NetBackup105 SnapshotManagerForCloud InstallGuide
NetBackup105 SnapshotManagerForCloud InstallGuide
Release 10.5
Veritas NetBackup™ Snapshot Manager for Cloud
Install and Upgrade Guide
Last updated: 2024-09-25
Legal Notice
Copyright © 2024 Veritas Technologies LLC. All rights reserved.
Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas
Technologies LLC or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This product may contain third-party software for which Veritas is required to provide attribution
to the third party (“Third-party Programs”). Some of the Third-party Programs are available
under open source or free software licenses. The License Agreement accompanying the
Software does not alter any rights or obligations you may have under those open source or
free software licenses. Refer to the Third-party Legal Notices document accompanying this
Veritas product or available at:
https://www.veritas.com/about/legal/license-agreements
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Veritas Technologies
LLC and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Veritas as on premises or
hosted services. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in
accordance with the terms of this Agreement.
Technical Support
Technical Support maintains support centers globally. All support services will be delivered
in accordance with your support agreement and the then-current enterprise technical support
policies. For information about our support offerings and how to contact Technical Support,
visit our website:
https://www.veritas.com/support
You can manage your Veritas account information at the following URL:
https://my.veritas.com
If you have questions regarding an existing support agreement, please email the support
agreement administration team for your region as follows:
Japan [email protected]
Documentation
Make sure that you have the current version of the documentation. Each document displays
the date of the last update on page 2. The latest documentation is available on the Veritas
website:
https://sort.veritas.com/documents
Documentation feedback
Your feedback is important to us. Suggest improvements or report errors or omissions to the
documentation. Include the document title, document version, chapter title, and section title
of the text on which you are reporting. Send feedback to:
You can also see documentation information or ask a question on the Veritas community site:
http://www.veritas.com/community/
https://sort.veritas.com/data/support/SORT_Data_Sheet.pdf
Contents
■ Verifying that specific ports are open on the instance or physical host
Category Requirement
Note: The single hostname or FQDN for NetBackup Snapshot Manager has limit
of 64 characters which is required at the time of installation.
Multi-alias feature is no longer supported for Snapshot Manager.
Installation of Snapshot Manager version 10.4 or later is not supported with backlevel
NetBackup Primary Server (10.2 or earlier). For the upgrade support from 10.2 or
earlier releases:
See “Upgrading NetBackup Snapshot Manager” on page 264.
Preparing for NetBackup Snapshot Manager for Cloud installation 23
Meeting system requirements
Table 2-2 System requirements for the NetBackup Snapshot Manager host
Amazon Web Services (AWS) ■ Elastic Compute Cloud (EC2) instance type: t3.large
instance ■ vCPUs: 2
■ RAM: 16 GB
■ Root disk: 64 GB with a solid-state drive (GP2)
■ Data volume: 50 GB Elastic Block Store (EBS) volume of
type GP2 with encryption for the snapshot asset database;
use the data volume as a starting value and expand your
storage as needed.
■ Register the RHEL instance with Red Hat using Red Hat
Subscription Manager
■ Extend the default LVM partitions on the RHEL instance
so that they fulfill the minimum disk space requirement
24 Preparing for NetBackup Snapshot Manager for Cloud installation
Meeting system requirements
Table 2-2 System requirements for the NetBackup Snapshot Manager host
(continued)
■ Register the RHEL instance with Red Hat using Red Hat
Subscription Manager
■ Extend the default LVM partitions on the RHEL instance
so that they fulfil the minimum disk space requirement
Table 2-2 System requirements for the NetBackup Snapshot Manager host
(continued)
■ /var
The /var file system is further used for container run times. Ensure that the host
on which you install or upgrade NetBackup Snapshot Manager has sufficient space
for the following components.
NetBackup Snapshot Manager agents 350 MB free space, for every NetBackup Snapshot
and plug-ins Manager plug-in and agent is configured.
/cloudpoint 50 GB or more
Following are the additional ports required for Single File Restore (SFR) from a
backup copy:
■ For Windows: Ports 139 and 445 must be open outbound from the clients
(target VMs on which on-host agents are running) to access SMB share from
the storage server(s).
■ For Linux: Ports 2049 and 111, the standard NFS ports, 2049 and 111 must
be open outbound from the clients (target VMs on which on-host agents are
running) to access NFS share from the storage server(s).
Category Support
■ Windows Server
■ Windows applications are not supported on OCI.
■ Oracle
Single node configurations are supported.
See “Oracle plug-in configuration requirements”
on page 218.
Category Support
Microsoft Azure
Category Support
NetBackup Y N Y Y
NetBackup Snapshot N Y Y Y
Manager
Recommended N N Y N
■ With fresh installation on RHEL 8 platform, and limited only to VM based (BYOD)
deployments.
32 Preparing for NetBackup Snapshot Manager for Cloud installation
NetBackup Snapshot Manager host sizing recommendations
Note: Any NetBackup Snapshot Manager deployments in OCI is not FIPS compliant.
Memory: 16 GB
Consider the following points while choosing a configuration for the NetBackup
Snapshot Manager host:
■ To achieve better performance in a high workload environment, Veritas
recommends that you deploy the NetBackup Snapshot Manager host in the
same location as that of the application hosts.
■ If you are using the agentless option, Veritas recommends that you allocate
enough space to the /opt/VRTScloudpoint directory on the application host.
NetBackup Snapshot Manager uses this directory for extracting the plug-in
configuration files.
■ Depending on the number of workloads, the amount of plug-in data that is
transmitted from the NetBackup Snapshot Manager host can get really large in
size. The network latency also plays a key role in such a case. You might see
a difference in the overall performance depending on these factors.
■ If you want to configure multiple workloads using the agentless option, then the
performance is dependent on factors such as the network bandwidth and the
location of the NetBackup Snapshot Manager host with respect to the application
workload instances. You can, if desired, bump up the NetBackup Snapshot
Manager host's CPU, memory, and network configuration to achieve a
performance improvement in parallel configurations of agentless application
hosts.
■ In cases where the number of concurrent operations is higher than what the
NetBackup Snapshot Manager host configuration capacity can handle,
NetBackup Snapshot Manager automatically puts the operations in a job queue.
The queued jobs are picked up only after the running operations are completed.
■ NetBackup automatically controls the number of parallel operations by the
number of disk attachment points available on the NetBackup Snapshot Manager
VM instance.
The NetBackup Snapshot Manager extension can have the configuration same or
higher as the NetBackup Snapshot Manager host.
See “ Meeting system requirements” on page 21.
Supported NetBackup Snapshot Manager extension environment:
Note: For NetBackup Snapshot Manager 10.0 or later, the VM based extensions
are supported on Azure Stack hub and Kubernetes based extension are supported
on Azure, AWS and GCP.
Memory: 16 GB
Memory: 32 GB or more
Platform Description
For detailed instructions on installing the Docker on Ubuntu, see Install Docker Engine on Ubuntu.
# sudo sestatus
The Current Mode parameter value in the command output should appear as permissive.
Note: If you ever start your instance without this volume attached (for example,
after moving the volume to another instance), the nofail mount option enables
the instance to start even if there are errors mounting the volume.
Table 2-11 Volume creation steps for each supported cloud vendor
Vendor Procedure
Amazon Web 1 On the EC2 dashboard, click Volumes > Create Volumes.
Services (AWS)
2 Follow the instructions on the screen and specify the following:
■ Volume type: General Purpose SSD
■ Size: 50 GB
Google Cloud Create the disk for the virtual machine, initialize it, and mount it to
Platform /cloudpoint.
Microsoft Azure 1 Create a new disk and attach it to the virtual machine. For more
information, see Use the portal to attach a data disk to a Linux
VM.
You should choose the managed disk option. For more information,
see Use the portal to attach a data disk to a Linux VM.
Microsoft Azure 1 Create a new disk and attach it to the virtual machine. For more
Stack Hub information, see Create VM disk storage in Azure Stack Hub.
Table 2-11 Volume creation steps for each supported cloud vendor
(continued)
Vendor Procedure
Oracle Cloud 1 Create a new disk and attach it to the VM. For more information,
Infrastructure see Oracle Documentation.
Port Description
443 The NetBackup Snapshot Manager user interface uses this port as the default
HTTPS port.
Note: If custom port is used at the time of deployment, the same custom
port must be enabled at the firewall.
5671 The NetBackup Snapshot Manager RabbitMQ server uses this port for
communications. This port must be open to support multiple agents,
extensions, backup from snapshot, and restore from backup jobs.
Note: (For AKS only) To enable swap space on Azure Kubernetes cluster for
NetBackup installation and NetBackup Snapshot Manager deployment on kubernetes
based extensions, follow the steps mentioned in Customize node configuration for
Azure Kubernetes Service (AKS) node pools.
Required ports:
■ Port required on NetBackup primary server: 1556 and 443
■ Ports required on NetBackup media server for client side deduplication: 10082
and 10102
If you use private names for installing certificates and communicating with
NetBackup, which must be resolved using /etc/hosts, then follow these steps:
■ Add entries in /cloudpoint/openv/etc/hosts file in the same format as in
/etc/hosts file.
■ Ensure that you use the private name during NetBackup Snapshot Manager
installation, as well as NetBackup Snapshot Manager registration.
Note: Any IPV6 configured NetBackup Snapshot Manager is not supported for
deployment in OCI.
Preparing for NetBackup Snapshot Manager for Cloud installation 41
OCI - iptables rules for backup from snapshot jobs
The contents of the iptable rules file resemble this example after commenting out
the rules present by default:
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [463:49013]
#:InstanceServices - [0:0]
#-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
#-A INPUT -p icmp -j ACCEPT
#-A INPUT -i lo -j ACCEPT
#-A INPUT -p udp --sport 123 -j ACCEPT
#-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
#-A INPUT -j REJECT --reject-with icmp-host-prohibited
#-A FORWARD -j REJECT --reject-with icmp-host-prohibited
#-A OUTPUT -d 169.254.0.0/16 -j InstanceServices
#-A InstanceServices -d 169.254.0.2/32 -p tcp -m owner --uid-owner
0 -m tcp --dport 3260 -m comment --comment "See the Oracle-Provided
Images section in the Oracle Cloud Infrastructure documentation for
security impact of modifying or removing this rule" -j ACCEPT
#-A InstanceServices -d 169.254.2.0/24 -p tcp -m owner --uid-owner
0 -m tcp --dport 3260 -m comment --comment "See the Oracle-Provided
Images section in the Oracle Cloud Infrastructure documentation for
security impact of modifying or removing this rule" -j ACCEPT
#-A InstanceServices -d 169.254.4.0/24 -p tcp -m owner --uid-owner
0 -m tcp --dport 3260 -m comment --comment "See the Oracle-Provided
Images section in the Oracle Cloud Infrastructure documentation for
security impact of modifying or removing this rule" -j ACCEPT
#-A InstanceServices -d 169.254.5.0/24 -p tcp -m owner --uid-owner
0 -m tcp --dport 3260 -m comment --comment "See the Oracle-Provided
Images section in the Oracle Cloud Infrastructure documentation for
security impact of modifying or removing this rule" -j ACCEPT
#-A InstanceServices -d 169.254.0.2/32 -p tcp -m tcp --dport 80 -m
comment --comment "See the Oracle-Provided Images section in the
42 Preparing for NetBackup Snapshot Manager for Cloud installation
OCI - iptables rules for backup from snapshot jobs
COMMIT
root@nbsm-host:/#
Restart the NetBackup Snapshot Manager instance after changing the iptable rules.
44 Preparing for NetBackup Snapshot Manager for Cloud installation
OCI - iptables rules for backup from snapshot jobs
Chapter 3
Deploying NetBackup
Snapshot Manager for
Cloud using container
images
This chapter includes the following topics:
Note: RedHat 8.x has replaced the Docker ecosystem with the Podman ecosystem.
Note: When you deploy NetBackup Snapshot Manager, you may want to copy the
commands below and paste them in your command line interface. If you do, replace
the information in these examples that is different from your own: the product and
build version, the download directory path, and so on.
Note: You must log on to the support site to download tar.gz image file.
From the Products drop-down, select NetBackup and select the required
version from the Version drop-down. Click Explore. Click Base and upgrade
installers.
The NetBackup Snapshot Manager image name resembles the following format
for Docker and Podman environment:
NetBackup_SnapshotManager_<version>.tar.gz
Note: The actual file name may vary depending on the release version.
# ls
NetBackup_SnapshotManager_10.5.x.x-xxxx.tar.gz
netbackup-flexsnap-10.5.x.x-xxxx.tar.gz
flexsnap_preinstall.sh
3 Run the following command to prepare the NetBackup Snapshot Manager host
for installation:
# sudo ./flexsnap_preinstall.sh
Deploying NetBackup Snapshot Manager for Cloud using container images 49
Installing NetBackup Snapshot Manager in the Docker/Podman environment
Options:
-h, --help
Print this message and exit
Command:
backup To create backup of Snapshot Manager metadata.
install To install the Snapshot Manager stack on a host.
recover To restore from backup copy Snapshot Manager
metadata.
renew To renew the Snapshot Manager certificates or
extension.
restart To restart the Snapshot Manager services on a host.
servers information.
truststore To list and update Snapshot Manager truststore.
uninstall To uninstall the Snapshot Manager stack on a host.
Options Description
Options Description
--chain <chain> Absolute path of certificate chain containing all intermediate CAs
and server certificate.
--crlpath <directory> Specify CRL directory location for non CDP based CRL
validation. Useful if Certificate Authority is not accessible from
Snapshot Manager host.
--passphrase <file> Specifies the path of file that contains the passphrase to access
the keystore. The first line in the file is used as passphrase.
Options Description
Note: The flexsnap_configure CLI uses privilege flag implicitly (-u 0).
The installer displays messages similar to the following for interactive CLI
(NBCA):
# flexsnap_configure install -i
Please provide NetBackup Primary details:
NetBackup primary server IP Address or FQDN: <nbu_primary_fqdn>
Start configuring with NetBackup CA certificate.
Provide NetBackup authentication token: <security_token>
NetBackup Snapshot Manager hostname for TLS certificate (64
char FQDN limit): <snapshot_manager_fqdn>
Port (default:443):
Configuration started at time: Wed Jan 3 05:33:08 UTC 2024
Podman server version: 4.2.0
This is a fresh install of NetBackup Snapshot Manager
10.5.x.x-xxxx
Creating network: flexsnap-network ...done
Starting container: flexsnap-fluentd ...done
52 Deploying NetBackup Snapshot Manager for Cloud using container images
Installing NetBackup Snapshot Manager in the Docker/Podman environment
The installer displays messages similar to the following for interactive CLI
under ECA:
# flexsnap_configure install -i
Please provide NetBackup Primary details:
NetBackup primary server IP Address or FQDN: <nbu_primary_fqdn>
Start configuring external CA certificate.
Absolute path of the root CA certificate file: <root_ca_file>
Absolute path of server private key file: <server_key_file>
Absolute path of server certificate chain: <server_chain_file>
Absolute path of key passphrase file (Press ENTER if keyfile
is non encrypted): <server_passphrase_file>
Absolute path of CRL directory (Press ENTER for CDP based CRL
check): <crl_path>
CRL check level, Press ENTER for default 1 i.e. LEAF (0:
DISABLE, 1: LEAF and 2:CHAIN): <crl_level>
NetBackup Snapshot Manager hostname for TLS certificate (64
char FQDN limit): <snapshot_manager_fqdn>
Port (default:443): <snapshot_manager_port>
Configuration started at time: Tue Jan 2 10:44:07 UTC 2024
Podman server version: 4.2.0
This is a fresh install of NetBackup Snapshot Manager
10.5.x.x-xxxx
Creating network: flexsnap-network ...done
Starting container: flexsnap-fluentd ...done
Creating container: flexsnap-postgresql ...done
Deploying NetBackup Snapshot Manager for Cloud using container images 53
Installing NetBackup Snapshot Manager in the Docker/Podman environment
Parameter Description
Following parameters are required only if the instance uses a proxy server
<http_proxy_value> Represents the value to be used as the HTTP proxy for all
connections.
<https_proxy_value> Represents the value to be used as the HTTPS proxy for all
connections.
<no_proxy_value> Represents the addresses that are allowed to bypass the proxy
server. You can specify host names, IP addresses, and domain
names in this parameter.
Note:
6 Use the following docker command to view the docker images that are loaded
on the host:
■ (For Docker) # sudo docker images
■ (For Podman) # sudo podman images
The output resembles as follows:
Parameter Description
Host name for Specify the IP address or the Fully Qualified Domain Name (FQDN)
TLS certificate of the NetBackup Snapshot Manager host.
Port Specify the port through which the NetBackup Snapshot Manager
can communicate. Default is port 443.
Note: After the deployment of NetBackup Snapshot Manager, ensure that the
IPv6 interface on the system is not disabled.
Note: If you ever need to restart NetBackup Snapshot Manager, use the docker
run command so that your environmental data is preserved.
Note: The CIL policy for Podman based deployments would be automatically loaded
and applied for RHEL 8 and 9.
5 Use OpenScap tool to remediate the machine with the following set of rules
required for NetBackup Snapshot Manager:
xccdf_org.ssgproject.content_rule_package_iptables-services_removed
xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_forwarding
xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward
Following is an example for using the oscap command with the remediate
option:
# oscap xccdf eval --skip-rule
xccdf_org.ssgproject.content_rule_accounts_tmout --results
demo-remediate2.xml --profile
xccdf_org.ssgproject.content_profile_cis --remediate
/usr/share/xml/scap/ssg/content/ssg-rhel8-ds-1.2.xml
xccdf_org.ssgproject.content_rule_accounts_tmout
xccdf_org.ssgproject.content_rule_auditd_data_retention_admin_space_left_action
xccdf_org.ssgproject.content_rule_auditd_data_retention_max_log_file_action
xccdf_org.ssgproject.content_rule_auditd_data_retention_space_left_action
xccdf_org.ssgproject.content_rule_banner_etc_issue
xccdf_org.ssgproject.content_rule_banner_etc_issue_net
xccdf_org.ssgproject.content_rule_grub2_uefi_password
xccdf_org.ssgproject.content_rule_mount_option_var_noexec
xccdf_org.ssgproject.content_rule_package_bind_removed
xccdf_org.ssgproject.content_rule_package_cups_removed
xccdf_org.ssgproject.content_rule_package_dhcp_removed
xccdf_org.ssgproject.content_rule_package_dovecot_removed
xccdf_org.ssgproject.content_rule_package_httpd_removed
xccdf_org.ssgproject.content_rule_package_mcstrans_removed
xccdf_org.ssgproject.content_rule_package_net-snmp_removed
xccdf_org.ssgproject.content_rule_package_openldap-clients_removed
Deploying NetBackup Snapshot Manager for Cloud using container images 61
Securing the connection to NetBackup Snapshot Manager
xccdf_org.ssgproject.content_rule_package_rsync_removed
xccdf_org.ssgproject.content_rule_package_samba_removed
xccdf_org.ssgproject.content_rule_package_setroubleshoot_removed
xccdf_org.ssgproject.content_rule_package_squid_removed
xccdf_org.ssgproject.content_rule_package_talk_removed
xccdf_org.ssgproject.content_rule_package_telnet-server_removed
xccdf_org.ssgproject.content_rule_package_tftp-server_removed
xccdf_org.ssgproject.content_rule_package_vsftpd_removed
xccdf_org.ssgproject.content_rule_package_xinetd_removed
xccdf_org.ssgproject.content_rule_package_xorg-x11-server-common_removed
xccdf_org.ssgproject.content_rule_package_ypserv_removed
xccdf_org.ssgproject.content_rule_rsyslog_files_permissions
xccdf_org.ssgproject.content_rule_selinux_state
xccdf_org.ssgproject.content_rule_service_firewalld_enabled
xccdf_org.ssgproject.content_rule_set_firewalld_default_zone
xccdf_org.ssgproject.content_rule_sudo_require_authentication
xccdf_org.ssgproject.content_rule_sudo_require_reauthentication
■ For NBCA and ECA mixed mode continue with ECA mode for NetBackup
Snapshot Manager installation.
For more information, refer to the following sections of the NetBackup™ Security
and Encryption Guide.
■ About the host ID-based certificate revocation list
Deploying NetBackup Snapshot Manager for Cloud using container images 63
Securing the connection to NetBackup Snapshot Manager
Note: Cache is not validated if any of ECA tuneable are added or modified manually
inside the /cloudpoint/flexsnap.conf file.
■ ECA to NBCA:
Or
66 Deploying NetBackup Snapshot Manager for Cloud using container images
Verifying that NetBackup Snapshot Manager is installed successfully
Note: If the installation of NetBackup Snapshot Manager fails, then the user
must remove the stale containers and flexsnap-network by performing the
uninstall steps and attempt the installation again.
See “Preparing to uninstall NetBackup Snapshot Manager” on page 291.
■ Run the following command and verify that the NetBackup Snapshot Manager
services are running and the status is displayed as UP:
For Docker environment: # sudo docker ps -a
For Podman environment: # sudo podman ps -a
The command output resembles the following:
CONTAINER ID IMAGE
COMMAND CREATED STATUS
PORTS
NAMES
b13a96fbefa1 veritas/flexsnap-core:10.5.x.x-xxxx
"/usr/bin/flexsnap-w…" 4 hours ago Up 4 hours
flexsnap-workflow-system-0-min
a3a6c801d7aa veritas/flexsnap-core:10.5.x.x-xxxx
"/usr/bin/flexsnap-w…" 4 hours ago Up 4 hours
flexsnap-workflow-general-0-min
b9cd09ab7797 veritas/flexsnap-nginx:10.5.x.x-xxxx
"/usr/sbin/nginx" 4 hours ago Up 4 hours
0.0.0.0:443->443/tcp, :::443->443/tcp, 0.0.0.0:5671->5671/tcp,
:::5671->5671/tcp flexsnap-nginx
7fd258cb575a veritas/flexsnap-core:10.5.x.x-xxxx
"/usr/bin/flexsnap-n…" 4 hours ago Up 4 hours
flexsnap-notification
9c06318b001a veritas/flexsnap-core:10.5.x.x-xxxx
"/usr/bin/flexsnap-p…" 4 hours ago Up 4 hours
flexsnap-policy
Deploying NetBackup Snapshot Manager for Cloud using container images 67
Verifying that NetBackup Snapshot Manager is installed successfully
031f853377a5 veritas/flexsnap-core:10.5.x.x-xxxx
"/usr/bin/flexsnap-s…" 4 hours ago Up 4 hours
flexsnap-scheduler
dfbcaeda1463 veritas/flexsnap-core:10.5.x.x-xxxx
"/usr/bin/flexsnap-a…" 4 hours ago Up 4 hours
flexsnap-onhostagent
253e7284a945 veritas/flexsnap-core:10.5.x.x-xxxx
"/usr/bin/flexsnap-a…" 4 hours ago Up 4 hours
flexsnap-agent
d54eed8434fe veritas/flexsnap-core:10.5.x.x-xxxx
"/usr/bin/flexsnap-l…" 4 hours ago Up 4 hours
flexsnap-listener
759e4ee9653b veritas/flexsnap-core:10.5.x.x-xxxx
"/usr/bin/flexsnap-c…" 4 hours ago Up 4 hours
flexsnap-coordinator
28c88bdc1ca2 veritas/flexsnap-core:10.5.x.x-xxxx
"/usr/bin/flexsnap-g…" 4 hours ago Up 4 hours
8472/tcp
flexsnap-api-gateway
dd5018d5e9f9 veritas/flexsnap-core:10.5.x.x-xxxx
"/usr/bin/flexsnap-c…" 4 hours ago Up 4 hours
9000/tcp
flexsnap-certauth
0e7555e38bb9 veritas/flexsnap-rabbitmq:10.5.x.x-xxxx
"/opt/VRTScloudpoint…" 4 hours ago Up 4 hours (healthy)
5671/tcp
flexsnap-rabbitmq
b4953f328e8d veritas/flexsnap-postgresql:10.5.x.x-xxxx
"/opt/VRTScloudpoint…" 4 hours ago Up 4 hours (healthy)
13787/tcp
flexsnap-postgresql
cf4a731c07a6 veritas/flexsnap-deploy:10.5.x.x-xxxx
"/opt/VRTScloudpoint…" 4 hours ago Up 4 hours
flexsnap-ipv6config
9407ea65a337 veritas/flexsnap-fluentd:10.5.x.x-xxxx
"/opt/VRTScloudpoint…" 4 hours ago Up 4 hours
68 Deploying NetBackup Snapshot Manager for Cloud using container images
Restarting NetBackup Snapshot Manager
0.0.0.0:24224->24224/tcp, :::24224->24224/tcp
flexsnap-fluentd
to service a large number of jobs, and then scale in as well when the jobs have
completed.
Note: Ensure that you use the same tag as that of NetBackup Snapshot Manager
image version. Custom tag cannot be used.
Note: If custom port is used instead of port 443, then ensure that the custom
port is opened on firewall to allow communication between NetBackup Snapshot
Manager extension and NetBackup Snapshot Manager.
Note: For the VM-based extension you do not need to download the extension.
Proceed directly to steps 7 and 8 to copy the token.
Note: The token is valid for 180 seconds only. If you do not use the token within
that time frame, generate a new token.
Deploying NetBackup Snapshot Manager for Cloud extensions 75
Installing the NetBackup Snapshot Manager extension on a VM
Note: The actual file name varies depending on the release version.
■ For the VM based extension installed on a RHEL OS, the SElinux mode must
be "permissive".
■ Network Security Groups used by the host that is being protected should allow
communication from the host where the extension is installed, on the specified
ports.
76 Deploying NetBackup Snapshot Manager for Cloud extensions
Installing the NetBackup Snapshot Manager extension on a VM
Or
Use the following equivalent docker/podman command to install Snapshot
Manager extension:
■ For docker environment:
2 Navigate to the NetBackup Web UI and follow the steps 7 and 8 described in
the section Downloading NetBackup Snapshot Manager extension to generate
and copy the validation token.
See “Downloading the NetBackup Snapshot Manager extension” on page 74.
Note: For the VM-based extension you do not need to download the extension.
Proceed directly to steps 7 and 8 to copy the token.
Parameter Description
Note: Veritas does not recommend the registration of kubernetes extensions for
Snapshot Manager in Kubernetes cluster.
Deploying NetBackup Snapshot Manager for Cloud extensions 79
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
Overview
■ Your Azure managed Kubernetes cluster should already be deployed with
appropriate network and configuration settings, and with specific roles. The
cluster must be able to communicate with NetBackup Snapshot Manager.
The required roles are: Azure Kubernetes Service RBAC Writer, AcrPush,
Azure Kubernetes Service Cluster User Role
For supported Kubernetes versions, refer to the NetBackup Snapshot Manager
Hardware Compatibility List (HCL).
■ Use an existing Azure Container Registry or create a new one, and ensure that
the managed Kubernetes cluster has access to pull images from the container
registry
■ A dedicated nodepool for NetBackup Snapshot Manager workloads needs to
be created with manual scaling or 'Autoscaling' enabled in the Azure managed
Kubernetes cluster. The autoscaling feature allows your nodepool to scale
dynamically by provisioning and de-provisioning the nodes as required
automatically.
■ NetBackup Snapshot Manager extension images (flexsnap-deploy,
flexsnap-core, flexsnap-fluentd, flexsnap-datamover) need to be
uploaded to the Azure container registry.
■ Ensure that you create an Azure Container Registry or use the existing one if
available, to which the NetBackup Snapshot Manager images will be pushed
(uploaded). See Azure documentation.
■ To run the kubectl and container registry commands from the host system,
assign the following role permissions to your VM and cluster. You can assign a
'Contributor', 'Owner', or any custom role that grants full access to manage all
resources.
■ Navigate to your Virtual Machine and click Identity on the left.
Under System assigned tab, turn the Status to 'ON'.
Click Azure role assignment and click Add role assignments and select
Scope as 'Subscription' or 'Resource Group'.
Select Role and assign the following roles :
Azure Kubernetes Service RBAC Writer, AcrPush, Azure Kubernetes Service
Cluster User Role, and click Save.
■ Navigate to your Kubernetes cluster and click Access Control (IAM) on the
left .
Click Add role assignments and select Role as 'Contributor '.
Select Assign access to as 'Virtual Machines' and select your VM from the
drop-down and click Save.
■ While defining StorageClass consider using CSI provisioner for Azure Files
with NFS protocol.
For example,
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: test-sc
Deploying NetBackup Snapshot Manager for Cloud extensions 81
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
parameters:
skuName: Premium_LRS
protocol: nfs
provisioner: file.csi.azure.com
reclaimPolicy: Retain
volumeBindingMode: WaitForFirstConsumer
■ Create a namespace for NetBackup Snapshot Manager from the command line
interface on host system:
# kubectl create namespace cloudpoint-system
Note: Do not create the authentication token yet, as it is valid only for 180
seconds.
2 If the host from which you want to install the extension is not the same host
where your NetBackup Snapshot Manager is installed, load the NetBackup
Snapshot Manager container images on the extension host (flexsnap-deploy,
flexsnap-core, flexsnap-fluentd, flexsnap-datamover)
Parameter Description
container_registry_path To obtain the container registry path, go to your container registry in Azure and from
the Overview pane, copy the 'Login server'.
Example: mycontainer.azurecr.io
Example: 10.5.x.x-xxxx
■ To tag the images, run the following command for each image, depending
on the container platform running on your host:
For Docker: # docker tag source_image:tag target_image:tag
For Podman: # podman tag source_image:tag target_image:tag
Where,
■ the source image tag is: veritas/flexsnap-deploy:tag>
■ the target image tag is:
<container_registry_path>/<source_image_name>:<SnapshotManager_version_tag>
Example:
Deploying NetBackup Snapshot Manager for Cloud extensions 83
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
4 Then to push the images to the container registry, run the following command
for each image, depending on the container platform running on your host:
For Docker: # docker push target_image:tag
For Podman: # podman push target_image:tag
Example:
5 Once the images are pushed to the container registry, execute the extension
script cp_extension.sh that was downloaded earlier, from the host where
kubectl is installed. The script can be executed either by providing all the
required input parameters in one command, or in an interactive way where you
will be prompted for input.
Gather the following parameters before running the script:
Parameter Description
snapshotmanager_ip Provide IP address or FQDN of the main NetBackup Snapshot Manager host.
target_image:tag Target image tag created for the flexsnap-deploy image in step 3.
Example:
mycontainer.azurecr.io/veritas/flexsnap-deploy:10.5.x.x-xxxx
namespace NetBackup Snapshot Manager namespace that was created earlier in the preparation
steps.
84 Deploying NetBackup Snapshot Manager for Cloud extensions
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
Parameter Description
storage_class Kubernetes storage class that was created earlier in the preparation steps.
Example: cloudpoint-sc
workflow_token Authentication token created from the NetBackup Web UI - Add extension dialog.
■ Run the installation command with all the input parameters described in
the above table:
./cp_extension.sh install -c <snapshotmanager_ip> -i
<target_image:tag> -n <namespace> -p <tag_key=tag_val> -s
<storage_class> -t <workflow_token> -k <Size (In GiB)>
Example:
./cp_extension.sh install
Snapshot Manager image repository path. Format=<Login-server/image:tag>:
cpautomation.azurecr.io/veritas/flexsnap-deploy:10.5.x.x-xxxx
Snapshot Manager extension namespace: snapshot-manager
Deploying NetBackup Snapshot Manager for Cloud extensions 85
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
■ When the script runs, provide the input parameters as described in the
above table:
./cp_extension.sh install
Snapshot Manager image repository path. Format=<Login-server/image:tag>:
cpautomation.azurecr.io/veritas/flexsnap-deploy:10.5.x.x-xxxx
Snapshot Manager extension namespace: snapshot-manager
Snapshot Manager IP or fully-qualified domain name: 10.244.79.38
Node group/pool label with format key=value: agentpool=extpool
Storage class name: azurefile
Size in GiB (minimum 30 GiB, Please refer NetBackup Snapshot Manager
86 Deploying NetBackup Snapshot Manager for Cloud extensions
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
Note: The output examples have been formatted to fit the screen.
See “Verifying that specific ports are open on the instance or physical host”
on page 39.
■ Install a Docker or Podman container platform on the host and start the container
service.
See Table 2-10 on page 37.
■ It is not recommended to change scale settings of the cluster nodegroup when
jobs are running. Disable the extension when jobs are not running, then change
the scale settings and enable the extension for new jobs.
■ Prepare the NetBackup Snapshot Manager host to access Kubernetes cluster
within your AWS environment.
■ Install AWS CLI. For more information, refer to the AWS Command Line
Interface.
■ Install Kubernetes CLI. For more information, refer to the Installing kubectl
documentation.
■ Create an AWS Container Registry or use the existing one if available, to
which the NetBackup Snapshot Manager images will be pushed (uploaded).
Configure the minimum and maximum nodes as per the requirement.
For more information, refer to the AWS documentation Amazon Elastic
Container Registry documentation.
■ Create the OIDC provider for the AWS EKS cluster. For more information,
refer to the Create an IAM OIDC provider for your cluster section of the
Amazon EKS User Guide.
■ Create an IAM service account for the AWS EKS cluster. For more
information, refer to the Amazon EKS User Guide.
■ If an IAM role needs an access to the EKS cluster, run the following command
from the system that already has access to the EKS cluster:
kubectl edit -n kube-system configmap/aws-auth
For more information, refer to the Enabling IAM user and role access to your
cluster section of the Amazon EKS User Guide.
■ Install Amazon EFS driver. For more information, refer to the Amazon EFS
CSI driver section of the Amazon EKS User Guide.
■ Login to the AWS environment to access the Kubernetes cluster by running
this command on AWS CLI:
# aws eks --region <region_name> update-kubeconfig --name
<cluster_name>
■ Create a storage class. For more information, refer to the Storage classes section
of the Amazon EKS User Guide.
Deploying NetBackup Snapshot Manager for Cloud extensions 89
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
■ Create a namespace for NetBackup Snapshot Manager from the command line
on host system:
# kubectl create namespace cloudpoint-system
■ Then create a new or use an existing managed Kubernetes cluster in AWS, and
add a new node pool dedicated for NetBackup Snapshot Manager use. Configure
Autoscaling as per your requirement.
■ While defining StorageClass, set uid/gid to the root.
Following is an example for StorageClass:
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: efs-sc1
parameters:
basePath: /dynamic_provisioning_bhakti
directoryPerms: "700"
fileSystemId: fs-03e18dc283779991e
gid: "0"
provisioningMode: efs-ap
uid: "0"
provisioner: efs.csi.aws.com
reclaimPolicy: Delete
volumeBindingMode: Immediate
Note: Do not create the authentication token yet, as it is valid only for 180
seconds.
2 If the host from which you want to install the extension is not the same host
where your NetBackup Snapshot Manager is installed, load the NetBackup
Snapshot Manager container images on the extension host (flexsnap-deploy,
flexsnap-core, flexsnap-fluentd, flexsnap-datamover)
Parameter Description
Example:
<accoint_id>.dkr.ecr.us-east-2.amazonaws.com/veritas/flexsnap-datamover
Example: 10.5.x.x-xxxx
■ To tag the images, run the following command for each image, depending
on the container platform running on your host:
For Docker: # docker tag source_image:tag target_image:tag
For Podman: # podman tag source_image:tag target_image:tag
Where,
■ the source image tag is: veritas/flexsnap-deploy:tag>
■ the target image tag is:
<container_registry_path>/<source_image_name>:<SnapshotManager_version_tag>
Deploying NetBackup Snapshot Manager for Cloud extensions 91
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
Example:
4 Then to push the images to the container registry, run the following command
for each image, depending on the container platform running on your host:
For Docker: # docker push target_image:tag
For Podman: # podman push target_image:tag
Example:
5 Once the images are pushed to the container registry, you can install the
extension using one of the following methods:
■ Kustomization and custom resource YAML files: Create and apply the
kustomization.yaml and cloudpoint_crd.yaml files based on the samples
provided.
See “Install extension using the Kustomize and CR YAMLs” on page 104.
■ Extension script: Execute the extension script cp_extension.sh that is
packaged within the 'tar' file that was downloaded earlier. The script can
be executed either by providing all the required input parameters in one
command, or in an interactive way where you will be prompted for input.
See “Install extension using the extension script” on page 92.
92 Deploying NetBackup Snapshot Manager for Cloud extensions
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
After following the above instructions, you can verify if the extension was installed
successfully.
To verify that the extension is installed successfully:
■ Verify that the success message is displayed at the command prompt.
■ Verify that the extension is listed on the NetBackup Web UI.
Navigate to Cloud > NetBackup Snapshot Manager tab.
Click Advanced settings and go to NetBackup Snapshot Manager extensions
tab and verify.
■ Run the following command and verify that there are five pods, namely,
flexsnap-deploy-xxx, flexsnap-fluentd-xxx, flexsnap-listener-xxx and
flexsnap-fluentd-collector-xxx are in Running state:
# kubectl get pods -n <namespace>
Example: # kubectl get pods -n cloudpoint-system
Parameter Description
Example:
<account_id>.dkr.ecr.us-east-2.amazonaws.com/veritas/flexsnap-deploy:10.5.x.x-xxxx
namespace The namespace that was created earlier in the preparation steps, in
which to deploy NetBackup Snapshot Manager.
tag_key=tag_val tag_key and tag_val are the label key and value pair defined for the
node on which you want to install the extension. The label key-value pair
can be retrieved by using the command kubectl describe node
<node_name> -n <namespace>
Example: eks.amazonaws.com/nodegroup=Demo-NG
storage_class Kubernetes storage class that was created earlier in the preparation
steps.
Example: cloudpoint-sc
Parameter Description
workflow_token Authentication token created from the NetBackup Web UI - Add extension
dialog.
■ Run the installation command with all the input parameters described in the
above table:
./cp_extension.sh install -c <snapshotmanager_ip> -i
<target_image:tag> -n <namespace> -p <tag_key=tag_val> -f
<storage_class> -t <workflow_token>
Example:
-n cloudpoint-system -p eks.amazonaws.com/nodegroup=td-nodepool-dnd
-s efs-sc -k 50
-t <workflow_token>
clusterrole.rbac.authorization.k8s.io/cloudpoint-cloudpoint-system
unchanged
clusterrolebinding.rbac.authorization.k8s.io/cloudpoint-rolebinding-cloudpoint-system
unchanged
customresourcedefinition.apiextensions.k8s.io/cloudpoint-servers.veritas.com
created
94 Deploying NetBackup Snapshot Manager for Cloud extensions
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
customresourcedefinition.apiextensions.k8s.io/cloudpoint-servers.veritas.com
condition
met
Generating Snapshot Manager Custom Resource Definition object
cloudpointrule.veritas.com/cloudpoint-config-rule created
Snapshot Manager extension installation ...done
■ When the script runs, provide the input parameters as described in the above
table.
Example:
./cp_extension.sh install
deployment.apps/flexsnap-deploy created
serviceaccount/cloudpoint-acc created
clusterrole.rbac.authorization.k8s.io/cloudpoint-cloudpoint-system
unchanged
clusterrolebinding.rbac.authorization.k8s.io/cloudpoint-rolebinding-cloudpoint-system
unchanged
customresourcedefinition.apiextensions.k8s.io/cloudpoint-servers.veritas.com
created
Note: The output examples may be formatted or truncated to fit the screen.
Note: The NetBackup Snapshot Manager and all the cluster nodepools must
be in the same zone.
apiVersion: v1
kind: PersistentVolume
metadata:
name: <name of the pv>
spec:
capacity:
storage: <size in GB>
accessModes:
- ReadWriteMany
nfs:
path: <path to the dir created above>
server: <ip of the filestore>
Note: Do not create the authentication token yet, as it is valid only for 180
seconds.
2 If the host from which you want to install the extension is not the same host
where your NetBackup Snapshot Manager is installed, load the NetBackup
Snapshot Manager container images on the extension host (flexsnap-deploy,
flexsnap-core, flexsnap-fluentd, flexsnap-datamover)
Parameter Description
Example: gcr.io/<project-name>/<dir>
Example: 10.5.x.x-xxxx
■ To tag the images, run the following command for each image, depending
on the container platform running on your host:
For Docker: # docker tag source_image:tag target_image:tag
For Podman: # podman tag source_image:tag target_image:tag
Where,
■ the source image tag is: veritas/flexsnap-deploy:tag>
■ the target image tag is:
<container_registry_path>/<source_image_name>:<SnapshotManager_version_tag>
Example:
veritas/flexsnap-deploy:10.5.x.x-xxxx
# docker tag veritas/flexsnap-core:10.5.x.x-xxxx
gcr.io/<project-name>/
veritas/flexsnap-listener:10.5.x.x-xxxx
# docker tag veritas/flexsnap-fluentd:10.5.x.x-xxxx
gcr.io/<project-name>/
veritas/flexsnap-fluentd:10.5.x.x-xxxx
# docker tag veritas/flexsnap-datamover:10.5.x.x-xxxx
gcr.io/<project-name>/
veritas/flexsnap-datamover:10.5.x.x-xxxx
4 To push the images to the container registry, run the following command for
each image, depending on the container platform running on your host:
For Docker: # docker push target_image:tag
For Podman: # podman push target_image:tag
Example:
# docker push
gcr.io/<project-name>/veritas/flexsnap-deploy:10.5.x.x-xxxx
# docker push
gcr.io/<project-name>/veritas/flexsnap-core:10.5.x.x-xxxx
# docker push
gcr.io/<project-name>/veritas/flexsnap-fluentd:10.5.x.x-xxxx
# docker push
gcr.io/<project-name>/veritas/flexsnap-datamover:10.5.x.x-xxxx
Parameter Description
Example:
gcr.io/<project-name>/veritas/flexsnap-deploy:10.5.x.x-xxxx
Deploying NetBackup Snapshot Manager for Cloud extensions 101
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
Parameter Description
■ Run the installation command with all the input parameters described in
the above table:
./cp_extension.sh install -c <snapshotmanager-ip> -i
<target-image:tag> -n <namespace> -p
cloud.google.com/gke-nodepool=<nodepool-name> -v
<persistent-volume-name> -k <size-in-GiB> -t <token>
Example:
# ./cp_extension.sh install
Snapshot Manager image repository path.
Format=<Login-server/image:tag>:
gcr.io/cloudpoint-development/test/veritas/flexsnap-deploy:10.5.x.x-xxxx
Snapshot Manager extension namespace: test-ns
Snapshot Manager IP or fully-qualified domain name: <ip
Address>
102 Deploying NetBackup Snapshot Manager for Cloud extensions
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
unchanged
deployment.apps/flexsnap-operator created
Snapshot Manager service deployment ...done
customresourcedefinition.apiextensions.k8s.io/cloudpoint-servers.veritas.com
condition met
Generating Snapshot Manager Custom Resource Definition object
Waiting for deployment "flexsnap-operator" rollout to finish:
0 of 1 updated
replicas are available...
deployment "flexsnap-operator" successfully rolled out
cloudpointrule.veritas.com/cloudpoint-config-rule created
Snapshot Manager extension installation ...
Operator operations passed
Waiting for all components to come up ...Done
[root@xxxx]# kubectl get pods
NAME READY STATUS
RESTARTS AGE
flexsnap-fluentd-collector-79f4dd8447-5lgrf 1/1 Running
0 34s
Deploying NetBackup Snapshot Manager for Cloud extensions 103
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
■ When the script runs, provide the input parameters as described in the
above table:
./cp_extension.sh install
Snapshot Manager image repository path.
Format=<Login-server/image:tag>: cpautomation.gcr.io/
<project-name>/veritas/flexsnap-deploy:10.5.x.x-xxxx
Snapshot Manager extension namespace: snapshot-manager
Snapshot Manager IP or fully-qualified domain name: xx.xxx.xx.xx
Node group/pool label with format key=value: agentpool=extpool
Persistent volume name:
Size in GiB (minimum 30 GiB,
Please refer NetBackup Snapshot Manager Install and Upgrade Guide
for PV size): 50
Snapshot Manager extension token:
This is a fresh NetBackup Snapshot Manager Extension Installation
cloudpointrule.veritas.com/cloudpoint-config-rule created
Snapshot Manager extension installation ...
Operator operations passed
Waiting for all components to come up ...Done
Waiting for all components to come up ...Done
Note: The output examples have been formatted to fit the screen.
Parameter Description
Example:
<account_id>.dkr.ecr.us-east-2.amazonaws.com/veritas/flexsnap-deploy
Example: 10.5.x.x-xxxx
namespace The namespace that was created earlier in the preparation steps,
in which to deploy NetBackup Snapshot Manager.
Example:
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- cloudpoint_service.yaml
patchesStrategicMerge:
- node_select.yaml
namespace: demo-cloudpoint-ns
images:
- name: CLOUDPOINT_IMAGE
newName:
<account_id>.dkr.ecr.us-east-2.amazonaws.com/veritas/flexsnap-deploy
newTag: 10.5.x.x-xxxx
vars:
- name: ServiceAccount.cloudpoint-acc.metadata.namespace
objref:
kind: ServiceAccount
name: cloudpoint-acc
apiVersion: v1
fieldref:
fieldpath: metadata.namespace
configurations:
- cloudpoint_kustomize.yaml
cloudpoint_service.yaml
If deploying the extension on GCP platform, then in cloudpoint_service.yaml,
replace the storageClassName with volumeName.
106 Deploying NetBackup Snapshot Manager for Cloud extensions
Install extension using the Kustomize and CR YAMLs
cloudpoint_crd.yaml
Edit the cloudpoint_crd.yaml manifest file as follows:
■ For GCP platform: Delete the line with storageClassName word in it.
■ For Non-GCP platform: Delete the line with volumeName word in it.
Now update the parameters in the Spec section with relevant values as described
in the following table.
Parameter Description
Example: efs-sc-new-root
Note: Not required for GCP platform.
Example:
apiVersion: veritas.com/v1
kind: CloudpointRule
metadata:
name: cloudpoint-config-rule
namespace: demo-cloudpoint-ns
spec:
CLOUDPOINT_HOST: 3.17.**.*** .
CLOUDPOINT_EXTENSION_TOKEN: <extension_token>
RENEW: false
Deploying NetBackup Snapshot Manager for Cloud extensions 107
Install extension using the Kustomize and CR YAMLs
LOG_STORAGE:
STORAGE_CLASS_NAME: efs-sc-new
SIZE: 100
node_select.yaml
Navigate to nodeSelector under the Spec section and replace the values of
NODE_AFFINITY_KEY and NODE_AFFINITY_VALUE in the node_select.yaml
file. User can obtain these details using the following commands:
■ Use the following command to obtain the name of any node from the dedicated
node-pool for our extension:
# kubectl get nodes
■ Depending on the specific cloud provider, use the following respective commands
based on the the tag key=value label:
■ For Azure: # kubectl describe node <node_name> | grep -i labels
Output example: agentpool=azure-node-pool
■ For AWS: # kubectl describe node <node_name> | grep -i
<node_group_name>
Output example: eks.amazonaws.com/nodegroup=aws-node-pool
■ For GCP: # kubectl describe node <node_name> | grep -i
<node_pool_name>
Output example: cloud.google.com/gke-nodepool=gcp-node-pool
Parameter Description
Then run the following commands from the folder where the YAML files are located.
■ To apply the Kustomization YAML: kubectl apply -k <location of the
kustomization.yaml file>
Option Procedure
Disable or enable the You can disable or enable the extensions from the NetBackup Web
extension: UI
Option Procedure
# ./cp_extension.sh renew
By default, snapshots taken on the assets discovered are only crash consistent.
To perform filesystem and application consistent snapshot or single file restores
on VM's, user must configure agents for their VM's. For more information on
configuring the agents, refer to the following section:
See “Installing and configuring NetBackup Snapshot Manager agent” on page 200.
Note: Before you configure the AWS plug-in, ensure that you have enabled the
regions that you want to protect and configured the proper permissions so that
NetBackup Snapshot Manager can work with your AWS assets.
VPC Endpoint First DNS name of AWS Security Token Service (STS)
endpoint service with no zone specified.
114 NetBackup Snapshot Manager for cloud providers
AWS plug-in configuration notes
Role Name The IAM role that is attached to the other AWS account
(cross account).
VPC Endpoint First DNS name of AWS Security Token Service (STS)
endpoint service with no zone specified.
For example,
vpce-044994fccdfd11b6f-k5hd5cx1.
sts.us-east-2.vpce.amazonaws.com
Note: Amazon Web Services recommends using the regional endpoint instead of
global endpoints.
■ ec2.*.amazonaws.com
■ sts.*.amazonaws.com
■ rds.*.amazonaws.com
■ kms. *.amazonaws.com
NetBackup Snapshot Manager for cloud providers 115
AWS plug-in configuration notes
■ ebs.*.amazonaws.com
■ iam.*.amazonaws.com
■ eks.*.amazonaws.com
■ autoscaling.*.amazonaws.com
■ (For DBPaaS protection) dynamodb.*.amazonaws.com,
redshift.*.amazonaws.com
■ (For provider managed consistency) ssm.*.amazonaws.com
In addition, you must specify the following resources and actions:
■ ec2.SecurityGroup.*
■ ec2.Subnet.*
■ ec2.Vpc.*
■ ec2.createInstance
■ ec2.runInstances
assets. When Redshift cluster is in the available state, assets are marked as
Active on NetBackup UI; otherwise, assets are marked as Inactive.
■ You cannot delete automated snapshots of RDS instances, Redshift clusters,
and Aurora clusters through NetBackup Snapshot Manager.
■ The application consistency of AWS RDS applications depend on the behavior
of AWS. (AWS suspends I/O while backing up the DB instance).
This is a limitation from AWS and is currently outside the scope of NetBackup
Snapshot Manager.
■ All automated snapshot names start with the pattern rds:. For Redshift clusters,
it starts with rs:
■ If you are configuring the plug-in to discover and protect AWS Nitro-based
Windows instances that use NVMe EBS volumes, you must ensure that the
AWS NVMe tool executable file, ebsnvme-id.exe, is present in any of the
following locations on the AWS instance:
■ %PROGRAMDATA%\Amazon\Tools
This is the default location for most AWS instances.
■ %PROGRAMFILES%\Veritas\Cloudpoint
Manually download and copy the executable file to this location.
■ System PATH environment variable
Add or update the executable file path in the system's PATH environment
variable.
If the NVMe tool is not present in one of the mentioned locations, NetBackup
Snapshot Manager may fail to discover the file systems on such instances. You
may see the following error in the logs:
"ebsnvme-id.exe" not found in expected paths!"
This is required for AWS Nitro-based Windows instances only. Also, if the
instance is launched using the community AMI or custom AMI, you might need
to install the tool manually.
■ NetBackup Snapshot Manager does not support cross-account replication for
AWS RDS instances, RDS clusters, or Redshift clusters, if the snapshots are
encrypted using the default RDS encryption key (aws/rds). You cannot share
such encrypted snapshots between AWS accounts.
If you try to replicate such snapshots between AWS accounts, the operation
fails with the following error:
Replication failed The source snapshot KMS key [<key>] does not exist,
is not enabled or you do not have permissions to access it.
118 NetBackup Snapshot Manager for cloud providers
AWS plug-in configuration notes
This is a limitation from AWS and is currently outside the scope of NetBackup
Snapshot Manager.
■ If a region is removed from the AWS plug-in configuration, then all the discovered
assets from that region are also removed from the NetBackup Snapshot Manager
assets database. If there are any active snapshots that are associated with the
assets that get removed, then you may not be able perform any operations on
those snapshots.
Once you add that region back into the plug-in configuration, NetBackup
Snapshot Manager discovers all the assets again and you can resume operations
on the associated snapshots. However, you cannot perform restore operations
on the associated snapshots.
■ NetBackup Snapshot Manager supports commercial as well as GovCloud (US)
regions. During AWS plug-in configuration, even though you can select a
combination of AWS commercial and GovCloud (US) regions, the configuration
will eventually fail.
■ NetBackup Snapshot Manager does not support IPv6 addresses for AWS RDS
instances. This is a limitation of Amazon RDS itself and is not related to
NetBackup Snapshot Manager.
For more information, refer to the AWS documentation.
■ NetBackup Snapshot Manager does not support application consistent snapshots
and granular file restores for Windows systems with virtual disks or storage
spaces that are created from a storage pool. If a Microsoft SQL server snapshot
job uses disks from a storage pool, the job fails with an error. But if a snapshot
job for virtual machine which is in a connected state is triggered, the job might
be successful. In this case, the file system quiescing and indexing is skipped.
The restore job for such an individual disk to original location also fails. In this
condition, the host might move to an unrecoverable state and requires a manual
recovery.
■ AWS virtual machine cannot be restored with a security group not owned by
the account where the restore is being performed. This is due to a limitation
from AWS which restricts creating the EC2 instance on shared VPC's security
group that is not owned by the account creating the virtual machine.
For more information, refer to the 'Share your VPC' section of the Amazon VPC
User Guide.
■ For filesystem/application consistent snapshots using AWS Systems Service
Manager:
■ The SSM document created must be removed manually on plug-in/NetBackup
Snapshot Manager removal.
NetBackup Snapshot Manager for cloud providers 119
AWS plug-in configuration notes
■ The validity of the temporary security credentials that the Source Account
IAM role gets when it assumes the Cross Account IAM role is set to 1 hour,
at a minimum (Maximum CLI/API session duration field).
See “Before you create a cross account configuration” on page 120.
■ If the assets in the AWS cloud are encrypted using AWS KMS Customer
Managed Keys (CMK), then you must ensure the following:
■ When selecting an IAM user to configure NetBackup Snapshot Manager
plug-in configuration, ensure that the IAM user is added as a key user of the
CMK.
■ For source account configuration, ensure that the IAM role that is attached
to the NetBackup Snapshot Manager instance is added as a key user of the
CMK.
■ For cross account configuration, ensure that the IAM role that is assigned
to the other AWS account (cross account) is added as a key user of the
CMK.
Adding these IAM roles and users as the CMK key users allows them to use
the AWS KMS CMK key directly for cryptographic operations on the assets. For
more details, refer to the AWS documentation.
■ If the NetBackup Snapshot Manager instance has instance metadata service
(IMDsv2) enabled, then ensure that the HttpPutResponseHopLimit parameter
is set to 2 for the VM.
If the value of HttpPutResponseHopLimit parameter is not set to 2, then the
AWS calls to fetch the metadata from the NetBackup Snapshot Manager
containers created on the machine fails.
For more information on the IMDsv2 service, refer to Use IMDSv2.
3 Set up a trust relationship between the source and target AWS accounts.
In the target AWS account, edit the trust relationship and specify source account
number and source account role.
This action allows only the NetBackup Snapshot Manager instance hosted in
source AWS account to assume the target role using the credentials associated
with source account's IAM role. No other entities can assume this role.
NetBackup Snapshot Manager for cloud providers 123
AWS plug-in configuration notes
5 From the target account's Summary page, edit the Maximum CLI/API session
duration field and set the duration to 1 hour, at a minimum.
This setting determines the amount of time for which the temporary security
credentials that the source account IAM role gets when it assumes target
account IAM role remain valid.
{
"Sid": "providerManagedConsistency",
"Effect": "Allow",
124 NetBackup Snapshot Manager for cloud providers
AWS plug-in configuration notes
"Action": [
"ec2:CreateSnapshots",
"ec2:CreateTags",
"ec2:CreateSnapshot"
],
"Resource": [
"*"
]
}
■ AWSPowerShell version greater than Install or update the latest version of the AWS
or equal to 4.1.144 (AWS CLI.
PowerShell)
Install or update the latest version of the AWS
■ AWS VSS Components version CLI
greater than or equal to 2.3.2 (Install
the VSS package)
Note: If the above modules are not
installed, then NetBackup Snapshot
Manager will install them if the VM
workload has access to the internet.
# cat
/etc/veritas/provider_managed_consistency.conf
PRE_SCRIPT_LOCATION =
"/preScript.sh"
PRE_SCRIPT_PARAMS = ""
POST_SCRIPT_LOCATION =
"/postScript.sh"
POST_SCRIPT_PARAMS = ""
If the above prerequisites are met, then by default NetBackup Snapshot Manager
would take filesystem/application consistent snapshot of the VM workload. When
AWS cloud provider plug-in is configured, then a new SSM document with name
Veritas-Consistent-Snapshot would be created in the specified AWS account and
region. This SSM document is managed by NetBackup Snapshot Manager and
must not be modified by the user.
The logs can be located at the following respective location:
■ Snapshot Manager: /cloudpoint/logs/flexsnap.log
■ Host VM: Check the Amazon SSM logs (Viewing SSM Agent logs)
Create an endpoint of AWS Security Token Create an endpoint of STS service in source
Service (STS). account (account where NetBackup Snapshot
Manager is present).
Create other endpoint services as required. For more information on the AWS service list,
see the 'AWS services that integrate with AWS PrivateLink' section in the AWS
Documentation.
NetBackup Snapshot Manager must be present in the same region where plugin would be
configured using VPC endpoint.
VM based
NetBackup Snapshot Manager for cloud providers 127
AWS plug-in configuration notes
kms:GenerateDataKey
kms:GenerateDataKeyWithoutPlaintext
kms:CreateGrant
ec2:DescribeVolumeAttribute
132 NetBackup Snapshot Manager for cloud providers
AWS plug-in configuration notes
ec2:GetEbsEncryptionByDefault
NetBackup Snapshot Manager for cloud providers 135
AWS plug-in configuration notes
Role/Policy:AmazonSSMManagedInstanceCore
Marketplace deployment
autoscaling:TerminateInstanceI
nAutoScalingGroup
sns:GetTopicAttributes
3 To configure the AWS plug-in for the created or edited user, refer to the plug-in
configuration notes.
See “AWS plug-in configuration notes” on page 112.
144 NetBackup Snapshot Manager for cloud providers
Google Cloud Platform plug-in configuration notes
GCP regions
■ africa-south1
■ asia-east1
■ asia-east2
■ asia-northeast1
■ asia-northeast2
■ asia-south1
■ asia-southeast1
■ australia-southeast1
■ europe-north1
■ europe-west1
■ europe-west2
■ europe-west3
■ europe-west4
■ europe-west6
■ europe-west10
■ northamerica-northeast1
■ southamerica-east1
■ us-central1
■ us-east1
■ us-east4
■ us-west1
■ us-west2
■ us-west3- Utah
■ us-west4 Nevada
■ us-east5 (Columbus)
■ us-south1(Dallas)
NetBackup Snapshot Manager for cloud providers 145
Google Cloud Platform plug-in configuration notes
GCP regions
■ asia-south
■ australia-southeast2
■ europe-central2
■ europe-west12 (Turin)
■ northamerica-northeast2
■ southamerica-west1
■ me-west1 (Tel Aviv)
■ me-central1 (Doha)
■ me-central2 (Dammam)
Note: To list and use multi-regional encryption keys, the supported GCP
region/location options are: global, us, europe and asia.
Project ID The ID of the project from which the resources are managed.
Listed as project_id in the JSON file.
146 NetBackup Snapshot Manager for cloud providers
Google Cloud Platform plug-in configuration notes
Client Email The email address of the Client ID. Listed as client_email
in the JSON file.
Private Key The private key. Listed as private_key in the JSON file.
Note: You must enter this key without quotes (neither single
quotes nor double quotes). Do not enter any spaces or return
characters at the beginning or end of the key.
■ The maximum number of labels that can be attached to GCP instances are 64
and NetBackup Snapshot Manager uses 2 labels. If any instance has more than
62 labels, backup/restore may fail.
■ Reconfiguration of Service Account based GCP provider plug-in configuration
with same/overlapping regions and different credential type is not supported.
See “Google Cloud Platform permissions required by NetBackup Snapshot Manager”
on page 148.
See “Configuring a GCP service account for NetBackup Snapshot Manager”
on page 158.
See “Preparing the GCP service account for plug-in configuration” on page 157.
■ The node pool provided while configuring Kubernetes cluster extension must
have all nodes from same region, that is, the node-pool should be single zonal.
■ The region of the NetBackup Snapshot Manager host and node-pool should be
same.
■ For backup from snapshot use case, NetBackup Snapshot Manager should be
installed in cloud only. A provider must be configured for the region in which
NetBackup Snapshot Manager is installed. If NetBackup Snapshot Manager is
148 NetBackup Snapshot Manager for cloud providers
Google Cloud Platform plug-in configuration notes
Note: If changing API access scope is not available, then automatically Allow
full access to all Cloud APIs must be set.
Note: In the following table the permissions marked with an asterisk (*) are
mandatory.
NetBackup Snapshot Manager for cloud providers 149
Google Cloud Platform plug-in configuration notes
VM based
150 NetBackup Snapshot Manager for cloud providers
Google Cloud Platform plug-in configuration notes
Discovery * compute.disks.get
152 NetBackup Snapshot Manager for cloud providers
Google Cloud Platform plug-in configuration notes
{
"type": "service_account",
"project_id": "some-product",
"private_key": "-----BEGIN PRIVATE KEY-----\n
N11EvA18ADAN89kq4k199w08AQEFAA5C8KYw9951A9EAAo18AQCnvpuJ3oK974z4\n
.
.
.
weT9odE4ryl81tNU\nV3q1XNX4fK55QTpd6CNu+f7QjEw5x8+5ft05DU8ayQcNkX\n
4pXJoDol54N52+T4qV4WkoFD5uL4NLPz5wxf1y\nNWcNfru8K8a2q1/9o0U+99==\n
-----END PRIVATE KEY-----\n",
"client_email": "[email protected]",
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
"token_uri": "https://accounts.google.com/o/oauth2/token",
"auth_provider_x509_cert_url": "https://www.googleapis.com
\
/oauth2/v1/certs",
"client_x509_cert_url": "https://www.googleapis.com/robot/v1
\
158 NetBackup Snapshot Manager for cloud providers
Google Cloud Platform plug-in configuration notes
/metadata/x509/ email%40xyz-product.iam.gserviceaccount.com"
}
3 When you configure the plug-in from the NetBackup user interface, copy and
paste the reformatted private key into the Private Key field. The reformatted
private_key should look similar to the following:
Note: The zone of NetBackup Snapshot Manager and node-pools of the extension
must be same.
■ compute.snapshots.useReadOnly
■ compute.disks.create
■ compute.networks.list
■ compute.projects.get
■ compute.subnetworks.get
■ compute.subnetworks.list
■ compute.subnetworks.use
■ compute.subnetworks.useExternalIp
■ resourcemanager.projects.get
■ compute.firewalls.get
■ This feature allows user to snapshot and restore disks having private disk access
enabled. The restored disk will also have the same disk access object associated.
162 NetBackup Snapshot Manager for cloud providers
Microsoft Azure plug-in configuration notes
■ User would be able to snapshot, backup and restore VM's having private disk
access. The restored VM will also have disks having private disk enabled with
same disk access object.
If VMs having private disk access are restored through snapshot or backup
copy, then ensure that the count of the disks per disk access object would
increase and might not adhere to the prerequisite of 5 disks per disk access
object. User must take appropriate actions to protect the restored VM.
■ For cross subscription restore from backup copy or if disk access object is
deleted which was present in original VM, then disks of the restored VM would
have disabled public and private access.
■ If NetBackup Snapshot Manager is in one subscription and VM's to be protected
are in different subscription, then appropriate private endpoint created within
Snapshot Manager subscription must be associated with disk access objects.
Support for application consistency using Azure recovery points
By default, the create snapshot operation in Snapshot Manager would create
recovery points instead of snapshots. To use Azure recovery points for the snapshots
to be application consistent, refer to the following table to connect and configure
the VM's in Azure cloud:
No need to connect and ■ For Linux: By default the snapshots would be filesystem
configure the VM's consistent in Azure.
■ For Oracle on Linux:
■ The VM must be in a connected state
Or
■ Pre-scipts or post-scripts for application consistency must
be configured for the Linux VM as mentioned in the
Application-consistent backup of Azure Linux VMs
documentation.
Note: While creating and restoring snapshots, restore points would be created
instead of snapshots being created in Azure.
Create snapshot
■ In Snapshot Manager a Restore Point Collection is created with a VM restore
point when the first snapshot is taken for a VM.
■ Each VM restore point contains the disk restore points of all disks whose
snapshots have been taken in the VM snapshot operation.
NetBackup Snapshot Manager for cloud providers 163
Microsoft Azure plug-in configuration notes
■ Each subsequent snapshot taken on the VM is saved in Azure under the same
Restore Point Collection that was created when the first snapshot was taken.
■ The subsequent restore points are incremental backups.
Restore snapshot
■ Snapshots would be restored from snapshots in Azure, for snapshots taken in
versions prior to Snapshot Manager version 10.2.
■ Snapshots would be restored from Restore Points, for snapshots taken in
Snapshot Manager version 10.2.
Note the following:
■ Locate the restore point:
Obtain the Snapshot ID in the job details of the created snapshot in NetBackup
as follows:
■ Windows:
C:\WindowsAzure\Logs\Plugins\Microsoft.Azure.RecoveryServices.VMSnapshot\<version>
Prerequisites
Before you configure the Azure plug-in, complete the following preparatory steps:
■ (Applicable only if user proceeds with application service principal route) Use
the Microsoft Azure Portal to create an Azure Active Directory (AAD) application
for the Azure plug-in.
■ Assign the required permissions to a role to access resources.
For more information on Azure plug-in permissions required by NetBackup
Snapshot Manager, See “Configuring permissions on Microsoft Azure”
on page 168.
In Azure you can assign permissions to the resources by one of the following
methods:
164 NetBackup Snapshot Manager for cloud providers
Microsoft Azure plug-in configuration notes
For more details, follow the steps mentioned in the Azure documentation.
Credential type:
Credential type:
Credential type:
Following parameters are applicable for all the above credential type's
NetBackup Snapshot Manager for cloud providers 165
Microsoft Azure plug-in configuration notes
Resource Group prefix The prefix used to store the snapshots created for the assets
in a different resource group other than the one in which the
assets exist.
Protect assets even if prefixed Resource Groups On selecting this check box, NetBackup Snapshot Manager
are not found would not fail the snapshot operation if resource group does
not exists. It tries to store the snapshot in the original resource
group.
Note: The prefixed resource group region must be same as
the original resource group region.
■ NetBackup Snapshot Manager Azure plug-in does not support the following
Azure regions:
Location Region
US ■ US DoD Central
■ US DoD East
■ US Sec West
NetBackup Snapshot Manager for cloud providers 167
Microsoft Azure plug-in configuration notes
Location Region
■ If NetBackup Snapshot Manager is running behind the firewall then ensure that
the following endpoints and metadata IP are allowed on port 443 for successful
asset discovery:
■ Endpoints:
*.management.azure.com
*.login.microsoftonline.com
*.storage.azure.net
*.vault.azure.net
■ Metadata IP: 169.254.169.254
VM based
NetBackup Snapshot Manager for cloud providers 169
Microsoft Azure plug-in configuration notes
To create VM in a Microsoft.Network/virtualNetworks/subnets/join/action
subnet, that is, join a
subnet.
Marketplace deployment
The following set of permissions are required to use managed identity for discovery,
create, delete, database authentication and point in time restore (applicable only
for Azure SQL and Managed Instance databases) for supported PaaS databases:
174 NetBackup Snapshot Manager for cloud providers
Microsoft Azure plug-in configuration notes
actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Subscription/*/read",
"Microsoft.Resources/*/read",
"Microsoft.ManagedIdentity/*/read",
"Microsoft.Sql/*/read",
"Microsoft.Sql/servers/databases/write",
"Microsoft.Sql/servers/databases/delete",
"Microsoft.Sql/managedInstances/databases/write",
"Microsoft.Sql/managedInstances/databases/delete",
"Microsoft.DBforMySQL/servers/read",
"Microsoft.DBforMySQL/servers/databases/read",
"Microsoft.DBforMySQL/flexibleServers/read",
"Microsoft.DBforMySQL/flexibleServers/databases/read",
"Microsoft.DBforMySQL/servers/databases/write",
"Microsoft.DBforMySQL/flexibleServers/databases/write",
"Microsoft.DBforMySQL/servers/databases/delete",
"Microsoft.DBforMySQL/flexibleServers/databases/delete",
"Microsoft.DBforPostgreSQL/servers/databases/delete",
"Microsoft.DBforPostgreSQL/flexibleServers/databases/delete",
"Microsoft.DBforPostgreSQL/servers/databases/write",
"Microsoft.DBforPostgreSQL/flexibleServers/databases/write",
"Microsoft.DBforPostgreSQL/servers/read",
"Microsoft.DBforPostgreSQL/servers/databases/read",
"Microsoft.DBforPostgreSQL/flexibleServers/read",
"Microsoft.DBforPostgreSQL/flexibleServers/databases/read"
],
"Microsoft.DBforMySQL/servers/read",
"Microsoft.DBforMySQL/servers/databases/read",
"Microsoft.DBforMySQL/flexibleServers/read",
"Microsoft.DBforMySQL/flexibleServers/databases/read",
"Microsoft.DBforPostgreSQL/servers/read",
"Microsoft.DBforPostgreSQL/servers/databases/read",
"Microsoft.DBforPostgreSQL/flexibleServers/read",
"Microsoft.DBforMariaDB/servers/read",
"Microsoft.DBforMariaDB/servers/databases/read",
"Microsoft.DBforPostgreSQL/flexibleServers/databases/read",
"Microsoft.Sql/*/write",
"Microsoft.Sql/*/delete"
NetBackup Snapshot Manager for cloud providers 175
Microsoft Azure plug-in configuration notes
If you use system managed identity for the PaaS Azure SQL and Managed Instance,
apply the same set of permissions/rules to the media server(s) and Snapshot
Manager. If you use user managed identity, attach the same user managed identity
to the media server(s) and Snapshot Manager.
Permissions required by Azure Cosmos DB for NoSQL
"Microsoft.DocumentDB/databaseAccounts/read",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/read",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/write",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/read",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/write",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/throughputSettings
/read"
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/throughputSettings
/write",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/storedProcedures
/read",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/storedProcedures
/write",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/triggers/read",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/triggers/write",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/userDefinedFunctions
/read",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/userDefinedFunctions
/write",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/throughputSettings/read",
"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/throughputSettings/write"
"Microsoft.DocumentDB/databaseAccounts/mongodbDatabases/read",
"Microsoft.DocumentDB/databaseAccounts/mongodbDatabases/write",
"Microsoft.DocumentDB/databaseAccounts/mongodbDatabases/collections
/read",
"Microsoft.DocumentDB/databaseAccounts/mongodbDatabases/collections
/write",
"Microsoft.DocumentDB/databaseAccounts/mongodbDatabases/delete",
"Microsoft.DocumentDB/databaseAccounts/mongodbDatabases/collections/throughputSettings
/read",
"Microsoft.DocumentDB/databaseAccounts/mongodbDatabases/collections/throughputSettings
/write",
"Microsoft.DocumentDB/databaseAccounts/listKeys/action"
176 NetBackup Snapshot Manager for cloud providers
Microsoft Azure plug-in configuration notes
{
"properties": {
"roleName": "cosp_minimal",
"description": "minimal permission required for cos protection.",
"assignableScopes": [
"/subscriptions/<Subsfription_ID>"
],
"permissions": [
{
"actions": [
"Microsoft.Storage/storageAccounts/blobServices/read",
"Microsoft.Storage/storageAccounts/
blobServices/containers/read",
"Microsoft.Storage/storageAccounts/
blobServices/containers/write",
"Microsoft.ApiManagement/service/*",
"Microsoft.Authorization/*/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Storage/storageAccounts/read"
],
"notActions": [],
"dataActions": [
"Microsoft.Storage/storageAccounts/
blobServices/containers/blobs/write",
"Microsoft.Storage/storageAccounts/
blobServices/containers/blobs/filter/action",
"Microsoft.Storage/storageAccounts/
blobServices/containers/blobs/tags/write",
"Microsoft.Storage/storageAccounts/
blobServices/containers/blob/read",
],
"notDataActions": []
}
]
}
}
NetBackup Snapshot Manager for cloud providers 177
Microsoft Azure plug-in configuration notes
To create a custom role using powershell, follow the steps mentioned in the Azure
documentation.
For example:
New-AzureRmRoleDefinition -InputFile
"C:\CustomRoles\ReaderSupportRole.json"
To create a custom role using Azure CLI, follow the steps mentioned in the Azure
documentation.
For example:
Note: Before creating a role, you must copy the role definition given earlier (text in
JSON format) in a .json file and then use that file as the input file. In the sample
command displayed earlier, ReaderSupportRole.json is used as the input file that
contains the role definition text.
Table 5-9 Azure Stack Hub plug-in configuration parameters using AAD
Azure Stack Hub Resource The endpoint URL in the following format, that allows
Manager endpoint URL NetBackup Snapshot Manager to connect with your Azure
resources.
https://management.<location>.<FQDN>
Authentication Resource URL The URL where the authentication token is sent to.
(optional)
NetBackup Snapshot Manager for cloud providers 179
Microsoft Azure Stack Hub plug-in configuration notes
Azure Stack Hub Resource The endpoint URL in the following format, that allows
Manager endpoint URL NetBackup Snapshot Manager to connect with your Azure
resources.
https://management.<location>.<FQDN>
Authentication Resource URL The URL where the authentication token is sent to.
(optional)
VM based
NetBackup Snapshot Manager for cloud providers 181
Microsoft Azure Stack Hub plug-in configuration notes
Microsoft.Network/publicIPAddresses/write
NetBackup Snapshot Manager for cloud providers 185
Microsoft Azure Stack Hub plug-in configuration notes
To create VM in a Microsoft.Network/virtualNetworks/subnets/join/action
subnet, that is, join a
subnet.
Marketplace deployment
To create a custom role using Powershell, follow the steps mentioned in the Azure
Stack documentation.
For example:
■ New-AzRoleDefinition
■ New-AzureRmRoleDefinition
To create a custom role using Azure CLI, follow the steps mentioned in the Azure
documentation.
For example:
Note: Before creating a role, you must copy the role definition (text in JSON format)
in a .json file and then use that file as the input file. In the sample command
displayed earlier, registrationrole.json is used as the input file that contains
the role definition text.
Note: The staging location is specific to the subscription ID, you must create one
staging location for each subscription that you are using to restore VMs.
NetBackup Snapshot Manager for cloud providers 187
OCI plug-in configuration notes
For example:
/resourceGroup/Harsha_RG/storageaccount/harshastorageacc
3 Repeat step 2, for each subscription ID that you are using. Save and close the
file.
Note: Premium disks (SSD) and standard disks (HDD) are backed by the same
storage infrastructure in Azure Stack Hub. They provide the same performance.
af-johannesburg-1,
ca-montreal-1, ca-toronto-1,
il-jerusalem-1,
mx-monterrey-1, mx-queretaro-1,
uk-cardiff-1, uk-london-1,
If NetBackup Snapshot Manager is not deployed in OCI cloud, these are the required
parameters.
User OCID The OCID of the user for which you want to
generate the credentials.
Table 5-15
Permissions Description
Permissions Description
Permissions Description
Permissions Description
Here is an example of assigning permissions to the policy that you create. Here,
nbsm-iam-role is the name of dynamic group and NetBackup Snapshot Manager
is a part of that dynamic group
Table 5-16
Cloud Supported Endpoints Description/Requirements
Service databases
Provider
■ Server URL
Amazon Redshift
endpoints and
quotas
No need to connect and ■ For Linux: By default the snapshots would be filesystem
configure the VM's consistent in Azure.
■ For Oracle on Linux:
■ The VM must be in a connected state
Or
■ Pre or post scripts for application consistency must be
configured for the Linux VM as mentioned in the
Application-consistent backup of Azure Linux VMs
documentation.
The agent installs necessary plugins for performing the required operations for
protecting the assets on the host.
One of the following approach can be used to install agents on their hosts that must
be protected:
■ On-host agent
See “Protecting assets with NetBackup Snapshot Manager's on-host agent
feature” on page 199.
■ Agentless
See “Protecting assets with NetBackup Snapshot Manager's agentless feature”
on page 221.
In both the above approaches, the same plug-ins are installed on the host to perform
the operations. However the difference in the above two approaches are as follows:
User must manually install the agent on the The agent can be installed on the host using
host and register it to the Snapshot Manager the NetBackup Web UI, by
host connecting/configuring the VM.
User must not share the Host credentials to The Host/VM credentials must be stored in
the Snapshot Manager, as the user would NetBackup credential manager, so that
install it manually on the host. Snapshot Manager can connect to the host
and install the agent and necessary plugins.
Configuration for protecting assets on cloud hosts/VM 199
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
Connection is permanently setup over Each time when an operation (as follows)
RabbitMQ port 5671 to the host VM from the must be performed on the host, then the
Snapshot Manager to collect and send data. Snapshot Manager temporarily connects to
the VM using SSH port for Linux/Windows
and installs the agent:
The agent once installed manually always As the agent is not always present on the host
remains on the host unless it is uninstalled, hence, the name agentless feature.
hence the name on-host agent feature.
Note: For NetBackup to discover and protect assets on a host for single file restore
or filesystem/application consistency, then install the agent on the host, even if
snapshots are filesystem/application consistent through provider-managed
consistency.
If a non-admin user attempts the installation, the installer displays the Windows
UAC prompt where the user must specify the credentials of an admin user.
■ Complete the preparatory steps and install all the dependencies for the respective
agent.
See “Preparing to install the Linux-based agent” on page 203.
See “Preparing to install the Windows-based agent” on page 207.
To download and install the agent
1 Sign in to the NetBackup web UI.
2 From the left navigation pane, click Workloads > Cloud and then select the
NetBackup Snapshot Managers tab.
All the NetBackup Snapshot Manager servers that are registered with the
primary server are displayed in this pane.
3 From the desired NetBackup Snapshot Manager server row, click the actions
icon on the right and then select Add agent.
■ For the Windows-based agent, run the agent package file and follow the
installation wizard workflow to install the agent on the Windows application
host. Oracle Cloud Infrastructure does not support Windows on host agents.
Note: To allow the installation, admin users must click Yes on the Windows
UAC prompt. Non-admin users must specify admin user credentials on the
UAC prompt.
Note: The version of the agent binary remains 10.5.x.x.xxxx despite the binary
name indicating 10.5.x.x-xxxx.
8 This completes the agent installation. You can now proceed to register the
agent.
See “Registering the Linux-based agent” on page 203.
See “Registering the Windows-based agent” on page 207.
Linux-based agent
This section describes the procedures for preparing and registering the following:
■ Linux-based agents
■ SUSE Linux-based agents
■ Oracle Enterprise Linux-based agents
■ The on-host agent registration may fail if the host is FIPS enabled and NetBackup
Snapshot Manager is not, or vice versa.
To register the Linux-based agent
1 Return to the NetBackup Web UI, and on the Add agent dialog box, click Create
Token.
If you have closed the dialog box, sign in to the NetBackup Web UI again and
perform the following:
■ On the left, click Workloads > Cloud.
■ Click the Snapshot Managers tab.
■ From the desired NetBackup Snapshot Manager server row, click the actions
button on the right and then select Add agent.
Configuration for protecting assets on cloud hosts/VM 205
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
Note: The token is valid for 180 seconds only. If you do not copy the token
within that time frame, generate a new token again.
206 Configuration for protecting assets on cloud hosts/VM
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
3 Connect to the Linux host and register the agent using the following command:
# sudo flexsnap-agent --ip <snapshotmanager_host_FQDN_or_IP>
--token <authtoken>
Note: You can use flexsnap-agent --help to see the command help.
NetBackup Snapshot Manager performs the following actions when you run
this command:
4 Return to the NetBackup Web UI, close the Add agent dialog box, and then
from the NetBackup Snapshot Manager server row, click the actions button on
the right and then click Discover.
This triggers a manual discovery of all the assets that are registered with the
NetBackup Snapshot Manager server.
5 Click on the Virtual machines tab.
The Linux host where you installed the agent should appear in the discovered
assets list.
Click to select the Linux host. If the host status is displayed as VM Connected
and a Configure Application button appears, it confirms that the agent
registration is successful.
6 This completes the agent registration. You can now proceed to configure the
application plug-in.
See “Configuring an application plug-in” on page 210.
Windows-based agent
This section describes the procedures for preparing and registering the
Windows-based agent.
Configuration for protecting assets on cloud hosts/VM 207
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
Note: The token is valid for 180 seconds only. If you do not copy the token
within that time frame, generate a new token again.
Note: You can use flexsnap-agent.exe --help to see the command help.
NetBackup performs the following actions when you run this command:
■ registers the Windows-based agent
■ creates a <System
Drive>\ProgramData\Veritas\CloudPoint\etc\flexsnap.conf
configuration file on the Windows instance and updates the file with
NetBackup host information
■ enables and then starts the agent service on the Windows host
Note: If you intend to automate the agent registration process using a script
or a 3rd-party deployment tool, then consider the following:
Even if the agent has been registered successfully, the Windows agent
registration command may sometimes return error code 1 (which generally
indicates a failure) instead of error code 0.
An incorrect return code might lead your automation tool to incorrectly indicate
that the registration has failed. In such cases, you must verify the agent
registration status either by looking in to the flexsnap-agent-onhost logs or from
the NetBackup Web UI.
4 Return to the NetBackup Web UI, close the Add agent dialog box, and then
from the NetBackup Snapshot Manager server row, click the actions button on
the right and then click Discover.
This triggers a manual discovery of all the assets that are registered with the
NetBackup Snapshot Manager server.
210 Configuration for protecting assets on cloud hosts/VM
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
■ NetBackup Snapshot Manager uses the Microsoft Volume Shadow Copy Service
(VSS).
Ensure that you configure VSS to store shadow copies on the same drive (the
originating drive) where the database resides.
See “Configuring VSS to store shadow copies on the originating drive”
on page 234.
■ NetBackup Snapshot Manager does not support discovery, snapshot, and restore
operations for SQL databases that contain leading or trailing spaces or
non-printable characters. This is because the VSS writer goes into an error state
for such databases.
Refer to the following for more details:
Microsoft SQL Server database documentation
■ Before you restore a SQL Availability Group (AG) database, perform the
pre-restore steps manually.
See “Steps required before restoring SQL AG databases” on page 213.
■ New location restore of system database is not supported.
■ If destination instance has AG configured, restore is not supported.
Configuration for protecting assets on cloud hosts/VM 213
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
■ If database exists on new location destination and the overwrite existing option
is not selected, the restore job will fail.
■ If the overwrite existing option is selected for database that is a part of an AG,
the restore job will fail.
■ For system database restore, the SQL Server version must be same. For user
databases, restore from a higher SQL version to a lower version is not allowed.
■ Default timeout of 6 hours is not allowing restore of larger database (size more
than 300 GB). Configurable timeout parameter value can be set to restore larger
database.
See “Troubleshooting NetBackup Snapshot Manager” on page 304.
Note: If you are restoring the AG database to multiple replicas, perform the entire
restore process on the primary replica first, and then repeat the steps for each
secondary replica.
1. For the database that you want to restore, suspend data movement from the
replica.
From the SQL Server Management Studio, right-click on the database and
select Suspend Data Movement.
2. Remove the database from the AG on the replica.
From the SQL Server Management Studio, right-click on the database and
select Remove Database from Availability Group.
Confirm that the database is no longer part of the AG. Observe that the
database on the primary replica is no longer in synchronized mode, and the
status of the corresponding database on the secondary replica appears as
(Restoring...).
Note: If you are restoring the AG database to multiple replicas, perform the entire
restore process on the primary replica first, and then repeat the steps for each
secondary replica.
The snapshot creation and snapshot restore operations will fail if the file is
present on the selected drives.
Perform the following steps to revert the shadow copy
1 Connect to the Windows host where the SQL Server instance is running.
Ensure that you use an account that has administrator privileges on the host.
2 Stop the SQL Server service on the Windows host.
3 Open a command prompt window. If Windows UAC is enabled on the host,
open the command prompt in the Run as administrator mode.
4 Navigate to
%programdata%\Veritas\CloudPoint\tmp\tools\windows\tools\ directory,
and then run the following command from there:
vss_snapshot.exe --revertSnapshot
The command displays a json output with Status = 0 that confirms that the
operation is successful.
This command reverts the shadow copies for all the drives, except the system
drive. The SQL Server service is stopped before the snapshot is reverted and
automatically started after the revert operation is successful.
5 Start the SQL Server service on the Windows host.
Note: These steps are applicable only in case of a SQL Server instance snapshot
restore to a new location. These are not applicable for a SQL Server database
snapshot restore.
216 Configuration for protecting assets on cloud hosts/VM
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
4 View the list of disks on the new host using the following command:
list disk
Identify the new disk that is attached due to the snapshot restore operation
and make a note of the disk number. You will use it in the next step.
5 Select the desired disk using the following command:
select disk <disknumber>
Here, <disknumber> represents the disk that you noted in the earlier step.
6 View the attributes of the selected disk using the following command:
attributes disk
The output displays a list of attributes for the disk. One of the attributes is
read-only, which we will modify in the next step.
7 Modify the read-only attribute for the selected disk using the following command:
attributes disk clear readonly
From the list of volumes displayed, identify the volume for which you want
to assign, modify, or remove a drive letter.
■ Select the desired volume using the following command:
select volume <volnumber>
Here, <volnumber> represents the volume that you noted in the earlier step.
■ Assign a drive letter to the selected volume using the following command:
assign letter=<driveletter>
Here, <driveletter> is the drive letter that you wish to assign to the volume.
Ensure that the specified drive letter is not already in use by another volume.
■ Repeat these steps to assign a drive letter to all the SQL Server volumes
on the disk.
Do not close the command prompt yet; you can use the same window to perform
the remaining steps described in the next section.
2 View the list of all the shadow copies that exist on the new host. Type the
following command:
list shadows all
Identify the shadow copy that you want to use for the revert operation and
make a note of the shadow copy ID. You will use the shadow ID in the next
step.
3 Revert the volume to the desired shadow copy using the following command:
revert <shadowcopyID>
Here, <shadowcopyID> is the shadow copy ID that you noted in the earlier
step.
4 Exit the DiskShadow utility using the following command:
exit
218 Configuration for protecting assets on cloud hosts/VM
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
Oracle plug-in
You can configure the Oracle plug-in to discover and protect your Oracle database
applications with disk-level snapshots.
■ Disk-level restore to a new location fails if the NetBackup plug-in for Oracle is
not configured on the target host.
In such a case, to complete the Oracle snapshot restore to a new location
successfully, you must perform the restore in the following order:
220 Configuration for protecting assets on cloud hosts/VM
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
5 Open the Oracle database for normal usage using the following command:
# ALTER DATABASE OPEN
6 Add an entry of the newly created database in the Oracle listerner.ora and
tnsnames.ora files.
Note: The following steps are provided as a general guideline. Refer to the operating
system or the distribution-specific documentation for detailed instructions on how
to grant password-less sudo access to a user account.
1. Perform the following steps on the host where you want to configure the
agentless feature.
2. Verify that the host username that you provide to NetBackup Snapshot Manager
is part of the wheel group.
Log on as a root user and run the following command:
# usermod -aG wheel hostuserID
Configuration for protecting assets on cloud hosts/VM 223
Protecting assets with NetBackup Snapshot Manager's agentless feature
Here, hostuserID is the host username that you provide to NetBackup Snapshot
Manager.
3. Log out and log on again for the changes to take effect.
4. Edit the /etc/sudoers file using the visudo command:
# sudo visudo
6. In the /etc/sudoers file, edit the entries for the wheel group as follows:
■ Comment out (add a # character at the start of the line) the following line
entry:
# %wheel ALL=(ALL) ALL
■ Uncomment (remove the # character at the start of the line) the following
line entry:
%wheel ALL=(ALL) NOPASSWD: ALL
The changes should appear as follows:
If you do not see any prompt requesting for a password, then the user account
has been granted password-less sudo access.
You can now proceed to configure the NetBackup Snapshot Manager agentless
feature.
■ Enable port 22 from the security group and firewall for the Windows VMs.
Port 22 is enabled by default once the OpenSSH server is installed and enabled
in the above step.
■ Powershell version 5.1 or later must be installed.
■ (Optional) If user had enabled WMI/SMB ports and they are not used by any
other application, you can disable these ports from the security groups and the
firewall rules after upgrading to NetBackup Snapshot Manager version 10.4 or
later.
Note: The agentless feature is supported for Microsoft Windows version 2019 and
above.
Limitation
■ Hosts with Windows OS are not supported in OCI for agentless and on host
agents.
3 Click to select the host and then click Connect in the top bar.
Note: If you have not assigned any credential to the VM, a message prompts you
to assign the credentials before you can connect the VM. See the Managing
Credentials section, in the Web UI Administrator’s Guide.
Configuration for protecting assets on cloud hosts/VM 225
Protecting assets with NetBackup Snapshot Manager's agentless feature
After following the recovery steps, NetBackup Snapshot Manager operates normally.
You can also recover assets using earlier snapshots or backup copies.
230 Snapshot Manager for cloud catalog backup and recovery
NetBackup Snapshot Manager data recovery
Chapter 8
NetBackup Snapshot
Manager for cloud assets
protection
This chapter includes the following topics:
Note: If instance level SQL server backup is selected, only the databases that
are online are included in the snapshot. The snapshot does not include
databases that are offline or in an erroneous state.
4 On the Choose a protection plan panel, search and select the appropriate
protection plan and then click Protect.
Verify that on the Applications tab, the Protected by column for the selected
asset displays the protection plan that you just assigned. This indicates that
the asset is now being protected by the configured protection plan.
The backup jobs should automatically get triggered as per the schedule defined
in the plan. You can monitor the backup jobs from the Activity monitor pane.
(Applicable only for EKS) Time taken to complete the backup jobs on EKS is
more due to network modulators/snoopers that add delays in the
communication.
Before subscribing a PaaS asset, you need to associate credentials to the database.
For information, refer to the NetBackup Web UI Cloud Administrator's Guide.
For more detailed information on how to subscribe assets to a protection plan, refer
to the NetBackup Web UI Backup Administrator's Guide.
NetBackup Snapshot Manager for cloud assets protection 233
Assigning tags on snapshots and Restore Point Collection
For Azure For Azure For AWS For GCP For OCI
Stack
Maximum tags Maximum tags Maximum tags Maximum Maximum tags limit:
limit: 48 limit: 15 limit: 50 labels limit: 61
62
Maximum tags Maximum tags Maximum tags
that can be allowed on allowed on
assigned on instance/disk: 13 instance/volume:
resources in 40.
Azure stack:
Remaining 10
15
tags would be
reserved for
NetBackup
Snapshot
Manager for
creating snapshot.
234 NetBackup Snapshot Manager for cloud assets protection
Configuring VSS to store shadow copies on the originating drive
For Azure For Azure For AWS For GCP For OCI
Stack
Keys used in Keys used in Keys used in Keys used in Keys used in OCI:
Azure: Azure Stack: AWS: GCP:
createdby, cp:data,
cp:data, cp:data, createdby cp:data, instance_id, cp:host-snapshot-name
createdby src-volume, createdby
src-vol-region,
cloudpoint-replicated,
src-inst-region,
createdby,
cp:host-snapshot-name,
cloudpoint-description,
cloudpoint-src-region,
cloudpoint-src-account
Copy Service (VSS). VSS lets you take volume snapshots while applications
continue to write to the volume.
When you configure VSS, note the following;
■ NetBackup Snapshot Manager currently has a limitation that you must manually
configure the shadow copy creation location to the same drive or volume as the
originating drive. This approach ensures that an application-consistent snapshot
is created.
■ If shadow storage already exists on an alternate drive or a dedicated drive, you
must disable that storage and replace it with the configuration in the following
procedure.
■ NetBackup Snapshot Manager does not support discovery, snapshot, and restore
operations for SQL databases that contain leading or trailing spaces or
non-printable characters. This is because the VSS writer goes into an error state
for such databases.
For more information, see Microsoft Documentation.
Here, maxsize represents the maximum free space usage allowed on the
shadow storage drive. The caret (^) character in the command represents the
Windows command line continuation character.
For example, if the VSS shadow copies of the D: drive are to be stored on the
D: drive and allowed to use up to 80% of the free disk space on D:, the
command syntax is as follows:
Platform Managed Key (PMK) Same PMK is used as the source disk.
Customer Managed Key (CMK) Same CMK is used as the source disk.
Section Permission
Unwrap Key
Key Vault Crypto Service Encryption User App (Disk Encryption Set)
Platform Managed Key (PMK) Same PMK is used as the source disk.
Note: For successful restoration, the target restore location must be inside the
scope of the key during restoration.
Platform Managed Key (PMK) Same PMK is used as the source disk.
For Azure Stack, you must specify the file path of the root certificates using the
ECA_TRUST_STORE_PATH parameter in the
/cloudpoint/openv/netbackup/bp.conf file in the NetBackup Snapshot Manager.
The value of ECA_TRUST_STORE_PATH must be in the
/cloudpoint/eca/trusted/cacerts.pem file.
Note: If NetBackup is upgraded from version 9.1 to 10.4 or later, then user can
delete the VIRTUALIZATION_CRL_CHECK flag which was enabled for CRL
check between NetBackup and NetBackup Snapshot Manager.
■ Agentless logs
■ A persistent structured repository that stores the logs of all the NetBackup
Snapshot Manager services
■ A single stream of all NetBackup Snapshot Manager logs (vs disparate individual
log files) makes it easy to trail and monitor specific logs
■ Metadata associated with the logs allow for a federated search that speeds up
troubleshooting
■ Ability to integrate and push NetBackup Snapshot Manager logs to a third-party
tool for analytics and automation
Steps to configure log file rotate and log size command options
1 In /cloudpoint/flexsnap.conf file, enter the log_rotate_age and
log_rotate_size values under logging section and then restart the
flexsnap-fluentd container for changes to take effect.
[logging]
log_rotate_age = 7
log_rotate_size = 20000
```
■ log_rotate_age: Specifies the generations to keep rotated log files (the total
number of files that can be accumulated before rotation), the default value
is 30.
■ log_rotate_size: Specifies the log file size (in bytes) after which a single log
file will be rotated, the default value is 100000000 bytes.
STDOUT: This is used to send the NetBackup Snapshot Manager log messages to
/cloudpoint/logs/flexsnap.log.
Note that the changes take effect immediately and apply only to the newer log
messages that get generated after the change. The file changes do not apply to
the older logs that were generated before the configuration file was updated.
Log Description
■ bpbkar, bpcd, bpclntcmd, nbcert, vnetd, vxms and all other services logs
can be found inside netbackup directory
To increase logging verbosity, bp.conf and nblog.conf files can be updated on
NetBackup Snapshot Manager at /cloudpoint/openv/netbackup. See NetBackup
Logging Reference Guide
Changes to the bp.conf and nblog.conf files come to effect when the next
backup from snapshot or restore job runs.
Log retention
The default configuration for datamover logs is as follows:
■ Log retention maximum period is 30 days. Logs older than 30 days are deleted.
■ The default configuration for high and low water marks for datamover logs is
70% and 30% of the size of "/cloudpoint" mount point. For example, if the usable
size of the /cloudpoint folder is 30 GB, then the high water mark is 21 GB
(70%) and low water mark is 9GB (30%). In case, the logs directory
(/cloudpoint/openv/dm/) size reaches to high water mark, older logs for which
the datamover containers are cleaned up and no longer running are considered
for deletion. The logs are deleted for such datamover containers until low water
mark is reached or no logs are remaining for the datamover containers cleaned
up or no longer running.
Modifying the default configuration:
256 NetBackup Snapshot Manager for Cloud logging
Agentless logs
You can modify the default configuration for log retention by adding such a section
in the flexsnap.conf on the primary NetBackup Snapshot Manager. Open the
flexsnap.conf file from the path /cloudpoint/flexsnap.conf and add the
following section:
[datamover]
high_water_mark = 50
low_water_mark = 20
log_retention_in_days = 60
Agentless logs
Logs for agentless connection to cloud instance(s) are present on the cloud instance
at following locations based on the platform:
■ Linux: /tmp/ directory
■ Windows: C:\ProgramData\Veritas\CloudPoint\logs\
NetBackup Snapshot Manager for Cloud logging 257
Troubleshooting NetBackup Snapshot Manager logging
■ Upgrade scenarios
■ Post-upgrade tasks
■ Post-migration tasks
260 Upgrading NetBackup Snapshot Manager for Cloud
About NetBackup Snapshot Manager for Cloud upgrades
10.4 10.5
10.1/10.1.1 10.5
Note: Direct upgrade from older versions to 10.5 is not supported. We need to first
upgrade to 10.1 before upgrading to 10.5 for any upgrade path.
Upgrade scenarios
The following table lists the NetBackup Snapshot Manager upgrade scenarios.
Note: For the NetBackup version 10.4 or later, NetBackup (primary, media) server
and NetBackup Snapshot Manager version must be at the same level. During
upgrade, first upgrade NetBackup Snapshot Manager and then upgrade NetBackup
server.
Note: If NetBackup Snapshot Manager was installed via Azure Marketplace, then
it is recommended that the NetBackup Snapshot Manager is upgraded via Azure
Marketplace. For more information, refer to the 'Upgrading the Snapshot Manager'
section of NetBackup™ Marketplace Deployment on Azure Cloud Guide.
Upgrading NetBackup Snapshot Manager for Cloud 261
Upgrade scenarios
Upgrading to If you plan to upgrade The process for this upgrade is:
NetBackup version NetBackup to 10.3 or later that
■ Disable the NetBackup Snapshot Manager server for
10.5 includes upgrading all
maintenance in the NetBackup Web UI.
NetBackup Snapshot Manager
■ Upgrade the NetBackup Snapshot Manager server from
servers.
NetBackup 9.1.x to NetBackup 10.x.
See “Supported upgrade path” ■ Upgrade the NetBackup Snapshot Manager server from
on page 260. NetBackup 10.x to NetBackup 10.5.
■ Enable the NetBackup Snapshot Manager server in the
NetBackup Web UI.
■ Upgrade the NetBackup server from 8.3.x directly to 10.5.
■ Upgrade the media server to 10.5 if it has been configured
with storage units.
Only NetBackup If you plan to upgrade only the Contact Veritas Technical Support to obtain an Emergency
Snapshot Manager NetBackup Snapshot Manager Engineering Binary (EEB) to support the incompatibility
upgrades to version servers to 10.3 or later, but do between the NetBackup Snapshot Manager and NetBackup
10.3 or later not plan to upgrade NetBackup versions.
to 10.3 or later.
■ Disable NetBackup Snapshot Manager servers.
■ Apply the EEB patch on the NetBackup primary server
and associated media servers.
■ Upgrade NetBackup Snapshot Manager.
■ Then enable NetBackup Snapshot Manager servers.
If you plan to upgrade only the ■ Update the on-host agent version to 10.3 or later.
NetBackup Snapshot Manager ■ Update the NetBackup Snapshot Manager extension to
to version 10.3 or later, but did version 10.3 or later.
not upgrade the on-host agent
Contact Veritas Technical Support to support the
and NetBackup Snapshot
incompatibility between the NetBackup Snapshot Manager
Manager extensions.
and on-host/ NetBackup Snapshot Manager extension
versions.
Note: The above recommended action is based on the
NetBackup Snapshot Manager RabbitMQ Authentication
Bypass Vulnerability security advisory.
Migrating VM based If you plan to migrate your VM For the complete procedure, refer to the "Migration and
NetBackup Snapshot based NetBackup Snapshot upgrade of NetBackup Snapshot Manager" section of
Manager to Manager to a managed NetBackup™ Deployment Guide for Kubernetes Clusters.
Kubernetes Kubernetes cluster.
deployment
Migrating and If you plan to migrate and See “Migrating and upgrading NetBackup Snapshot
upgrading the upgrade NetBackup Snapshot Manager” on page 276.
NetBackup Snapshot Manager on RHEL 8.6 or 8.4
Manager on RHEL
Upgrading NetBackup Snapshot Manager for Cloud 263
Preparing to upgrade NetBackup Snapshot Manager
■ To cancel the pending SLP operation for images that belong to specific
lifecycle, use nbstlutil cancel -lifecycle <name>
264 Upgrading NetBackup Snapshot Manager for Cloud
Upgrading NetBackup Snapshot Manager
■ On the NetBackup primary server, run the following command to stop all
NetBackup processes:
■ UNIX: /usr/openv/netbackup/bin/bp.kill_all
■ Windows: install_path\NetBackup\bin\bpdown -f
■ If any jobs are still running after the Snapshot Manager instance or services
have been shutdown as part of the upgrade or migration, then look for any
additional disks attached to the VM hosting the Snapshot Manager. Remove
these disks and delete them manually.
■ After you upgrade NetBackup Snapshot Manager, if required you can upgrade
the NetBackup primary server. Also, you must enable the NetBackup Snapshot
Manager server from NetBackup Web UI.
Note: The actual file name may vary depending on the release version.
2 Copy the downloaded compressed image file to the computer on which you
want to deploy NetBackup Snapshot Manager.
3 Un-tar the image file and list the contents:
# ls
NetBackup_SnapshotManager_10.5.x.x-xxxx.tar.gz
netbackup-flexsnap-10.5.x.x-xxxx.tar.gz
flexsnap_preinstall.sh
Upgrading NetBackup Snapshot Manager for Cloud 265
Upgrading NetBackup Snapshot Manager
4 Run the following command to prepare the NetBackup Snapshot Manager host
for installation:
# sudo ./flexsnap_preinstall.sh
For Docker
Or
Use the following equivalent docker/podman command to stop NetBackup
Snapshot Manager:
■ For Podman
■ For Docker
Note: Ensure that you enter the command without any line breaks.
Wait for all the NetBackup Snapshot Manager containers to be stopped and
then proceed to the next step.
6 Upgrade NetBackup Snapshot Manager by running the following command:
flexsnap_configure install
Or
Use the following equivalent docker/podman command to upgrade NetBackup
Snapshot Manager:
■ For Podman
■ For Docker
Note: Ensure that you enter the command without any line breaks.
The installer first loads the individual service images and then launches them
in their respective containers.
The output resembles the following (Below is an example of the Podman
environment output:
Example 2:
9 (Optional) Run the following command to remove the previous version images.
(For Podman) # podman rmi -f <imagename>:<oldimage_tagid>
(For Docker) # docker rmi -f <imagename>:<oldimage_tagid>
10 To verify that the new NetBackup Snapshot Manager version is installed
successfully:
See “Verifying that NetBackup Snapshot Manager is installed successfully”
on page 65.
11 This concludes the upgrade process. Verify that your NetBackup Snapshot
Manager configuration settings and data are preserved as is.
The next step is to register the NetBackup Snapshot Manager with the Veritas
NetBackup primary server (10.2 or earlier) with credentials.
# ls
NetBackup_SnapshotManager_10.5.x.x-xxxx.tar.gz
netbackup-flexsnap-10.5.x.x-xxxx.tar.gz
flexsnap_preinstall.sh
3 Run the following command to prepare the NetBackup Snapshot Manager host
for installation:
# sudo ./flexsnap_preinstall.sh
The installer first loads the individual service images and then launches them
in their respective containers.
276 Upgrading NetBackup Snapshot Manager for Cloud
Applying operating system patches on NetBackup Snapshot Manager host
6 (Optional) Run the following command to remove the previous version images.
(For Podman) # sudo podman rmi -f <imagename>:<oldimage_tagid>
(For Docker) # sudo docker rmi -f <imagename>:<oldimage_tagid>
7 To verify that the new NetBackup Snapshot Manager version is installed
successfully:
See “Verifying that NetBackup Snapshot Manager is installed successfully”
on page 65.
8 This concludes the NetBackup Snapshot Manager upgrade process using a
patch or a hotfix. Verify that your NetBackup Snapshot Manager configuration
settings and data are preserved as is.
■ Verify that specific ports are open on the instance or physical host.
See “Verifying that specific ports are open on the instance or physical host”
on page 39.
Next, migrate NetBackup Snapshot Manager from the RHEL 7.x host to the newly
prepared RHEL 8.x/9.x host.
See “Migrate and upgrade NetBackup Snapshot Manager on RHEL 8.x and 9.x”
on page 278.
278 Upgrading NetBackup Snapshot Manager for Cloud
Migrating and upgrading NetBackup Snapshot Manager
# ls
NetBackup_SnapshotManager_10.5.x.x-xxxx.tar.gz
netbackup-flexsnap-10.5.x.x-xxxx.tar.gz
flexsnap_preinstall.sh
3 Run the following command to prepare the NetBackup Snapshot Manager host
for installation:
# sudo ./flexsnap_preinstall.sh
The installer first loads the individual service images and then launches them
in their respective containers.
5 (Optional) Run the following command to remove the previous version images.
# docker rmi -f <imagename>:<oldimage_tagid>
Wait for all the NetBackup Snapshot Manager containers to be stopped and
then proceed to the next step.
2 Migrate the NetBackup Snapshot Manager configuration data to the RHEL 8.x
and 9.x host:
■ If you have created a new system with RHEL 8.x and 9.x:
■ Run the following command to unmount /cloudpoint from the current
host.
# umount /cloudpoint
Note: For detailed instructions to detach or attach the data disks, follow
the documentation provided by your cloud or storage vendor.
280 Upgrading NetBackup Snapshot Manager for Cloud
Migrating and upgrading NetBackup Snapshot Manager
■ On the RHEL 8.x and 9.x host, run the following commands to create
and mount the disk:
# mkdir /cloudpoint
# mount /dev/<diskname> /cloudpoint
For vendor-specific details
See “Creating and mounting a volume to store NetBackup Snapshot
Manager data” on page 37.
■ If you have upgraded from RHEL 7.x to RHEL 8.x and 9.x, copy the
/cloudpoint mountpoint data from RHEL 7.x system and move it to the
RHEL 8.x and 9.x system under /cloudpoint folder.
Install the same version of NetBackup Snapshot Manager on the different host
(RHEL 8.x and 9.x) as on the previous host by following the steps mentioned
in the To install/upgrade NetBackup Snapshot Manager in docker environment.
This concludes the NetBackup Snapshot Manager migration process.
After migration, install the new_version on the new host by following the steps
mentioned in the To install/upgrade NetBackup Snapshot Manager in docker
environment.
3 During migration process, if NetBackup Snapshot Manager is migrated to
another system or IP address is changed, then regenerate the certificates as
follows:
Using flexsnap_configure CLI
■ Stop the NetBackup Snapshot Manager services using the following
command:
# flexsnap_configure stop
4 After migrating NetBackup Snapshot Manager to a RHEL 8.x and 9.x host,
perform the following steps to upgrade NetBackup Snapshot Manager to 10.5.
See “Upgrading NetBackup Snapshot Manager” on page 264.
5 This concludes the migration and upgrade process for NetBackup Snapshot
Manager. Verify that your NetBackup Snapshot Manager configuration settings
and data are preserved as is.
■ Example 2:
For GCP1: us-east1 and us-west1
For GCP2: us-east1
User can remove us-east1 from GCP2 by using delete_plugin option from
tpconfig command.
■ Example 3:
Upgrading NetBackup Snapshot Manager for Cloud 283
Post-upgrade tasks
Post-upgrade tasks
You may need to perform the following tasks after a successful upgrade of the
NetBackup Snapshot Manager server.
Post-upgrade tasks
1 Upgrade the NetBackup Snapshot Manager agents on the Linux and Windows
application hosts.
Note: If you are upgrading from NetBackup Snapshot Manager 8.3 to 9.0 or
9.1, then you must manually upgrade the on-host agents. If you are upgrading
from NetBackup Snapshot Manager 9.0 to 9.1, upgrading the on-host agents
is optional.
■ Repeat these steps on all the Linux hosts where you wish to upgrade the
Linux-based agent.
Note the following:
284 Upgrading NetBackup Snapshot Manager for Cloud
Post-upgrade tasks
actions": [
"Microsoft.Compute/restorePointCollections/read",
"Microsoft.Compute/restorePointCollections/write",
"Microsoft.Compute/restorePointCollections/delete",
"Microsoft.Compute/restorePointCollections/restorePoints/read",
"Microsoft.Compute/restorePointCollections/restorePoints/write",
"Microsoft.Compute/restorePointCollections/restorePoints/delete",
"Microsoft.Compute/restorePointCollections/restorePoints/
retrieveSasUris/action",
"Microsoft.Compute/restorePointCollections/restorePoints/
diskRestorePoints/read",
"Microsoft.Compute/restorePointCollections/restorePoints/
diskRestorePoints/beginGetAccess/action",
"Microsoft.Compute/restorePointCollections/restorePoints/
diskRestorePoints/endGetAccess/action"
],"
customresourcedefinition.apiextensions.k8s.io/cloudpoint-servers.veritas.com
condition met
Generating Snapshot Manager Custom Resource Definition object
deployment "flexsnap-deploy" successfully rolled out
cloudpointrule.veritas.com/cloudpoint-config-rule configured
Snapshot Manager extension installation ...done
Executable way
■ Permit the script to run as an executable:
# chmod +x cp_extension_start.sh
# ls
NetBackup_SnapshotManager_10.5.x.x-xxxx.tar.gz
netbackup-flexsnap-10.5.x.x-xxxx.tar.gz
flexsnap_preinstall.sh
2 Run the following command to prepare the Snapshot Manager host for
installation:
# ./flexsnap_preinstall.sh
Post-migration tasks
After migration, if the name is changed to NetBackup Snapshot Manager, then
perform the following steps for Linux and Windows on-host agent renews and then
perform the plugin level discovery:
For Linux:
■ Edit the /etc/flexsnap.conf file and update the targeted field with new IP/host
of NetBackup Snapshot Manager.
For example,
[agent]
id = agent.c2ec74c967e043aaae5818e50a939556
■ Perform the Linux on-host agent renew using the following command:
/opt/VRTScloudpoint/bin/flexsnap-agent --renew --token <auth_token>
For Windows:
■ Edit the \etc\flexsnap.conf and update the targeted field with new IP/host
of NetBackup Snapshot Manager.
For example,
[global]
target = nbuxqa-alphaqa-10-250-172-172.vxindia.veritas.com
hostid = azure-vm-427a67a0-6f91-4a35-abb0-635e099fe9ad
[agent]
id = agent.3e2de0bf17d54ed0b54d4b33530594d8
■ Perform the Windows on-host agent renew using the following command:
"c:\ProgramFiles\Veritas\CloudPoint\flexsnap-agent.exe" --renew
--token <auth_token>
Chapter 13
Uninstalling NetBackup
Snapshot Manager for
Cloud
This chapter includes the following topics:
If you have configured policies, ensure that you stop the scheduled policy runs.
You may even want to delete those policies.
■ Ensure that you remove the NetBackup Snapshot Manager agents that are
installed on the application hosts. The application hosts are the systems where
the applications that are being protected by NetBackup Snapshot Manager are
running.
See “Removing the NetBackup Snapshot Manager agents” on page 295.
■ Ensure that you disable the NetBackup Snapshot Manager server from
NetBackup. You can disable NetBackup Snapshot Manager server from the
NetBackup Web UI .
■ All the snapshot data and configuration data from your existing installation is
maintained in the external /cloudpoint data volume. This information is external
to the NetBackup Snapshot Manager containers and images and is deleted after
the uninstallation.
You can take a backup of all the data in the /cloudpoint volume, if desired.
See “Backing up NetBackup Snapshot Manager” on page 292.
2 Ensure that all NetBackup Snapshot Manager containers are stopped. This
step is important because all activity and connections to and from NetBackup
Snapshot Manager must be stopped to get a consistent NetBackup Snapshot
Manager backup.
Enter the following:
(For Docker) # sudo docker ps | grep veritas
(For Podman) # sudo podman ps | grep veritas
This command should not return any actively running NetBackup Snapshot
Manager containers.
Uninstalling NetBackup Snapshot Manager for Cloud 293
Unconfiguring NetBackup Snapshot Manager plug-ins
3 (Optional) If you still see any active containers, repeat step 2. If that does not
work, run the following command on each active container:
(For Docker) # sudo docker kill container_name
(For Podman) # sudo podman kill container_name
As an example following is the command for docker environment:
# sudo docker kill flexsnap-api
4 After all the containers are stopped, take a snapshot of the volume on which
you installed NetBackup Snapshot Manager. Use the cloud provider's snapshot
tools.
5 After the snapshot completes, restart NetBackup Snapshot Manager services.
Use the following command:
(For Docker/Podman)
flexsnap_configure start
3 From the menu on the left, click Workloads > Cloud and then click the Virtual
machines tab.
4 On the Virtual machines tab, select the host where you want unconfigure the
agent and then from the menu bar that appears at the top, click Unconfigure.
NetBackup Snapshot Manager unconfigures the plug-in from the host. Observe
that the Unconfigure button now changes to Configure. This indicates that
the plug-in unconfiguration is successful on the host.
To unconfigure the agent entry from the NetBackup Snapshot Manager server
1 Sign in to the NetBackup UI.
2 Remove NetBackup Snapshot Manager plug-in configuration from the host
that you wish to disconnect.
See “Unconfiguring NetBackup Snapshot Manager plug-ins” on page 293.
3 From the menu on the left, click Workloads > Cloud and then click the Virtual
machines tab.
4 On the Virtual machines tab, select the host where you want unconfigure the
agent and then from the menu bar that appears at the top, click Disconnect.
NetBackup Snapshot Manager begins to unconfigure the agent. Observe that
the Disconnect button now changes to Connect. This indicates that the
disconnect operation is successful and the agent has been unconfigured
successfully.
The agent and the information of the assets discovered by the agent is removed
from NetBackup Snapshot Manager database.
5 The next step is to manually uninstall the agent from the host on which you
performed the disconnect operation. This is required if you wish to protect this
host and its assets using NetBackup Snapshot Manager at a later time.
See “Removing the NetBackup Snapshot Manager agents” on page 295.
Note: To allow the uninstallation, admin users will have to click Yes on the
Windows UAC prompt. Non-admin users will have to specify admin user
credentials on the UAC prompt.
During uninstallation, the installer performs the following tasks on the NetBackup
Snapshot Manager host:
■ Stops all the NetBackup Snapshot Manager containers that are running
■ Removes the NetBackup Snapshot Manager containers
■ Unloads and removes the NetBackup Snapshot Manager images
flexsnap_configure uninstall
Use the following docker command to view the docker images that are loaded
on the host:
■ (For Docker) # sudo docker images -a
■ (For Podman) # sudo podman images -a
Use the following respective commands to remove the NetBackup Snapshot
Manager container images from the host:
■ (For Docker) # sudo docker rmi <image ID>
■ (For Podman) # sudo podman rmi <image ID>
For example:
# mkdir /cloudpoint
6 Mount the attached volume to the installation directory you just created.
Use the following command:
# mount /dev/device-name
/full_path_to_cloudpoint_installation_directory
For example:
# mount /dev/xvdb /cloudpoint
7 Verify that all NetBackup Snapshot Manager related configuration data and
files are in the directory.
Enter the following command:
# ls -l /cloudpoint
■ SQL snapshot or restore and granular restore operations fail if the Windows
instance loses connectivity with the NetBackup Snapshot Manager host
■ Disk-level snapshot restore fails if the original disk is detached from the instance
■ Discovery is not working even after assigning system managed identity to the
control node pool
■ Container manager may not spawn the ephemeral registration container timely
■ Snapshot Manager failed to retrieve the specified cloud domain(s), against the
specified plugin instance
■ Performance issues with OCI backup from snapshot and restore from backup
copy
server. However, as the earlier RabbitMQ connection already exists, the new
connection attempt fails with a resource locked error.
As a result of this connection failure, the agent goes offline and leads to a failure
of all snapshot and restore operations performed on the host.
Workaround:
Restart the Veritas NetBackup Snapshot Manager Agent service on the agent
host.
■ On a Linux hosts, run the following command:
# sudo systemctl restart flexsnap-agent.service
■ On Windows hosts:
Restart the Veritas NetBackup Snapshot Manager™ Agent service from
the Windows Services console.
■ Execute the following command on the primary server to get the NBU UUID:
/usr/openv/netbackup/bin/admincmd/nbhostmgmt -list -host
<primary server host name> | grep "Host ID"
■ The snapshot job is successful but backup job fails with error "The
NetBackup Snapshot Managers certificate is not valid or doesn't
exist.(9866)" when ECA_CRL_CHECK disabled on master server.
If ECA_CRL_CHECK is configured on master server and is disabled then it
must be configured in bp.conf on NetBackup Snapshot Manager setup with
same value.
For example, considering a scenario of backup from snapshot where NetBackup
is configured with external certificate and certificate is revoked. In this case, if
ECA_CRL_CHECK is set as DISABLE on master then set the same value in
bp.conf of NetBackup Snapshot Manager setup, otherwise snapshot operation
will be successful and backup operation will fail with the certificate error.
See “Configuring security for Azure Stack ” on page 245.
■ NetBackup Snapshot Manager cloud operations fail on a RHEL system if
a firewall is disabled
The NetBackup Snapshot Manager operations fail for all the supported cloud
plugins on a RHEL system, if a firewall is disabled on that system when the
NetBackup Snapshot Manager services are running. This is a network
Troubleshooting NetBackup Snapshot Manager for Cloud 307
Troubleshooting NetBackup Snapshot Manager
■ Restart Docker
# systemctl restart docker
■ Backup from Snapshot job and Indexing job fails with the errors
and/or
This can happen when the inbound access to NetBackup Snapshot Manager
on port 5671 and 443 port gets blocked at the OS firewall level (firewalld). Hence,
from the datamover container (used for the Backup from Snapshot and Indexing
jobs), communication to NetBackup Snapshot Manager gets blocked. This
results in the datamover container not being able to start the backup or indexing.
Workaround:
Modify the rules in OS firewall to allow the inbound connection from 5671 and
443 port.
■ Agentless connection fails for a VM with an error message.
308 Troubleshooting NetBackup Snapshot Manager for Cloud
Troubleshooting NetBackup Snapshot Manager
Agentless connection fails for a VM with the following error message when user
changes the authentication type from SSH Key based to password based for a
VM through the portal:
This issue occurs when the permissions are not defined correctly for the user
in the sudoers file as mentioned in the above error message.
Workaround:
Resolve the sudoers file issue for the user by providing the required permissions
to perform the passwordless sudo operations.
■ When NetBackup Snapshot Manager is deployed in private subnet (without
internet) NetBackup Snapshot Manager function fails
This issue occurs when NetBackup Snapshot Manager is deployed in private
network where firewall is enabled or public IP which is disabled. The customer’s
information security team would not allow full internet access to the virtual
machine's.
Workaround:
Enable the ports from the firewall command line using the following commands:
firewall-cmd --add-port=22/tcp
firewall-cmd --add-port=5671/tcp
firewall-cmd --add-port=443/tcp
■ Agentless connection and granular restore to restored host fails when the
VM restored from backup has 50 tags attached to it
Workaround:
(For AWS) If a Windows VM restored from backup has 50 tags and platform tag
does not exists, user can remove any tag that is not required and add the
Platform: windows tag.
■ For few GKE versions, failed pod issues are observed in namespace
Following few failed pods in namespace is observed with failure status as
NodeAffinity:
0 4d14h
flexsnap-fluentd-collector-c88f8449c-5jkqh 0/1 NodeAffinity
0 3d15h
flexsnap-fluentd-collector-c88f8449c-ph8mx 0/1 NodeAffinity
0 39h
flexsnap-fluentd-collector-c88f8449c-rqw7w 1/1 Running
0 10h
flexsnap-fluentd-collector-c88f8449c-sswzr 0/1 NodeAffinity
0 5d18h
flexsnap-fluentd-ftlnv 1/1 Running
3 (10h ago)10h
flexsnap-listener-84c66dd4b8-6l4zj 1/1 Running
0 10h
flexsnap-listener-84c66dd4b8-ls4nb 0/1 NodeAffinity
0 17h
flexsnap-listener-84c66dd4b8-x84q8 0/1 NodeAffinity
0 3d15h
flexsnap-listener-84c66dd4b8-z7d5m 0/1 NodeAffinity
0 5d18h
flexsnap-operator-6b7dd6c56c-cf4pc 1/1 Running
0 10h
flexsnap-operator-6b7dd6c56c-qjsbs 0/1 NodeAffinity
0 5d18h
flexsnap-operator-6b7dd6c56c-xcsgj 0/1 NodeAffinity
0 3d15h
flexsnap-operator-6b7dd6c56c-z86tc 0/1 NodeAffinity
0 39h
{
"CPServer1": [
{
"Plugin_ID": "test",
"Plugin_Type": "aws",
"Config_ID": "aws.8dda1bf5-5ead-4d05-912a-71bdc13f55c4",
"Plugin_Category": "Cloud",
"Disabled": false
}
]
},
{
"CPServer2": [
{
"Plugin_ID": "gcp.2080179d-c149-498a-bf1f-4c9d9a76d4dd",
"Plugin_Type": "gcp",
"Config_ID": "gcp.2080179d-c149-498a-bf1f-4c9d9a76d4dd",
"Plugin_Category": "Cloud",
"Disabled": false
},
{
"Plugin_ID": "gcp.2080179d-c149-498a-bf1f-4c9d9a76d4dd",
"Plugin_Type": "gcp",
"Config_ID": "gcp.2080179d-c149-498a-bf1f-4c9d9a76d4dd",
"Plugin_Category": "Cloud",
"Disabled": false
}
]
}
Manually edit and delete the duplicated plugin information from the
CloudPoint_plugin.conf file.
For example, consider the following example where the duplicate entry for Azure
plugin config is visible (in bold) in CloudPoint_plugin.conf file:
{
"CPServer1": [
{
"Plugin_ID": "config10",
"Plugin_Type": "azure",
"Config_ID": "azure.327ec7fc-7a2d-4e94-90a4-02769a2ba521",
"Plugin_Category": "Cloud",
"Disabled": false
}
]
},
{
"CPServer2": [
{
"Plugin_ID": "azure.327ec7fc-7a2d-4e94-90a4-02769a2ba521",
"Plugin_Type": "azure",
"Config_ID": "azure.327ec7fc-7a2d-4e94-90a4-02769a2ba521",
"Plugin_Category": "Cloud",
"Disabled": false
},
{
"cpserver101.yogesh.joshi2-dns-zone": [
{
"Plugin_ID": "azure.327ec7fc-7a2d-4e94-90a4-02769a2ba521",
"Plugin_Type": "azure",
"Config_ID": "azure.327ec7fc-7a2d-4e94-90a4-02769a2ba521",
"Plugin_Category": "Cloud",
"Disabled": false
},
{
"Plugin_ID": "AZURE_PLUGIN",
"Plugin_Type": "azure",
"Config_ID": "azure.4400a00a-8d2b-4985-854a-74f48cd4567e",
Troubleshooting NetBackup Snapshot Manager for Cloud 313
SQL snapshot or restore and granular restore operations fail if the Windows instance loses connectivity with
the NetBackup Snapshot Manager host
"Plugin_Category": "Cloud",
"Disabled": false
}
]
}
]
}
Workaround:
To resolve this issue, restart the Veritas NetBackup Snapshot Manager Agent
service on the Windows instance.
Workaround:
If the restore has already failed in the environment, you may have to manually
perform a disk cleanup first and then trigger the restore job again.
Troubleshooting NetBackup Snapshot Manager for Cloud 315
Discovery is not working even after assigning system managed identity to the control node pool
3 From the NetBackup UI, trigger the disk-level restore operation again.
In general, if you want to detach the original application disks from the instance,
use the following process for restore:
1. First take a disk-level snapshot of the instance.
2. After the snapshot is created successfully, manually detach the disk from the
instance.
For example, if the instance is in the AWS cloud, use the AWS Management
Console and edit the instance to detach the data disk. Ensure that you save
the changes to the instance.
3. Log on to the instance using an administrative user account and then run the
following command:
# sudo umount /<application_diskmount>
If you see a "device is busy" message, wait for some time and then try the
umount command again.
But it could not discover the assets if there are insufficient permissions added in
System managed identity. Discovery and NetBackup Snapshot Manager related
operations would not work even if System managed identity is enabled and
required permission/role is added to System managed identity later on. Because
it will always use User managed identity at the backend of NetBackup Snapshot
Manager.
To resolve this issue, perform the following steps
1 Update the required permission/role and then add the permissions to User
managed identity and run the required operations again.
2 Edit the corresponding Azure provider configuration in NetBackup Web UI and
run the required operations again.
The following table lists the scenarios and expected outcomes of different Azure
plug-in configurations:
Reader CP-Permissions No
Reader Reader No
CP-Permissions Reader No
Reader Reader No
Note: In the above table, CP-Permissions is a role that has permission to take
snapshot andReader is a role that does not have permission to take the snapshot.
[capability_limit]
max_backup_jobs = 4
flexsnap-workflow-general-1665398188-4d03f27e-fblxb
0/1 ContainerCreating 0
142m
flexsnap-workflow-general-1665398188-538a8846-zrgtl
0/1 ContainerCreating 0
142m
flexsnap-workflow-general-1665398188-87cb301a-5bqss
320 Troubleshooting NetBackup Snapshot Manager for Cloud
Backup and restore jobs fail with timeout error
0/1 ContainerCreating 0
142m
flexsnap-workflow-general-1665398188-f61f5f42-g2rhv
0/1 ContainerCreating 0
142m
To resolve this issue, refer to the AWS troubleshooting section and implement the
solution. Contact the AWS support for further troubleshooting.
To resolve this issue, manually configure the following to set the maximum jobs
that can run on a single node at a time:
■ host using the /cloudpoint/flexsnap.conf file
Or
■ cluster using the flexsnap-conf config map
[capability_limit]
max_jobs = <num>
where, <num> is the maximum number of jobs that can run at a time on a node.
In case of multiple jobs running in parallel, if any service fails due to non availability
of resources then reduce the number of parallel jobs that can be performed on the
provided node type.
Workaround:
The Google Cloud Platform is configured with Cloud KMS CryptoKey
Encrypter/Decrypter permission which is missing for
service-<default-service-account>@compute-system.iam.gserviceaccount.com
service account.
To resolve this issue, assign the following permission to the service account:
-
serviceAccount:service-<default-service-account>@compute-system.iam.gserviceaccount.com
role: roles/cloudkms.cryptoKeyEncrypterDecrypter
etag: BwX-yNgMdSE=
version: 1
Workaround:
Without access permission, the Snapshot Manager requires the inbound rules to
be configured for the snapshot manager in the security group of the ‘VPC endpoint
of the Redshift service'.
On the AWS portal, select a cluster. Click Properties > click Network and security
settings > click the virtual private cloud object > click Endpoints. Search for
“redshift-endpoint” in the search field > click the VPC endpoint id > click the Security
Groups tab. Click the Security Group ID > click Edit Inbound rules, and add the
following for Snapshot Management servers.
Type : HTTPS
Protocol : TCP
Source : 10.177.77.210/32
Workaround:
324 Troubleshooting NetBackup Snapshot Manager for Cloud
Parameterised VM restore fails to retrieve encryption keys
Provide the following required permission to the role attached to the service account
which is used to configure the GCP provider:
compute.networks.getEffectiveFirewalls
Workaround:
Provide the following required permissions to the role attached to the service account
used to configure the GCP provider.
"cloudkms.cryptoKeys.get",
"cloudkms.cryptoKeyVersions.get",
"cloudkms.cryptoKeys.list",
"cloudkms.keyRings.list",
"cloudkms.cryptoKeyVersions.useToDecrypt",
"cloudkms.cryptoKeyVersions.useToEncrypt",
"cloudkms.locations.get",
"cloudkms.locations.list"
Workaround:
Troubleshooting NetBackup Snapshot Manager for Cloud 325
Snapshot Manager failed to retrieve the specified cloud domain(s), against the specified plugin instance
This would stop and start services in the correct order hence ensuring that
NetBackup Snapshot Manager works correctly.
2. Identify the Snapshot Manager related SELinux denials and apply corresponding
policy changes using the following command:
# flexsnap_configure updatecil -i
Following are the SELinux policy updates detected for Snapshot Manager:
[oci]
vol_max_vpu_cnt_in_bfs_restore = 50
The value can be anything from the range 20 - 120, in multiples of 10.
Note the following:
■ For the backed up volumes NetBackup automatically increases the IOPS, when
autotune is enabled. But higher IOPS might incur higher cost.
■ If you restore a VM with increased VPU, then after the restore, configure the
VPU again to a normal value from the OCI console. You can re-configure the
VPU value provided in flexsnap.conf file from the OCI console.
■ When using the agentless method, connection to Amazon Linux 2023 machines
fail with the following error message:
328 Troubleshooting NetBackup Snapshot Manager for Cloud
Single file restore from snapshot copy fails with an error
The agent has been abruptly terminated on the remote host. Channel
not open for sending
The above issue occurs when the operating system libcrypt.so.1 native library
is not available on Amazon Linux 2023 machines.
Workaround:
On Amazon Linux 2023 machine, install the libxcrypt-compat package using the
following command:
sudo dnf install libxcrypt-compat
Workaround:
Manually trigger re-scan of disks on target VM as mentioned below for Windows
and Linux systems:
Troubleshooting NetBackup Snapshot Manager for Cloud 329
MS SQL application backup, restore, or SFR job on Windows cloud VM fails with an error
For Windows:
■ If any network device is attached to the device, detach it.
■ Open the command prompt in administrator privileges and run the following
command:
diskpart
■ Inside the diskpart prompt, type rescan and press the Enter key.
■ Exit the diskpart prompt and the command line.
■ Perform the single file restore from snapshot copy operation again.
For Linux:
■ Run the following command:
echo "- - -" > /sys/class/scsi_host/hostX/scan
where X is the number of SCSI host to scan.
Ensure that you run the above command for each SCSI host available.
For example, if there are three devices, then run the following commands:
# echo "- - -" > /sys/class/scsi_host/host0/scan
# echo "- - -" > /sys/class/scsi_host/host1/scan
# echo "- - -" > /sys/class/scsi_host/host2/scan
This issue occurs intermittently while taking a MS SQL application backup, restore,
or in SFR job while fetching the attached device information through WMI using the
deployed agent on the host.
Workaround:
Retry the operation. If the issue still persists, then restart the target Windows VM.
mv
/usr/share/dbus-1/system-services/org.fedoraproject.SetroubleshootFixit.service
/usr/share/dbus-1/system-services/org.fedoraproject.SetroubleshootFixit.service.back
## RHEL 8 and 9 only
mv
/usr/share/dbus-1/system-services/org.fedoraproject.SetroubleshootPrivileged.service
/usr/share/dbus-1/system-services/org.fedoraproject.SetroubleshootPrivileged.service.back
mv
/usr/share/dbus-1/system-services/org.fedoraproject.Setroubleshootd.service
/usr/share/dbus-1/system-services/org.fedoraproject.Setroubleshootd.service.back
These prerequisites include creating a boot volume and a data volume. Timeout
for the restore jobs occurs and fails the job.
Workaround:
To fix this, manually configure the timeout for restores to meet the prerequisites.
332 Troubleshooting NetBackup Snapshot Manager for Cloud
Restore from backup fails with an error