Veritas NetBackup™ CloudPoint Install and Upgrade Guide

Last Published:
Product(s): NetBackup (8.3.0.1, 8.3)
Platform: Linux,UNIX,Windows
  1. Section I. CloudPoint installation and configuration
    1. Preparing for CloudPoint installation
      1.  
        About the deployment approach
      2.  
        Deciding where to run CloudPoint
      3.  
        About deploying CloudPoint in the cloud
      4.  
        Meeting system requirements
      5.  
        CloudPoint host sizing recommendations
      6.  
        Creating an instance or preparing the physical host to install CloudPoint
      7.  
        Installing Docker
      8.  
        Creating and mounting a volume to store CloudPoint data
      9.  
        Verifying that specific ports are open on the instance or physical host
    2. Deploying CloudPoint using the Docker image
      1.  
        Installing CloudPoint
      2.  
        Verifying that CloudPoint installed successfully
      3.  
        Configuring AWS KMS in CloudPoint
    3. CloudPoint cloud plug-ins
      1. AWS plug-in configuration notes
        1.  
          Prerequisites for configuring the AWS plug-in
        2.  
          Configuring AWS permissions for CloudPoint
        3.  
          AWS permissions required by CloudPoint
        4.  
          Before you create a cross account configuration
      2. Google Cloud Platform plug-in configuration notes
        1.  
          Google Cloud Platform permissions required by CloudPoint
        2.  
          Configuring a GCP service account for CloudPoint
        3.  
          Preparing the GCP service account for plug-in configuration
      3. Microsoft Azure plug-in configuration notes
        1.  
          Configuring permissions on Microsoft Azure
      4.  
        How to configure the CloudPoint cloud plug-ins?
    4. CloudPoint storage array plug-ins
      1. NetApp plug-in configuration notes
        1.  
          NetApp plug-in configuration parameters
        2.  
          Configuring a dedicated LIF for NetBackup access
        3.  
          Supported CloudPoint operations on NetApp storage
      2. Nutanix Files plug-in configuration notes
        1.  
          Nutanix Files plug-in configuration prerequisites
        2.  
          Nutanix Files plug-in considerations and limitations
        3.  
          Supported CloudPoint operations on Nutanix Files File Server
        4. Troubleshooting NetBackup issues for Nutanix Files
          1.  
            Backup jobs for Nutanix Files fail due to snapshot import and export operations failures
          2.  
            Plug-in configuration may fail if the Nutanix Files version is unsupported
      3. Dell EMC Unity array plug-in configuration parameters
        1.  
          Supported Dell EMC Unity arrays
        2.  
          Supported CloudPoint operations on Dell EMC Unity arrays
      4. Pure Storage FlashArray plug-in configuration notes
        1.  
          Supported Pure Storage FlashArray models
        2.  
          Supported CloudPoint operations on Pure Storage FlashArray models
      5. HPE RMC plug-in configuration notes
        1.  
          RMC plug-in configuration parameters
        2.  
          Supported HPE storage systems
        3.  
          Supported CloudPoint operations on HPE storage arrays
      6. Hitachi plug-in configuration notes
        1.  
          Hitachi plug-in configuration parameters
        2.  
          Supported Hitachi storage arrays
        3.  
          Supported CloudPoint operations on Hitachi arrays
      7. InfiniBox plug-in configuration notes
        1.  
          InifiniBox plug-in configuration parameters
        2.  
          Supported CloudPoint operations on InfiniBox arrays
      8.  
        How to configure the CloudPoint storage array plug-ins?
    5. CloudPoint application agents and plug-ins
      1.  
        Microsoft SQL plug-in configuration notes
      2. Oracle plug-in configuration notes
        1.  
          Optimizing your Oracle database data and metadata files
      3.  
        MongoDB plug-in configuration notes
      4.  
        About the installation and configuration process
      5.  
        Preparing to install the Linux-based agent
      6.  
        Preparing to install the Windows-based agent
      7.  
        Downloading and installing the CloudPoint agent
      8.  
        Registering the Linux-based agent
      9.  
        Registering the Windows-based agent
      10.  
        Configuring the CloudPoint application plug-in
      11.  
        Configuring VSS to store shadow copies on the originating drive
      12.  
        Creating a NetBackup protection plan for cloud assets
      13.  
        Subscribing cloud assets to a NetBackup protection plan
      14. About snapshot restore
        1.  
          Process for restoring SQL AG databases
      15.  
        Restore requirements and limitations for Microsoft SQL Server
      16.  
        Restore requirements and limitations for Oracle
      17.  
        Restore requirements and limitations for MongoDB
      18.  
        Steps required before restoring SQL AG databases
      19.  
        Recovering a SQL database to the same location
      20.  
        Recovering a SQL database to an alternate location
      21. Additional steps required after a SQL Server snapshot restore
        1.  
          Steps required after a SQL Server disk-level snapshot restore to new location
      22.  
        Additional steps required after restoring SQL AG databases
      23.  
        SQL snapshot or restore and granular restore operations fail if the Windows instance loses connectivity with the CloudPoint host
      24.  
        Disk-level snapshot restore fails if the original disk is detached from the instance
      25.  
        Additional steps required after a MongoDB snapshot restore
      26.  
        Additional steps required after an Oracle snapshot restore
      27.  
        Additional steps required after restoring an AWS RDS database instance
    6. Protecting assets with CloudPoint's agentless feature
      1.  
        About the agentless feature
      2.  
        Prerequisites for the agentless configuration
      3.  
        Granting password-less sudo access to host user account
      4.  
        Configuring the agentless feature
  2. Section II. CloudPoint maintenance
    1. CloudPoint logging
      1.  
        About CloudPoint logging mechanism
      2. How Fluentd-based CloudPoint logging works
        1.  
          About the CloudPoint fluentd configuration file
        2.  
          Modifying the fluentd configuration file
      3.  
        CloudPoint logs
    2. Troubleshooting CloudPoint
      1.  
        Restarting CloudPoint
      2.  
        Troubleshooting CloudPoint logging
      3.  
        CloudPoint agent fails to connect to the CloudPoint server if the agent host is restarted abruptly
      4.  
        CloudPoint agent registration on Windows hosts may time out or fail
      5.  
        Disaster recovery when DR package is lost or passphrase is lost
    3. Upgrading CloudPoint
      1.  
        About CloudPoint upgrades
      2.  
        Supported upgrade path
      3.  
        Upgrade scenarios
      4.  
        Preparing to upgrade CloudPoint
      5.  
        Upgrading CloudPoint
    4. Uninstalling CloudPoint
      1.  
        Preparing to uninstall CloudPoint
      2.  
        Backing up CloudPoint
      3.  
        Unconfiguring CloudPoint plug-ins
      4.  
        Unconfiguring CloudPoint agents
      5.  
        Removing the CloudPoint agents
      6.  
        Removing CloudPoint from a standalone Docker host environment
      7.  
        Restoring CloudPoint

About snapshot restore

The types of snapshots you can restore and where you can restore them varies depending on the asset type.

When you restore a snapshot, keep in mind the following:

  • You can restore an encrypted snapshot. To enable the restoring of encrypted snapshots, add a Key Management Service (KMS) policy, and grant the NetBackup user access to KMS keys so that they can restore encrypted snapshots.

  • If you are restoring a replicated host snapshot to a location that is different from the source region, then the restore might fail as the key is not available at the target location.

    As a prerequisite, create a key-pair with the same name as the source of the snapshot, or import the key-pair from the source to the target region.

    Then, after the restore is successful, change the security groups of the instance from the network settings for the instance.

  • When you have created a snapshot of a supported storage array disk which has a file system created and mounted on it, you must first stop any application that is using the file system and then unmount the file system and perform restore.

  • For AWS/Azure/GCP cloud disk/volume snapshots, you must first detach the disk from the instance and then restore the snapshot to original location.

  • (Applicable to AWS only) When you restore a host-level application snapshot, the name of the new virtual machine that is created is the same as the name of the host-level snapshot that corresponds to the application snapshot.

    For example, when you create an application snapshot named OracleAppSnap, NetBackup automatically creates a corresponding host-level snapshot for it named OracleAppSnap-<number>. For example, the snapshot name may resemble OracleAppSnap-15.

    Now, when you restore the application snapshot (OracleAppSnap), the name of the new VM is OracleAppSnap-<number> (timestamp).

    Using the example cited earlier, the new VM name may resemble OracleAppSnap-15 (restored Nov 20 2018 09:24).

    Note that the VM name includes "Oracle-AppSnap-15" which is the name of the host-level snapshot.

  • (Applicable to AWS only) When you restore a disk-level application snapshot or a disk snapshot, the new disk that is created does not bear any name. The disk name appears blank.

    You have to manually assign a name to the disk to be able to identify and use it after the restore.

  • When you restore a snapshot of a Windows instance, you can log in to the newly restored instance using original instance's username/password/pem file.

    By default, AWS disables generating a random encrypted password after launching the instance from AMI. You must set Ec2SetPassword to Enabled in config.xml to generate new password every time. For more information on how to set the password, see the following link.

    https://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/ec2config-service.html#UsingConfigXML_WinAMI

  • The volume type of newly created volumes for replicated snapshots is according to the region's default volume type.

    If volume type is not specified, the following default values are used:

Table: Default volume types

Region

Default volume type

us-east-1, eu-west-1, eu-central-1, us-west-1, us-west-2

ap-northeast-1, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-south-1

sa-east-1, us-gov-west-1, cn-north-1

standard

All other regions

gp2

  • If you are performing a disk-level snapshot restore to the same location, then verify that the original disk is attached to the instance, before you trigger a restore.

    If the existing original disk is detached from the instance, then the restore operation might fail.

    See Disk-level snapshot restore fails if the original disk is detached from the instance.

  • You can perform only one restore operation on a snapshot at any given time. If multiple operations are submitted on the same asset, then only the first operation is triggered and the remaining operations will fail.

    This is applicable for all CloudPoint operations in general. CloudPoint does not support running multiple jobs on the same asset simultaneously.

  • If you intend to restore multiple file systems or databases on the same instance, then Veritas recommends that you perform these operations one after the other, in a sequential manner.

    Running multiple restore operations in parallel can lead to an inconsistency at the instance level and the operations might fail eventually. Multiple restore jobs that need access to any shared asset between them are not allowed. Assets that participate in the restore job are locked and any other job requiring such locked assets will fail.

  • If a region or zone is removed from the AWS or GCP plug-in configuration, then all the discovered assets from that region or zone are also removed from the CloudPoint assets database. If there are any active snapshots that are associated with the assets that get removed, then you may not be able perform any restore operations on those snapshots.

    Once you add that zone back into the plug-in configuration, CloudPoint discovers all the assets again and you can resume the restore operations on the associated snapshots.