Important Update: Cohesity Products Documentation


All Cohesity product documentation are now managed via the Cohesity Docs Portal: https://docs.cohesity.com/HomePage/Content/home.htm. Some documentation available here may not reflect the latest information or may no longer be accessible.

NetBackup™ for Nutanix AHV Administrator's Guide

Last Published:
Product(s): NetBackup (11.1)
  1. Overview
    1.  
      Overview of configuring and protecting AHV assets in the NetBackup web UI
  2. RBAC roles for the Nutanix AHV administrator
    1.  
      RBAC roles for the Nutanix AHV administrator
    2.  
      Assign both the Default VMware Administrator and Default AHV Administrator roles to a user
    3.  
      Create a custom role for all Nutanix AHV permissions and additional VMware asset permissions
    4.  
      Create a custom role for all VMware permissions and additional Nutanix AHV asset permissions
  3. Managing AHV clusters
    1.  
      Quick configuration checklist to protect AHV virtual machines
    2.  
      Configure secure communication between the AHV cluster and NetBackup host and Nutanix Prism Central and NetBackup host
    3.  
      Enable the iSCSI initiator service on windows backup host
    4.  
      Install the iSCSI initiator package on Linux backup host
    5.  
      Migrate Java GUI/CLI added clusters into the web UI
    6.  
      Prerequisites to configure Nutanix AHV cluster
    7.  
      About support for Nutanix segmented iSCSI network
    8.  
      Configure CHAP settings for iSCSI secure communication with AHV clusters
    9.  
      About the ports that NetBackup uses to communicate with AHV
    10.  
      Add or browse an AHV cluster
    11.  
      Remove AHV Clusters
    12.  
      Add a new Nutanix Prism Central
    13.  
      Add new Prism Central server credentials
    14.  
      Remove Nutanix Prism Central
    15.  
      Create an intelligent VM group
    16.  
      Assign permissions to the intelligent VM group
    17.  
      Update the intelligent VM group
    18.  
      Remove the intelligent VM group
    19.  
      Set CHAP for iSCSI
    20.  
      Add an AHV access host
    21.  
      Remove an AHV access host
    22.  
      Change resource limits for AHV resource types
    23.  
      Change the autodiscovery frequency of AHV assets
    24. Scan for malware
      1.  
        Scanning backup images
      2.  
        Assets by workload type
  4. Managing credentials
    1. Managing AHV cluster credentials
      1.  
        Add new cluster credentials
      2.  
        Update and validate AHV cluster credentials
    2. Managing Nutanix Prism Central credentials
      1.  
        Add new Nutanix Prism Central credentials
      2.  
        Update and validate Nutanix Prism Central credentials
    3.  
      View the credential name that is applied to an asset
    4.  
      Edit or delete a named credential
  5. Instant access
    1.  
      Prerequisites of instant access
    2.  
      Things to consider and limitations before you use the instant access feature
    3.  
      Create an instant access VM
    4.  
      Download files and folders from a VM backup image
    5. Instant access Build Your Own (BYO)
      1.  
        Prerequisites of Instant Access Build Your Own (BYO)
      2.  
        Hardware configuration requirement of Instant Access Build Your Own (BYO)
      3.  
        Frequently asked questions
  6. Protecting AHV virtual machines
    1.  
      Things to know before you protect AHV virtual machines
    2.  
      Protect AHV VMs or intelligent VM groups using Protection plan
    3.  
      Backup AHV VMs or intelligent groups using Policy
    4.  
      Protect AHV VMs within VPC
    5.  
      Protect vTPM enabled AHV VMs
    6.  
      Customize protection settings for an AHV asset
    7.  
      Modify policy for an AHV asset
    8.  
      Schedules and retention
    9.  
      Backup options
    10.  
      Prerequisite to Enable virtual machine quiescing
    11.  
      Remove protection from VMs or intelligent VM groups
    12.  
      View the protection status of VMs or intelligent VM groups
  7. Recovering AHV virtual machines
    1.  
      Things to consider before you recover the AHV virtual machines
    2.  
      About the pre-recovery check
    3.  
      Recover an AHV virtual machine
    4.  
      Recover an AHV VM within VPC
    5.  
      Recover a vTPM enabled AHV VM
    6.  
      About Nutanix AHV agentless files and folders restore
    7.  
      Prerequisites for agentless files and folder recovery
    8.  
      SSH key fingerprint
    9.  
      Recover files and folders with Nutanix AHV agentless restore
    10.  
      Recovery target options
    11.  
      Pre-recovery checks for Nutanix AHV
    12.  
      About Nutanix-AHV agent-based files and folders restore
    13.  
      Prerequisites for agent-based files and folder recovery
    14.  
      Recover files and folders with Nutanix AHV agent based restore
    15.  
      Limitations
  8. Protecting Nutanix Cloud Clusters (NC2)
    1.  
      Protecting Nutanix Cloud Clusters (NC2) on AWS
    2.  
      Protecting Nutanix Cloud Clusters (NC2) on Azure
  9. Troubleshooting AHV operations
    1.  
      Troubleshooting AHV operations: Error during creation of AHV instant access virtual machines
    2.  
      Troubleshooting tips for NetBackup for AHV
    3.  
      Error during AHV credential addition
    4.  
      Error during the AHV virtual machines discovery phase
    5.  
      Errors for the Status for a newly discovered VM
    6.  
      Error run into while backing up AHV virtual machines
    7.  
      Error while restoring AHV virtual machines
  10. API and command line options for AHV
    1.  
      Using APIs and command line options to manage, protect, or recover AHV virtual machines
    2.  
      Additional NetBackup options for AHV configuration
    3.  
      Additional information about the rename file

Scanning backup images

This section describes the procedure for scanning client backup images of a particular policy for malware.

To scan policy of client backup images for malware

  1. On the left, select Detection and reporting > Malware detection.
  2. On the Malware detection page, select Scan for malware.
  3. In the Search by option, select Backup images.

    Select one of the following scan types:

    • Malware scan - Select this option to scan images using default malware scan.

    • YARA scan - Select this option to scan images using YARA rules.

      Click the Select threat feeds option.

      On the Select threat feeds for scanning dialog box, select the required YARA rules or a zip file of YARA rules that you have uploaded earlier.

  4. All the following steps are applicable for the scan type: Malware scan.

    In the Scanner host pool option, search and select the appropriate host pool name from the list of scanner host pools listed in Select malware scanner host pool.

    Note:

    Scan host from the selected scan host pool must be able to access the instant access mount created on the storage server which is configured with NFS/SMB share type.

  5. In the search criteria, review and edit the following:
    • Policy name

      Only supported policy types are listed.

    • Client name

      Displays the clients that have backup images for a supported policy type.

    • Policy type

      Displays all the supported policies which are enabled for malware scanning.

      Note:

      The Nutanix-AHV policy displays Nutanix-AHV images if the backups are taken from a Nutanix-AHV policy and Protection plan backups.

      Warning:

      The Hypervisor policy type displays Nutanix AHV and RHV images. NetBackup supports malware scanning only for Nutanix AHV images.

    • Type of backup

    • Copies

      If the selected copy does not support instant access, then the backup image is skipped for the malware scan.

    • Disk pool

      MSDP (PureDisk), OST (for example, Data Domain) and AdvancedDisk storage type disk pools are listed.

    • Disk type

      MSDP (PureDisk), OST (for example, Data Domain) and AdvancedDisk disk types are listed.

    • Infection status

      The malware infected status of the backup images can be searched based on the following types: infection detected by malware scan, file hash search, not infected, not scanned or all.

    • For the Select the timeframe of backups, verify the date and the time range or update it.

    • On selecting the Abort malware scan on detecting an infection option, clean recovery would not be supported for infected images.

  6. Click Search.
  7. Select the search criteria and ensure that the selected scan host is active and available.
  8. From the Select the backups to scan table select one or more images for scan.
  9. Click Scan for malware.
  10. After the scan is initiated, the Scan status is displayed.

    The following are the status fields:

    • Not scanned

    • Not infected

    • Infected

    • Failed

      Hover over the status to view the reason for the failed scan.

      Note:

      Any backup images that fail the validation are ignored. Malware scanning is supported for the backup images that are stored on storage with instant access capability and for the supported policy types only.

    • In progress

    • Pending

      Note:

      You can cancel the malware scan for one or more in progress and pending jobs.

    • Infected - Malware scan aborted