NetBackup™ Web UI Cloud Administrator's Guide

Last Published:
Product(s): NetBackup & Alta Data Protection (10.3.0.1, 10.3)
  1. Managing and protecting cloud assets
    1.  
      About protecting cloud assets
    2.  
      Limitations and considerations
    3. Configure Snapshot Manager in NetBackup
      1.  
        Add a Snapshot Manager
      2. Add a cloud provider for a Snapshot Manager
        1.  
          IAM Role for AWS Configuration
      3.  
        Associate media servers with a Snapshot Manager
      4.  
        Discover assets on Snapshot Manager
      5.  
        Enable or disable a Snapshot Manager
      6.  
        (Optional) Add the Snapshot Manager extension
    4. Managing intelligent cloud groups
      1.  
        Create an intelligent cloud group
      2.  
        Delete an intelligent cloud group
    5. Protecting cloud assets or intelligent cloud groups
      1.  
        Customize or edit protection for cloud assets or intelligent groups
      2.  
        Remove protection from cloud assets or intelligent groups
    6.  
      Cloud asset cleanup
    7.  
      Cloud asset filtering
    8.  
      AWS and Azure government cloud support
    9. About protecting Microsoft Azure resources using resource groups
      1.  
        Before you begin
      2.  
        Limitations and considerations
      3. About resource group configurations and outcome
        1.  
          Examples of resource group configurations
      4.  
        Troubleshoot resource group permissions
    10. About the NetBackup Accelerator for cloud workloads
      1.  
        How the NetBackup Accelerator works with virtual machines
      2.  
        Accelerator forced rescan for virtual machines (schedule attribute)
      3.  
        Accelerator backups and the NetBackup catalog
      4.  
        Accelerator messages in the backup job details log
    11.  
      Configuring backup schedule for cloud workloads
    12.  
      Backup options for cloud workloads
    13.  
      Snapshot replication
    14.  
      Configure AWS snapshot replication
    15.  
      Using AWS snapshot replication
    16.  
      Support matrix for account replication
    17.  
      Protect applications in-cloud with application consistent snapshots
    18. Protecting PaaS assets
      1.  
        Prerequisites for protecting PaaS assets
      2. Installing the native client utilities
        1.  
          Installing the MySQL client utility
        2.  
          Installing the sqlpackage client utility
        3.  
          Installing PostgresSQL client utility
        4.  
          Installing MongoDB client utility
        5.  
          Installing the Amazon RDS for Oracle client utility
      3.  
        Configuring the storage server for instant access
      4. Configuring storage for different deployments
        1.  
          For MSDP cloud deployments
        2.  
          For Kubernetes deployments
        3.  
          For VM-based BYO deployments
      5.  
        About incremental backup for PaaS workloads
      6.  
        Limitations and considerations
      7.  
        Discovering PaaS assets
      8.  
        Viewing PaaS assets
      9.  
        Managing PaaS credentials
      10.  
        View the credential name that is applied to a database
      11. Add credentials to a database
        1.  
          Creating an IAM database username
        2.  
          Configuring permissions for database user
        3.  
          Creating a system or user managed identity username
      12.  
        Add protection to PaaS assets
      13.  
        Perform backup now
  2. Recovering cloud assets
    1.  
      Recovering cloud assets
    2.  
      Perform rollback recovery of cloud assets
    3. Recovering PaaS assets
      1.  
        Recovering non-RDS PaaS assets
      2.  
        Recovering RDS-based PaaS asset
      3.  
        Recovering Azure protected assets
      4.  
        Recovering duplicate images from AdvancedDisk
  3. Performing granular restore
    1.  
      About granular restore
    2.  
      Supported environment list
    3.  
      List of supported file systems
    4.  
      Before you begin
    5.  
      Limitations and considerations
    6.  
      Restoring files and folders from cloud virtual machines
    7.  
      Restoring volumes on cloud virtual machines
    8.  
      Performing steps after volume restore containing LVM
    9.  
      Troubleshooting
  4. Troubleshooting protection and recovery of cloud assets
    1.  
      Troubleshoot cloud workload protection issues
    2. Troubleshoot PaaS workload protection and recovery issues
      1.  
        Troubleshooting Amazon Redshift issues

Limitations and considerations

The following limitations considerations exist for granular restore:

  • If adequate space is not available on the target location, the restore operation fails before the copy operation begins.

  • The following devices are ignored when snapshots are performed or indexed.

    • Ephemeral storage devices

      (For example, Amazon AWS instance store volumes and Microsoft Azure temporary disks.) These devices are also ignored for indexing as well.

    • File systems that are created on LDM disk

      These files systems are ignored for host consistent snapshots.

  • Until old agent (pre-installed) service is not restarted, alternate host restore (GRT and application) of LVM asset might fail. To support the recovery of LVM assets, you need to restart the older agents.

  • Granular restore (GRT) or single file restore (SFR) can be performed with the help of VxMS indexing. VxMS indexing is applicable for all Snapshot Manager supported file systems. VxMS indexing can be performed for Azure, Azure Stack, AWS cloud and GCP.

  • Host consistent snapshot is supported for EXT2 file system only if it is mounted as read-only.

  • If any unsupported file systems are present on the host, the host can be added to the protection plan that is created for granular restore. The protection plans for granular restore have the Enable granular recovery for files or folders check box value set to true.

  • During indexing, OS errors can occur while crawling files, directories, or other entries. These errors are ignored and the indexing operation continues. To restore the missing files, you must initiate the granular restore operations on the parent folder.

  • When you create or mount a disk from the Windows VM, add the drive letter. This action ensures that the indexing operation can capture the correct drive letter.

  • In some cases a mount point is not visible when you browse for files or folders from the recovery point. Consider the following reasons:

    • The "/" (root file system) is on an LVM, and

    • The mount point is not directly related to "/" (root file system).

    In this scenario, search for the mount point from the right panel and then restore the files or folders successfully.

    Consider the following example. A disk is mounted on /mnt1/mnt2 where /mnt1 is any directory on the "/". (The root file system that is on the LVM setup.) mnt2 is a mount point inside mnt1. mnt2 is not visible in the tree on the left panel. However, you can search and restore files or folders inside the mount point.

  • To restore files and folders from VM snapshot recovery points, the /etc/fstab file on the Linux servers must have the entries based on the file system UUID, instead of device paths. The device paths can change depending on the order in which Linux discovers the devices during system boot.

  • While restoring application or file systems from one OS version to another OS version, refer to the OS and application vendor's compatibility matrix. Restore of file system from higher version to lower version is not recommended.

  • A user group cannot restore a drive as source to an alternate folder as the destination. A user group does not have the writer permission to create a new folder.

  • The agentless connection cannot restore the encrypted file by Windows (or EFS) through a granular file-level restore (Restore files and folder option). However, you can restore the file through a volume-level restore and then decrypt the file.

  • Files that are stored on volume that is mounted on a folder (junction point) can be restored only if the underlying disk has the GPT partition layout. If the volume is mounted using a drive letter, then the files can be restored irrespective of the partition layout of the underlying disk.

 

Limitations for single file restore from a backup copy
  • When you restore files or folders and source host is Linux and the target host is Windows, the following points apply:

    • File attributes cannot be restored on a Windows host and only the content of the file is restored.

    • If there is any symlink in the files or folders that are selected for restore, the symlink is not restored.

    • For a restore to the original location, the check for available size is skipped before the copy operation.

  • If restoring files or folders when the source host is Linux and the target host is Linux, then the socket and the block files are not restored.

  • A restore of files and folders is not supported when they reside on any LDM disks, dynamic disks, or storage spaces.

  • If the media server or the PureDisk Deduplication Engine and Veritas Provisioning file system daemon service restarts, the live mount that is retained during a partially successful restore is removed or expired before the retention period expiration date.

  • If any media servers are not upgraded to 10.3, then the primary server on version 10.3 is used to connect to NetBackup Snapshot Manager.

  • The junction point on Windows after indexing uses the following format:

    Volume {4e3f8396-490a-400a-8abf-5579cafd4c0f}

    To restore a junction point for single file restore from backup operation, select Restore everything to a different location and in the Advanced options enable Require to restore access control list.

Operational notes for the Activity monitor

The following behaviors exist for the Activity monitor:

  • After a restore job is completed, you cannot expand the directories in the File List section of the restore job.

  • In the Activity monitor summary, when the restore job starts it shows the current file which is the first entry in the restore items. After the job is complete, the summary no longer displays.

  • Bytes transferred and estimated bytes are not updated and are shown as 0.