NetBackup™ Web UI Cloud Administrator's Guide
- Managing and protecting cloud assets
- About protecting cloud assets
- Limitations and considerations
- Configure Snapshot Manager in NetBackup
- Managing intelligent cloud groups
- Protecting cloud assets or intelligent cloud groups
- Cloud asset cleanup
- Cloud asset filtering
- AWS and Azure government cloud support
- About protecting Microsoft Azure resources using resource groups
- About the NetBackup Accelerator for cloud workloads
- Configuring backup schedule for cloud workloads
- Backup options for cloud workloads
- Snapshot replication
- Configure AWS snapshot replication
- Using AWS snapshot replication
- Support matrix for account replication
- Protect applications in-cloud with application consistent snapshots
- Protecting PaaS assets
- Prerequisites for protecting PaaS assets
- Installing the native client utilities
- Configuring the storage server for instant access
- Configuring storage for different deployments
- About incremental backup for PaaS workloads
- Limitations and considerations
- Discovering PaaS assets
- Viewing PaaS assets
- Managing PaaS credentials
- View the credential name that is applied to a database
- Add credentials to a database
- Add protection to PaaS assets
- Perform backup now
- Recovering cloud assets
- Performing granular restore
- Troubleshooting protection and recovery of cloud assets
Creating a system or user managed identity username
Do any of the following configurations:
Configure managed identity user as AAD admin:
Set AAD admin on the SQL server or the Managed instance.
Go to Settings > Azure Active Directory > Set admin. Search and set system-assigned or user-assigned managed identity, and save.
Note:
Only those media servers configured as system-assigned managed identity as AAD admin can perform backup and restore.
Create managed identity user on the database using SSMS client:
To set AAD admin for SQL server to create user, go to Settings > Active Directory admin > Set admin. Pick active directory the user, and save.
Login to the SQL database or Managed database to create user under that database.
CREATE USER [<managed_identity>] FROM EXTERNAL PROVIDER; ALTER ROLE db_owner ADD MEMBER [<managed_identity>];Provide login permission for that user on the SQL Server, run
# CREATE USER [<managed_identity>] FROM EXTERNAL PROVIDER; # ALTER ROLE loginmanager ADD MEMBER [<managed_identity>];
Note:
You must create users for all media servers communicating with the database using the system-assigned managed identity.
Note:
To restore database, you must configure the managed identity user as AAD admin on the target server.
To configure the AAD admin for MySQL server to create user, go to Settings > Active Directory admin > Set admin. Pick the active directory user, and save.
Get the client ID for managed identity using Azure CLI, run
# az ad sp list --display-name <managed_identity> --query [*].appId --out tsv
Generate access token to login, using Azure CLI, run:
# az account get-access-token --resource-type oss-rdbms
Login using the AAD admin user and access token, run:
# mysql -h <server name> --user <user name> --enable-cleartext-plugin --password=<token>
Create the manage identity user and grant the permissions, run:
# SET aad_auth_validate_oids_in_tenant = OFF; # CREATE AADUSER '<db_user>' IDENTIFIED BY '<Generated_client_id>'; # GRANT USAGE, DROP, SELECT, CREATE, SHOW VIEW, EVENT, LOCK TABLES , ALTER, CREATE VIEW, INSERT, REFERENCES, ALTER ROUTINE, PROCESS ON *.* TO '<db_user>'@'%'
To configure the AAD admin for PostgreSQL server to create user, go to Settings > Active Directory admin > Set admin. Pick the active directory user, and save.
Get client ID for the managed identity:
# az ad sp list --display-name <managed_identity> --query [*].appId --out tsv
Generate the access token required to login, run:
# az account get-access-token --resource-type oss-rdbms
Export the password for the generated token, run:
# export PGPASSWORD=<token>
Login using the AAD admin user and the access token, run:
# psql "host=<host name> port=5432 dbname=<dbname> user=<user name> sslmode=require"
Create user and grant permission, run:
# SET aad_auth_validate_oids_in_tenant = OFF; # CREATE ROLE <db_user> WITH LOGIN PASSWORD '<client_id>' IN ROLE azure_ad_user; # GRANT azure_pg_admin TO <db_user>; # ALTER USER smipguser CREATEDB; # ALTER USER smipguser Replication;
Note:
Only user managed identity is supported for MySQL Flexible Server. Managed Identity support is not available for PostgreSQL Flexible Server.
Log on to your Azure portal.
To assign the Cosmos DB Built-in Data Contributor role to the managed identity, run the command:
# az cosmosdb sql role assignment create -a <Account_Name> -g <Resource_Group_Name> -s "/" -p <Object_ID/Principle_ID> -d 00000000-0000-0000-0000-000000000002
Where:
Account_Name is the Azure Cosmos account name.
Resource_Group_Name is the Resource group name of the account.
Object_ID/Principle_ID is the Managed identity object or principle ID.
00000000-0000-0000-0000-000000000002 is the Cosmos DB Built-in Data Contributor role ID.