Important Update: Cohesity Products Documentation
All Cohesity product documentation are now managed via the Cohesity Docs Portal: https://docs.cohesity.com/HomePage/Content/home.htm. Some documentation available here may not reflect the latest information or may no longer be accessible.
NetBackup™ Web UI Cloud Administrator's Guide
- Managing and protecting cloud assets
- About protecting cloud assets
- Limitations and considerations
- AWS and Azure government cloud support
- Configure Snapshot Manager in NetBackup
- Managing intelligent groups for cloud assets
- Protecting cloud assets or intelligent groups for cloud assets
- About storage lifecycle policies
- Managing policies for cloud assets
- Limitations and considerations
- Planning for policies
- Creating policies for cloud assets
- Setting up attributes for PaaS assets
- Setting up attributes for IaaS assets
- Creating schedules
- About backup frequency
- About assigning retention periods
- Configuring the Start window
- Configuring the include dates
- Configuring the exclude dates
- Configuring the cloud assets for PaaS
- Configuring the cloud assets for IaaS
- Configuring backup options for IaaS
- Managing cloud policies
- Scan for malware
- Protecting Microsoft Azure resources using resource groups
- NetBackup Accelerator for cloud workloads
- Configuring backup schedules for cloud workloads using protection plan
- Backup options for cloud workloads
- AWS Snapshot replication
- Protect applications in-cloud with application-consistent snapshots
- Protecting AWS or Azure VMs for recovering to VMware
- Cloud asset cleanup
- Cloud asset filtering
- Protecting PaaS assets
- Protecting PaaS assets
- Steps to protect PaaS assets
- Prerequisites for protecting PaaS assets
- Enabling binary logging for MySQL and MariaDB databases
- Enabling backup and restore in Kubernetes
- Prerequisites for protecting Amazon RDS SQL Server database assets
- Protecting RDS Custom instances
- Protecting Azure Managed Instance databases
- Limitation and considerations
- For all databases
- For PostgreSQL
- For incremental backups for Azure PostgreSQL
- For AWS RDS PostgreSQL and AWS Aurora PostgreSQL
- For AWS DynamoDB
- For AWS DocumentDB
- For AWS Neptune
- For AWS RDS SQL
- For Azure, AWS RDS, and Aurora MySQL
- For incremental backups using Azure MySQL server
- For incremental backups using the GCP SQL Server
- For Azure SQL and SQL Managed Instance
- For Azure SQL and SQL Managed Instance (without temp. database)
- For Azure SQL Server and SQL Managed Instance incremental backup
- For Azure Cosmos DB for MongoDB
- For Azure Cosmos DB for NoSQL
- For Amazon RDS for Oracle
- For Amazon Redshift databases
- For Amazon Redshift clusters
- For GCP SQL Server
- For GCP BigQuery
- Installing the native client utilities
- Configuring storage for different deployments
- Configuring the storage server for instant access
- About incremental backup for PaaS workloads
- Configuring incremental backups for Azure MySQL server
- About archive redo log backup for PaaS workloads
- About Auto Image Replication for PaaS workloads
- Discovering PaaS assets
- Viewing PaaS assets
- Managing PaaS credentials
- Add protection to PaaS assets
- Recovering cloud assets
- Recovering cloud assets
- About the pre-recovery check for VMs
- Supported parameters for restoring cloud assets
- Recovering virtual machines
- Recovering applications and volumes to their original location
- Recovering applications and volumes to an alternate location
- Recovery scenarios for GCP VMs with read-only volumes
- (GCP only) Restoring virtual machines and volumes using the autoDelete disk support
- Perform rollback recovery of cloud assets
- Restore to a different cloud provider
- Recovering AWS or Azure VMs to VMware
- Recovering PaaS assets
- Recovering cloud assets
- Performing granular restore
- Troubleshooting protection and recovery of cloud assets
- Troubleshoot cloud workload protection issues
- Error Code 9855: Error occurred while exporting snapshot for the asset: <asset_name>
- VMs and other OCI assets with CMK-encrypted disks are marked as deleted in NetBackup UI.
- Backup from snapshot jobs take longer time than expected
- Backup from snapshot job fails due to connectivity issues when Snapshot Manager is deployed on an Ubuntu host
- Error disambiguation in NetBackup UI
- Status Code 150: Termination requested by administrator
- Troubleshoot PaaS workload protection and recovery issues
Prepare the VMs for back up
This section describes the considerations and prerequisites to back up the VMs for restoring to a different cloud platform. The process is different for different operating systems, depending on the cloud service to which you want to restore.
Target: AWS
- Install the required Xen and Nitro drivers:
If drivers are not installed, then install them by running the following commands:
lsinitrd | grep -i -e nvme -e ena -e xen
modinfo nvme
For more information, refer to Install or upgrade the NVMe driver
modinfo ena
For more information, refer to Enable enhanced networking with the Elastic Network Adapter (ENA) on your EC2 instances
Update/Create the
/etc/dracut.conffile with the following line:add_drivers+="xen-blkfront xen-netfront nvme-core nvme"
Run the following command:
dracut -f -v
Validate if the drivers are installed successfully by running the following command:
lsinitrd | grep -i -e nvme -e ena -e xen
- To avoid mount failures, it is recommended to replace the device names with UUID in
/etc/fstabfile.Back up the original
fstabfile and comment out Azure-specific entries, and other non-critical entries which might cause boot failures after restore. Alternatively, you can addnofailinfstabfile for these entries. - Create a root user password.
- Configure or obtain the root user credentials, if the VM is configured with key based logon.
To use the key based logon, perform the following:
Back up the original
/root/.ssh/authorized_keys.The
/root/.ssh/authorized_keyscontains the same public key as azureuser, but cannot log on using the root user and key due to the following command present inauthorized_keysfor the root user and the associated key:`echo 'Please login as the user \"azureuser\" rather than the user \"root\".';echo;sleep 10;exit 142`
Note:
This is applicable for Azure-created keys and user-provided keys.
You must delete the command to let the root logon work after restore.
After editing, the entry appears as follows:
cat /root/.ssh/authorized_keys no-port-forwarding,no-agent-forwarding,no-X11-forwarding, ssh-rsa AAAAB3Nza..<truncated>..HruCzDsb3j
Target: Azure
- AWS instances have Hv and NVMe drivers preinstalled and hence no additional steps are required. Confirm if the drivers exist in your instance, run the command:
lsinitrd | grep -i -e hv -e nvme
- Replace the device names with UUID in
/etc/fstabfile.
Target: AWS
By default, AWS uses SUSE kernel. Hence install the SUSE kernel and select it at the boot time from the GRUB menu on the restored VM as follows:
- Refer to the following documentation for more information on entries in
zypp.conffile as it may affect the number of kernels retained and their behavior:Installing multiple kernel versions
Proceed with the next steps after ensuring that the SUSE computer can work with multiple kernels.
- Run the following command to list the available kernels:
zypper se -s 'kernel*'
- From the list of kernels displayed in the above step, install a suitable default kernel version:
zypper in kernel-default-<VERSION>
For example, zypper in kernel-default-5.3.18-53.3
- List the installed kernels and kernel modules using the following command:
zypper se -si 'kernel*'
- It is recommended to set a root user password.
- If the required drivers are not installed, then install them by running the following commands:
lsinitrd --kver <YOUR NEW KERNEL VERSION> | grep xen
Update/Create the
/etc/dracut.conffile with the following line:add_drivers+="xen-blkfront xen-netfront nvme-core nvme"
Run the following command:
dracut -f -v
dracut -f -v --kver <YOUR NEW KERNEL VERSION>
lsinitrd --kver <YOUR NEW KERNEL VERSION> | grep xen
<YOUR NEW KERNEL VERSION> is the new kernel version installed in Step 3 above.
- Back up the
/etc/default/grubfile. Edit the originalgrubfile, add GRUB_TIMEOUT and GRUB_TIMEOUT_STYLE entries and comment out the following parameters:GRUB_HIDDEN_TIMEOUT
GRUB_HIDDEN_TIMEOUT_QUIET
By default, GRUB_DEFAULT is set to 0 in the
/etc/default/grubfile. Change the default value so that it loads Azure kernel on restart and not the newly installed kernel.For example,
GRUB_DEFAULT='1>KERNEL_INDEX'where KERNEL_INDEX can be found with grub2-mkconfig command or by analyzing /boot/grub2/grub.cfgfile.Updating GRUB_DEFAULT ensures that the source VM keeps using Azure kernel, in an event, where it is restarted while the new kernel is installed.
The GRUB config file has entries similar to the following:
#GRUB_HIDDEN_TIMEOUT= #GRUB_HIDDEN_TIMEOUT_QUIET=true GRUB_DEFAULT'1><YOUR KERNEL INDEX NUMBER>' GRUB_TIMEOUT=20 GRUB_TIMEOUT_STYLE=menu
Update the GRUB config file using the following command:
grub2-mkconfig -o /boot/grub2/grub.cfg
After restore, to access GRUB menu during restart, press ESC twice during the countdown on EC2 Serial Console.
For more information on GRUB entries, refer to Simple configuration handling
Target: Azure
- Run the following command to verify if the drivers are preinstalled:
lsinitrd | grep -i -e hv -e nvme
- It is recommended to replace the device names with UUID in
/etc/fstabfile.
Target: AWS
- Run the following command to install the linux-aws kernel package:
sudo apt-get update && sudo apt-get upgrade -y linux-aws
- Change grub countdown style and increase time-out in
/etc/default/grubfile. This enables the user to enter the recovery mode if issues are faced during the restart:GRUB_TIMEOUT_STYLE=menu
GRUB_TIMEOUT=20
- To avoid loading the new kernel on restart, ensure that the default kernel entry (GRUB_DEFAULT) in the grub configuration file is pointing to Azure-specific kernel and not the newly installed kernel.
- Run the following command to update
grubfile:update-grub
Target: Azure
- Run the following command to verify if the drivers are preinstalled:
lsinitrd | grep -i -e hv -e nvme
- It is recommended to replace the device names with UUID in
/etc/fstabfile.
Target: AWS
- Check the boot mode (Legacy or UEFI).
- Run the following:
(Ctrl + R) -> MSInfo32.exe → BIOS Mode
- Install the following drivers:
PV driver: AWSPVDriver.zip
EC2 install: EC2Install.zip
NVME: AWSNVMe.zip