Please enter search query.
Search <book_title>...
NetBackup™ Web UI Kubernetes Administrator's Guide
Last Published:
2022-03-28
Product(s):
NetBackup (10.0)
- Introducing the NetBackup web user interface
- Monitoring NetBackup
- Overview of NetBackup for Kubernetes
- Deploying and configuring the NetBackup Kubernetes operator
- Deploy service package on NetBackup Kubernetes operator
- Port requirements for Kubernetes operator deployment
- Upgrade the NetBackup Kubernetes operator
- Delete the NetBackup Kubernetes operator
- Configure NetBackup Kubernetes datamover
- Configure settings for NetBackup snapshot operation
- Troubleshooting NetBackup servers with short names
- Managing image groups
- Deploying certificates on NetBackup Kubernetes operator
- Managing Kubernetes assets
- Managing Kubernetes intelligent groups
- Protecting Kubernetes assets
- Recovering Kubernetes assets
- Troubleshooting Kubernetes issues
- Error during certificate deployment on the Kubernetes operator
- Error during the primary server upgrade: NBCheck fails
- Error during an old image restore: Operation fails
- Error during persistent volume recovery API
- Error during restore: Final job status shows partial failure
- Error during restore on the same namespace
- Datamover pods exceed the Kubernetes resource limit
- Error during restore: Job fails on the highly loaded cluster
- Custom Kubernetes role created for specific clusters cannot view the jobs
Identify certificate types
NetBackup helps you identify the certificate types enrolled on the Kubernetes operator.
To identify the certificate type
- To list the Kubernetes operator pods, run the command: kubectl get pods -n <namespace of Kubernetes operator>
- Log on to the Kubernetes operator with administrator rights and run the command:
kubectl exec pod/nbu-controller-manager-7c99fb8474-hzrsl -n <namespace of Kubernetes operator> -c netbackupkops -it -- bash
- To list backup servers which have NBCA certificate for Kubernetes, run the command:
/nbcertcmdtool/nbcertcmdtool -atLibPath/nbcertcmdtool/
-standalone -installDir "/usr/openv" -listCertDetails -NBCA
The output looks like this:
Master Server : masterserver.sample.domain.com Host ID : b06738f0-a8c1-47bf-8d95-3b9a41b7bb0a Issued By : /CN=broker/OU=NBCANBKOps Serial Number : 0x508cdf4500000008 Expiry Date : Dec 22 05:46:32 2022 GMT SHA-1 Fingerprint : 4D:7A:D9:B9:61:4E:93:29:B8:93:0B:E0: 07:0A:28:16:46:F6:39:C6 SHA-256 Fingerprint : C2:FA:AC:B5:21:6B:63:49:30:AC:4D:5E: 61:09:9A:8C:C6:40:4A:44:B6:39:7E:2B:B3:36:DE:D8:F5:D1:3D:EF Key Strength : 2048 Subject Key Identifier : AC:C4:EF:40:7D:8D:45:B4:F1:89:DA:FB: E7:FD:0F:FD:EC:61:12:C6 Authority Key Identifier : 01:08:CA:40:15:81:75:7B:37:9F:51:78: B2:6A:89:A1:44:2D:82:2B
- To list of backup servers which have ECA certificate for Kubernetes, run the command:
/nbcertcmdtool/nbcertcmdtool -atLibPath/nbcertcmdtool/
-standalone -installDir"/usr/openv" -listCertDetails -ECA
The output looks like this:
Subject Name : CN=ECA-KOPS,O=Veritas,OU=ECANBKOps Issued By : CN=ICA-2,O=Veritas,OU=ECANBKOps Serial Number : 0x56cf16040258d3654339b7f39817de89240d58 Expiry Date : Dec 16 05:48:16 2022 GMT SHA-1 Fingerprint : 70:DE:46:72:57:56:4E:47:DB:82:8B:8D:A3: 4B:BB:F9:8D:2C:B7:8E SHA-256 Fingerprint : E0:69:5F:79:A6:60:DB:7B:69:76:D3:A8: E6:E1:F2:0D:8C:6C:E6:4E:C4:5D:A4:77:17:5A:C2:42:89:74:15:7D Key Strength : 2048 Subject Key Identifier : F0:E7:1F:8C:50:FD:4D:25:40:69:77:6C: 2A:35:72:B6:1D:8E:E5:17 Authority Key Identifier : D7:53:57:C7:A6:72:E3:CB:73:BD:48:51: 2F:CB:98:A3:0B:8B:BA:5C Master Server : masterserver.sample.domain.com Host ID : b85ba9bf-02a8-439e-b787-ed52589c37d1