NetBackup™ for Kubernetes Administrator's Guide
- Overview of NetBackup for Kubernetes
- Deploying and configuring the NetBackup Kubernetes operator
- Prerequisites for NetBackup Kubernetes Operator deployment
- Deploy service package on NetBackup Kubernetes operator
- Port requirements for Kubernetes operator deployment
- Upgrade the NetBackup Kubernetes operator
- Delete the NetBackup Kubernetes operator
- Configure NetBackup Kubernetes data mover
- Automated configuration of NetBackup protection for Kubernetes
- Customize Kubernetes workload
- Troubleshooting NetBackup servers with short names
- Data mover pod schedule mechanism support
- Validating accelerator storage class
- Deploying certificates on NetBackup Kubernetes operator
- Managing Kubernetes assets
- Managing Kubernetes intelligent groups
- Managing Kubernetes policies
- Protecting Kubernetes assets
- Managing image groups
- Protecting Rancher managed clusters in NetBackup
- Recovering Kubernetes assets
- About incremental backup and restore
- Enabling accelerator based backup
- Enabling FIPS mode in Kubernetes
- About Openshift Virtualization support
- Troubleshooting Kubernetes issues
- Error during the primary server upgrade: NBCheck fails
- Error during an old image restore: Operation fails
- Error during persistent volume recovery API
- Error during restore: Final job status shows partial failure
- Error during restore on the same namespace
- Datamover pods exceed the Kubernetes resource limit
- Error during restore: Job fails on the highly loaded cluster
- Custom Kubernetes role created for specific clusters cannot view the jobs
- Openshift creates blank non-selected PVCs while restoring applications installed from OperatorHub
- NetBackup Kubernetes operator become unresponsive if PID limit exceeds on the Kubernetes node
- Failure during edit cluster in NetBackup Kubernetes 10.1
- Backup or restore fails for large sized PVC
- Restore of namespace file mode PVCs to different file system partially fails
- Restore from backup copy fails with image inconsistency error
- Connectivity checks between NetBackup primary, media, and Kubernetes servers.
- Error during accelerator backup when there is no space available for track log
- Error during accelerator backup due to track log PVC creation failure
- Error during accelerator backup due to invalid accelerator storage class
- Error occurred during track log pod start
- Failed to setup the data mover instance for track log PVC operation
- Error to read track log storage class from configmap
Perform Host-ID-based certificate operations
Ensure that the primary server is configure in the NBCA mode. To check if the NBCA mode is on, run the command: /usr/openv/netbackup/bin/nbcertcmd -getSecConfig -caUsage.
The output looks like this:
NBCA: ON ECA: OFF
HostID based certificate specification looks like this:
apiVersion: netbackup.veritas.com/v1
kind: BackupServerCert
metadata:
name: backupservercert-sample
namespace: kops-ns
spec:
clusterName: cluster.sample.com:port
backupServer: primaryserver.sample.domain.com
certificateOperation: Create | Update | Remove
certificateType: NBCA
nbcaAttributes:
nbcaCreateOptions:
secretName: "Secret name consists of token and fingerprint"
nbcaUpdateOptions:
secretName: "Secret name consists of token and fingerprint"
force: true
nbcaRemoveOptions:
hostID: "hostId of the nbca certificate. You can view on Netbackup UI"Table: HostID based certificate operations
Operation type | Options and comments |
|---|---|
Create | secretName: Name of the secret which contains a token and fingerprint. |
Remove | hostID: Host identification of the NBCA certificate. |
Update | secretName: Name of the secret which contains a token and fingerprint. |
You can create a HostID based certificate for Kubernetes operator using the following procedure.
To create HostID based certificate for Kubernetes operator
- On the backup server run the following command and get the SHA-256 fingerprint.
/usr/openv/netbackup/bin/nbcertcmd -listCACertDetails
- To create an authorization token, refer to the Creating authorization tokens section in the NetBackup™ Security and Encryption Guide.
- To create a reissue token, if required, refer to the Creating a reissue token section in the NetBackup™ Security and Encryption Guide.
- Create a secret with token and fingerprint.
- Provide a token as it is mandatory irrespective of security level.
Token-fingerprint-secret.yamllooks like this:apiVersion: v1 kind: Secret metadata: name: secret-name namespace: kops-ns type: Opaque stringData: token: "Authorization token | Reissue token" fingerprint: "SHA256 Fingerprint"
Copy the
Token-fingerprint-secret.yamlfile text.Open the text editor and paste the yaml file text.
Then, save the text with the yaml file extension to the home directory from where the Kubernetes clusters are accessible.
- To create the
Token-fingerprint-secret.yamlfile, run the command: kubectl create -f Token-fingerprint-secret.yaml - Create a
backupservercertobject with thenbcaCreateOptionsand then specify a secret name.nbca-create-backupservercert.yamllooks like this:apiVersion: netbackup.veritas.com/v1 kind: BackupServerCert metadata: name: backupserver-nbca-create namespace: kops-ns spec: clusterName: cluster.sample.com:port backupServer: backupserver.sample.domain.com certificateOperation: Create certificateType: NBCA nbcaAttributes: nbcaCreateOptions: secretName: nbcaSecretName with token and fingerprintCopy the
nbca-create-backupservercert.yamlfile text.Open the text editor and paste the yaml file text.
Then, save the text with the yaml file extension to the home directory from where the Kubernetes clusters are accessible.
- To create the
nbca-create-backupservercert.yamlfile, run the command: kubectl create -f nbca-create-backupservercert.yaml - Once the certificate is created, check custom resource status. If the custom resource status is successful, you can run Backup from Snapshot jobs.
Note:
You need to check that the BackupServerCert custom resource status is successful before initiating Backup from Snapshot or Restore from Backup Copy operations.
Note:
To renew host ID based certificate: NetBackup host ID certificate checks if it's due for renew after 24 hours cycle. Certificates get automatically renewed 180 days (6 months) before expiration date.
Note:
Ensure to check whether the NetBackup primary server clock and the NetBackup Kubernetes operator clock are in sync. For more details on the
CheckClockSkewerrors, refer to the Implication of clock skew on certificate validity section in the NetBackup™ Security and Encryption Guide.
You can remove a certificate from a primary server if the server is not used for running the backup and restore operations.
To remove primary server certificate from Kubernetes operator.
- Log on to the NetBackup web UI and get a hostID for the certificate that you want to remove.
To get the HostID for the certificate, refer to the Viewing host ID-based certificate details section in the NetBackup™ Security and Encryption Guide.
- Create a backupservercert with operation type remove.
nbca-remove-backupservercert.yamlfile looks like this:apiVersion: netbackup.veritas.com/v1 kind: BackupServerCert metadata: name: backupserver-nbca-domain.com namespace: kops-ns spec: clusterName: cluster.sample.com:port backupServer: backupserver.sample.domain.com certificateOperation: Remove certificateType: NBCA nbcaAttributes: nbcaRemoveOptions: hostID: nbcahostIDCopy the
nbca-remove-backupservercert.yamlfile text.Open the text editor and paste the yaml file text.
Then, save the text with the yaml file extension to the home directory from where the Kubernetes clusters are accessible.
- To create the
nbca-remove-backupservercert.yamlfile, run the command: kubectl create -f nbca-remove-backupservercert.yaml - To revoke the certificate, refer to the Revoking a host ID-based certificate section in the NetBackup™ Security and Encryption Guide.
Note:
Once the
nbca-remove-backupservercert.yamlis applied, certificates are removed from the Kubernetes operator's local certificate store. But it's still present and valid in the NetBackup database. So, the certificate needs to be revoked.
Following is the scenario when you may want to update the certificates assuming that the certificates are readable and present in the Kubernetes operator:
When certificates present on the Netbackup Kubernetes operator are revoked, then certificates can be reissued with update operation. To resolve this issue, either you can update the server certificate or you can remove the server certificate and then create a new certificate.
Note:
If update certificate operation fails, you must remove the certificate first and then create a new certificate.
To update a primary server certificate on Kubernetes operator:
- Create a backupservercert object with the update operation:
nbca-update-backupservercert.yamlfile looks like this:apiVersion: netbackup.veritas.com/v1 kind: BackupServerCert metadata: name: backupserver-nbca-update namespace:kops-ns spec: clusterName: cluster.sample.com:port backupServer: backupserver.sample.domain.com certificateOperation: Update certificateType: NBCA nbcaAttributes: nbcaUpdateOptions: secretName: "Name of secret containing token and fingerprint" force: trueCopy the
nbca-update-backupservercert.yamlfile text.Open the text editor and paste the yaml file text.
Then, save the text with the yaml file extension to the home directory from where the Kubernetes clusters are accessible.
- To create the
nbca-udpate-backupservercert.yamlfile, run the command: kubectl create -f nbca-update-backupservercert.yaml - Once the backupservercert object is created, then check the custom resource status.