NetBackup™ Web UI Cloud Object Store Administrator's Guide
- Introduction
- Managing Cloud object store assets
- Protecting Cloud object store assets
- About accelerator support
- About incremental backup
- About policies for Cloud object store assets
- Planning for policies
- Prerequisites for Cloud object store policies
- Creating a backup policy
- Setting up attributes
- Creating schedule attributes for policies
- Configuring the Start window
- Configuring exclude dates
- Configuring include dates
- Configuring the Cloud objects tab
- Adding conditions
- Adding tag conditions
- Example of conditions and tag conditions
- Managing Cloud object store policies
- Recovering Cloud object store assets
- Troubleshooting
- Recovery for Cloud object store using web UI for original bucket recovery option starts but job fails with error 3601
- Recovery Job does not start
- Restore fails: "Error bpbrm (PID=3899) client restore EXIT STATUS 40: network connection broken"
- Access tier property not restored after overwrite existing to original location
- Reduced accelerator optimization in Azure for OR query with multiple tags
- Backup is failed and shows a certificate error with Amazon S3 bucket names containing dots (.)
- Azure backup job fails when space is provided in tag query for either tag key name or value.
- The Cloud object store account has encountered an error
- Bucket list empty when selecting it in policy selection
- Creating second account on Cloudian fails by selecting existing region
- Restore failed with 2825 incomplete restore operation
- Bucket listing of cloud provider fails when adding bucket in Cloud objects tab
Bucket listing of cloud provider fails when adding bucket in Cloud objects tab
Explanation
The most common reason for failure in bucket listing is when cloud credentials provided to NetBackup do not have permission to list buckets.
Another reason is when the cloud provider does not support proper DNS entries for endpoints. Similarly, a wrongly configured DNS or even a virtual-hosted style naming implying that no request can be issued to the cloud provider without providing a bucket name as host name. An example of such a cloud endpoint is: s3-fips.us-east-1.amazonaws.com
Workaround
Although the bucket list is not available, you can always manually add buckets in the Cloud objects tab for backup.
When it is a DNS issue, you can optionally list buckets using a temporary workaround by adding IP hostname-mapping entry in the /etc/hosts file. When only virtual-hosted style requests are supported, first prefix the endpoint using a random bucket name, when using commands like ping, dig, nslookup to determine the IP of the cloud endpoint. For example,
ping randombucketname.s3-fips.us-east-1.amazonaws.com
You can then add the resulting IP along with the actual endpoint name (without the random bucket name prefix) in /etc/hosts file.
Note that this is a temporary workaround to edit DNS entries on the computer for bucket listing. Remove them after the policy configuration is done, unless the cloud endpoint is a private cloud setup that can use static IP addresses permanently.