Please enter search query.
Search <book_title>...
NetBackup™ Web UI Cloud Object Store Administrator's Guide
Last Published:
2023-03-31
Product(s):
NetBackup (10.2)
- Introduction
- Managing Cloud object store assets
- Protecting Cloud object store assets
- About accelerator support
- About incremental backup
- About policies for Cloud object store assets
- Planning for policies
- Prerequisites for Cloud object store policies
- Creating a backup policy
- Setting up attributes
- Creating schedule attributes for policies
- Configuring the Start window
- Configuring exclude dates
- Configuring include dates
- Configuring the Cloud objects tab
- Adding conditions
- Adding tag conditions
- Example of conditions and tag conditions
- Managing Cloud object store policies
- Recovering Cloud object store assets
- Troubleshooting
- Recovery for Cloud object store using web UI for original bucket recovery option starts but job fails with error 3601
- Recovery Job does not start
- Restore fails: "Error bpbrm (PID=3899) client restore EXIT STATUS 40: network connection broken"
- Access tier property not restored after overwrite existing to original location
- Reduced accelerator optimization in Azure for OR query with multiple tags
- Backup is failed and shows a certificate error with Amazon S3 bucket names containing dots (.)
- Azure backup job fails when space is provided in tag query for either tag key name or value.
- The Cloud object store account has encountered an error
- Bucket list empty when selecting it in policy selection
- Creating second account on Cloudian fails by selecting existing region
- Restore failed with 2825 incomplete restore operation
- Bucket listing of cloud provider fails when adding bucket in Cloud objects tab
- AIR import image restore fails on the target domain if the Cloud store account is not added in target domain.
Creating cross account access in AWS
If you have multiple AWS accounts in your environment, and NetBackup deployed in one account, can protect data in other accounts as well. You need to configure cross account data access in AWS portal, before selecting as your access method. NetBackup only needs the access key, secret key, and role ARN.
Follow the guidelines in AWS documentation for creating cross account access. Briefly, you need to perform the following steps.
To configure AWS cross accounts:
- Log on to the AWS provider portal.
- Create a new IAM role in the target AWS account, which you want to protect.
- Create a new policy for the IAM role and ensure that it has required permissions to access the bucket and objects in that target AWS account. See Permissions required for Amazon S3 cloud provider user.
- Establish a trust relationship between the source and the target AWS accounts.
- In the source AWS account, create a policy that allows the IAM role in the source AWS account, to assume the IAM role in the target AWS account.
- Attach the policy to the source account user, whose access key and secret access key you use for the assume role.