NetBackup™ Deployment Guide for Amazon Elastic Kubernetes Services (EKS) Cluster
- Introduction to NetBackup on EKS
- Deployment with environment operators
- Assessing cluster configuration before deployment
- Deploying NetBackup
- Preparing the environment for NetBackup installation on EKS
- Recommendations of NetBackup deployment on EKS
- Limitations of NetBackup deployment on EKS
- About primary server CR and media server CR
- Monitoring the status of the CRs
- Updating the CRs
- Deleting the CRs
- Configuring NetBackup IT Analytics for NetBackup deployment
- Managing NetBackup deployment using VxUpdate
- Migrating the node group for primary or media servers
- Upgrading NetBackup
- Deploying Snapshot Manager
- Migration and upgrade of Snapshot Manager
- Deploying MSDP Scaleout
- Upgrading MSDP Scaleout
- Monitoring NetBackup
- Monitoring MSDP Scaleout
- Monitoring Snapshot Manager deployment
- Managing the Load Balancer service
- Performing catalog backup and recovery
- Managing MSDP Scaleout
- About MSDP Scaleout maintenance
- Uninstalling MSDP Scaleout from EKS
- Uninstalling Snapshot Manager
- Troubleshooting
- View the list of operator resources
- View the list of product resources
- View operator logs
- View primary logs
- Pod restart failure due to liveness probe time-out
- Socket connection failure
- Resolving an invalid license key issue
- Resolving an issue where external IP address is not assigned to a NetBackup server's load balancer services
- Resolving the issue where the NetBackup server pod is not scheduled for long time
- Resolving an issue where the Storage class does not exist
- Resolving an issue where the primary server or media server deployment does not proceed
- Resolving an issue of failed probes
- Resolving token issues
- Resolving an issue related to insufficient storage
- Resolving an issue related to invalid nodepool
- Resolving a token expiry issue
- Resolve an issue related to KMS database
- Resolve an issue related to pulling an image from the container registry
- Resolving an issue related to recovery of data
- Check primary server status
- Pod status field shows as pending
- Ensure that the container is running the patched image
- Getting EEB information from an image, a running container, or persistent data
- Resolving the certificate error issue in NetBackup operator pod logs
- Resolving the primary server connection issue
- Primary pod is in pending state for a long duration
- Host mapping conflict in NetBackup
- NetBackup messaging queue broker take more time to start
- Local connection is getting treated as insecure connection
- Issue with capacity licensing reporting which takes longer time
- Backing up data from Primary server's /mnt/nbdata/ directory fails with primary server as a client
- Wrong EFS ID is provided in environment.yaml file
- Primary pod is in ContainerCreating state
- Webhook displays an error for PV not found
- Appendix A. CR template
About the Load Balancer service
Key features of the Load Balancer service:
Load balancer services are created in primary server and media server deployment that allows you to access the NetBackup application from public domains.
In primary server or media server CR spec, networkLoadBalancer section is used for handling the IP address and DNS name allocation for load balancer services. This section combines to sub fields , , and whereas these fields are optional. If is provided in CR spec, IP address count must match the replica count in case of media server CR whereas in case of primary server CR, only one IP address needs to be mentioned.
NetBackup supports the network load balancer with AWS Load Balancer scheme as .
The networkLoadBalancer section can be used to provide static IP address and dns name allocation to the Load Balancer services.
FQDN must be created before being used. Refer below sections for different allowed annotations to be used in CR spec.
User must add the following annotations:
service.beta.kubernetes.io/aws-load-balancer-subnets: <subnet1 name>
In addition to the above annotations, if required user can add more annotations supported by AWS. For more information, see AWS Load Balancer Controller Annotations.
Example: CR spec in primary server,
networkLoadBalancer: type: Private annotations: service.beta.kubernetes.io/aws-load-balancer-subnets: <subnet1 name> ipList: "10.244.33.27: abc.vxindia.veritas.com"
CR spec in media server,
networkLoadBalancer: type: Private annotations: service.beta.kubernetes.io/aws-load-balancer-subnets: <subnet1 name> ipList: "10.244.33.28: pqr.vxindia.veritas.com" "10.244.33.29: xyz.vxindia.veritas.com"
The IP address, the subnet provided in ipList and annotations in networkLoadBalancer section in CR spec must belong to same availability zone that of the node group.
Note:
The subnet provided here should be same as the one given in node pool used for primary server and media server.
If NetBackup client is outside VPC or to access Web UI from outside VPC, then client CIDR must be added with all NetBackup ports in security group rule of cluster. Run the following command, to obtain the cluster security group:
aws eks describe-cluster --name <my-cluster> --query cluster.resourcesVpcConfig.clusterSecurityGroupId
For more information on cluster security group, see Amazon EKS security group requirements and considerations.
Add inbound rule to security group. For more information, see Add rules to a security group.
Primary server:
1556
Used as bidirectional port. Primary server to/from media servers and primary server to/from client require this TCP port for communication.
8443
Used to inbound to java nbwmc on the primary server.
443
Used to inbound to vnet proxy tunnel on the primary server. Also, this is used Nutanix workload, communication from primary server to the deduplication media server.
13781
The MQBroker is listening on TCP port 13781. NetBackup client hosts - typically located behind a NAT gateway - be able to connect to the message queue broker (MQBroker) on the primary server.
13782
Used by primary server for bpcd process.
Port 22
Used by NetBackup IT Analytics data collector for data collection.
Media server:
1556
Used as bidirectional port. Primary server to/from media servers and primary server to/from client require this TCP port for communication.
13782
Used by media server for bpcd process.
443
The Snapshot Manager user interface uses this port as the default HTTPS port.
5671
The Snapshot Manager RabbitMQ server uses this port for internal service communications. This port must be open to support multiple agents, extensions, backup from snapshot, and restore from backup jobs.
2049
It is used for Amazon EFS access.
For more information, see Source ports for working with EFS.