NetBackup™ Web UI Administrator's Guide
- Introducing the NetBackup web user interface
- Monitoring NetBackup
- Notifications
- Section I. Managing role-based access control
- About role-based access control in NetBackup
- Configuring RBAC roles
- Configuring RBAC
- Default RBAC roles
- Administrator
- Default AHV Administrator
- Default Cloud Administrator
- Default Kubernetes Administrator
- Default NetBackup Kubernetes Operator Service
- Default RHV Administrator
- Default Resiliency Administrator
- Default Microsoft SQL Server Administrator
- Default Security Administrator
- Default Storage Administrator
- Default VMware Administrator
- RBAC permissions
- About role permissions
- Global > NetBackup management
- NetBackup Web Management Console Administration
- Access hosts
- Agentless hosts
- Anomalies
- Data classifications
- Email notifications
- Event logs
- NetBackup hosts
- Image sharing
- NetBackup backup images
- Jobs
- Licensing
- Media server
- Remote primary server certificate authority
- Resiliency
- Resource limits
- Retention levels
- Servers > Trusted primary servers
- Cloud providers
- CloudPoint servers
- WebSocket servers
- Global > Protection
- Global > Security
- Global > Storage
- Assets
- Protection plans
- Credentials
- Manage access
- Section II. Managing security
- Security events and audit logs
- Managing security certificates
- Managing user sessions
- Managing master server security settings
- Certificate authority for secure communication
- Disable communication with NetBackup 8.0 and earlier hosts
- Disable automatic mapping of NetBackup host names
- About NetBackup certificate deployment security levels
- Select a security level for NetBackup certificate deployment
- Set a passphrase for disaster recovery
- About trusted primary servers
- Creating and managing API keys for users (Administrators)
- Adding and managing your API key (Users)
- Configuring authentication options
- Managing hosts
- Section III. Managing storage and backups
- Configuring storage
- About storage configuration
- Create a Media Server Deduplication Pool (MSDP) storage server
- Create a Cloud storage, OpenStorage, or AdvancedDisk storage server
- Create a disk pool
- Create a storage unit
- Create a universal share
- Using image sharing from the NetBackup web UI
- Troubleshooting storage configuration
- Troubleshooting universal share configuration issues
- Create a Media Server Deduplication Pool (MSDP) storage server for image sharing
- Managing protection plans
- Managing classic policies
- Usage reporting and capacity licensing
- Configuring storage
- Section IV. Veritas Resiliency Platform
- Section V. Credentials
- Troubleshooting the NetBackup Web UI
Connection cannot be established with the AD or the LDAP server
If NetBackup could not establish a connection with the AD or the LDAP server, the nbatd logs contain the following error:
Example of error message:
(authldap.cpp) CAuthLDAP::validatePrpl - ldap_simple_bind_s() failed for user CN=Test User,OU=VTRSUsers,DC=VRTS,DC=com', error = -1, errmsg = Can't contact LDAP server,9:debugmsgs,1
The LDAP server URL (-s option) that is entered using the vssat addldapdomain command does not pass the validation test.
Validate the URL:
ldapsearch -H <LDAP_URI> -D "<admin_user_DN>" -w <passwd> -d <debug_level> -o nettimeout=<seconds>
Example of validation error message:
ldapsearch -H ldaps://example.veritas.com:389 -D "CN=Test User,OU=VRTSUsers,DC=VRTS,DC=com" -w ******** -d 5 -o nettimeout=60 TLS: can't connect: TLS error -8179:Peer's Certificate issuer is not recognized. ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)
If you use the ldaps option you can validate the certificate issuer using the ldapsearch command.
Validate the certificate issuer:
set env var LDAPTLS_CACERT to cacert.pem ldapsearch -H <LDAPS_URI> -D "<admin_user_DN>" -w <passwd> -d <debug_level> -o nettimeout=<seconds>
Example of validation message:
ldapsearch -H ldaps://example.veritas.com:389 -D "CN=Test User,OU=VRTSUsers,DC=VRTS,DC=com" -w ******** -d 5 -o nettimeout=60 TLS: can't connect: TLS error -8179: Peer's Certificate issuer is not recognized..ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)
The file path for cacert.pem is:
Windows:
install_path\NetBackup\var\global\vxss\eab\data \systemprofile\certstore\trusted\pluggins\ldap\cacert.pem
UNIX:
/usr/openv/var/global/vxss/eab/data/root/.VRTSat/profile /certstore/trusted/pluggins/ldap/cacert.pem
Use the -f option of the vssat addldapdomain command to add the certificate to the nbatd command's truststore.
This option is necessary if the CA that signed the certificate is other than the following:
Certification Services Division | GeoTrust | Symantec Corporation |
CyberTrust | GlobalSign | VeriSign Trust Network |
DigiCert | RSA Security Inc. |