NetBackup™ Web UI Cloud Administrator's Guide

Last Published:
Product(s): NetBackup (9.1)
  1. Introducing the NetBackup web user interface
    1.  
      About the NetBackup web UI
    2.  
      Terminology
    3.  
      Sign in to the NetBackup web UI
    4.  
      Sign out of the NetBackup web UI
  2. Monitoring NetBackup
    1.  
      The NetBackup dashboard
    2.  
      Monitoring jobs
    3.  
      Filter jobs in the job list
  3. Managing and protecting cloud assets
    1.  
      About protecting cloud assets
    2.  
      Limitations and considerations
    3. Configure CloudPoint servers in NetBackup
      1.  
        Configure a third-party CA certificate
      2.  
        Add a CloudPoint server
      3. Add a cloud provider for a CloudPoint server
        1.  
          IAM Role for AWS Configuration
      4.  
        Associate media servers with a CloudPoint server
      5.  
        Discover assets on CloudPoint server
      6.  
        Edit a CloudPoint server
      7.  
        Enable or disable a CloudPoint server
      8.  
        (Optional) Add the CloudPoint extension
    4. Managing intelligent cloud groups
      1.  
        Create an intelligent cloud group
      2.  
        Delete an intelligent cloud group
    5. Protecting cloud assets or intelligent cloud groups
      1.  
        Customize or edit protection for cloud assets or intelligent groups
      2.  
        Remove protection from cloud assets or intelligent groups
    6.  
      AWS and Azure government cloud support
    7. About protecting Microsoft Azure resources using resource groups
      1.  
        Before you begin
      2.  
        Limitations and considerations
      3. About resource group configurations and outcome
        1.  
          Examples of resource group configurations
      4.  
        Troubleshoot resource group permissions
    8.  
      Configuring backup schedule for cloud workloads
    9.  
      Backup options for cloud workloads
    10.  
      Configure snapshot replication
    11.  
      Protect applications in-cloud with application consistent snapshots
  4. Recovering cloud assets
    1.  
      Recovering cloud assets
    2.  
      Perform rollback recovery of cloud assets
  5. Performing granular restore
    1.  
      About granular restore
    2.  
      Supported environment list
    3.  
      List of supported file systems
    4.  
      Before you begin
    5.  
      Limitations and considerations
    6.  
      Restoring files and folders from cloud virtual machines
    7.  
      Restoring volumes on cloud virtual machines
    8.  
      Troubleshooting
  6. Troubleshooting protection and recovery of cloud assets
    1.  
      Troubleshoot cloud workload protection issues

Protect applications in-cloud with application consistent snapshots

You can take application consistent (point-in-time) snapshots of the applications that are deployed on virtual machines in cloud. This lets you perform a point-in-time recovery of applications.

You can perform original location and alternate location restores for these workloads.

For alternate location restore, consider the following:

  • For alternate location restore of MongoDB and MS SQL workloads, the target host must be discovered but the application status should not be in connected or configured state.

  • For alternate location restore of Oracle workloads, workloads the target host must be discovered but the application status should not be in connected or configured state.

Before you begin

Ensure that the database is prepared for snapshots. For details review the plug-in configuration notes in the Veritas CloudPoint documentation.

To configure applications for point-in-time recovery

  1. Connect to the virtual machine that hosts the applications.
    • After the cloud assets are discovered, go the Virtual Machines tab.

    • Select the virtual machine where the application is hosted. On the top right, click Manage credentials.

    • Enter the credentials. If the credentials for the VM are not configured, you must configure the credentials. See the Managing credentials chapter of the WebUI Administrator Guide.

    • After the virtual machines are connected, the virtual machines state is updated to Connected.

  2. Select the virtual machine where the application is hosted. On the top right, click Configure application.
  3. After the process is complete, the application status is updated to configured.
  4. The applications are displayed under the Applications tab after the next discovery.
  5. Apply the protection plan. See the NetBackup Web UI Administrator's Guide.

To edit or update virtual machine credentials

  1. Go to the Virtual Machines tab.
  2. Select the virtual machines for which you want to update credentials. On the top right, click Manage credentials.
  3. Update the credentials.

To edit or update application configuration

  1. Go to the Applications tab.
  2. Select the application for which you want to update. On the top right, click Edit configuration
  3. Update the credentials and click Configure.