Important Update: Cohesity Products Documentation
All Cohesity product documentation are now managed via the Cohesity Docs Portal: https://docs.cohesity.com/HomePage/Content/home.htm. Some documentation available here may not reflect the latest information or may no longer be accessible.
NetBackup™ Web UI Cloud Administrator's Guide
- Managing and protecting cloud assets
- About protecting cloud assets
- Limitations and considerations
- AWS and Azure government cloud support
- Configure Snapshot Manager in NetBackup
- Managing intelligent groups for cloud assets
- Protecting cloud assets or intelligent groups for cloud assets
- About storage lifecycle policies
- Managing policies for cloud assets
- Limitations and considerations
- Planning for policies
- Creating policies for cloud assets
- Setting up attributes for PaaS assets
- Setting up attributes for IaaS assets
- Creating schedules
- About backup frequency
- About assigning retention periods
- Configuring the Start window
- Configuring the include dates
- Configuring the exclude dates
- Configuring the cloud assets for PaaS
- Configuring the cloud assets for IaaS
- Configuring backup options for IaaS
- Managing cloud policies
- Scan for malware
- Protecting Microsoft Azure resources using resource groups
- NetBackup Accelerator for cloud workloads
- Configuring backup schedules for cloud workloads using protection plan
- Backup options for cloud workloads
- AWS Snapshot replication
- Protect applications in-cloud with application-consistent snapshots
- Protecting AWS or Azure VMs for recovering to VMware
- Cloud asset cleanup
- Cloud asset filtering
- Protecting PaaS assets
- Protecting PaaS assets
- Steps to protect PaaS assets
- Prerequisites for protecting PaaS assets
- Enabling binary logging for MySQL and MariaDB databases
- Enabling backup and restore in Kubernetes
- Prerequisites for protecting Amazon RDS SQL Server database assets
- Protecting RDS Custom instances
- Protecting Azure Managed Instance databases
- Limitation and considerations
- For all databases
- For PostgreSQL
- For incremental backups for Azure PostgreSQL
- For AWS RDS PostgreSQL and AWS Aurora PostgreSQL
- For AWS DynamoDB
- For AWS DocumentDB
- For AWS Neptune
- For AWS RDS SQL
- For Azure, AWS RDS, and Aurora MySQL
- For incremental backups using Azure MySQL server
- For incremental backups using the GCP SQL Server
- For Azure SQL and SQL Managed Instance
- For Azure SQL and SQL Managed Instance (without temp. database)
- For Azure SQL Server and SQL Managed Instance incremental backup
- For Azure Cosmos DB for MongoDB
- For Azure Cosmos DB for NoSQL
- For Amazon RDS for Oracle
- For Amazon Redshift databases
- For Amazon Redshift clusters
- For GCP SQL Server
- For GCP BigQuery
- Installing the native client utilities
- Configuring storage for different deployments
- Configuring the storage server for instant access
- About incremental backup for PaaS workloads
- Configuring incremental backups for Azure MySQL server
- About archive redo log backup for PaaS workloads
- About Auto Image Replication for PaaS workloads
- Discovering PaaS assets
- Viewing PaaS assets
- Managing PaaS credentials
- Add protection to PaaS assets
- Recovering cloud assets
- Recovering cloud assets
- About the pre-recovery check for VMs
- Supported parameters for restoring cloud assets
- Recovering virtual machines
- Recovering applications and volumes to their original location
- Recovering applications and volumes to an alternate location
- Recovery scenarios for GCP VMs with read-only volumes
- (GCP only) Restoring virtual machines and volumes using the autoDelete disk support
- Perform rollback recovery of cloud assets
- Restore to a different cloud provider
- Recovering AWS or Azure VMs to VMware
- Recovering PaaS assets
- Recovering cloud assets
- Performing granular restore
- Troubleshooting protection and recovery of cloud assets
- Troubleshoot cloud workload protection issues
- Error Code 9855: Error occurred while exporting snapshot for the asset: <asset_name>
- VMs and other OCI assets with CMK-encrypted disks are marked as deleted in NetBackup UI.
- Backup from snapshot jobs take longer time than expected
- Backup from snapshot job fails due to connectivity issues when Snapshot Manager is deployed on an Ubuntu host
- Error disambiguation in NetBackup UI
- Status Code 150: Termination requested by administrator
- Troubleshoot PaaS workload protection and recovery issues
Post-restore configurations
This section describes the additional configurations required for the target VM on different operating systems to ensure that the restored instance is reachable.
Target: AWS
- Perform the following steps to resolve the issue of restored AWS instance check fail and the instance is not reachable:
Connect to EC2 Serial Console, check if the network interface is up, and VM has started with all mount points.
If you get the following failure message while accessing EC2 Serial Console, change the instance type of VM to the one which supports EC2 Serial Console:
This instance type is not supported for the EC2 serial console.
You might be logged into rescue mode if some critical mount points fail:
Check if the following articles are applicable:
Check if all partitions are mountable, if not, further troubleshooting might be required to find out why they are failing.
Drives with mount failures can be detached from the impaired VM and attached to a healthy instance in the same availability zone for further troubleshooting.
If mounting succeeds and there are no failures, try restarting before the next steps, till you can boot into user space.
- If the VM is configured with
PasswordAuthenticationpassword check entry in/etc/ssh/sshd_configfile, then set the value to Yes. - If it is configured with
PubkeyAuthenticationssh key, then set the value of the entry in/etc/ssh/sshd_configfile to Yes. - Update the device names in
/etc/fstabfile if they were not replaced with UUID during pre-backup.For example, change
/dev/sdc1 → /dev/nvme1n1p1. This allows to establish the network connection. - Now you can troubleshoot any mount failures and logon by ssh from any non-CSP Serial Console.
Target: Azure
To backup the restored Azure VM, deploy the Azure VM extension before taking the backup.
Target: AWS
Perform the following steps to resolve the issue of restored AWS instance check fail and the instance is not reachable:
- Connect to EC2 Serial Console, check if the network interface is up, and VM has started with all mount points.
If you get the following failure message while accessing EC2 Serial Console, change the instance type of VM to the one which supports EC2 Serial Console:
This instance type is not supported for the EC2 serial console.
- If the VM has booted into emergency mode further troubleshooting might be required.
- Try mounting all partitions with mount -a command. If f it fails, check if the following article is applicable:
- While restarting, the
cloud-initservice might cause the VM to get stuck in network configuration. Reconfigure or stop, disable, and uninstall/removecloud-initservice using the following respective commands:systemctl stop cloud-init
systemctl disable cloud-init
zypper remove cloud-init
If required, reinstall
cloud-initservice after a restart. - Restart the VM.
- During restart select AWS kernel from the GRUB menu.
- Check the mount points.
- Check the status of the network interface with ip addr command. If it is up you should be able to log on by SSH externally, else try SSH troubleshooting.
Target: Azure
To backup the restored Azure VM, deploy the Azure VM extension before taking the backup.
Target: AWS
Perform the following steps to resolve the issue of restored AWS instance check fail and the instance is not reachable.
- Stop and Start the VM.
- Log on using EC2 Serial Console and switch to superuser.
- Disable Azure-specific services if any:
systemctl disable hv-kvp-daemon.service systemctl disable walinuxagent.service systemctl disable walinux-agent
- Reconfigure the data source for
cloud-initservice to point it to EC2 data source, and disable any Azure cloud-specific configurations:dpkg-reconfigure cloud-init
Few configuration files can be moved or renamed.
For example,
mv /etc/cloud/cloud.cfg.d/10-azure-kvp.cfg /etc/cloud/cloud.cfg.d/10-azure-kvp.cfg.disabled
mv /etc/cloud/cloud.cfg.d/90-azure.cfg /etc/cloud/cloud.cfg.d/90-azure.cfg.disabled
cloud-init clean --logs
- Set the default kernel to AWS by changing the value of GRUB_DEFAULT entry in
/etc/default/grubfile:By default we have GRUB_DEFAULT=0 in
/etc/default/grubfile. Change it to: GRUB_DEFAULT='KERNEL_INDEX' where the value of KERNEL_INDEX can be found with update-grub command. - Restart the VM.
- If there is any issue after restart, enter the recovery mode for AWS kernel and drop to root shell prompt to perform any troubleshooting steps.
Target: Azure
To backup the restored Azure VM, deploy the Azure VM extension before taking the backup.
Target: AWS
Log on with the same username and password as the source VM.
Target: Azure
To backup the restored Azure VM, deploy the Azure VM extension before taking the backup.