0% found this document useful (0 votes)
70 views128 pages

NetBackup103 WebUIGuide CloudAdmin

The NetBackup Web UI Cloud Administrator's Guide (Release 10.3) provides comprehensive instructions for managing and protecting cloud assets using NetBackup, including configuring Snapshot Manager, creating protection plans, and recovering assets. It covers support for various cloud providers and includes troubleshooting guidance for cloud workload protection issues. The document also emphasizes the importance of adhering to licensing agreements and provides resources for technical support and documentation updates.

Uploaded by

Suraj Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views128 pages

NetBackup103 WebUIGuide CloudAdmin

The NetBackup Web UI Cloud Administrator's Guide (Release 10.3) provides comprehensive instructions for managing and protecting cloud assets using NetBackup, including configuring Snapshot Manager, creating protection plans, and recovering assets. It covers support for various cloud providers and includes troubleshooting guidance for cloud workload protection issues. The document also emphasizes the importance of adhering to licensing agreements and provides resources for technical support and documentation updates.

Uploaded by

Suraj Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 128

NetBackup™ Web UI Cloud

Administrator's Guide

Release 10.3
Last updated: 2023-10-23

Legal Notice
Copyright © 2023 Veritas Technologies LLC. All rights reserved.

Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas
Technologies LLC or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.

This product may contain third-party software for which Veritas is required to provide attribution
to the third party (“Third-party Programs”). Some of the Third-party Programs are available
under open source or free software licenses. The License Agreement accompanying the
Software does not alter any rights or obligations you may have under those open source or
free software licenses. Refer to the Third-party Legal Notices document accompanying this
Veritas product or available at:

https://www.veritas.com/about/legal/license-agreements

The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Veritas Technologies
LLC and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED


CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH
DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. Veritas Technologies LLC SHALL
NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE
INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE
WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Veritas as on premises or
hosted services. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in
accordance with the terms of this Agreement.

Veritas Technologies LLC


2625 Augustine Drive
Santa Clara, CA 95054

http://www.veritas.com
Technical Support
Technical Support maintains support centers globally. All support services will be delivered
in accordance with your support agreement and the then-current enterprise technical support
policies. For information about our support offerings and how to contact Technical Support,
visit our website:

https://www.veritas.com/support

You can manage your Veritas account information at the following URL:

https://my.veritas.com

If you have questions regarding an existing support agreement, please email the support
agreement administration team for your region as follows:

Worldwide (except Japan) [email protected]

Japan [email protected]

Documentation
Make sure that you have the current version of the documentation. Each document displays
the date of the last update on page 2. The latest documentation is available on the Veritas
website:

https://sort.veritas.com/documents

Documentation feedback
Your feedback is important to us. Suggest improvements or report errors or omissions to the
documentation. Include the document title, document version, chapter title, and section title
of the text on which you are reporting. Send feedback to:

[email protected]

You can also see documentation information or ask a question on the Veritas community site:

http://www.veritas.com/community/

Veritas Services and Operations Readiness Tools (SORT)


Veritas Services and Operations Readiness Tools (SORT) is a website that provides information
and tools to automate and simplify certain time-consuming administrative tasks. Depending
on the product, SORT helps you prepare for installations and upgrades, identify risks in your
datacenters, and improve operational efficiency. To see what services and tools SORT provides
for your product, see the data sheet:

https://sort.veritas.com/data/support/SORT_Data_Sheet.pdf
Contents

Chapter 1 Managing and protecting cloud assets ......................... 7


About protecting cloud assets ........................................................... 8
Limitations and considerations ........................................................ 10
Configure Snapshot Manager in NetBackup ....................................... 11
Add a Snapshot Manager ......................................................... 12
Add a cloud provider for a Snapshot Manager .............................. 12
Associate media servers with a Snapshot Manager ....................... 17
Discover assets on Snapshot Manager ....................................... 17
Enable or disable a Snapshot Manager ....................................... 19
(Optional) Add the Snapshot Manager extension .......................... 19
Managing intelligent cloud groups .................................................... 19
Create an intelligent cloud group ............................................... 20
Delete an intelligent cloud group ................................................ 23
Protecting cloud assets or intelligent cloud groups ............................... 24
Customize or edit protection for cloud assets or intelligent groups
..................................................................................... 26
Remove protection from cloud assets or intelligent groups .............. 27
Cloud asset cleanup ..................................................................... 27
Cloud asset filtering ...................................................................... 28
AWS and Azure government cloud support ........................................ 31
About protecting Microsoft Azure resources using resource groups
........................................................................................... 31
Before you begin .................................................................... 32
Limitations and considerations .................................................. 32
About resource group configurations and outcome ........................ 33
Troubleshoot resource group permissions ................................... 36
About the NetBackup Accelerator for cloud workloads .......................... 36
How the NetBackup Accelerator works with virtual machines ........... 37
Accelerator forced rescan for virtual machines (schedule attribute)
..................................................................................... 38
Accelerator backups and the NetBackup catalog ........................... 38
Accelerator messages in the backup job details log ....................... 38
Configuring backup schedule for cloud workloads ............................... 39
Backup options for cloud workloads ................................................. 42
Snapshot replication ..................................................................... 45
Configure AWS snapshot replication ................................................ 45
Contents 5

Using AWS snapshot replication ..................................................... 48


Support matrix for account replication ............................................... 50
Protect applications in-cloud with application consistent snapshots
........................................................................................... 52
Protecting PaaS assets ................................................................. 53
Prerequisites for protecting PaaS assets ..................................... 54
Installing the native client utilities ............................................... 56
Configuring the storage server for instant access .......................... 63
Configuring storage for different deployments ............................... 63
About incremental backup for PaaS workloads ............................. 65
Limitations and considerations .................................................. 65
Discovering PaaS assets ......................................................... 72
Viewing PaaS assets .............................................................. 73
Managing PaaS credentials ...................................................... 73
View the credential name that is applied to a database ................... 73
Add credentials to a database .................................................. 73
Add protection to PaaS assets .................................................. 80
Perform backup now ............................................................... 80

Chapter 2 Recovering cloud assets ................................................. 82

Recovering cloud assets ................................................................ 82


Perform rollback recovery of cloud assets ......................................... 89
Recovering PaaS assets ................................................................ 89
Recovering non-RDS PaaS assets ............................................. 90
Recovering RDS-based PaaS asset ........................................... 91
Recovering Azure protected assets ............................................ 92
Recovering duplicate images from AdvancedDisk ......................... 94

Chapter 3 Performing granular restore ........................................... 96

About granular restore ................................................................... 96


Supported environment list ............................................................. 97
List of supported file systems .......................................................... 98
Before you begin .......................................................................... 99
Limitations and considerations ...................................................... 101
Restoring files and folders from cloud virtual machines ....................... 103
Restoring volumes on cloud virtual machines ................................... 107
Performing steps after volume restore containing LVM ....................... 108
Troubleshooting ......................................................................... 110
Contents 6

Chapter 4 Troubleshooting protection and recovery of cloud


assets ............................................................................ 116
Troubleshoot cloud workload protection issues ................................. 116
Troubleshoot PaaS workload protection and recovery issues ............... 120
Troubleshooting Amazon Redshift issues .................................. 126
Chapter 1
Managing and protecting
cloud assets
This chapter includes the following topics:

■ About protecting cloud assets

■ Limitations and considerations

■ Configure Snapshot Manager in NetBackup

■ Managing intelligent cloud groups

■ Protecting cloud assets or intelligent cloud groups

■ Cloud asset cleanup

■ Cloud asset filtering

■ AWS and Azure government cloud support

■ About protecting Microsoft Azure resources using resource groups

■ About the NetBackup Accelerator for cloud workloads

■ Configuring backup schedule for cloud workloads

■ Backup options for cloud workloads

■ Snapshot replication

■ Configure AWS snapshot replication

■ Using AWS snapshot replication

■ Support matrix for account replication


Managing and protecting cloud assets 8
About protecting cloud assets

■ Protect applications in-cloud with application consistent snapshots

■ Protecting PaaS assets

About protecting cloud assets


Using NetBackup, you can now protect your in-cloud workloads. The cloud data
protection framework leverages the Snapshot Manager infrastructure to drive faster
proliferation of cloud providers. In NetBackup 8.3 and later, Snapshot Manager can
protect assets in AWS, Azure, Azure Stack hub and GCP clouds.
The following table describes the tasks.

Table 1-1 Configuring protection for cloud assets

Task Description

Before you begin ensure that To manage and protect cloud assets in the web UI you
you have the appropriate must have the workload administrator role or similar
permissions. permissions. The NetBackup security administrator can
manage your role permissions at an individual asset level
or at the account or subscription level, or at a cloud
provider level.

See the NetBackup Web UI Administrator’s Guide.


Note: For managing hosted applications, you need
Manage Assets and Manage Protection Plans permissions.

Deploy Snapshot Manager Install Snapshot Manager in your environment.

See “Add a Snapshot Manager” on page 12.

Review Snapshot Manager and NetBackup limitations.

See “Limitations and considerations” on page 10.

Register the Snapshot Manager in NetBackup.

See the NetBackup Snapshot Client Administrator's Guide.


Managing and protecting cloud assets 9
About protecting cloud assets

Table 1-1 Configuring protection for cloud assets (continued)

Task Description

Add a configuration All the supported cloud providers are displayed in the web
UI.

You need to add the cloud account (configure the cloud


plug-in) for the cloud provider you need. You can create
multiple configurations for each provider.

See “Add a cloud provider for a Snapshot Manager”


on page 12.

For Amazon, you can choose to use IAM role.

See “IAM Role for AWS Configuration” on page 16.

Asset discovery NetBackup retrieves the cloud assets pertaining to the


cloud accounts that are configured in NetBackup. Assets
are populated in NetBackup asset DB.

By default, asset discovery happens every 2 hours and is


configurable.

In case of applications, you can set discovery interval


between 15 minutes to 45 minutes.

See “Discover assets on Snapshot Manager” on page 17.

Create a protection plan Create a protection plan. A protection plan is used to


schedule backup start windows.

See the NetBackup Web UI Administrator’s Guide.

You can also configure the protection plan for snapshot


replication. See “Configure AWS snapshot replication”
on page 45.

Choose to protect a virtual For each cloud provider, a list of discovered assets is
machine, application, or volume displayed. Add the assets to a protection plan.

See the NetBackup Web UI Administrator’s Guide.

You can also choose to protect application using


application consistent snapshots. See “Protect applications
in-cloud with application consistent snapshots” on page 52.
Managing and protecting cloud assets 10
Limitations and considerations

Table 1-1 Configuring protection for cloud assets (continued)

Task Description

Recover cloud assets ■ You can recover the assets using the recovery points.
See “Recovering cloud assets” on page 82.
See “Recovering cloud assets” on page 82.
See “Perform rollback recovery of cloud assets ”
on page 89.
■ You can also restore the assets using the
nbcloudrestore CLI utility.
Note: Do not use the bprestore CLI for restores
See the NetBackup Commands Reference Guide.

Troubleshooting See “Troubleshoot cloud workload protection issues”


on page 116.

Limitations and considerations


Consider the following when protecting cloud workloads
■ Deletion of Snapshot Manager host entry and its associated plug-ins is not
supported in NetBackup.
If you delete plug-ins that are configured in NetBackup, you cannot recover any
Snapshot Manager images that are associated with that plug-in.
■ Review the NetBackup Snapshot Manager Install and Upgrade Guide for
information on the capabilities of Snapshot Manager.
■ If you have a previous installation of Snapshot Manager, Veritas recommends
that you upgrade the Snapshot Manager and not reinstall it.
If you do reinstall the Snapshot Manager server, you need to reconfigure the
Snapshot Manager and perform all the protection-related steps.
■ By default, Snapshot Manager is configured with port 443.
■ After Snapshot Manager server is added, the host machine tries to use the IPv6
address to discover assets on cloud. If the IPV6 address is found on the host,
the application is configured to use it. If an IPv6 address is not found, the IPv4
address is used.
■ For Snapshot Manager, enhanced auditing is not supported. Thus, when you
add or update a Snapshot Manager, with non-root but NetBackup Admin rights,
during auditing the user is shown as root.
Managing and protecting cloud assets 11
Configure Snapshot Manager in NetBackup

■ If you deploy Snapshot Manager using the CloudFormation template, when you
register the on-host agent with the Snapshot Manager node using the command,
the IP address used must be private IP and not public IP.

Note: Veritas recommends having swap space enabled on NetBackup primary


servers that would be used to run backup from snapshot jobs for cloud asset groups.
The recommended size for swap space must be greater than or equal to 1.5 times
of the system memory. In scenarios where swap space enablement is not available,
it is recommend to have systems with higher memory configuration.

Configure Snapshot Manager in NetBackup


You can add a Snapshot Manager using the NetBackup Web UI. Starting with 8.3,
the Snapshot Manager can discover cloud assets on Amazon Web Services and
Microsoft Azure US Government cloud.
Consider the following important points:
■ You can associate multiple Snapshot Managers to a NetBackup primary server.
But you can associate only one Snapshot Manager to one NetBackup master
server.
■ You can associate multiple media servers to a Snapshot Manager. Only the
media servers that are linked to your NetBackup primary server can be linked
to a Snapshot Manager.
■ You can now manage Snapshot Manager and control discovery of assets from
the NetBackup WebUI, REST API, and CLI without interacting with the Snapshot
Manager interfaces.
■ For backup from snapshot jobs, the NetBackup media storage associated servers
are used instead of Snapshot Manager associated media servers. The
NetBackup media storage associated servers must be connected to the Snapshot
Manager to facilitate all the Snapshot Manager related operations.
The following table describes the underlying tasks.

Table 1-2 Configuring Snapshot Manager

Task Description

Add a Snapshot Manager See “Add a Snapshot Manager” on page 12.

Add cloud providers To discover assets on the Snapshot Manager,


you must add the cloud providers. See “Add
a cloud provider for a Snapshot Manager”
on page 12.
Managing and protecting cloud assets 12
Configure Snapshot Manager in NetBackup

Table 1-2 Configuring Snapshot Manager (continued)

Task Description

Discover assets on Snapshot Manager You can discover assets on the Snapshot
Manager.See “Discover assets on Snapshot
Manager” on page 17.

Associate media servers To offload snapshots and restore workflows


to a media server, you must associate the
media server to the Snapshot Manager.See
“Associate media servers with a Snapshot
Manager” on page 17.

Add a Snapshot Manager


You can add a Snapshot Manager using NetBackup WebUI.

Note: To allow backups from snapshots, bi-directional connectivity is required


between Snapshot Manager and NetBackup servers

To add a Snapshot Manager


1 On the left, click Workloads > Cloud.
2 Click on the Snapshot Managers tab.
3 Click Add.
4 In the Snapshot Manager field, enter one of the following:
■ The host name or IP address of the Snapshot Manager.
The host name or IP address must be the same as the one you have
provided at the time of Snapshot Manager configuration during Snapshot
Manager installation.
■ If the DNS server is configured, enter the FQDN of the Snapshot Manager.

5 In Port field, enter the port number for the Snapshot Manager.
The default port value is 443.
6 Click Save.

Add a cloud provider for a Snapshot Manager


You can protect the assets on the Amazon Web Services (AWS), Google Cloud
Platform (GCP), Microsoft Azure, and Microsoft Azure Stack Hub cloud providers.
Managing and protecting cloud assets 13
Configure Snapshot Manager in NetBackup

Starting with 9.0, the Snapshot Manager can discover Amazon Web Services and
Microsoft Azure US Government cloud workloads.
To add a cloud provider for Snapshot Manager
1 On the left, click Workloads > Cloud.
2 Click the Providers tab or click Add under the cloud provider for which you
want to add a configuration.
3 Enter a value in the Configuration Name field, in the Add configuration pane.
4 Select the preferred Snapshot Manager.
Managing and protecting cloud assets 14
Configure Snapshot Manager in NetBackup

5 Enter the required details.

Cloud provider Parameter Description

Microsoft Azure Credential type: Application service principal

Tenant ID The ID of the AAD directory in which


you created the application.

Client ID The application ID.

Secret key The secret key of the application.

Credential type: System managed Enable system managed identity on


identity Snapshot Manager host in Azure.
Note: Assign a role to the system
managed identity.

Credential type: User managed identity

Client ID The ID of the user managed identity


connected to the Snapshot Manager
host.

Following parameters are applicable for all the above credential type's

Regions One or more regions in which to


discover cloud assets.
Note: If you configure a government
cloud, select US Gov Arizona, US Gov
Texas US, or Gov Virginia.

Resource Group prefix The string with which you want to


append all the resources in a resource
group.

Protect assets even if prefixed The check box determines whether


Resource Groups are not found the assets are protected if they are not
associated to any resource groups.
Managing and protecting cloud assets 15
Configure Snapshot Manager in NetBackup

Cloud provider Parameter Description

Microsoft Azure Stack Hub Using AAD: The endpoint URL in the following
format, that allows Snapshot Manager
Azure Stack Hub Resource Manager
to connect with your Azure resources.
endpoint URL
https://management.<location>.<FQDN>

Tenant ID The ID of the AAD directory in which


you created the application.

Client ID The application ID.

Secret Key The secret key of the application.

Authentication Resource URL The URL where the authentication


(optional) token is sent to.

Using ADFS: The endpoint URL in the following


format, that allows Snapshot Manager
Azure Stack Hub Resource Manager
to connect with your Azure resources.
endpoint URL
https://management.<location>.<FQDN>

Tenant ID The ID of the AAD directory in which


you created the application.

Client ID The application ID.

Secret Key The secret key of the application.

Authentication Resource URL The URL where the authentication


(optional) token is sent to.

Amazon AWS Access Key The access key ID, when specified
with the secret access key, authorizes
Note: If the Snapshot Manager is
Snapshot Manager to interact with the
configured with IAM Config, the
AWS APIs.
Access Key and Secret Key options
are not available. Secret Key The secret key of the application.

Regions One or more AWS regions in which to


discover cloud assets.
Note: If you configure a government
cloud, select us-gov-east-1 or
us-gov-west-1.
Managing and protecting cloud assets 16
Configure Snapshot Manager in NetBackup

Cloud provider Parameter Description

Google Cloud Platform Project ID The ID of the project from which the
resources are managed. Listed as in
the project_id JSON file.

Client Email The email address of the Client ID.


Listed as client_email in the JSON
file.

Private Key The private key. Listed as


private_key in the JSON file.
Note: You must enter this key without
quotes. Do not enter any spaces or
return characters at the beginning or
end of the key.

Regions A list of regions in which the provider


operates.

6 Enter the connection and authentication details in the Add Configuration


pane.
7 Click Save.
The assets on the cloud providers are automatically discovered.

IAM Role for AWS Configuration


If the Snapshot Manager is deployed in cloud, AWS configuration can be configured
to use IAM role for authentication.
See “Add a cloud provider for a Snapshot Manager” on page 12.
Before proceeding, ensure that IAM role is configured within AWS. See the
NetBackup Snapshot Manager Install and Upgrade Guide for details.
The following implementations of IAM role are supported:
■ Source account: In this case, the cloud assets that need to be protected are in
the same AWS account as Snapshot Manager. Thus, AWS cloud is aware of
the AWS account ID and role name, you need to only select the region.
■ Cross account: In this case, the cloud assets that need to be protected are in a
different AWS account than Snapshot Manager. Thus, you need to enter the
target account and the target role name details along with the region so that
Snapshot Manager can access those assets.
Managing and protecting cloud assets 17
Configure Snapshot Manager in NetBackup

You need to establish a trust relationship between the source and the target
account. For example, if this is the role ARN for the role you want to use to
configure the plugin:
arn:aws:iam::935923755:role/TEST_IAM_ROLE
So, to configure the plugin, provide the last part of the ARN, the
name:TEST_IAM_ROLE
For more details, refer to the Access AWS Accounts Using IAM Roles related
information in the Amazon Web Services documentation.

Associate media servers with a Snapshot Manager


You can use a media server to offload the snapshots and restores jobs of your
cloud. To enable that you must associate one or more media servers to a Snapshot
Manager. The media servers must be in an active state to run the snapshot or
restore jobs. The media server that you associate with the Snapshot Manager must
be associate to your NetBackup master server also. However, the discovery jobs
run on the NetBackup master server only.
To associate media servers with a Snapshot Manager
1 On the left, click Workloads > Cloud.
2 Click on the Snapshot Managers tab.
3 From the menu next to the Snapshot Manager, click Advanced settings.
4 In the Media server tab, select one or more media servers that you want
associate with the Snapshot Manager.
5 Click Save.

Discover assets on Snapshot Manager


After you configure your cloud providers with a Snapshot Manager, automatic
discovery is triggered to discover assets from the cloud. During periodic discovery,
NetBackup pulls the assets data from Snapshot Manager every two hours whereas
Snapshot Manager pulls the asset data from cloud provider configurations every
one hour. If you disable a Snapshot Manager, all the assets associated with that
server are no longer protected or synced with NetBackup.
You can also manually trigger the cloud asset discovery if required, using the
Discover option for individual cloud provider configurations, or you can trigger a
discovery on a Snapshot Manager to fetch the assets data available on the Snapshot
Manager.
After the first full discovery, NetBackup subsequently performs periodic incremental
discovery of assets for the configured Snapshot Manager. It only detects the
Managing and protecting cloud assets 18
Configure Snapshot Manager in NetBackup

changes, such as addition, removal, or modification of assets, that occurred between


the last and current discovery.

Note: For the accurate incremental discovery, ensure that the time is set correctly
on the NetBackup master server and the Snapshot Manager, according to the
time-zones they are located in, to avoid any issues with the discovery.

The following procedure describes how to perform discovery at the Snapshot


Manager level, which does not actually discover the assets from the Cloud, but only
fetches the point-in-time data from Snapshot Manager.
To discover assets on Snapshot Manager
1 On the left, click Workloads > Cloud.
2 Click on the Snapshot Managers tab.
3 From the menu next to the Snapshot Manager, click Discover.
The following procedure describes how to perform discovery at the configuration
level, which triggers a deep discovery of assets and fetches the point-in-time state
of the assets detecting any additions, modifications, or deletion of assets in the
Cloud.
To discover assets for a cloud provider configuration
1 On the left, click Workloads > Cloud.
2 Click on the Snapshot Managers tab.
3 Click the Snapshot Manager IP or hostname for which to view the cloud
providers.
4 Click on the provider tab for which to view the configurations.
5 From the menu next to the configuration name, click Discover.

Note: If the discovery on cloud provider configurations takes more than 30 minutes,
the discovery operation times out. But the subsequent operation continues which
syncs the NetBackup assets with the Snapshot Manager assets.

Change the autodiscovery frequency for Snapshot


Manager
Use nbgetconfig and the nbsetconfig commands to view, add, or change the
autodiscovery option. For example:
CLOUD_AUTODISCOVERY_INTERVAL = number of seconds

See the NetBackup Administrator's Guide, Volume I for more details.


Managing and protecting cloud assets 19
Managing intelligent cloud groups

Enable or disable a Snapshot Manager


Based on your preference, you can enable or disable a Snapshot Manager. If you
disable a Snapshot Manager, you cannot discover assets or assign protection plans.
To enable or disable a Snapshot Manager
1 On the left, click Workloads > Cloud.
2 Click on the Snapshot Managers tab.
3 Based on the Snapshot Managerstatus, select Enable or Disable.

Note: After disabling a Snapshot Manager protection for the associated assets will
start failing for that server. In that case, unsubscribe the assets from the protection
plans or cancel any pending SLP operations to avoid seeing job failures during the
time it is disabled.

(Optional) Add the Snapshot Manager extension


The Snapshot Manager extension serves the purpose of scaling the capacity of the
Snapshot Manager host to service a large number of requests concurrently running
on the Snapshot Manager server at its peak performance capacity. You can install
one or more Snapshot Manager extensions on-premise or in cloud, depending on
your requirements to run the jobs without putting the host under additional stress.
An extension can increase the processing capacity of the Snapshot Manager host.
The Snapshot Manager extension can have the configuration same or higher as
the Snapshot Manager host.
Supported Snapshot Manager extension environments:
■ VM based extension for on-premise
■ Cloud based extension with managed Kubernetes cluster
Refer to Deploying Snapshot Manager extensions chapter in the latest version of
NetBackup Snapshot Manager Install and Upgrade Guide.

Managing intelligent cloud groups


You can create and protect a dynamic group of assets by defining the intelligent
cloud asset groups based on a set of filters called queries. NetBackup selects the
cloud virtual machines, applications, or volumes based on the queries, and adds
them to the group. An intelligent group automatically reflects changes in the asset
environment and eliminates the need to manually revise the list of assets in the
group when the assets are added or removed from the environment.
Managing and protecting cloud assets 20
Managing intelligent cloud groups

Then when you apply protection plan to an intelligent cloud asset group, all the
assets satisfying the query conditions will automatically be protected if the asset
environment changes in future.

Note: You can create, update, or delete the intelligent groups only if your role has
the necessary RBAC permissions for the cloud assets that you require to manage.
The NetBackup security administrator can grant you access for an asset type (VM,
PaaS, application, volume, network) associated with a specific account or
subscription, or at a cloud provider level. Refer to the NetBackup Web UI
Administrator's Guide.

Create an intelligent cloud group


To create an intelligent cloud group
1 On the left, click Workloads > Cloud.
2 Click the Intelligent groups tab and then click + Add.
3 Enter a name and description for the group.
4 Select the cloud provider, account ID, and region.

Note: If region is not specified, then the cloud intelligent group protects assets
across region.

5 Select the Asset type.


6 Then do one of the following:
■ Select Include all assets of the selected type.
This option uses a default query to select all assets for backup when the
protection plan runs.
■ To select only the assets that meet specific conditions, create your own
query: Click Add condition.
Managing and protecting cloud assets 21
Managing intelligent cloud groups

7 To add a condition, use the drop-downs to select a keyword and operator and
then enter a value.
See the section called “Query options for creating intelligent cloud groups”
on page 22.
To change the effect of the query, click + Condition and click AND or OR,
then select the keyword, operator, and value for the condition. For example:

This example uses AND to narrow the scope of the query: It selects only the
VMs that have cp in their display name and that also have a tag name as eng,
and are in running state.

Note: Special character '<' is not supported in a tag name. If present, asset
group creation will fail.

Note: Known limitation in NetBackup - if you create a query that has the
asset tag names (referenced from your cloud provider) containing spaces or
special characters such as (,), &, \, /, ", [, ], {, }, you cannot later
edit the query for editing any parameters. This does not prevent you from
successfully creating the intelligent group and applying the protection plan to
it. Only the Edit query functionality is affected with this limitation.
To avoid this issue, ensure that the tag names do not contain the specified
special characters and create a new query with the new tag names.

You can also add sub-queries to a condition. Click + Sub-query and click AND
or OR, then select the keyword, operator, and value for the sub-query condition.
Managing and protecting cloud assets 22
Managing intelligent cloud groups

8 To test the query, click Preview.


The query-based selection process is dynamic. Changes in the virtual
environment can affect which assets the query selects when the protection
plan runs. As a result, the assets that the query selects later when the protection
plan runs may not be identical to those currently listed in the preview.

Note: When using queries in Intelligent groups, the NetBackup web UI might
not display an accurate list of assets that match the query if the query condition
has non-English characters.
Using the not equals filter condition on any attribute returns assets including
those that have no value (null) present for the attribute. For multi-value attributes
such as tag, the assets that do not match at least one of the values of the
attribute are not returned

Note: When you click Preview or you save the group, the query options are
treated as case-sensitive when the assets are selected for the group. Under
Virtual machines, if you click on a VM that was not selected for the group,
the Intelligent groups field reads none.

9 To save the group without adding it to a protection plan, click Add.


To save the group and apply a protection plan to it, click Add and protect.
Select the plan, and click Protect.

Query options for creating intelligent cloud groups

Note: The attribute values may not match exactly with values shown on the cloud
provider's portal. You can refer to the asset details page or the cloud provider's API
response of an individual asset.

Table 1-3 Query keywords

Keyword Description

(all values are case-sensitive)

displayName Asset's display name.

state For example, running, stopped etc.

tag A label assigned to the asset for


categorization.
Managing and protecting cloud assets 23
Managing intelligent cloud groups

Table 1-3 Query keywords (continued)

Keyword Description

(all values are case-sensitive)

instanceType / machineType / vmSize Asset's instance/machine type or VM size,


depending on the cloud provider selection.

For example, t2.large, t3.large, or b2ms,


d2sv3

Table 1-4 Query operators

Operator Description

Starts with Matches the value when it occurs at the start


of a string.

Ends with Matches the value when it occurs at the end


of a string.

Contains Matches the value you enter wherever that


value occurs in the string.

= Matches only the value that you enter.

!= Matches any value that is not equal to the


value that you enter.

Note: Once you create an intelligent group, you cannot edit the cloud provider
selection for it, but you can edit the name and description, and modify the query as
required.

Delete an intelligent cloud group


To delete an intelligent cloud group
1 On the left, click Workloads > Cloud.
2 Locate the group under the Intelligent groups tab.
3 If the group is not protected, select it and then click Delete.
4 If the group is protected, click on the group, scroll down and click Remove
protection.
5 Then select that group under the Intelligent groups tab and click Delete.
Managing and protecting cloud assets 24
Protecting cloud assets or intelligent cloud groups

Protecting cloud assets or intelligent cloud groups


You can create the cloud provider-specific protection plans for your cloud workloads.
Then you can subscribe the assets that are associated with the cloud provider to
a provider-specific protection plan.

Note: If you previously had a protection plan that was applied to assets from different
cloud providers, it is automatically converted to the new provider-specific format.
This conversion happens after an upgrade to NetBackup 9.1. For example, if you
had the assets from Google Cloud and AWS Cloud that are subscribed to one
protection plan, then the protection plan is split. The protection plan is split into two
separate protection plans for each provider.
See the section called “Conversion of protection plans after an upgrade to NetBackup
9.1” on page 25. section.

Use the following procedure to subscribe a cloud VM, application, volume, or an


intelligent group to a protection plan. When you subscribe an asset to a protection
plan, you assign predefined backup settings to the asset.

Note: The RBAC role that is assigned to you must give you access to the assets
that you want to manage and to the protection plans that you want to use.

To protect a cloud asset or an intelligent group


1 On the left, click Workloads > Cloud.
2 On the Virtual machines tab, or Applications tab, or Volumes tab or
Intelligent groups tab, click the box for the asset or the asset group and click
Add protection.
3 Select a protection plan and click Next.
4 You can adjust the following settings:
■ Schedules and retention
■ Storage options
For more information about storage options in the web UI, review the
Configuring storage section in the NetBackup Web UI Administrator’s Guide.
■ Backup options

5 Click Protect.
Managing and protecting cloud assets 25
Protecting cloud assets or intelligent cloud groups

Backup now option for immediate protection


Apart from the scheduled protection plans, you can also use the Backup now
option to backup an asset immediately, to safeguard against any unplanned
circumstances.
1. Select a cloud asset or an intelligent group and click Backup now.
2. Then select a protection plan to apply. Only the protection plans relevant to a
specific cloud provider of the asset are displayed as options.
3. Click Start backup.
A backup job is triggered, which can be tracked on the Activity monitor page.
For more information, see NetBackup Web UI Administrator’s Guide.

Conversion of protection plans after an upgrade to


NetBackup 9.1
Note the following points with respect to the automatic conversion of older protection
plans to the new format.
■ Protection plan conversion starts when the asset migration is completed after
the upgrade of NetBackup to 9.1.
■ Old protection plans with no assets subscribed are not converted to the new
format. You can manually delete them.
■ Before or during conversion
■ All the assets are unsubscribed from the old protection plan and subscribed
to the converted protection plan.
■ No new assets can be subscribed to the old protection plan.
■ The Backup now operation fails for the old plan.
■ Customizing or editing the old protection plan is prevented.

■ After successful conversion


■ If the old protection plan was used to protect the assets from only one cloud
provider, then the new plan retains the same name and asset subscription
upon conversion.
■ If the old protection plan was used to protect the assets from multiple cloud
providers, then the name of the old protection plan is retained as before.
The protection plan name is updated to retain the asset subscription for any
one cloud provider upon conversion.
For the other cloud providers which were part of the old plan, new protection
plans are created upon conversion, and only the assets of respective
Managing and protecting cloud assets 26
Protecting cloud assets or intelligent cloud groups

providers are subscribed to them. New plans are named in the following
format <old_plan_name>_<cloud_provider>.
■ Hence you may see more number of plans in your Protection Plans menu
on the web UI than before.
■ Success messages are shown in the notifications as follows:
The protection plan <protectionPlanName> created during conversion to
new format.
Successfully converted the protection plan <protectionPlanName> to the
new format.
Then you can start managing and applying the converted protection plans
as normal.

Failure scenarios
Refer to the following to know how the failure scenarios are handled during or after
the conversion of protection plans. Also check the notifications for any failure alerts
and take the necessary action.
■ Some of the assets might fail to get unsubscribed from the old protection plan.
In that case, the conversion still continues with the assets that are successfully
unsubscribed. The conversion process for the assets that failed, is retried every
4 hours.
■ After the conversion, some of the assets might fail to get automatically
re-subscribed to the new plan. In that case, you need to manually subscribe
those assets to the converted protection plan.
■ Failure might be encountered when the required access permissions are
assigned to the new, converted protection plan. In that case, you need to
manually assign the access permissions.

Customize or edit protection for cloud assets or intelligent groups


You can edit certain settings for a protection plan, including schedule backup
windows and other options.
To customize or edit the protection plan for a cloud asset
1 On the left, click Workloads > Cloud.
2 On the Virtual machines tab, or Applications tab, or Volumes tab or
Intelligent groups tab, click on the asset that you want to customize the
protection for.
3 Click Customize protection > Continue.
4 You can adjust one or more of the following settings:
Managing and protecting cloud assets 27
Cloud asset cleanup

■ Schedules and retention


Change the backup start window.
■ Backup options
Enable/disable regional snapshots for Google Cloud assets, or
specify/change snapshot destination resource group for Azure and Azure
Stack Hub assets.

Remove protection from cloud assets or intelligent groups


You can unsubscribe a cloud asset from a protection plan. When the asset is
unsubscribed, backups are no longer performed.
To remove protection from a cloud asset
1 On the left, click Workloads > Cloud.
2 On the Virtual machines tab, or Applications tab, or Volumes tab or
Intelligent groups tab, click on the asset that you want to remove the protection
for.
3 Click Remove protection > Yes.

Cloud asset cleanup


Cloud assets are cleaned up automatically during cleanup cycle or manually based
on the following criteria:
■ No active protection plan to cloud asset.
■ Asset is not discovered in last 30 days (cleanup age).
■ No recovery points exist.
■ Asset is marked for deletion (asset is deleted on Snapshot Manager).
User can enhance this cloud asset cleanup criteria by updating cleanup-age and
providing specific filter criteria for assets through bp.conf file. Following parameters
must be configured in bp.conffile:
■ CLOUD.CLEANUP_AGE_MINUTES
■ CLOUD.CLEANUP_FILTER
For example,
/usr/openv/netbackup/bin/nbsetconfig

nbsetconfig> CLOUD.CLEANUP_AGE_MINUTES = 180

nbsetconfig> CLOUD.CLEANUP_FILTER = provider eq 'aws'


Managing and protecting cloud assets 28
Cloud asset filtering

nbsetconfig>

User can also manually run the POST query using the cleanup-assets named
query with the following request body and then run GET with query ID obtained
from the POST response, as described in the following example:

{
"data":{
"type":"query",
"attributes":{
"queryName":"cleanup-assets",
"workloads":["cloud"],
"parameters": {
"cleanup_age_minutes": 180
},
"filter": "provider eq 'aws'"
}
}
}

Cloud asset filtering


User can define custom filter based on attributes, which would be used to list assets
into Virtual machines, Applications, PaaS, and Volumes tab.
To create a filter
1 On the left, click Workloads > Cloud.
2 Under the Virtual machines, Applications, PaaS, or Volumes tab, click on the
Filter icon on the right top of the screen.
The Create filter option is displayed.
3 Click the Create filter option to define custom filter based on attributes to list
assets into Virtual machines, Applications, PaaS, or Volumes tab.
4 To create a filter, enter the details for the following parameters:

Parameter Description

Name Name of the filter.

Description Provide the description for the filter.

Query To select only the assets that meet specific


conditions, create your own query.
Managing and protecting cloud assets 29
Cloud asset filtering

5 To select only the assets that meet specific conditions, create your own query:
Click + condition.
6 To add a condition, use the drop-downs to select a keyword and operator and
then enter a value.
See the section called “Query options for creating intelligent cloud groups”
on page 22.
To change the effect of the query, click + Condition and click AND or OR,
then select the keyword, operator, and value for the condition. For example:

This example uses AND to narrow the scope of the query: It selects only the
assets that have aws in their display name and that also have a Name as
cloudpoint, and are in running state.

You can also add sub-queries to a condition. Click + Sub-query and click AND
or OR, then select the keyword, operator, and value for the sub-query condition.

Query options for creating filter

Note: The attribute values may not match exactly with values shown on the cloud
provider's portal. You can refer to the asset details page or the cloud provider's API
response of an individual asset.

Table 1-5 Query keywords

Keyword Description

(all values are case-sensitive)

Server type Type of the server.


Managing and protecting cloud assets 30
Cloud asset filtering

Table 1-5 Query keywords (continued)

Keyword Description

(all values are case-sensitive)

Instance ID Asset's instance ID, depending on the cloud provider


selection.

Instance name Asset's instance name, depending on the cloud provider


selection.

Name Asset's display name.

Provider Asset's cloud provider name.

Region Asset's cloud provider region name.

Config ID Asset's config ID.

Database service Asset's database service.

Deleted Deleted asset.

Entity type Asset's entity type.

Service domain Asset's service domain.

Snapshot Manager The instance of Snapshot Manager with which the asset
is registered.

Table 1-6 Query operators

Operator Description

Starts with Matches the value when it occurs at the start of a string.

Ends with Matches the value when it occurs at the end of a string.

Contains Matches the value you enter wherever that value occurs
in the string.

= Matches only the value that you enter.

!= Matches any value that is not equal to the value that you
enter.
Managing and protecting cloud assets 31
AWS and Azure government cloud support

AWS and Azure government cloud support


Starting with 8.3, the Snapshot Manager can discover Amazon Web Services and
Microsoft Azure US Government cloud workloads. After the Snapshot Manager is
added to NetBackup, you can protect the workloads by NetBackup. NetBackup is
compliant with the regulatory requirements including IPv6 support to deploy Snapshot
Managert on the AWS and Azure US government cloud workloads.
After you configure AWS or Azure US Government cloud, the AWS and Azure agent
service is created which discovers the cloud assets based on provided region. The
discovered assets are displayed in NetBackup. Currently, only workloads from
selected regions and mapped endpoint are discovered and protected. For the same
Snapshot Manager host, you cannot use a combination of public and government
clouds.
An error might occur if you update a cloud plug-in when the plug-in assets operations
are in-progress.
Snapshot Manager supports the following GovCloud (US) regions:

Cloud provider GovCloud (US) regions

Amazon Web Services ■ us-gov-east-1


■ us-gov-west-1

Microsoft Azure ■ US Gov Arizona


■ US Gov Texas
■ US Gov Virginia

Note: PaaS assets does not support government cloud.

For information about configuring AWS and Microsoft Azure, See “Add a cloud
provider for a Snapshot Manager” on page 12.

About protecting Microsoft Azure resources using


resource groups
NetBackup lets you define a peer Resource Groups snapshot destination for every
resource group that contains protected virtual machines and volumes.
All resources in Microsoft Azure are associated to a resource group. After a snapshot
is created, it is associated to a resource group. Also, each resource group is
associated to a region. See the following:
Managing and protecting cloud assets 32
About protecting Microsoft Azure resources using resource groups

https://docs.microsoft.com/en-us/azure/azure-resource-manager/
management/manage-resource-groups-portal
Snapshot Manager creates a snapshot and places the snapshot in resource group
to which the resource belongs even under the following conditions:
■ If you don’t provide a prefix for a resource group
■ Peer resource groups are not created
■ You allow the snapshots to get created
You can configure the settings to place the snapshots in different resource group
than the resource group that is associated with the resource. However, note the
following important points:
■ The peer resource group must be in the same region as the region of the
resource group of the resource.
■ If a peer resource group is not found, the configurations determine whether the
snapshots creation succeeds or fails.
To enable this feature, you must create peer resource groups. Snapshot Manager
then appends the prefix of the resource group that is associated with the resource.
When a snapshot is created, the peer resource group name is derived based on
the prefix and the resource group to which the resource is associated.

Note: You can now directly associate a snapshot to an existing peer resource
group, at the time of creating a protection plan. However the functionality of defining
a peer resource group by specifying a prefix which is described in this section, still
exists.
Refer to information on creating protection plans in the NetBackup Web UI
Administrator’s Guide for the complete procedure.

Before you begin


■ The peer resource groups must be available for resources that are being
protected using the resource group.
■ Regions of a plugin configuration must not overlap with another configuration if
a prefix is specified.

Limitations and considerations


■ Only alphanumeric characters, periods, underscores, hyphen, or parenthesis
are allowed in the resource group names.
■ The prefix length must be less than 89 characters.
Managing and protecting cloud assets 33
About protecting Microsoft Azure resources using resource groups

■ You cannot use characters that Azure configuration does not allow for resource
group naming conventions.

About resource group configurations and outcome


The following table lists scenarios for virtual machines and resource group setup,
resource configuration, and outcome.

Table 1-7 Configurations and outcome

Resource group Protect assets even if Outcome


prefix prefixed Resource
Groups are not found
check box

Not specified Not selected NetBackup associates the newly


created snapshots in resource group
of the resource.

Specified Not selected NetBackup creates new the


snapshots and associates the
snapshots to the peer resource group
if the following conditions are met:

■ The peer resource group is


created.
■ The peer resource group is in the
same region as the resource
group.

If the conditions are not met,


snapshot jobs fail.

Specified Selected NetBackup creates new snapshots


and associates the snapshots to the
peer resource group if the following
conditions are met:

■ The peer resource group is


created.
■ The peer resource group is in the
same region as the resource
group.

If a peer resource group is not


created or is in a different region then
the newly created snapshot is
associated to the resource group of
the resource that is protected.
Managing and protecting cloud assets 34
About protecting Microsoft Azure resources using resource groups

Examples of resource group configurations


The following table lists the examples for resource group configurations.

Table 1-8 Example configurations

Conditions Configurations Result

■ OS and all disks are in the ■ Resource Group Prefix Snapshots are created in the
same resource group. value is provided. peer resource group.
■ Peer resource group is ■ The Protect assets even
named correctly. if prefixed Resource
■ Peer resource is located Groups are not found
in the same region as check box is selected.
resource group of
resource.

■ OS and all disks are in ■ Resource Group Prefix Snapshots are created in the
separate resource groups. value is provided. peer resource group.
■ Peer resource groups are ■ The Protect assets even
named correctly. if prefixed Resource
■ Peer resources are Groups are not found
located in the same region check box is selected.
as resource groups of
resources.

■ OS and all disks are in the ■ Resource Group Prefix The snapshots are created in
same resource group. value is provided. original resource group not
■ Peer resource group is ■ The Protect assets even the peer resource group.
created in a different if prefixed Resource
region from the resource Groups are not found
group of the resource. check box is selected.

■ OS and all disks are in the ■ Resource Group Prefix The snapshots are created in
same resource group. value is provided. original resource group not
■ Peer resource group is not ■ The Protect assets even the peer resource group.
created. if prefixed Resource
Groups are not found
check box is selected.
Managing and protecting cloud assets 35
About protecting Microsoft Azure resources using resource groups

Table 1-8 Example configurations (continued)

Conditions Configurations Result

■ OS and all disks are in ■ Resource Group Prefix Snapshots are created in the
separate resource groups, value is provided. peer resource group of RG1
RG1 and RG2. ■ The Protect assets even and original resource group
■ Peer resource groups if prefixed Resource RG2.
RG1 is named correctly Groups are not found
and located in the same check box is selected.
region as the resources.
■ Peer resources group
RG2 is not created.

■ OS and all disks are in ■ Resource Group Prefix Snapshots are not created
same resource group. value is provided. and the job fails.
■ Peer resource groups are ■ The Protect assets even
named correctly. if prefixed Resource
■ Peer resources group is Groups are not found
located different region check box is not selected.
than the resource group
of resources.

■ OS and all disks are in the ■ Resource Group Prefix Snapshots are not created
same resource group. value is provided. and the job fails.
■ Peer resource group is not ■ The Protect assets even
created. if prefixed Resource
Groups are not found
check box is not selected.

■ OS and all disks are in ■ Resource Group Prefix Snapshots are not created
separate resource groups, value is provided. and the job fails.
RG1 and RG2. ■ The Protect assets even
■ Peer resource groups of if prefixed Resource
RG1 and RG2 that is, Groups are not found
snapRG1 and snapRG2 check box is not selected.
are in different regions.
■ Peer resource group
snapRG1 is located in the
same region as the
resource group RG1.
■ The peer resource group
snapRG2 is located in a
different region than
resource group RG2.
Managing and protecting cloud assets 36
About the NetBackup Accelerator for cloud workloads

Troubleshoot resource group permissions


If appropriate permissions are not assigned to the resource group, the snapshot
creation fails for Azure resources that are associated to resource groups.
Workaround:
To resolve this issue, perform the following steps:
1. Navigate to
https://portal.azure.com/#blade/HubsExtension/BrowseResourceGroups.
2. Click on the resource group, that is to be used in the snapshot.
3. Click on Access control (IAM).
4. Click on Add Role Assignment.
5. Select Role as Owner, Assign Access to as User, and select the Application
(created for Snapshot Manager, to make API calls).
6. Save and try to backup again.

About the NetBackup Accelerator for cloud


workloads
NetBackup Accelerator reduces the backup time for cloud backups. NetBackup
uses reference snapshots to identify the changes that were made within a virtual
machine. Only the changed data blocks are sent to the NetBackup media server,
to significantly reduce the I/O and backup time. The media server combines the
new data with previous backup data and produces a traditional full NetBackup
image that includes the complete virtual machine files.
NetBackup supports Accelerator backup for AWS, Azure and Azure Stack workloads.

Note: Accelerator is most appropriate for virtual machine data that does not
experience a high rate of change.

Accelerator has the following benefits:


■ Performs the full backups faster than traditional backup. Creates a compact
backup stream that uses less network bandwidth between the backup host and
the server. Accelerator sends only changed data blocks for the backup.
NetBackup then creates a full traditional NetBackup image that includes the
changed block data.
■ Accelerator backups support Granular Recovery Technology (GRT).
Managing and protecting cloud assets 37
About the NetBackup Accelerator for cloud workloads

■ Reduces the I/O on the Snapshot Manager.


■ Reduces the CPU load on the Snapshot Manager.

How the NetBackup Accelerator works with virtual machines


For Azure and Azure Stack backups, Accelerator is activated when you select a
Accelerator supported storage type, like MSDP, OpenStorage, CloudStorage, and
MSDP-C (Azure and AWS).
The NetBackup Accelerator creates the backup stream and backup image for each
virtual machine as follows:
■ If the virtual machine has no previous backup, NetBackup performs a full backup.
■ At the next backup, NetBackup identifies data that has changed since the
previous backup. Only changed blocks and the header information are included
in the backup, to create a full VM backup. The changed blocks are identified by
comparing the previous reference snapshot and the current snapshot. If you
select Keep backup only or Initiate backup when snapshot is about to expire
option in the protection plan, the snapshot is retained for accelerator purpose
till the next backup is completed.
■ The backup host sends to the media server a tar backup stream that consists
of the following: The virtual machine's changed blocks, and the previous backup
ID and data extents (block offset and size) of the unchanged blocks.
■ The media server reads the virtual machine's changed blocks, the backup ID,
and information about the data extents of the unchanged blocks. From the
backup ID and data extents, the media server locates the rest of the virtual
machine's data in existing backups.
■ The media server directs the storage server to create a new full image that
consists of the following: The newly changed blocks, and the existing unchanged
blocks that reside on the storage server. The storage server may not write the
existing blocks but rather link them to the image.
■ Microsoft Azure does not allow more than 200 subsequent incremental
snapshots. If you select the Keep snapshot along with backup option in the
protection plan and specify a such a retention period for the snapshot, so that
it leads to more than 200 incremental snapshots. Then, full backups take place
instead of accelerator. It is recommended to keep a reasonable snapshot
retention period to utilize the accelerator benefits.
■ If the configuration of a VM changes, for example, if a new disk is added to a
VM between two accelerator backups, a full backup is taken for that disk, and
accelerator backup is taken for the existing disks.
Managing and protecting cloud assets 38
About the NetBackup Accelerator for cloud workloads

Accelerator forced rescan for virtual machines (schedule attribute)


Accelerator forced rescan helps to prevent corrupt backup image issues by manually
executing the ForcedRescan command. When Accelerator forced rescan is used,
all the data on the virtual machine is backed up. This backup is similar to the first
Accelerator backup for a policy. For the forced rescan job, the optimization
percentage for Accelerator is 0. The duration of the backup is similar to a
non-Accelerator full backup.
Force rescan enhances safety, and establishes a baseline for the next Accelerator
backup. This feature protects against any potential damage like failure of checksum
verification on the data in the staging area.
Recommendations for using forced rescan:
■ Do not trigger force rescan for the VMs which are turned off.
■ If the storage location memory is full, you can see a notification in the UI. Initiate
the force rescan only when sufficient memory is available at the storage location.
NetBackup creates a schedule named 'ForcedRescan' for every protected VM. To
manually trigger the backup with force rescan execute the following command in
the command prompt or the Linux terminal:
bpbackup -i -p <policy_name> -s ForcedRescan

For example, bpbackup -i -p


msdp_10mins_FRS+5d990ab5-f791-474f-885a-ae0c30f31c98 -s ForcedRescan

You can obtain the policy name from web UI from the relevant protection plan.

Accelerator backups and the NetBackup catalog


Use of Accelerator does not affect the size of the NetBackup catalog. A full backup
with Accelerator generates the same catalog size as a full backup of the same data
without Accelerator. The same is true of incremental backups: use of Accelerator
does not require more catalog space than the same backup without Accelerator.

Accelerator messages in the backup job details log


When a virtual machine is first backed up, Accelerator is not used for that backup.
The following messages appear in the job details log:

Jul 21, 2021 1:55:52 PM - Info bpbrm (pid=78332) accelerator enabled


Jul 21, 2021 1:55:53 PM - Info bpbrm (pid=78332) There is no
complete backup image match with track journal, a regular full
backup will be performed.
Managing and protecting cloud assets 39
Configuring backup schedule for cloud workloads

..

Jul 21, 2021 1:56:11 PM - Info bpbkar (pid=1301) accelerator sent


402666496 bytes out of 402664960 bytes to server, optimization 0.0%

When subsequent backups of the virtual machine use Accelerator, the following
messages appear in the job details log:

Jul 21, 2021 2:01:33 PM - Info bpbrm (pid=79788) accelerator enabled

..

Jul 21, 2021 2:02:00 PM - Info bpbkar (pid=1350) accelerator


sent 1196032 bytes out of 402664960 bytes to server, optimization 99.7%

This message is a key trace for Accelerator. In this example Accelerator was
successful at reducing the backup data by 99.7%.

Configuring backup schedule for cloud workloads


You can add backup schedule in the Attributes tab of the Add backup schedule
dialog, while creating a protection plan for the Azure, Azure Stack, AWS and GCP
cloud workloads.
See the Managing protection plans section of the NetBackup Web UI Administrator’s
Guide, for details of how to create a protection plan.
To add backup schedule to a cloud workload
1 On the left, click Protection > Protection plans and then click Add.
2 In Basic properties, enter a Name, Description, and select Cloud, from the
Workload drop-down list.
3 Select a Cloud Provider from the drop-down list, click Next. In Schedules,
click Add schedule.
In the Add backup schedule tab, you can configure the options for retaining
the backup and the snapshot.
Managing and protecting cloud assets 40
Configuring backup schedule for cloud workloads

4 (For Azure SQL server, GCP SQL Server, and SQL Managed Instance PaaS
assets only.) If you have selected Protect PaaS assets only for the protection
plan, select Backup type as Incremental backup or Full. For incremental
backup type, NetBackup taken an initial full backup, and all subsequent backups
capture only incremental changes in the database. This feature increases
backup performance to a great extent. In case of a schema change, goes back
to full backup from incremental backup, and notifies this activity in the activity
monitor.
Assign a longer retention period to full backups than to incremental backups
within a policy. A complete restore requires the previous full backup plus all
subsequent incremental backups. It may not be possible to restore all the files
if the full backup expires before the incremental backups. See “About
incremental backup for PaaS workloads” on page 65.
5 From the Recurrence drop-down, specify the frequency of the backup.
6 In the Snapshot and backup options, do any of the following:
■ Select Keep snapshot along with backup option to retain both the
snapshot and the backup. Specify retention period for both the snapshot
and the backup, using the Keep snapshot for and the Keep backup for
drop-downs. Select Full from the Backup type drop-down. Select Initiate
backup only when the snapshot is about to expire option, to start the
backup job just before the retained snapshot expires.
■ Select Keep snapshot only option, to retain only the snapshot. Specify
retention period for the snapshot using the Keep snapshot for drop-down.
■ (Optional) If you have selected provider as Amazon AWS, and selected
to retain the snapshot by selecting any of the above two options, you
can configure snapshot replication at this point. For more information
about cloud snapshot replication, See “Configure AWS snapshot
replication” on page 45.
■ Select Enable Snapshot replication.
■ In the table, select Region, AWS Account, and Retention period for
the replicated snapshots.

Note: The number of replication copies that you configure is displayed


in the Snapshot replicas column in the Schedules and retention table
in the Schedules tab.

■ Select Keep backup only option, to retain only the backup. The snapshot
expires immediately after the backup. Specify retention period for the backup
Managing and protecting cloud assets 41
Configuring backup schedule for cloud workloads

using the Keep backup for drop-down. Select Full from the Backup type
drop-down.

7 Continue creating the schedule in the Start window tab, as described in the
Managing protection plans section of the NetBackup Web UI Administrator’s
Guide.

Availability of granular recovery for different backup


options
Availability of the granular recovery for files or folders option, depends on the
different backup options that you select for the workload.
■ When you select the Keep snapshot along with backup option, granular
recovery is available.
■ When you select the Keep snapshot only option, granular recovery is available.
■ When you select the Keep backup only option, granular recovery is available.
Indexing during backup and snapshot jobs
■ NetBackup performs VxMS (Veritas Mapping Service) based indexing from
snapshot, and inline indexing during the backup from snapshot Jobs. It can
index files irrespective of the region and location of the Snapshot Manager.
VxMS based indexing is currently supported for GCP, AWS, Azure, and Azure
Stack Hub clouds.
■ Indexing is performed during the actual backup or snapshot jobs, but you can
perform the recovery of individual files or folders only from the snapshot and
backup copy using Enable granular recovery for files and folders option.
■ Once the snapshot of the VM assets is created, the 'Index from Snapshot' job
for each of the assets is triggered. You can check the indexing job details in the
Activity Monitor.
■ The VxMS debug logs and the cloud connector debug logs are available in the
/cloudpoint/openv/dm/datamover.<datamover-id>/netbackup/logs folder of the
Snapshot Manager.
■ To index files and folders with same mount path as mentioned in /etc/fstab,
the /etc/fstab file on the Linux servers, must have entries based on the UUID
file system, instead of device paths. The device paths can change depending
on the order in which Linux discovers the devices during system boot.

Note: If the VM is not in connected state, then the VM backup continues and the
backup job is marked as partially successful. In this case, you cannot restore
individual files or folders as the indexing is not available when the VM is not
connected.
Managing and protecting cloud assets 42
Backup options for cloud workloads

Backup options for cloud workloads


Note: For a connected VM, a file system consistent snapshot is attempted. In case
a connected VM is stopped later, then the application enters into an error state and
a crash consistent snapshot is taken instead of file system consistent snapshot.
You can refer to the Job monitor and refer the logs if the snapshot taken was crash
consistent or file system consistent snapshot.

Regional snapshots for Google cloud


You can choose to enable regional snapshots for the Google cloud workloads while
creating a protection plan.
If the regional snapshot option is enabled, the snapshot will be created in the same
region in which the asset exists. Otherwise, the snapshot will be created in a
multi-regional location.

Snapshot destination resource group for Azure and Azure


Stack Hub
You can choose to specify a snapshot destination peer resource group while creating
a protection plan for Azure or Azure Stack Hub. While the previous functionality of
defining a peer resource group by specifying a prefix still exists, you can now directly
associate a snapshot to an existing peer resource group at the time of creating a
protection plan.
Managing and protecting cloud assets 43
Backup options for cloud workloads

If you have selected the cloud provider as Microsoft Azure or Azure Stack Hub
while creating a protection plan, you can select Specify snapshot destination
resource group to associate snapshots to a particular peer resource group within
the same region in which the asset exists. Then select a configuration, subscription,
and a resource group for a snapshot destination.
The snapshot is stored in one of the destination resource groups, in the following
preference:
■ A destination resource group specified in the protection plan
■ A pre-fixed resource group specified in the plugin configuration (for Azure only)
■ A resource group in which the asset exists, if no destination or pre-fixed resource
group is specified in NetBackup.

Excluding selected disks from backup


You can configure a protection plan to exclude some disks from the backup and
snapshot which are applicable to all supported cloud vendors including GCP. This
enables you to avoid redundant images of the disks that do not need to be backed
up, and speed up the backups by reducing the volume of data to be processed.
If you are creating a protection plan for AWS, Azure, Azure Stack Hub, or GCP
clouds, you can select Exclude selected disks from backups option and specify
the disks that should not be included in the backup image. You can choose to
Managing and protecting cloud assets 44
Backup options for cloud workloads

exclude either all the non-boot disks, or the disks that have specific tags associated
with them in the corresponding cloud provider account.

Note: A protection plan that has disk exclusion option enabled can be applied only
to the cloud VM type assets and VM intelligent groups.

Then while restoring the VMs from the Recovery Points tab, refer to the Includes
disks column to view the list of disks that are included or excluded in the backup
image.
Refer to the information on creating a protection plan in the NetBackup Web UI
Administrator’s Guide for the complete procedure.
Notes:
■ In case of LVM, if disks are excluded partially then system might not boot up
properly.
■ In case there is a non supported file system configured on a disk and user wants
to exclude that disk from snapshot, the snapshot would continue to be crash
consistent snapshot as the disk containing non supported file system is excluded.
■ If the user wants to exclude the disk, he/she should have the nofail flag attached
to the data disk prior to taking a snapshot in the /etc/fstab file. This is required
if the user reboot the instance without this volume attached (for example, after
moving the volume to another instance), the nofail mount option enables the
instance to boot even if there are errors mounting the volume. For more
information, refer to the following example entry in the /etc/fstab file:
For example,UUID=aebf131c-6957-451e-8d34-ec978d9581ae /data xfs
defaults,nofail 0 2
■ The user should ensure that assets are properly discovered once there has
been any change in their tags from the cloud provider. Once the policy run is
scheduled for an asset, the disks are excluded as per the discovered data only.
Managing and protecting cloud assets 45
Snapshot replication

If, the user attaches a tag while the snapshot is in progress, that tag would not
be considered as a part of exclusion. Once discovery is completed, it will be
considered during next protection cycle.
■ In case of OS with non-English locale, if user opts tag based exclusion in
protection plan and disk tag has non-English character, even then disk exclusion
works as expected. But in some cases tag with non-English character is not
correctly captured in job(try) logs and audit logs although there is no functionality
impact as disk exclusion is considered correctly.

Snapshot replication
Replicating a snapshot means saving a copy of the snapshot to another location.
In AWS, another location can be one of the following:
■ different region within the same account.
■ same region in a different account.
■ different region within different account.
For example, an AWS cloud administrator have their assets in the region X. The
snapshots of those assets will also be stored in X region. However, you can also
replicate the snapshots to the Y region within same account or X/Y region in a
different account, for an added level of protection. In NBU Snapshot Manager
terminology, the original location (X) is the replication source, and the location where
snapshots are replicated (Y) is the replication destination.
Replication is performed in three steps. This mechanism is handled internally and
the entire process is completely transparent to the user.
■ Share the snapshot, only if replicating to a cross account. For more information,
see the Share a snapshot section of the AWS documentation.
■ Copy the snapshot. For more information, see the CopySnapshot section of the
AWS documentation.
■ Unshare the snapshot, only if replicating to a cross account.

Configure AWS snapshot replication


Requirements for replicating snapshots
■ Replicating unencrypted snapshots
Ensure that the source and target accounts/regions are configured using the
AWS cloud provider from NetBackup Snapshot Manager. There are no additional
requirements for replicating unencrypted snapshots.
Managing and protecting cloud assets 46
Configure AWS snapshot replication

■ Replicating encrypted snapshots using AWS KMS


Ensure that the source and target accounts/regions are configured using the
AWS cloud provider from NetBackup Snapshot Manager.
Additionally, to replicate encrypted snapshots to a cross account, the encryption
CMK key from the original location needs to be shared to the target account.
(This shared KMS key is implicitly used while copying the snapshot in the target
account, and the copied snapshot can be replicated by a different key).
Both the source and target locations should have encryption key (KMS key) with
same name; that is, they should have the same key alias (in terms of AWS).
If encryption key with the same name is not present at the target, then the
replicated snapshot is encrypted using the default KMS key in the target location.
■ Permissions for cross account replication
For cross-account replication, the AWS IAM user or role associated with the
snapshot source region's AWS account (source AWS account) must have the
following permissions:
■ ModifySnapshotAttribute and CopySnapshot on the EC2 instance.

■ DescribeKey and ReEncrypt on the KMS key that is used to encrypt the
original snapshot.
For cross-account replication, the AWS IAM user or role associated with the
snapshot replication target region's AWS account (target AWS account) must
have the following permissions:
■ CreateGrant, DescribeKey, and Decrypt on the KMS key that is used to
encrypt the original snapshot.
■ CreateGrant, Encrypt, Decrypt, DescribeKey, and
GenerateDataKeyWithoutPlainText on the KMS encryption key used while
performing the CopySnapshot operation on the original snapshot.

You can choose to replicate snapshots for AWS cloud assets from the primary
location to a remote or a secondary location. The Snapshot Manager's support
cross-region and cross account replication. With snapshot replication you can
achieve the following:
■ Maintain a copy of cloud assets at a different destination for long-term retention
and auditing requirements.
■ Recover cloud assets from the replicated copies from another region in case
there is a region outage.
■ Recover cloud assets from the replicated copies from another account in case
the user account is compromised.
Managing and protecting cloud assets 47
Configure AWS snapshot replication

Configuration
Review the following information to configure snapshot replication:
■ You can configure snapshot replication when you create a protection plan. See
the NetBackup™ Web UI Administrator's Guide.
■ For cross account replication, you need to establish a trust relationship between
the source and the target account. For more details, refer to the Across AWS
Accounts Using IAM Roles related information in the Amazon Web Services
documentation.

Considerations
Consider the following when you configure cloud snapshot replication:
■ Even if multiple schedules are configured, the replication destination region that
is configured is applied to all the schedules.
■ Cloud snapshot replication is supported only for Amazon cloud providers.

Asset protection criteria


Consider the following before adding cloud assets to a protection plan that is
configured for cloud snapshot replication:
■ Assets must be added to a protection plan that replicates snapshots to a different
region.
For example, assets residing in region ‘aws_account_1-us-east-1’ cannot be
subscribed to a protection plan replicating to the same region
‘aws_account_1-us-east-1’.
■ Assets can be replicated to a different account in the same region.
For example, assets residing in region ‘aws_account_1-us-east-1’ can be
subscribed to a protection plan replicating to the same region but different
account ‘aws_account_2-us-east-1’.
■ Assets that are discovered by a Snapshot Manager must be replicated to the
region that is discovered by the same Snapshot Manager.
For example, assets that are discovered by Snapshot Manager ‘CP1’ cannot
be subscribed to a protection plan replicating to a region that is discovered by
Snapshot Manager ‘CP2’.
■ Only Amazon assets can be subscribed to a protection plan that is configured
for cloud snapshot replication.

Manage concurrent snapshots replications


For better performance, you can tune the number of concurrent snapshot
replications. Amazon has different limits for each asset type to do concurrent
Managing and protecting cloud assets 48
Using AWS snapshot replication

snapshot replications to a single destination region. For example, RDS has a limit
for 5, EBS has a limit for 5, and EC2 has a limit for 50. For more details refer to
Copy Snapshot related information in the Amazon Web Services documentation.
In NetBackup this limit is defined using the following parameter in the bp.conf file:
MAX_CLOUD_SNAPSHOT_REPLICATION_JOBS_PER_DESTINATION

The default value is 5.

Using AWS snapshot replication


This section elaborates how to create snapshot replicas using the AWS snapshot
replication feature, and restore the replicated snapshots whenever required. Refer
to the NetBackup Snapshot Manager Install and Upgrade Guide and the NetBackup
Web UI Administrator’s Guide for details about these steps, otherwise indicated.

Creating snapshot replications


This section describes how to configure the Source region to create snapshot
replicas in the Target region.
To create replicas
1 Add Snapshot Manager (CP1) in web UI.
See “Add a Snapshot Manager” on page 12.
2 Add AWS plug-in for Source and Target region for replication.
3 Create protection plan and select Region and Account.
See “Configuring backup schedule for cloud workloads” on page 39.
4 Connect and configure an application consistent guest VM using the OnHost
agent.
5 Start the snapshot-based backup and replicate the snapshots using the
protection plan.
6 Verify the recovery points for snapshot and replica copy.

Restoring from the snapshot replicas in the target region


If the Source region fails, you can restore the VMs belonging to this region, from
the Target region, where you have taken the snapshot replicas. As the Source
region is down, you initially need to restore the VMs in the Target region.

Note: You cannot restore single files or folders from a replica that was discovered
by an alternate Snapshot Manager in a failed over region.
Managing and protecting cloud assets 49
Using AWS snapshot replication

Restoring in the target region


1 Disable server CP1 in the Source region from web UI.
See “Enable or disable a Snapshot Manager” on page 19.
2 Register a new Snapshot Manager (CP2) in the target region, from web UI.
3 Add AWS plug-in for only the Target region and account. Let the discovery
complete.
4 To restore VMs:
■ Sign in to the NetBackup Web UI.
■ On the left, click Workloads > Cloud. On the Virtual machines tab, click
the computer that you want to recover.
■ Click the Recovery points tab. In the list of images, click Restore in front
of the required Replica image, and click Restore virtual machine.
■ To change the Display name for the VM, enter a new name.
■ Select a subnet (subnet path having VPC).
See “Recovering cloud assets” on page 82.

5 Add appropriate security group to the restored VMs to enable remote access.
6 Uninstall and reinstall the Snapshot Manager agent from the restored VMs,
and then register the Snapshot Manager agents with the new CP2 server.
7 Run a deep discovery from the AWS provider console.
8 Create new protection plan to protect the restored VMs. Start a snapshot-based
backup.

Restoring back to the source region from the target region


You can restore the VMs from the Target region to the Source region, once the
source region is back online.
Restoring to the source region
1 Edit the AWS plug-in for CP2 and add the Source region.
2 Create a new protection plan to create a snapshot replica in the Source region.
3 Start a snapshot-based backup and replicate.
4 Disable the CP2 server in web UI. See “Enable or disable a Snapshot Manager”
on page 19.
5 Enable the CP1 server and start a deep discovery from the AWS provider
console.
6 Perform full restore of the VMs from the Target region.
Managing and protecting cloud assets 50
Support matrix for account replication

7 Add the appropriate security group to enable remote access to the restored
VMs.
8 Uninstall and reinstall the Snapshot Manager agents from the restored VMs.
Then register Snapshot Manager agents with the CP1 server.
9 Run a deep discovery from the AWS console.
10 Use the existing protection plan to protect newly restored VMs.

Support matrix for account replication


Table 1-9 Support matrix for same account replication

Asset types Source asset Source snapshot Replicated


(Region X) (Region X) snapshot (Region
Y)

EBS Volume, EC2 Unencrypted Unencrypted Unencrypted


Instance and
RDS/Aurora Attached disks Attached disks Attached disks
encrypted using encrypted using encrypted using
default AWS KMS default AWS KMS default AWS KMS
key. key. key.

Encrypted using AWS Encrypted using AWS Encrypted using AWS


KMS CMK key (with KMS CMK key (Alias KMS CMK key with
Alias ABC). ABC). name if present (Alias
ABC), else encrypted
using default AWS
KMS key.
Managing and protecting cloud assets 51
Support matrix for account replication

Table 1-10 Support matrix for different account same region replication

Asset types Source asset Source snapshot Replicated


(Account A (Account A snapshot
Region X) Region X) (Account B
Region Y)

EBS Volume, EC2 Unencrypted Unencrypted Unencrypted


Instance and
RDS/Aurora Encrypted using Encrypted using Not supported
default AWS KMS default AWS KMS
key. key.

Encrypted using AWS Encrypted using AWS Encrypted using AWS


KMS CMK key (with KMS CMK key (with KMS CMK key with
Alias ABC). Alias ABC). name if present (with
Alias ABC), else
encrypted using
default AWS KMS
key.

Table 1-11 Support matrix for different account different region replication

Asset types Source asset Source snapshot Replicated


(Account A (Account A snapshot
Region X) Region X) (Account B
Region Y)

EBS Volume and Unencrypted Unencrypted Unencrypted


EC2 Instance
Encrypted using Encrypted using Not supported
default AWS KMS default AWS KMS
key. key.

Encrypted using AWS Encrypted using AWS Encrypted using AWS


KMS CMK key (with KMS CMK key (with KMS CMK key with
Alias ABC). Alias ABC). name if present (with
Alias ABC), else
encrypted using
default AWS KMS
key.
Managing and protecting cloud assets 52
Protect applications in-cloud with application consistent snapshots

Table 1-11 Support matrix for different account different region replication
(continued)

Asset types Source asset Source snapshot Replicated


(Account A (Account A snapshot
Region X) Region X) (Account B
Region Y)

RDS Unencrypted Unencrypted Unencrypted

Encrypted using Encrypted using Not supported


default AWS KMS default AWS KMS
key. key.

Encrypted using Encrypted using Not supported


default AWS KMS default AWS KMS
key. key.

Aurora Unencrypted Unencrypted Not supported

Encrypted using Encrypted using Not supported


default AWS KMS default AWS KMS
key. key.

Encrypted using Encrypted using Not supported


default AWS KMS default AWS KMS
key. key.

Protect applications in-cloud with application


consistent snapshots
You can take application consistent (point-in-time) snapshots of the applications
that are deployed on virtual machines in cloud. This lets you perform a point-in-time
recovery of applications.
You can perform original location and alternate location restores for these workloads.
For alternate location restore, consider the following:
■ For alternate location restore of MS SQL workloads, the target host must be
discovered but the application status should not be in connected or configured
state.
■ For alternate location restore of Oracle workloads, the target host must be
discovered but the application status should not be in connected or configured
state.
Managing and protecting cloud assets 53
Protecting PaaS assets

Before you begin


Ensure that the database is prepared for snapshots. For details review the plug-in
configuration notes in the Veritas Snapshot Manager documentation.
To configure applications for point-in-time recovery
1 Connect to the virtual machine that hosts the applications.
■ After the cloud assets are discovered, go the Virtual Machines tab.
■ Select the virtual machine where the application is hosted. On the top right,
click Manage credentials.
■ Enter the credentials. If the credentials for the VM are not configured, you
must configure the credentials. See the Managing credentials chapter of
the WebUI Administrator Guide.
■ After the virtual machines are connected, the virtual machines state is
updated to Connected.

2 Select the virtual machine where the application is hosted. On the top right,
click Configure application.
3 After the process is complete, the application status is updated to configured.
4 The applications are displayed under the Applications tab after the next
discovery.
5 Apply the protection plan. See the NetBackup Web UI Administrator's Guide.
To edit or update virtual machine credentials
1 Go to the Virtual Machines tab.
2 Select the virtual machines for which you want to update credentials. On the
top right, click Manage credentials.
3 Update the credentials.
To edit or update application configuration
1 Go to the Applications tab.
2 Select the application for which you want to update. On the top right, click Edit
configuration
3 Update the credentials and click Configure.

Protecting PaaS assets


You can manage the PaaS assets after discovered by NetBackup. The assets are
displayed in the PaaS and Applications tabs, under cloud workload. The
Managing and protecting cloud assets 54
Protecting PaaS assets

Applications tab displays the RDS assets, whereas the PaaS tab displays the
non-RDS assets. You can view, protect, and recover PaaS assets from these two
tabs.

Prerequisites for protecting PaaS assets


NetBackup lets you discover, protect, and restore PaaS assets across different
cloud platforms for a variety of assets. This section details the supported platforms
and databases.

Supported cloud providers


NetBackup enables you to protect PaaS assets with the following cloud providers:
■ Microsoft Azure
■ AWS
■ GCP

Supported databases for different providers


The following table lists the supported databases for each cloud provider.

Table 1-12 Supported databases by PaaS

Providers Supported databases

Microsoft Azure PostgreSQL, SQL Managed Instance, SQL, MariaDB, Azure


Cosmos DB for NoSQL, Azure Cosmos DB for MongoDB, and
MySQL.

The following components are not supported:

Azure SQL - Elastic pool

Azure SQL Managed Instance - Azure Arc

Azure Cosmos DB for MongoDB vCore

Azure PostgreSQL - Hyperscale (Citus) server group and Azure


Arc enabled PostgreSQL Hyperscale

AWS RDS SQL, RDS PostgreSQL, RDS MySQL, RDS MariaDB, RDS
Aurora MySQL, RDS Aurora PostgreSQL, Amazon RDS for
Oracle, Amazon Redshift, and DynamoDB.

GCP Cloud SQL for PostgreSQL, Cloud SQL for SQL Server, and
Cloud SQL for MySQL
Managing and protecting cloud assets 55
Protecting PaaS assets

Supported platforms
This section details the supported platforms for primary and media servers.

Table 1-13 Supported platforms for PaaS

NetBackup server Supported platform

Primary RHEL, SUSE, and Windows

Media RHEL

Storage server Universal share on underlying MSDP block storage or


MSDP-Cloud storage STU

Required cloud provider permissions


The credential that you use to add the cloud providers must have all the required
permissions and privileges assigned as mentioned in the NetBackup Snapshot
Manager Installation and Upgrade Guide.

Supported ports
Here are the supported ports for different PaaS databases.

Table 1-14 Supported ports for PaaS

Database PaaS Supported ports


workload

Azure SQL Server 1433

Azure SQL Managed 1433


Instance

Azure MySQL 3306

Azure PostgreSQL 5432

Azure MariaDB 3306

GCP PostgreSQL 5432

GCP MySQL 3306

AWS DynamoDB NA

AWS RDS PostgreSQL 5432

AWS RDS MySQL 3306

AWS MariaDB 3306


Managing and protecting cloud assets 56
Protecting PaaS assets

Table 1-14 Supported ports for PaaS (continued)

Database PaaS Supported ports


workload

AWS RDS AuroraDB 5432


Postgres

AWS RDS AuroraDB 3306


MySQL

AWS RDS SQL server 1433

Amazon RDS for Oracle 1521

Azure Cosmos DB for 443


NoSQL

Azure Cosmos DB for 10255


MongoDB

GCP SQL Server port 1433

Amazon Redshift 5439

Enabling binary logging for MySQL databases


■ For AWS, see
https://aws.amazon.com/premiumsupport/knowledge-center/rds-mysql-functions/
■ For Azure, set the value of the parameter log_bin_trust_function_creators
as 1, as described in the link:
https://learn.microsoft.com/en-us/azure/mysql/single-server/how-to-server-parameters
■ For GCP, do the following:
■ Open the instance and click Edit.
■ Scroll down to Flags section.
■ To set a flag, click Add item, select log_bin_trust_function_creators flag
from the drop-down menu, and set its value to on.
■ Click Save to save your changes. You can confirm your changes under
Flags in the Overview page.

Installing the native client utilities


If you use a build-your-own (BYO) setup, you must install the native client utilities
in your NetBackup environment for your PaaS workload to work.
Managing and protecting cloud assets 57
Protecting PaaS assets

For NetBackup deployments in Azure Kubernetes Services (AKS) or Elastic


Kubernetes Services (EKS), the native client utilities are packaged as part of
NetBackup media server, primary server, and data mover container image. Manual
installation is not required for them.
Ensure that the network settings like firewall, security group, and DNS configuration
are configured appropriately to access databases within the cloud provider.

Note: If any of these packages are already installed in the media server(s), remove
the packages to avoid conflict with the newer versions of the packages that you
install.

Installing the MySQL client utility

Note: MySQL client utility recommended version is 8.0.34.

RPM Download https://downloads.mysql.com/archives/community/


location

To install, run the following commands in the terminal:


1 rpm -ivh mysql-community-common-<version_no>.x86_64.rpm

2 rpm -ivh mysql-community-client-plugins- <version_no>.x86_64.rpm

3 rpm -ivh mysql-community-libs- <version_no>.x86_64.rpm

4 rpm -ivh mysql-community-client- <version_no>.x86_64.rpm

Note: Avoid using MySQL client utility 8.0.32 version as there is bug reported by
MySQL.

Installing the sqlpackage client utility

Note: sqlpackage client utility recommended version is 19.2 (Build: 162.0.52).


Managing and protecting cloud assets 58
Protecting PaaS assets

Download https://docs.microsoft.com/en-us/sql/tools/
locations /sqlpackage-download?view=sql-server-ver15

https://packages.microsoft.com/rhel/7/prod/msodbcsql17-17.9.1.1-1.x86_64.rpm

https://packages.microsoft.com/rhel/7/
prod/unixODBC-2.3.7-1.rh.x86_64.rpm

To install, run the following commands in the terminal:


1 cd ~

2 mkdir sqlpackage

3 unzip ~/Downloads/sqlpackage-linux-<version string>.zip -d


~/sqlpackage

4 echo "export PATH=\"\$PATH:$HOME/sqlpackage\"">> ~/.bashrc

5 chmod a+x ~/sqlpackage/sqlpackage

6 source ~/.bashrc

Note: Ensure that sqlpackage is added as a default path variable. If you still
get the cannot find sqlpackage error, restart the NetBackup services on the
media server.

7 sqlpackage

8 rpm -ivh unixODBC-2.3.7-1.rh.x86_64.rpm

9 rpm -ivh msodbcsql17-17.10.2.1-1.x86_64.rpm

RHEL 9 users perform the following additional steps:


1 Download the Microsoft.NETCore.App.Runtime.linux-x64 from the link:
https://www.nuget.org/api/v2/package/Microsoft.NETCore.App.Runtime.linux-x64/6.0.10
Locate the file: microsoft.netcore.app.runtime.linux-x64.6.0.10.nupkg.
2 Extract the file using a decompression tool like, 7zip.
3 Navigate to:
microsoft.netcore.app.runtime.linux-x64.6.0.10.nupkg\runtimes\linux-x64\lib\net6.0\
4 Copy the file System.Security.Cryptography.X509Certificates.dll from
there to the ~/sqlpackage folder created in step 2 of installing sqlpackage
client utility task.
Managing and protecting cloud assets 59
Protecting PaaS assets

If you are attaching the 10.1 media server as an external media server with 10.1.1
NetBackup setup, perform the following steps on the 10.1 media server.
For a BYO NetBackup setup:
■ Run the command:
mkdir -p <backup and restore ushare export path>

■ Check the Defaultvers value of NFS in the /etc/nfsmount.conf file.


■ If the Defaultvers value is nfs3, then mount the backup and restore ushare
path with the option nolock. For example: mount <ushare mount path>
<ushare export path> -o nolock

■ If the Defaultvers is nfs4, mount the backup and restore ushare path
without the nolock option.

For NetBackup deployed in AKS and EKS environments:


■ Run the command:
mkdir -p <backup and restore ushare export path>

■ Check the Defaultvers value of NFS from the /etc/nfsmount.conf file.


■ If the Defaultvers value is nfs3, then mount the backup and restore ushare
path with the option nolock For example: mount <ushare mount path>
<ushare export path> -o nolock

■ If the Defaultvers value is nfs4, then mount the v4 version of backup and
restore ushare path without the nolock option.

Installing PostgresSQL client utility


PostgresSQL client utility recommended version is 15.3.

Download RHEL 7 https://download.postgresql.org/pub/repos/yum/15/redhat/rhel-7-x86_64/


locations
RHEL 8 https://download.postgresql.org/pub/repos/yum/15/redhat/rhel-8-x86_64/

RHEL 9 https://download.postgresql.org/pub/repos/yum/15/redhat/rhel-9-x86_64/

To install, run the following commands in the terminal:


1 rpm -ivh postgresql15-libs-15.3-1PGDG.rhel7.x86_64.rpm

2 rpm -ivh postgresql15-15.3-1PGDG.rhel7.x86_64.rpm

Note: lz4 compression package and libicu are required by


postgresql15-15.3-1PGDG.rhel8.x86_64.rpm on RHEL 8 and 9.
Managing and protecting cloud assets 60
Protecting PaaS assets

Installing MongoDB client utility


MongoDB client utility recommended version is 100.7.3.

Download RHEL 7 https://fastdl.mongodb.org/tools/db/mongodb-database-tools-rhel70-x86_64-100.7.3.rpm


locations
RHEL 8 https://fastdl.mongodb.org/tools/db/mongodb-database-tools-rhel80-x86_64-100.7.3.rpm

RHEL 9 https://fastdl.mongodb.org/tools/db/mongodb-database-tools-rhel90-x86_64-100.7.3.rpm

To install, run the following commands in the terminal:


rpm -ivh mongodb-database-tools-rhel70-x86_64-100.7.3.rpm

Installing the Amazon RDS for Oracle client utility


Amazon RDS for Oracle client utility recommended version is 21.11.0.0.0-1.el8.

Download ni stantceil nt-basci https:/download.oracle.com/otn_software/linux/instantclient/2111000/oracle-instantclient-basic-21.11.0.0.0-1.el8.x86_64.rpm


locations
n
i stantce
il nt-odbc https:/download.oracle.com/otn_software/linux/instantclient/2111000/oracle-instantclient-odbc-21.11.0.0.0-1.el8.x86_64.rpm

To install, run the following commands in the terminal:


1 c. yum install unixODBC

2 rpm -ivh oracle-instantclient-basic-21.10.0.0.0-1.el8.x86_64.rpm

3 d. rpm -ivh oracle-instantclient-odbc-21.10.0.0.0-1.el8.x86_64.rpm

Installing the EFS utility and configuring permissions


To install the EFS utility
1 Visit this page in AWS documentation:
https://docs.aws.amazon.com/efs/latest/ug/installing-amazon-efs-utils.html
2 Refer to the section: To build and install amazon-efs-utils as an RPM package
for Amazon Linux, Amazon Linux 2, and Linux distributions other than
OpenSUSE or SLES.
3 Install stunnel version 5.
4 Modify region from /etc/amazon/efs/efs-utils.conf to your RDS instance
region.

Configuring EFS and the restore mount path on AWS


You need to configure the Amazon Elastic File System (EFS) before you can perform
any backup or restore. For restore, you also need to configure the EFS mount path.
Managing and protecting cloud assets 61
Protecting PaaS assets

■ To configure EFS, see the following knowledge base article:


https://www.veritas.com/support/en_US/article.100059038
■ To configure the mount path for restore, see the following knowledge base
article:
https://www.veritas.com/support/en_US/article.100059039

Configuring AWS permissions for NetBackup


NetBackup required permissions to in AWS to perform backup and restore. To
configure the permissions, create an AWS IAM role and assign the permissions
required by NetBackup to the role. For more information on how to create an IAM
role, see this link in AWS documentation:
https://docs.aws.amazon.com/iam/index.html
Required permissions:

efsdescribemounttarget:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"elasticfilesystem:DescribeMountTargets",
"elasticfilesystem:DescribeFileSystems",
],
"Resource": [
"arn:aws:elasticfilesystem:*:*:access-point/*",
"arn:aws:elasticfilesystem:*:*:file-system/*"
]
}
]
}

rdsdescribeoptiongroup
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": "rds:DescribeOptionGroupOptions",
"Resource": "arn:aws:rds:*:*:og:*"
Managing and protecting cloud assets 62
Protecting PaaS assets

}
]
}

AmazonRDSReadOnlyAccess:(AWS Managed)
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"rds:Describe*",
"rds:ListTagsForResource",
"ec2:DescribeAccountAttributes",
"ec2:DescribeAvailabilityZones",
"ec2:DescribeInternetGateways",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSubnets",
"ec2:DescribeVpcAttribute",
"ec2:DescribeVpcs"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"cloudwatch:GetMetricStatistics",
"cloudwatch:ListMetrics",
"cloudwatch:GetMetricData",
"logs:DescribeLogStreams",
"logs:GetLogEvents",
"devops-guru:GetResourceCollection"
],
"Resource": "*"
},
{
"Action": [
"devops-guru:SearchInsights",
"devops-guru:ListAnomaliesForInsight"
],
"Effect": "Allow",
"Resource": "*",
"Condition": {
Managing and protecting cloud assets 63
Protecting PaaS assets

"ForAllValues:StringEquals": {
"devops-guru:ServiceNames": [
"RDS"
]
},
"Null": {
"devops-guru:ServiceNames": "false"
}
}
}
]
}

Configuring the storage server for instant access


Here is the required configuration for your storage server to support instance access.
1 Ensure that NFS and NGINX are installed.
2 The NGINX version must be the same as the one in the corresponding official
RHEL version release. Install it from the corresponding RHEL yum source
(EPEL).
3 Ensure that the policycoreutils and policycoreutils-python packages
are installed from the same RHEL yum source (RHEL server). Run the following
commands:
■ semanage port -a -t http_port_t -p tcp 10087

■ setsebool -P httpd_can_network_connect 1

4 Ensure that any mount points does not directly mount the /mnt folder on the
storage server. Mount the mount points to its subfolders only.
5 Enable the logrotate permission in selinux using the following command:
semanage permissive -a logrotate_t

Configuring storage for different deployments


This section describes how to configure storage for different NetBackup
deployments.
Managing and protecting cloud assets 64
Protecting PaaS assets

For MSDP cloud deployments


MSDP storage targets use the media servers. The native client utility must be
installed on the media server and the server must have connectivity to the PaaS
workload.
For MSDP cloud volume storage, NetBackup protects PaaS assets through the
Data Mover Container (DMC), using the universal share accelerator.
Universal share accelerator requires a minimal of 500GB of storage space, as
persistent storage to store the temporary metadata within the DMC. This storage
path must be same as the storage path that is used in the MSDP storage server.

For Kubernetes deployments


Consider the following:
■ Create the persistent volume claims using disk-based and delete-policy storage
classes, and attach to the container at the storage path.
■ It is recommended to use the default storage class with the default storage size
of 600 Gi storage. To change the storage class or storage size, then need to
update the pdconf config map of the Kubernetes deployment, as follows:

STORAGE_CLASS=<disk based storage class>


STORAGE_SIZE=<pv size>

For VM-based BYO deployments


Consider the following:
■ Mount a new disk with 600-GB storage in NetBackup Snapshot Manager, at the
path :/datamover_storage.
■ Each data mover container creates a directory at the mounted disk path, and
creates a symlink as the storage path. You can see this path in the data mover
container as the storage path. This path is the same as the MSDP storage path
for the temporary storage for universal share accelerator operation.
If you do not have sufficient storage space available on the deployment, you can
override the storage requirement. Do the following:
1. Navigate to:
/cloudpoint/openv/netbackup/vpfs_override_parameters.json

2. Update the CloudCacheSize parameter with the available storage size in GBs.

{
"DataTransferManagementOptions": {
Managing and protecting cloud assets 65
Protecting PaaS assets

"CloudCacheSize": 200
}
}

About incremental backup for PaaS workloads


NetBackup supports differential incremental backup for Azure SQL Server, Azure
SQL Managed Instance, and GCP SQL Server workloads. Incremental backups
reduce the backup window significantly in NetBackup. In this method, NetBackup,
backs up only the data that has been changed since the subsequent full backup.
Differential incremental backup is only supported for those workloads, where the
Change Data Capture feature on the Azure SQL Server, GCP SQL Server, and
Azure SQL Managed Instance are enabled.
Guidelines for working with incremental backups for PaaS workloads:
■ Assign a longer retention period to full backups than to incremental backups
within a policy. A complete restore requires the previous full backup plus all
subsequent incremental backups. It may not be possible to restore all the files
if the full backup expires before the incremental backups.
■ Use one storage for full and incremental backups.
■ Do not create long-term copy for incremental backups.
■ Do not expire random incremental backup images. Expiring them may cause
application inconsistency due to data loss. NetBackup relies on previous full
backup and all the subsequent incremental backups.
■ While duplicating, ensure that the full and the incremental backup copies are
duplicated to the target storage. Any of the previous full or incremental images
missing may result in data loss.
■ While importing, ensure that the full and all the incremental backup copies are
imported together. Any of the previous dependent full or incremental images
missing may result in failure.

Limitations and considerations


Consider the following when protecting cloud workloads.

For all databases


■ NetBackup deployments in Flex Appliance and Flex Scale do not support PaaS
workloads.
Managing and protecting cloud assets 66
Protecting PaaS assets

■ Supports only default the ports for all the databases across providers. Workload
instances configured with custom ports are not supported.
■ Database names containing the characters '#' and '/' are not supported for
backup and restore operations. Also, the database name should adhere to
naming conventions suggested by the cloud vendors.
■ ";" is not supported in server or database password.
■ Backup and restore of a database with non-7 bit ASCII characters are not
supported for a primary server running Windows, and having a media server
version prior to 10.1.1.
■ You can duplicate the PaaS backup image to a supported storage server. But
before you start a restore, you need to duplicate the image back to an MSDP
server with universal share enabled. See “Recovering duplicate images from
AdvancedDisk” on page 94.
■ With NetBackup 10.3, you can perform backup and restore of supported Azure
PaaS databases with Managed Identity based database authentication. This is
not supported for Azure Database for MariaDB server. This feature requires at
least one media server of version 10.2 or higher.
■ For authentication of Azure database, It is recommended to use User Assigned
managed identity to work across all media servers. A database user with a
system-assigned managed identity, which is associated with the media server
or vm-scale-set (AKS/EKS), does not work with any other media server or media
in any other vm-scale set (AKS/EKS).
■ Azure Managed Identity is not supported across subscriptions of different tenants.

For PostgreSQL
■ Restore of security privileges is not supported.
■ During restore you can use –no-owner and –no-privileges option. After restore,
the metadata captured at the time of backup are shown as owner/ACL in the
progress log restore activity on the web UI.
■ Restore does not fail if the owner or role does not exist on the destination.
■ Post restore, the database has the role associated according to the credentials
provided in NetBackup against the destination instance.
■ Users need to modify the ownership of databases post restore.
■ Backup and restore are not supported if the only SSL (Secure Sockets Layer)
connection is enforced at the server level for GCP PostgreSQL workload.
■ Azure Postgres database restore from single to flexible server or vice versa is
not supported because of the cloud provider limitations.
Managing and protecting cloud assets 67
Protecting PaaS assets

■ The following characters are not supported in the database name in the restore
workflow: `, @, \, [, ], !, #, %, ^, ., ,, &, *, (, ), <, >, ?, /, |, }, {, ~, :, ', ", ;, +, = and
-.
■ Uppercase username is not supported for new users added after PostgreSQL
server creation.

For AWS DynamoDB


■ Alternate restore for region and account is not supported.
■ Restore from imported images from a different primary server is only supported
using NetBackup REST API.

For AWS RDS SQL


■ Only Express and Web editions for AWS RDS SQL are supported.
■ For credential validation, IAM is not supported for AWS RDS SQL. You can use
the username and password method.
■ Only Amazon RDS data management type is supported. The data management
type RDS Custom is not supported for AWS RDS SQL instance editions.
■ Databases using Transparent Data Encryption (TDE) are backed up without
TDE, but using MSDP encryption. This allows for restoring your database in
more scenarios like loss of the TDE encryption key, cloud region outage, disaster
recovery to another cloud and so on.

For MySQL
■ Restore operation require superuser privileges if the dump file contains the
CREATE DEFINER statement for backups taken on version lower than 10.2.
■ Backup taken on version 10.3 or higher cannot be restored using version lower
than 10.2.
■ Backup and restore are not supported if the only SSL connection is enforced at
the server level for GCP MySQL workload.
■ You can restore MySQL database to an alternate instance with another MySQL
version than the backup instance, depending on MySQL's version compatibility.

For GCP SQL Server


■ Backup and restore of read-only databases are not supported.
■ Provider credentials are validated for full backup and restore and not as database
credentials.
■ Backup and restore of single-user-mode databases are not supported.
Managing and protecting cloud assets 68
Protecting PaaS assets

■ If one operation is in progress, the subsequent jobs wait in the queue. If the job
in progress takes time to complete, the jobs in the queue may get timed out,
and fail.

For incremental backups using GCP SQL Server


■ Incremental backups after any DML changes, might fail when a table is renamed
after CDC is enabled on the table. As a workaround, you must
manually modify any objects that reference the renamed table. For example, if
you rename a table that is referenced in a trigger, you must modify the trigger
to contain the new table name. Refer to this Azure documentation link to list
dependencies on the table before renaming it.
■ Backup and restore of databases having binary or image data are not supported.
Bulk insert on Cloud SQL Server requires sysadmin permission that GCP does
not allow.
■ While duplicating incremental backups on the different storage
servers, NetBackup generates different copy numbers for the same recovery
point. If you try to restore an incremental copy where no earlier full and other
incremental backups are present, the restore may fail.
■ If you have multiple media servers, the incremental backups can run only on
version 10.3 or later.
■ System databases and CDC schema are backed up and restored on the target
database.
■ You must the set the CDC retention period greater than the period used to
schedule incremental backup frequency.
■ Incremental backups for databases with multiple tables can take longer to backup
as CDC enablement for multiple tables takes longer time.
■ Incremental backups are not supported for database editions Web and Express.
■ Any attempts to enable CDC fail if a custom schema or a user named CDC
already exists in the database.
■ To ensure application consistency, NetBackup relies on previous full backup
and all the subsequent incremental backups. If a random backup image
is expired, it may cause application inconsistency due to data loss.
■ CDC requires SQL Server Standard or Enterprise editions. If a database is
attached or restored with the KEEP_CDC option to any edition other than
Standard or Enterprise backup fails. The error message 932 is displayed.
Managing and protecting cloud assets 69
Protecting PaaS assets

For Azure SQL and SQL Managed Instance


■ The Azure VM which is used as a media server, should be in the same Vnet as
that of an Azure-managed instance. Alternatively, if the media server and SQL
managed instance are in different Vnet, then both the Vnets must be peered to
access the database instance.
■ Backup fails when Readlock is placed on the database or resource group.
■ Backup is partially successful when Delete lock is placed on the database or
resource group. The tempdb stale entry does not get deleted from the Azure
cloud portal. You need to manually delete it.
■ To restore a database on an Azure SQL server or Azure Managed Instance,
you must assign AAD admin privilege on the target server. Before the restore,
do the following, as required:
■ The system or the user-managed identity of the media servers.
■ The vm-scale-set in which NetBackup media is deployed (in case of AKS
or EKS deployment).

For Azure SQL Server and SQL Managed Instance


incremental backup
■ You can enable Change Data Capture (CDC) only on databases tiers S3 and
above. Sub-core (Basic, S0, S1, S2) Azure SQL Server and SQL Managed
Instance databases are not supported for CDC.
■ You may encounter backup or restore issues for databases having encrypted
columns in the table. As a workaround, Microsoft suggests using Publish/Extract
commands to tackle this issue.
■ Restore may fail for a database having blob data in the table.
■ To duplicate incremental backups on different storage servers; NetBackup
generates different copy numbers for the same recovery point. If you try to
restore an incremental copy where no earlier reference of full and other
incremental backup is present, the restore fails.

Note: Incremental backup of Azure SQL Server can run only on NetBackup
media server version 10.2 and above. Incremental backup of Azure SQL
Managed Instance can run only on NetBackup media server version 10.3 and
above.

■ The user ID used for the cloud service must have permission to enable and
disable CDC. Without this permission, you can see errors such as follows:
Managing and protecting cloud assets 70
Protecting PaaS assets

3842: "Failed to enable CDC"


and
3844: "Failed to disable CDC"

■ Any attempt to enable CDC fails if a custom schema or a user with the name
cdc exists in the database. The term cdc is reserved for system use.

■ In a database with the CDC schema created before taking the first full backup,
the schema does not get backed up or restored.
■ If you restore to any edition other than Standard or Enterprise, the operation is
blocked because CDC requires SQL Server Standard or Enterprise editions.
Error message 932 is displayed.
■ Avoid backing up databases with BLOB data tables. If a table contains BLOB
data, then the backup might be successful, but the restore fails.
■ Encryption setting of an Azure SQL Server or Azure SQL Managed Instance
database may not be preserved (Is_encryption=0) during a restore.

For Azure Cosmos DB for MongoDB


■ Discovery, protection, and restore are not supported if the account is configured
using the vCore cluster.
■ Backup and restore are not supported if the account is configured with a
customize key.
■ NetBackup does not support Azure cosmos DB for MongoDB version 3.2.
■ Overwrite existing database option is not supported.
■ Rules for naming databases:
■ The length of the database names must be between 3 and 63 characters.
■ Database names support all characters except #, /, ?,&, <, >, =, }, $, {, ], [,
", ', ., \ .

For Azure Cosmos DB for NoSQL


■ Backup and restore are not supported if the account is configured with a
customize key.
■ Protection of Azure Cosmos DB for MongoDB version 3.2 is not supported.
■ Overwrite existing database option is not supported.
■ Rules for naming databases:
■ The length of the database names must be between 3 and 63 characters.
Managing and protecting cloud assets 71
Protecting PaaS assets

■ Database names support all characters except #, /, ?,&, <, >, =, }, $, {, ], [,


", ', ., \ .

For Amazon RDS for Oracle


■ Backup and restore are only supported for EFS-supported Oracle instances.
■ Standard and Enterprise Edition are supported.
■ Multi-tenant container databases and read replicas are not supported.
■ Backup and restore are not supported for TDE enabled RDS Oracle instances.
■ Only Amazon RDS data management type is supported. The data management
type RDS Custom is not supported.
■ Option group attached to RDS Oracle should have the same database engine
version and same database engine name.
■ Restore is supported using the EFS staging path only, including the manual
restore from the Instant access database tab.

For Amazon Redshift


■ Restores to alternate region or alternate account are not supported.
■ NetBackup protects the individual AWS Redshift cluster databases. Protection
of the entire AWS Redshfit cluster is not supported.
■ Only user databases are protected. System databases are not displayed or
protected.
■ Restore from imported images from a different primary server is supported only
using NetBackup REST API.
■ Only Redshift clusters are supported. Serverless Redshift is not supported.
■ All clusters whose databases you are taking backup must be in the available
state.
■ Table names having double quotes and case-sensitive names are not restored.
■ File count during restore may show one file less than the total number of backed
up files.
■ It is not recommended take backup of databases having empty tables.
■ NetBackup provides crash-consistent Redshift data protection. Consider the
type of activity and application requirements before taking backups to determine
if an application needs to checkpoint or quiesce for backup operations.
Managing and protecting cloud assets 72
Protecting PaaS assets

Discovering PaaS assets


NetBackup lets you discover, protect, and restore PaaS database assets. You can
also discover and restore Azure SQL database and Azure SQL managed database
assets backed up by Microsoft Azure. The supported backup modes are Point in
time backup and Long-term retention backup.

Note: If you have upgraded the NetBackup Snapshot Manager (previously


CloudPoint) from version 10.0 to 10.1. For all users with custom roles, the PaaS
assets are marked as deleted in the PaaS tab. The assets do not show any
recovery-point on them, instead new assets with same name are visible. The old
assets get removed from the PaaS tab after the subsequent scheduled asset cleanup
(default duration is 30 days). As a work-around for this problem, re-assign
permissions of all the new asset to the existing RBAC role or create a new custom
role. For more information, see NetBackup WebUI Administrator's Guide.

Note: If you change the Snapshot Manager cloud plug-in configuration from Azure
service principal to Azure managed identity, the status of the previously discovered
PaaS assets are displayed deleted. NetBackup Snapshot Manager removes the
deleted assets every 24 hours, if you want to perform backup or recovery before
the scheduled cleanup, contact Veritas Technical Support.

To discover PaaS assets:


1 Add a Snapshot Manager. See “Add a Snapshot Manager” on page 12.
2 Add Microsoft Azure, GCP, or AWS as a provider. See “Add a cloud provider
for a Snapshot Manager” on page 12.
3 Run a discovery. See “Discover assets on Snapshot Manager” on page 17.
After the discovery is complete, you can find all the discovered assets in the
PaaS tab, in the Cloud workload.
All discovered AWS RDS assets appear in the Applications tab. The RDS
instances support provider snapshot-based backups as well as NetBackup
managed backups.
NetBackup can manage and protect all the assets listed under the PaaS tab.
Additionally, Azure SQL database and Azure SQL Managed database assets
can also be backed up by Microsoft Azure.

Note: When you create and delete a PaaS asset with same name in intervals, and
if the PaaS asset is deleted after discovery, web UI shows old data until the next
periodic discovery runs.
Managing and protecting cloud assets 73
Protecting PaaS assets

Viewing PaaS assets


To view PaaS assets:
1 On the left, click Workloads > Cloud.
2 In the PaaS tab, the assets that are available to you are displayed. The RDS
assets are displayed in the Applications tab.
You can perform Add protection, Backup now, Manage credential operations
in the displayed assets.
For DynamoDB and Amazon Redshift assets the Manage credentials option
is not available.
For the deleted assets, you can only manage credentials.

Managing PaaS credentials


You can add credentials for a database listed in the PaaS and Applications tab
under Cloud workload. You can add, edit, or delete PaaS credentials from the
central Credential management console in NetBackup. Some workloads like
DynamoDB and Amazon Redshift do not support credential management through
NetBackup and leverage the provider credentials.

View the credential name that is applied to a database


You can view the named credential that is configured for the databases in the
Credential name column of the PaaS tab. If the credentials are not configured for
a particular asset, this field is blank.
To view the credentials for PaaS databases:
1 On the left, select Workloads > Cloud> PaaS tab.
2 Click Show or hide columns above the database list table.
3 Select Credential name to display the credential name column.

Add credentials to a database


You can add or modify credentials for a database listed in the PaaS tab.
To add or change credentials
1 On the left, click Workloads > Cloud.
In the PaaS tab, the assets that are available to you are displayed. The RDS
assets are displayed in the Applications tab.
2 Select the database in the table, then click Manage credentials.
Managing and protecting cloud assets 74
Protecting PaaS assets

3 Select a Validation host. The validation host must be a RHEL media server
having connectivity with the PaaS workload, or a NetBackup Snapshot Manager.
If you use a NetBackup Snapshot Manager, a datamover container is added
on the Snapshot Manager host.
You can add existing credentials or create new credentials for the database:
■ To select an exiting credential for the account, select the Select from
existing credentials option, select the required credential from the table
below, and click Next.
■ To add a new credential for the account, select Add credentials, and click
Next. Enter a Credential name, Tag, and Description for the new
credential. Under Service credentials:
■ Select Role based database authentication (Applicable for supported
database service) to use AWS IAM, Azure System Managed and User
Managed authentication.
■ Select IAM database authentication (Applicable for Amazon RDS
only) for Amazon RDS assets only, and specify a Database user
name.
See “Creating an IAM database username” on page 75.

Note: If the Snapshot manager is deployed in-cloud with an attached


IAM role having the required permission. You must also deploy the
media server in same cloud environment and attach the same IAM
role. Otherwise, the backup jobs for the AWS assets fail.

■ Select Azure System Managed Identity authentication or Azure


User Managed Identity authentication as required. Enter the
username of the database, and click Next.
To perform backup and restore operations utilizing managed identity
authentication, you must configure AAD admin to the source and
target database servers.
See “Creating a system or user managed identity username”
on page 77.

Note: If the snapshot manager deployed in cloud with an attached


Managed Identity having the required permissions, attach the same
identity to the media server. For AKS and EKS deployments attach
the same Managed identity to the VM scale set.
Managing and protecting cloud assets 75
Protecting PaaS assets

■ Select Password authentication and specify the username and the


password for the database server.
If you are using Azure Cosmos DB for NoSQL:
■ Username is the Account URI that you can find on Azure portal, at
Settings > Keys > URI.
■ Password is the Primary Key or Secondary Key that you can find
on the Azure portal, at Settings > Keys > PRIMARY KEY or
SECONDARY KEY.
■ Read keys can only take backup. It is recommended to use read-write
keys to restore databases.
If you are using Azure Cosmos DB for MongoDB:
■ Username is same as the account name that you can find on Azure
portal, at Settings > Connection Strings > USERNAME.
■ Password is the Primary Key or Secondary Key that you can find
on the Azure portal, at Settings > Keys > PRIMARY KEY or
SECONDARY KEY.
■ Read keys can only take backup. It is recommended to use read-write
keys to restore databases.
Click Next.

■ Add a role that you want to have access to the credential. To add new
permissions to a role:
■ Click Add.
■ Select a role.
■ Select the credential permissions that you want the role to have.
■ Click Save.

4 Click Next to finish creating the credential.


For more information about credentials and how to edit or delete a credential, see
NetBackup Web UI Administrator’s Guide.

Creating an IAM database username


To create an IAM username:
1 Enable IAM DB authentication on the RDS DB instance.
2 Create Database user using master login (rds_iam
■ For MySQL create the username using master login (rds_iam):
Managing and protecting cloud assets 76
Protecting PaaS assets

■ mysql --protocol=tcp --host=instance_fqdn --user=admin -p --port=3306


■ CREATE USER iamuser IDENTIFIED WITH AWSAuthenticationPlugin
as 'RDS';
■ GRANT SELECT, INSERT, UPDATE, DELETE, CREATE, DROP,
RELOAD, PROCESS, REFERENCES, INDEX, ALTER, SHOW
DATABASES, LOCK TABLES, CREATE VIEW, SHOW VIEW, CREATE
ROUTINE, ALTER ROUTINE, EVENT, TRIGGER ON *.*
'<db_user>'@'%';

■ For PostgreSQL create the user under server.


■ psql -h instance_fqdn -U postgres
■ CREATE USER iamuser WITH LOGIN;
■ GRANT rds_iam TO iamuser;
■ ALTER ROLE iamuser WITH LOGIN CREATEDB;
■ GRANT rds_superuser TO iamuser;

3 Attach the RDS policy to the IAM role attached to the NetBackup media server.
For more details, see AWS permissions required by NetBackup Snapshot Manager
section in the latest version of the NetBackup Snapshot Manager Install and Upgrade
Guide.

Configuring permissions for database user


For MySQL
Create a database user with master login and grant these permissions:
■ mysql --protocol=tcp --host=instance_fqdn --user=admin -p --port=3306
■ CREATE USER dbuser IDENTIFIED BY '<password>';
■ GRANT SELECT, INSERT, UPDATE, DELETE, CREATE, DROP, RELOAD,
PROCESS, REFERENCES, INDEX, ALTER, SHOW DATABASES, LOCK
TABLES, CREATE VIEW, SHOW VIEW, CREATE ROUTINE, ALTER ROUTINE,
EVENT, TRIGGER ON *.* TO `dbuser`@'%' WITH GRANT OPTION;
For PostgreSQL
Create a database user under server and grant the following permissions:
■ psql -h instance_fqdn -U postgres
■ CREATE USER dbuser WITH PASSWORD '<password>' CREATEDB;
■ (For AWS RDS PostgreSQL) GRANT rds_superuser TO dbuser;
Managing and protecting cloud assets 77
Protecting PaaS assets

■ (For AZURE PostgreSQL) GRANT azure_pg_admin TO dbuser;


■ (For GCP PostgreSQL) GRANT cloudsqlsuperuser TO dbuser;
For SQL Server
Create a database user under server and grant the following permission:
■ Create a login on the server:
CREATE LOGIN dbuser WITH PASSWORD='<password>'
■ Create a user for the database in the server:
■ CREATE USER [dbuser] FOR LOGIN [dbuser]
■ ALTER ROLE [db_owner] ADD MEMBER [dbuser]

Note: The database user must not be part of any database deny role. For example:
db_denydatareader and db_denydatawriter.

Creating a system or user managed identity username


For Azure SQL Server and Managed Instance
Do any of the following configurations:
Configure managed identity user as AAD admin:
■ Set AAD admin on the SQL server or the Managed instance.
■ Go to Settings > Azure Active Directory > Set admin. Search and set
system-assigned or user-assigned managed identity, and save.

Note: Only those media servers configured as system-assigned managed


identity as AAD admin can perform backup and restore.

Create managed identity user on the database using SSMS client:


■ To set AAD admin for SQL server to create user, go to Settings > Active Directory
admin > Set admin. Pick active directory the user, and save.
■ Login to the SQL database or Managed database to create user under that
database.

CREATE USER [<managed_identity>] FROM EXTERNAL PROVIDER;


ALTER ROLE db_owner ADD MEMBER [<managed_identity>];

■ Provide login permission for that user on the SQL Server, run
Managing and protecting cloud assets 78
Protecting PaaS assets

# CREATE USER [<managed_identity>] FROM EXTERNAL PROVIDER;


# ALTER ROLE loginmanager ADD MEMBER [<managed_identity>];

Note: You must create users for all media servers communicating with the
database using the system-assigned managed identity.

Note: To restore database, you must configure the managed identity user as
AAD admin on the target server.

For MySQL
■ To configure the AAD admin for MySQL server to create user, go to Settings >
Active Directory admin > Set admin. Pick the active directory user, and save.
■ Get the client ID for managed identity using Azure CLI, run

# az ad sp list --display-name <managed_identity> --query [*].appId


--out tsv

■ Generate access token to login, using Azure CLI, run:

# az account get-access-token --resource-type oss-rdbms

■ Login using the AAD admin user and access token, run:

# mysql -h <server name> --user <user name>


--enable-cleartext-plugin --password=<token>

■ Create the manage identity user and grant the permissions, run:

# SET aad_auth_validate_oids_in_tenant = OFF;


# CREATE AADUSER '<db_user>' IDENTIFIED BY
'<Generated_client_id>';
# GRANT USAGE, DROP, SELECT, CREATE, SHOW VIEW, EVENT, LOCK
TABLES , ALTER, CREATE VIEW, INSERT, REFERENCES, ALTER ROUTINE,
PROCESS ON *.* TO '<db_user>'@'%'

For PostgreSQL
■ To configure the AAD admin for PostgreSQL server to create user, go to Settings
> Active Directory admin > Set admin. Pick the active directory user, and save.
■ Get client ID for the managed identity:
Managing and protecting cloud assets 79
Protecting PaaS assets

# az ad sp list --display-name <managed_identity> --query


[*].appId --out tsv

■ Generate the access token required to login, run:

# az account get-access-token --resource-type oss-rdbms

■ Export the password for the generated token, run:

# export PGPASSWORD=<token>

■ Login using the AAD admin user and the access token, run:

# psql “host=<host name> port=5432 dbname=<dbname> user=<user


name> sslmode=require”

■ Create user and grant permission, run:

# SET aad_auth_validate_oids_in_tenant = OFF;


# CREATE ROLE <db_user> WITH LOGIN PASSWORD '<client_id>' IN ROLE azure_a
# GRANT azure_pg_admin TO <db_user>;
# ALTER USER smipguser CREATEDB;
# ALTER USER smipguser Replication;

Note: Only user managed identity is supported for MySQL Flexible Server. Managed
Identity support is not available for PostgreSQL Flexible Server.

For Azure Cosmos DB for NoSQL


1. Log on to your Azure portal.
2. To assign the Cosmos DB Built-in Data Contributor role to the managed
identity, run the command:
# az cosmosdb sql role assignment create -a <Account_Name> -g
<Resource_Group_Name> -s "/" -p <Object_ID/Principle_ID> -d
00000000-0000-0000-0000-000000000002

Where:
■ Account_Name is the Azure Cosmos account name.
■ Resource_Group_Name is the Resource group name of the account.
■ Object_ID/Principle_ID is the Managed identity object or principle ID.
Managing and protecting cloud assets 80
Protecting PaaS assets

■ 00000000-0000-0000-0000-000000000002 is the Cosmos DB Built-in


Data Contributor role ID.

Add protection to PaaS assets


After you discover the PaaS assets, you can add protection to them in the
Applications or PaaS tab in Cloud workload.
To add protection to PaaS assets
1 On the left, click Workloads > Cloud.
2 To protect AWS RDS supported database assets, click the Applications tab.
For other PaaS assets, click the PaaS tab.
3 Check if the asset that you want to protect has a credential.
See “View the credential name that is applied to a database” on page 73..
If the Credential name column is empty, you need to assign a credential to
the asset.
See “Add credentials to a database ” on page 73.
4 To add protection to an asset, select the asset and click Add protection.
An asset must have assigned credentials to be eligible for most operations.
For example, if you want to assign the asset to a protection plan or perform
backup now.
5 Select a protection plan and click Next.
6 Review the configuration settings and click Protect.

Perform backup now


Using this option you can create a one-time backup of the selected asset. This
backup does not affect any future, or scheduled backups.
Managing and protecting cloud assets 81
Protecting PaaS assets

To perform backup now


1 On the left, click Workloads > Cloud.
To backup AWS RDS supported database assets, click the Applications tab.
For other PaaS assets, click the PaaS tab.

Note: You can see and protect the user-created databases. The system
databases are not shown and protected, as these databases need the cloud
provider's superuser privilege to perform backup and restore.

2 Select the asset, then click Add protection.


3 Select the required protection plan, then click Start backup.
You can view the status of the backup job in the Activity monitor.
The database agents access the database from within the media server
(container, in case of NetBackup deployed in AKS and EKS environments),
and perform NFS mount of the Universal share path on the media server
(backup host).

Note: For incremental backup of Azure SQL databases, NetBackup performs a full
backup even if the asset is protected by a protection plan with backup type a
differential incremental.
Chapter 2
Recovering cloud assets
This chapter includes the following topics:

■ Recovering cloud assets

■ Perform rollback recovery of cloud assets

■ Recovering PaaS assets

Recovering cloud assets


You can restore AWS, Azure, Azure Stack and GCP VM assets from snapshot
copy, replica copy, backup copy, or duplicate copy.
While restoring VMs, NetBackup gives you the option to change certain parameters
of the original backup or snapshot copy. Including options like changing the VM
display name, changing power options of the VM, removing tag associations during
restore, and restoring to an alternate network. You can also restore VMs to an
alternate configuration, to a different zone, to a different subscription, and restore
VMs or disks to a different resource group.
■ For GCP: Select Firewall rule
■ For Azure: Select Network security group
■ For AWS: Select Security group

About the pre-recovery check for VMs


Pre-recovery check indicates how a restore may fail, before the restore is initiated.
The pre-recovery check verifies the following:
■ Usage of supported characters and the length in the display name.
■ Existence of destination network
■ Existence of selected Resource group for VMs and disks
Recovering cloud assets 83
Recovering cloud assets

■ Existence of source VM snapshot (applicable for restore from snapshot)


■ Existence of the staging location added in the file
/cloudpoint/azurestack.conf (applicable for restore from backup for Azure
stack)
■ Existence of a VM with the same display name.
■ Connectivity with the Snapshot Manager and cloud credential validation.
■ Validity of selected encryption keys.

Supported parameters for restoring cloud assets


The following table summarizes the different parameters that you can change while
restoring assets for different cloud providers.

Table 2-1 Supported parameters for Azure, Azure Stack, GCP, and AWS
snapshot and backup copies

Parameters Snapshot copy Backup copy

Azure Azure GCP Azure Azure GCP


Stack and Stack and
AWS AWS

Change VM Y Y Y Y Y Y
display name

Change power Y Y Y Y Y Y
state of the VM

Remove tag Y Y Y Y Y Y
associations

Restore to a Y Y Y Y Y Y
different
network

Subscription Y Y Y
ID

Change Y Y Y Y
resource
group

Change region Y Y Y
of the VM
Recovering cloud assets 84
Recovering cloud assets

Table 2-1 Supported parameters for Azure, Azure Stack, GCP, and AWS
snapshot and backup copies (continued)

Change Y Y
provider
configuration

Change Y Y Y Y
resource
group for
disks

Zone Y Y Y Y

Security Y Y Y Y Y Y
group/Firewall
rule/Network
security group

Edit disk Y Y Y Y
encryption

Recovering virtual machines


To recover a VM
1 On the left, click Workloads > Cloud.
2 Click the Virtual Machines tab.
All the discovered cloud assets for the respective category are displayed.
3 Double-click the protected asset that you want recover.
4 Click the Recovery points tab.
The available images are listed in rows with the backup timestamp for each
image. For AWS workloads you can see replica as well as backup images, if
available.
5 In the Copies column, click the copy that you want to recover. You can see
the backup, snapshot, and replica copy, if available. Click Recover. If you don't
select a copy to restore, the primary copy is selected.
6 Click Restore Virtual Machine.
7 In the Recovery target page, do the following:
If you restore a backup copy, modify the values of these parameters as required:
■ Configuration: To restore to an alternate configuration, select one from
the drop-down.
Recovering cloud assets 85
Recovering cloud assets

■ Region: To restore to an alternate region, select one from the drop-down.


■ Subscription: To restore to an alternate subscription, select one from the
drop-down. For Azure and Azure Stack only.
■ Resource group: To restore to an alternate resource group, click the search
icon, in the Select resource group dialog, select the required resource
group. For Azure and Azure Stack only.
■ Display name: To change the display name, enter the new one in the field.
The specified display name is validated during the pre-recovery check.

Note: Except in AWS workloads, the following special characters are not
allowed in the display name: ` ~ ! @ # $ % ^ & * ( ) = + _ [ ] { } \\ | ; : ' \" , <
> / ?."

If you restore a snapshot copy, specify only the Resource group and the
Display name.
During VM restore from snapshot or backup copy, encryption keys can be
selected from individual disks or all disks at the same time as follows:
■ Select the Volume and click Edit the encryption key option.
■ Select the required Encryption type.
■ Select the required encryption Key and click Save.

8 Click Next.
9 In the Recovery options page:
■ If you restore a backup copy, to restore to a different zone, select a Zone.
To select a network available in that zone, click the search icon near
Network configuration, and select a target network for recovery.
User can also select Security group / Network security group / Firewall
rule for AWS, Azure, and GCP cloud providers respectively.
■ (Only for GCP) If you restore a snapshot copy, to restore to a different
region, select a Region. To select a network available in that zone, click
the search icon in Network configuration, and select a target network for
recovery. The list shows networks available in that zone.
■ If you restore a snapshot copy, to restore to a different zone, select a Zone.
To select a network available in that zone, click the search icon in Network
configuration, and select a target network for recovery. The list shows
networks available in that zone.
User can also select Security group / Network security group / Firewall
rule for AWS, Azure, and GCP cloud providers respectively.
Recovering cloud assets 86
Recovering cloud assets

In the Advanced section:


■ To keep the VM powered on after recovery, select Power on after recovery.
■ To remove the tags associated with the asset at the time of backup or
creating snapshot, select Remove tag associations.

Note: If you do not select the Remove tag associations option, any tag
value for assets should not have spaces, before and after a comma. After
the restoration of an asset, the spaces before and after any comma in the
tag values are removed. For example, the value for the tag
name:created_on: Fri, 02-Apr-2021 07:54:59 PM , EDT, is converted to:
Fri,02-Apr-2021 07:54:59 PM,EDT. You can manually edit the tag values
to reinstate the spaces.

Note: Selection of None for zone means VM will not be placed in any zone
and selection of None for Network security group/Security group/Firewall
rule means that no security rules are applied to the restored VM.

10 Click Next. The pre-recovery check begins. This stage validates all the recovery
parameters and displays errors, if any. You can fix the errors before starting
the recovery.
11 Click Start recovery.
The Restore activity tab shows the job progress.
For information on the recovery status codes, see the NetBackup administrator or
the NetBackup Status Codes Reference Guide, available here:
http://www.veritas.com/docs/000003214

Recovering applications and volumes to its original


location
For GCP, when you restore a snapshot that was created before the upgrade, if the
source disk is not present, a default restored disk, pd-standard is created.
To recover applications and volumes to the original location
1 On the left, click Workloads > Cloud.
2 Click the Applications or Volumes tab.
All the discovered cloud assets for the respective category are displayed.
3 Double-click on the protected asset that you want recover.
Recovering cloud assets 87
Recovering cloud assets

4 Click the Recovery points tab. In the calendar view, click the date on which
the backup occurred.
The available images are listed in rows with the backup timestamp for each
image.
5 On the top right for the preferred recovery point, select Original location.
6 Click Start recovery.
7 On the left, click Activity monitor to view the job status.

Recovering applications and volumes to an alternate


location
Considerations
■ For encrypted VM restore in AWS to an alternate location, the key-pair names
must be same on the source and destination region. If not, create a new key-pair
in the destination region that is consistent with the key-pair in the source region.
To recover applications and volumes to alternate location
1 On the left, click Workloads > Cloud.
2 Click the Applications or Volumes tab.
All the discovered cloud assets for the respective category are displayed.
3 Double-click on the protected asset that you want recover.
4 Click the Recovery points tab. In the calendar view, click the date on which
the backup occurred.
The available images are listed in rows with the backup timestamp for each
image.
5 On the top right for the preferred recovery point, select Alternate location.
6 Select the location where you want to restore the cloud asset.
7 Click Start recovery.
8 On the left, click Activity monitor to view the job status.

Note: (Applicable for Azure cloud) Application restore to alternate location for ADE
enabled VM is not supported.

Recovery scenarios for GCP VMs with read-only volumes


The following table describes how NetBackup handles the restore/recovery of GCP
VMs that have read-only volumes.
Recovering cloud assets 88
Recovering cloud assets

Table 2-2 Recovery scenarios for read-only GCP VMs

Scenario Handling

Restoring a volume from the During restore, the disk is attached in the read/write
snapshot of an attached read-only mode to the original or alternate location.
disk, from the Volumes tab under
Cloud workload.

Restoring a VM, with a read-only During restore of such a VM to its original or alternate
disk, from a crash-consistent location, a read-only disk is restored in a read/write
snapshot, from the Virtual mode.
machines tab under Cloud
workloads.

Restoring a VM with a read-only You can attach a read-only disk to multiple VMs, but
disk, from an app-consistent NetBackup discovers it under only one VM.
snapshot, from the Virtual
For a Windows VM, the snapshot fails with a VSS error,
machine tab under Cloud
similar to the following:
workload.
Failure: flexsnap.GenericError: Failed to take
snapshot (error: Failed to create VSS snapshot of
the selected volumes.)"

For a Linux VM, the snapshot may or may not be


successful for the VM under which the disk is
discovered, but fails for the rest of the VMs due to the
missing dependencies. Error example:

linear_flow.Flow: create snapshot (test-win) of host


linux-1(len=4)' requires ['snap_google-
gcepd-us-west 2-b-7534340043 132122994'] but no
other entity produces said requirements\n
MissingDependencies

In the above case, if a snapshot is successful for a Linux


VM, a read-only disk is restored in a read/write mode.

(For GCP only) Restoring virtual machines and volumes


using the autoDelete disk support
When taking snapshot or backup from snapshot of source VM, additional information
about disks is saved. The autoDelete flag determines whether to delete the disk
when deleting the VM. Hence if new VM is created from snapshot or backup from
snapshot, then disks would be set as source VM.
For example,
Source VM:
Recovering cloud assets 89
Perform rollback recovery of cloud assets

Disk1: autoDelete is set to true (When source VM is deleted and autoDelete is


set to true then the disk is deleted automatically)
Disk2: autoDelete is set to false.
Restored VM:
Disk1_suffix: autoDelete is set to true.
Disk2_suffix: autoDelete is set to false.

Perform rollback recovery of cloud assets


The rollback recovery of a cloud asset overwrites the existing data on the original
asset. Unlike virtual machine restore, rollback restore does not create a new copy
of the restored image, but replaces the existing data on the source.

Note: Snapshot replicas do not support rollback. Also, Azure Stack and GCP
workloads does not support rollback restore.

To perform rollback recovery of the cloud asset


1 On the left, click Workloads > Cloud.
2 Click the Virtual Machines.
All the discovered cloud assets for the respective category are displayed.
3 Double-click on the protected asset you want to recover.
4 Click the Recovery points tab. The available images are listed in rows with
the backup timestamp for each image. In the Copies column, click the snapshot
that you want to recover. Click Recover> Rollback restore.
5 Click Start recovery. The existing data is overwritten.
6 On the left, click Activity monitor > Jobs to view the job status.

Recovering PaaS assets


PaaS assets are listed under the Cloud workload. You can restore Amazon RDS
assets from the Applications tab. All other PaaS assets are available for restore
from the PaaS tab. Recovery flows for Azure assets are different, based on whether
they are NetBackup protected or Azure protected.
In NetBackup 10.3 and later, you can separately restore the data or schema and
the metadata for the MySQL database. You need superuser privileges for the
metadata restore and at least one media server at version 10.2 or later.
Recovering cloud assets 90
Recovering PaaS assets

Note: For a MySQL restore, if you do not have admin or root user privileges, then
you must have the view permission, along with the restore permissions.

PaaS assets support instant access during recovery. Instant access enables faster
access to data and reduces overall recovery time.
Before performing instant access recovery ensure to add the key:
MEDIA_SERVER_POD_CIDR in the bp.conf file of the primary server. For NetBackup
deployed in the AKS or EKS environment, set its value to the subnets of the media
server pod, as comma-separated values. For example:
MEDIA_SERVER_POD_CIDR=10.0.0.0/8, 10.0.0.0/16

Note: While viewing PaaS restore jobs in the Activity monitor, the fields Bytes
transferred and Estimated bytes remaining, may not indicate correct information.
You can look at the number of Files written for the correct status, and the
NetBackup logs.

Recovering non-RDS PaaS assets


You can restore the non-RDS PaaS assets from the PaaS tab, under Cloud
workload.
To restore non-RDS PaaS assets:
1 On the left, click Workloads > Cloud and click the PaaS tab. Click the name
of the asset that you want to recover.
2 Click the Recovery points tab, for Azure assets, additionally select NetBackup
managed.
The available recovery points are displayed in the table.
3 Click Recover in the row of the image that you want to recover.
4 In the Name field, the original name of the asset appears by default. You can
change the name in the field. You may not be able to change this name later.
5 (Optional) In the Target instance field, the source instance of the asset is
selected by default. To restore to an alternate instance, select the required
instance. Target instance is not available for DynamoDB assets.
6 (Optional, for MySQL databases only.) Select Restore metadata to restore
metadata such as views, triggers, store procedures, and so on.
7 (Optional, for MySQL databases only.) For the target instance credentials for
restore:
Recovering cloud assets 91
Recovering PaaS assets

■ Select Use already associated credentials to use the credentials that are
already associated with the instance, and click Start recovery.
■ Select Use different credentials to use a different set of credentials, either
existing credentials or create a new one.
See “Add credentials to a database ” on page 73.
The validation host for validating these credentials must be the same as
the one used during backup. If the host used during backup is not available
during credential validation during restore, then validation fails.
(Optional) Select Make default credentials to set these credentials as
default credentials for the asset.

8 Click Start recovery.


The Restore activity tab shows you the status.

Recovering RDS-based PaaS asset


You can restore the RDS-based PaaS assets from the Applications tab, under
the Cloud workload.
To restore RDS-based PaaS assets:
1 On the left, click Workloads > Cloud and click the Applications tab. Click the
name of the asset that you want to recover.
2 Click the Recovery points tab, in the calendar, select the date for which you
want to see the recovery points.
The available recovery points are displayed on the right.
3 Click Recover in the row of the image that you want to recover.
4 Under Source databases, select the databases that you want to restore. Click
Add database, in the Add database dialog, select the required databases,
and click Select.
5 (For Amazon RDS for Oracle databases only) Enter the staging path in the
AWS Elastic file system field. Click Start recovery. The recovered database
appears in the Instant access databases tab. To complete the recovery of
the asset, see the Knowledge base article:
https://www.veritas.com/support/en_US/article.100058945
You can select a different EFS mount path to stage the restored data, than the
one used during the backup, you can also select an EFS at a different region.
For in-cloud deployments, it is recommended to have the EFS and the EC2
on which you want to restore, in the same region for better performance and
avoid network latency.
Recovering cloud assets 92
Recovering PaaS assets

6 Enter a prefix to add to the restored databases, or use the default. This field
must have a value.
7 (Optional) In the Target instance field, the source instance of the asset is
selected by default. To restore to an alternate instance, select the required
instance.
8 (Optional, for MySQL databases only.) Select Restore metadata to restore
metadata such as views, triggers, store procedures, and so on.
9 (Optional, for MySQL databases only.) For the target instance credentials for
restore:
■ Select Use already associated credentials to use the credentials that are
already associated with the instance, and click Start recovery.
■ Select Use different credentials to use a different set of credentials, either
existing credentials or create a new one.
See “Add credentials to a database ” on page 73.
(Optional) Select Make default credentials to set these credentials as
default credentials for the asset.
■ Select a validation host to validate the provided credentials.

10 Click Start recovery.


The Restore activity tab shows you the status.
These two restore workflows implicitly create an instant access mount share against
the recovery point.

Recovering Azure protected assets


NetBackup lets you restore Azure SQL database and Azure SQL managed database
assets that are backed up by Microsoft Azure. The supported backup modes are
Point in time backup and Long-term retention backup.

Note: Restoration in Elastic pool in Instance pool is not supported.

Before proceeding make sure that you have the required permissions to restore
PaaS assets.
To recover point in time backup assets:
1 On the left, click Workload > Cloud.
2 Click the PaaS tab.
All the discovered PaaS assets are displayed.
Recovering cloud assets 93
Recovering PaaS assets

3 Under Recovery points type, select Provider protected.


4 Click Restore in the row of the protected Azure SQL database and Azure SQL
managed database asset that you want to recover.
5 In the Recovery points tab, under Point in time backup, click Restore.
6 Select a date and time under Restore point (UTC). You can select any restore
point, between the earliest restore point, and the:
■ Latest backup time for online databases.
■ Database deletion time for deleted databases.
Microsoft Azure may round off the selected time to the nearest available
recovery point, using UTC time.
The default restore date and time displayed in web UI may differ based on the
selected PaaS asset. For example, for Azure SQL databases, the default
restore time is the current time, and for Azure SQL managed database, the
default restore time is 6 minutes earlier than the current time.
7 Optionally, for Azure SQL databases, enter a name for the restored database
in the Database name field. Database names cannot have special characters
like < > * % & : \ / and ? or control characters. Do not end the name with a
period or space. For more information about Azure resource naming rules, see
https://docs.microsoft.com/en-us/azure/azure-resource-manager
/management/resource-name-rules#microsoftsql
If you do not enter a name, NetBackup automatically assigns a name in the
<dbName>_<Restored time in UTC> format.
8 Optionally, for Azure SQL managed databases, enter the instance name in the
Managed instance field. By default, the instance name of the recovery point
is displayed. You can also search for the managed instance name using the
search option. You can restore to the same region to which your subscription
belongs.
If you cannot see the desired managed instance in the search results, perform
a manual discovery. Also, ensure that you have RBAC access to the managed
instance.
9 Click Next. Once the Pre-recovery check is complete, click Start recovery.
You can check the status of the job in the activity monitor.
To recover long-term retention backup assets:
1 On the left, click Workloads > Cloud.
2 Click the PaaS tab.
All the discovered PaaS assets are displayed.
Recovering cloud assets 94
Recovering PaaS assets

3 Click Restore in the row of the protected asset that you want recover.
4 In the Recovery points tab, under Long term retention backup, click Restore
against the image that you want to restore.
5 Optionally, for Azure SQL databases, enter a name for the restored database
in the Database name field. Database names cannot have special characters
like < > * %& : \ / and ? or control characters. Do not end the name with a period
or space. For more information about Azure resource naming rules, see
https://docs.microsoft.com/en-us/azure/azure-resource-manager
/management/resource-name-rules#microsoftsql
If you do not enter a name, NetBackup automatically assigns a name in the
restore_<dbName> format.
6 Optionally, for Azure SQL managed databases, enter the instance name in the
Managed instance field. By default, the instance name of the recovery point
is displayed. You can also search for the managed instance name using the
search option. You can restore to the same region to which your subscription
belongs.
7 Click Next. Once the Pre-recovery check is complete, click Start recovery.
You can check the status of the job in the activity monitor.

Note: Tags from portal as well as Snapshot Manager are not restored. However,
the "createdby: cloudpoint" tag is created while restoring through NetBackup.

Note: For provider protected recovery jobs, any intermittent failures keep the
recovery job running until the next schedule job cleanup runs.

Recovering duplicate images from AdvancedDisk


A 10.1 media server cannot initiate PaaS restores from a duplicated image, if the
image resides on an AdvancedDisk storage or an MSDP cloud storage. As a
workaround, you can perform the following steps:
Pre-requisite:
1. For AdvancedDisk the media server version associated with the MSDP server
must be 10.1 or above.
2. For MSDP cloud storage, media server version used for recovery must be
10.1.1.
3. Ensure that ushare is set up and configured on the MSDP server.
Recovering cloud assets 95
Recovering PaaS assets

4. Create a universal share on this MSDP storage server. Ensure that you add
the corresponding media server hostname/IP in the export list of ushare.
To recover from AdvancedDisk, do the following:
1 Using the Catalog in web UI, manually duplicate the image to an MSDP storage.
See NetBackup WebUI Administrator's Guide for details.

Note: To duplicate from a second copy, click search again after selecting
duplicate option in catalog view.

2 Once the duplication job completes, ensure that the new recovery point is
visible for the given asset in web UI.
To start a restore job, See “Recovering PaaS assets” on page 89.
To restore using REST API, see section:
recovery/workloads/cloud/scenarios/asset/recover. Refer to NetBackup API
documentation.

Note: For RDS instance recovery, NetBackup does not display any error or warning
messages, if you initiate the restore from a backup image residing on AdvancedDisk
storage.
Chapter 3
Performing granular
restore
This chapter includes the following topics:

■ About granular restore

■ Supported environment list

■ List of supported file systems

■ Before you begin

■ Limitations and considerations

■ Restoring files and folders from cloud virtual machines

■ Restoring volumes on cloud virtual machines

■ Performing steps after volume restore containing LVM

■ Troubleshooting

About granular restore


NetBackup enables you to perform a granular restore of files and folders on cloud
virtual machines. You can create snapshots, backup of snapshot and restore, at
the same time you can also locate and restore individual files and folders. You can
also restore volumes from virtual machines.
This process is known as granular restore in which each single file in the snapshot
or backup is considered as a granule or more commonly referred to as single file
restore. NetBackup makes an inventory of all the files within a snapshot or backup
using an indexing process. You can restore specific files from a snapshot only if
Performing granular restore 97
Supported environment list

that snapshot has been indexed by NetBackup. You can also restore specific files
from a backup only if that backup has been indexed by NetBackup.
The following table helps you understand the flow of enabling granular restore of
volumes, files, and folders:

Table 3-1 Granular restore tasks

Task Description

Connect virtual machines Connect the virtual machines that you want
to use to perform granular restore.

Discover assets on virtual machine Use the Discover option.

Navigate to Cloud > Snapshot Managers >


Snapshot Manager > Actions > Discover.

Create protection plan Create a protection plan.

Ensure that the Enable granular recovery


for files or folders check box is selected in
the Backup options of the protection plan.

Subscribe discovered assets to the protection Add the assets on the VMs connected in the
plan previous step to the protection plan that has
the indexable attribute enabled granular
restore.

Execute protection plan Schedule backup job and indexing or use the
Backup now option. The backup job starts
immediately.

■ Restore file or folder Perform granular restore of a file, folder, or


■ Restore volumes volume.

Note: Restore volumes is not supported for


backup copy.

Supported environment list


The following table lists the supported versions.

Table 3-2 Supported versions

Application Version

NetBackup 10.3
Performing granular restore 98
List of supported file systems

Table 3-2 Supported versions (continued)

Application Version

NetBackup backup host OS RHEL 7.x and 8.8

Snapshot Manager host OS ■ RHEL 7.x and later, RHEL 8.6


■ Ubuntu 18.04 LTS and 20.04 LTS
Note: The version of the OS (Ubuntu
20.04 LTS) listed on the UI is the version
of the container.

Cloud providers ■ Amazon Web Services


■ Microsoft Azure
■ Microsoft Azure Stack Hub
■ Google Cloud Platform

Snapshot Manager or agent instance type ■ Amazon AWS: t2.large/t3.large


■ Microsoft Azure: D2s_V3Standard
■ Microsoft Azure Stack Hub: DS2_v2
Standard, DS3_v2 Standard
■ Google Cloud Platform: n1.Standard2 and
larger

Snapshot Manager agent host to be protected ■ Linux OS: RHEL 7.x and RHEL 8.8
■ Windows OS Version: 2012 R2, 2016,
2019 and 2022

List of supported file systems


The following table provides details about supported files systems.

Platform Discovered file system Partition layouts

RHEL (With consistent ■ ext3 ■ GPT


snapshot property) ■ ext4 ■ MBR
Note: For Google cloud ■ xfs ■ No layout (direct FS)
platform, if agent host is on
operating system version
RHEL 8.x, then Snapshot
Manager must be installed on
host having operating system
version RHEL 8.x.
Performing granular restore 99
Before you begin

Platform Discovered file system Partition layouts

Windows (With consistent NTFS ■ GPT


snapshot property) ■ MBR

Note: Application consistent snapshot is not supported for ext2 file system version.

Note: GRT is allowed irrespective of destination file-system/partition type (FAT,


ReFS, LDM or LVM).

Before you begin


Ensure the following points are addressed before you perform granular restore.
Configured Snapshot Manager and VM to be protected with granular restore enabled
have the following requirements:
■ The following requirements apply to snapshots:
■ (Microsoft Azure and Azure Stack Hub) Even if Snapshot Manager is not
deployed in the same subscription and region as the connected VM, but if
a backup schedule is configured as part of the protection plan, then granular
restore can be performed. For snapshot-only protection plan schedule, for
both Azure and Azure Stack Hub, you need to deploy the Snapshot Manager
host in the same subscription and region as the VMs.
■ Amazon AWS: The Snapshot Manager host and the connected VM must be
in the same account and region.
■ The cloud plug-in must be configured to protect the assets in the region in
which the Snapshot Manager host is deployed.

■ The host must be in a connected state and must have required supported
configuration.
■ The host must have the fsConsistent and indexable flags enabled when
connected. The indexable flag is applicable for a snapshot-only protection plan
schedule.
■ Protection plan must have the Enable Granular restore for files and folders
check box enabled.
■ Apart from the boot disk and disk that is mounted on /cloudpoint, no extra
disk must be attached to Snapshot Manager instance explicitly.
■ File systems on the host must be supported.
See “List of supported file systems” on page 98.
Performing granular restore 100
Before you begin

■ Configure port 5671 and 443 for open Snapshot Manager host.
■ For agentless restore, in Linux systems, configure the port 22 on the indexable
virtual machines. For Windows platform, configure the ports 135, 445 and the
dynamic or fixed WMI-IN port on the indexable virtual machines.
■ Ensure that the following points are addressed before you perform the single
file restore from a snapshot backup:
■ You have NetBackup and Snapshot Manager version 10.2 or later.
■ A granular restore is successful only if the backup image is restored from
MSDP storage server (10.3 or later), with instant access enabled.
■ On the Windows target host, the administrator must have the attach and
detach policy enabled for the disks. For more information, refer to the
AttachVirtualDisk function.
■ (For Windows) To restore symlink, the agent must be configured using the
required access. For this, add administrator user in Create symbolic links
policy under Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment.

■ The backup must be taken with the Granular File and Restore option
selected.
■ The target virtual machine must have access to the MSDP storage server
over NFS/SMB.
■ The Windows target must meet the following requirements:
■ (For restoring Windows image content with Restoring Access Control
list) The Samba user credentials must be stored in the Windows credential
manager for an MSDP storage server. This server is the one that exports
the instant access share.
On the MSDP server, run the following command to generate the Samba
credentials.
smbpasswd -a <username>
Add the DNS name or the IP address of the MSDP server. Provide the
username from the previous step and the password that was generated
in the Windows credential manager.
The smbpasswd command fails if the username is not present on the
MSDP server. You must first add user with the command useradd
<username> command.

■ (For restoring Linux image content) The NFS client is installed.


For more information on how to enable SMB/IA on MSDP, refer to the
NetBackup Deduplication Guide.
Performing granular restore 101
Limitations and considerations

Verify the SMB configuration on the MSDP server with the following precheck
script:
/usr/openv/pdde/vpfs/bin/ia_byo_precheck.sh

Limitations and considerations


The following limitations considerations exist for granular restore:
■ If adequate space is not available on the target location, the restore operation
fails before the copy operation begins.
■ The following devices are ignored when snapshots are performed or indexed.
■ Ephemeral storage devices
(For example, Amazon AWS instance store volumes and Microsoft Azure
temporary disks.) These devices are also ignored for indexing as well.
■ File systems that are created on LDM disk
These files systems are ignored for host consistent snapshots.

■ Until old agent (pre-installed) service is not restarted, alternate host restore
(GRT and application) of LVM asset might fail. To support the recovery of LVM
assets, you need to restart the older agents.
■ Granular restore (GRT) or single file restore (SFR) can be performed with the
help of VxMS indexing. VxMS indexing is applicable for all Snapshot Manager
supported file systems. VxMS indexing can be performed for Azure, Azure Stack,
AWS cloud and GCP.
■ Host consistent snapshot is supported for EXT2 file system only if it is mounted
as read-only.
■ If any unsupported file systems are present on the host, the host can be added
to the protection plan that is created for granular restore. The protection plans
for granular restore have the Enable granular recovery for files or folders
check box value set to true.
■ During indexing, OS errors can occur while crawling files, directories, or other
entries. These errors are ignored and the indexing operation continues. To
restore the missing files, you must initiate the granular restore operations on
the parent folder.
■ When you create or mount a disk from the Windows VM, add the drive letter.
This action ensures that the indexing operation can capture the correct drive
letter.
■ In some cases a mount point is not visible when you browse for files or folders
from the recovery point. Consider the following reasons:
Performing granular restore 102
Limitations and considerations

■ The "/" (root file system) is on an LVM, and


■ The mount point is not directly related to "/" (root file system).
In this scenario, search for the mount point from the right panel and then restore
the files or folders successfully.
Consider the following example. A disk is mounted on /mnt1/mnt2 where /mnt1
is any directory on the "/". (The root file system that is on the LVM setup.) mnt2
is a mount point inside mnt1. mnt2 is not visible in the tree on the left panel.
However, you can search and restore files or folders inside the mount point.
■ To restore files and folders from VM snapshot recovery points, the /etc/fstab
file on the Linux servers must have the entries based on the file system UUID,
instead of device paths. The device paths can change depending on the order
in which Linux discovers the devices during system boot.
■ While restoring application or file systems from one OS version to another OS
version, refer to the OS and application vendor’s compatibility matrix. Restore
of file system from higher version to lower version is not recommended.
■ A user group cannot restore a drive as source to an alternate folder as the
destination. A user group does not have the writer permission to create a new
folder.
■ The agentless connection cannot restore the encrypted file by Windows (or
EFS) through a granular file-level restore (Restore files and folder option).
However, you can restore the file through a volume-level restore and then decrypt
the file.
■ Files that are stored on volume that is mounted on a folder (junction point) can
be restored only if the underlying disk has the GPT partition layout. If the volume
is mounted using a drive letter, then the files can be restored irrespective of the
partition layout of the underlying disk.

Limitations for single file restore from a backup copy


■ When you restore files or folders and source host is Linux and the target host
is Windows, the following points apply:
■ File attributes cannot be restored on a Windows host and only the content
of the file is restored.
■ If there is any symlink in the files or folders that are selected for restore, the
symlink is not restored.
■ For a restore to the original location, the check for available size is skipped
before the copy operation.
Performing granular restore 103
Restoring files and folders from cloud virtual machines

■ If restoring files or folders when the source host is Linux and the target host is
Linux, then the socket and the block files are not restored.
■ A restore of files and folders is not supported when they reside on any LDM
disks, dynamic disks, or storage spaces.
■ If the media server or the PureDisk Deduplication Engine and Veritas Provisioning
file system daemon service restarts, the live mount that is retained during a
partially successful restore is removed or expired before the retention period
expiration date.
■ If any media servers are not upgraded to 10.3, then the primary server on version
10.3 is used to connect to NetBackup Snapshot Manager.
■ The junction point on Windows after indexing uses the following format:
Volume {4e3f8396-490a-400a-8abf-5579cafd4c0f}
To restore a junction point for single file restore from backup operation, select
Restore everything to a different location and in the Advanced options enable
Require to restore access control list.

Operational notes for the Activity monitor


The following behaviors exist for the Activity monitor:
■ After a restore job is completed, you cannot expand the directories in the File
List section of the restore job.
■ In the Activity monitor summary, when the restore job starts it shows the current
file which is the first entry in the restore items. After the job is complete, the
summary no longer displays.
■ Bytes transferred and estimated bytes are not updated and are shown as 0.

Restoring files and folders from cloud virtual


machines
You can restore a single file or folder from a cloud virtual machine.

Note: For Microsoft Azure, Google Cloud Platform, and Amazon AWS NetBackup
supports snapshot and recovery of cloud assets that are encrypted using the keys
that the manager provides.

To restore a file or folder


1 On the left, click Workloads > Cloud.
2 Click on the Virtual machines tab.
Performing granular restore 104
Restoring files and folders from cloud virtual machines

3 Select the virtual machine where the application is hosted. On the top right,
click Connect.
4 After the VM is connected, on the top right, click Add protection.
5 Select a protection plan that is created for granular recovery of files and folders
and click Next.
6 Click Protect.
7 To execute the protection plan, click Backup now.
8 After a snapshot and the two indexing job or two backup from snapshot job for
the assets are complete, click the Recovery points tab.
9 For the preferred recovery point, select Restore files and folders from the
Action menu.
You can also restore files and folders for Snapshot and Backup type of copies
by clicking on Recover and then selecting Restore files and folders for specific
type of copy.
10 In the Add file step, click Add.
11 In the Add files and folders dialog box, select the files you want to restore
and click Add.
You can click the folders or drives on the left to expand and view the files in a
particular folder. You can search files based on their names or extensions.
12 Click Next.
13 In the Recovery target step, perform the following:
Performing granular restore 105
Restoring files and folders from cloud virtual machines

Dialog box Snapshot copy Backup copy

Restore to Target VM - Select ■ Cloud provider - Select cloud


a VM. A list with all provider to where single file restore
connected VMs is to be performed.
having same ■ Configuration - To restore to an
operating systems alternate configuration, select one
as original target from the drop-down.
host is displayed. If ■ Region - To restore to an alternate
you do not select a region, select one from the
VM, the files are drop-down.
restored to the ■ (For Azure and Azure Stack only)
original VM. Subscription - To restore to an
alternate subscription, select one
from the drop-down.
■ Target VM - Select a VM. A list with
all connected/disconnected and
Linux/Windows VMs are displayed
for cross platform restore.

Restore target options ■ Restore everything to original location


■ Restore everything to a different location
You must then provide a directory location. You can also
enter a UNC path to the location.

Restoring files and folders across cloud provider is supported using granular
restore from backup copy. Source VM and target VM can be part of different
cloud providers to perform granular restore.
Cross platform restore is supported for the following scenarios:
■ NetBackup and Snapshot Manager on one cloud, target host on another
cloud.
■ NetBackup and Snapshot Manager on one cloud, another Snapshot
Manager and target host on another cloud.
■ NetBackup and Snapshot Manager on one cloud, AIR (Auto Image
Replication) restore on another domain.

14 If Restore everything to original location option is selected, then click Next


and select the following preferred option in the Recovery options step:
Performing granular restore 106
Restoring files and folders from cloud virtual machines

Dialog box Snapshot copy Backup copy

Options ■ Append string to file names


In the String field, enter the string that you want use to
append. The string is appended before the last extension
of a file.
■ Allow overwrite of existing files
You must have appropriate permissions.

Advanced options N/A ■ (Applicable only for Windows to


Windows restore) Require to
restore access control list -
Select the checkbox to restore
access control list which requires
additional operations.
■ Target host NAT gateway IP
address - Enter network address
translation gateway IP address, in
case the target VM is behind a
network gateway and is not directly
accessible.
Note: Only private IP or hostname
allowed.

15 If Restore everything to a different location option is selected, then provide


the Directory for restore and click Next.
16 In the Review step, view the selected options and click Start Recovery.
The restore job for the selected files is triggered. You can view the job details on
the Activity monitor. After the job is successful, you can see summary of restored
files in the job details.

Note: Permission on files are assigned based on uid/guid, during restore to


non-similar environments (where user/groups does not match). Restored files/folders
must have permission to non-intended users/groups on target host. Hence after
successful restore of required files, user must modify the access as per requirement.

Note the following:


When restoring hardlinks for single file restore from Snapshot or Backup (source
Linux VM to target Linux VM), ensure that you follow the following guidelines:
Performing granular restore 107
Restoring volumes on cloud virtual machines

■ When selecting folders and files in Add files and folders dialog box, do not
select redundant entries. For example, selecting a folder and a file that exists
in the same folder, since the folder already has that file.
■ Even if redundant entries are selected, ensure that you do not select the Allow
overwrite of existing files option in Recovery option step. This will result in
failure of copying the hardlink file.

Restoring volumes on cloud virtual machines


You can restore one or more volumes on a virtual machine.
To restore a volume
1 On the left, click Workloads > Cloud.
2 Click on the Virtual machines tab.
3 Select the virtual machine where the application is hosted.
4 After the VM is connected, on the top right, click Add protection.
5 Select a protection plan and click Next.
6 Click Protect.
7 To execute the protection plan, click Backup now.
8 To view the recovery points, click the Recovery points tab.
9 On the top right for the preferred recovery point, select Restore volumes.
You can also apply date filters to search across the recovery points.
10 In the Restore volumes dialog box, select one or more volumes.
11 From the Target VM list, select the VM on which you want to restore the
volumes.
In case of restore from a replicated (non-primary) VM, the restore to original
location is not supported. If you do not select a VM, the files are restored to
the original VM.
12 Click Restore.
The restore job for the selected volumes is triggered. You can view the job
details on the Activity monitor.

Note: If you want to restore volume to the same virtual machine and location, you
must detach existing volume and free the slot and then try to restore.
Performing granular restore 108
Performing steps after volume restore containing LVM

Performing steps after volume restore containing


LVM
You can perform steps after volume restore for the LVM volumes.

Note: SFR (Single File Restore) or GRT (Granule Restore) and application restore
is performed through the installed agents. But for volume recovery, it is necessary
to make the associated file systems online after successful recovery.

To perform steps after volume restore


1 Run the command to see all newly attached post volumes on to the host.PVS
If there are duplicate PVs (a warning is displayed on the above command) then
run,
vgimportclone --import /dev/<Device1> /dev/<Device2> ...
--basevgname <NewVGName>

Else, find out the newly created Volume Groups (VG) on the host. If new VGs
are not displayed then import the VG using the following command. It will
discover new VG as <NewVGName>
vgimport -a

vgs

2 Run below command to list all the logical volumes (new and old)
lvs <NewVGName>

3 Activate all the LVs belonging to <NewVGName> as,


lvchange --activate y /dev/mapper/<NewVGName>-<LVName1>

lvchange --activate y /dev/mapper/<NewVGName>-<LVName2>

lvchange --activate y /dev/mapper/<NewVGName>-<LVNameN>


Performing granular restore 109
Performing steps after volume restore containing LVM

4 Identify the UUID and file system of an authenticate and newly activated LV.
blkid -p /dev/mapper/<NewVGName>-<LVName1>

Output: /dev/mapper/<NewVGName>-<LVName1>:
UUID="2a4bdc14-b5eb-4ee6-b876-ebdcb66c55d9"
BLOCK_SIZE="4096"TYPE="xfs" USAGE="filesystem"

blkid -p /dev/mapper/<OldVGName>-<LVName1>

Output: /dev/mapper/<OldVGName>-<LVName1>:
UUID="2a4bdc14-b5eb-4ee6-b876-ebdcb66c55d9"
BLOCK_SIZE="4096"TYPE="xfs" USAGE="filesystem"

5 If the UUID is the same, then you need to change it as follows

File System Steps

xfs mkdir <NewMountPoint>

mount -o nouuid /dev/mapper/<NewVGName>-<LVName1>


<NewMountPoint>

umount <NewMountPoint>

xfs_admin -U generate
/dev/mapper/<NewVGName>-<LVName1>

mount /dev/mapper/<NewVGName>-<LVName1>
<NewMountPoint>

ext2 / ext3/ ext4 mkdir<NewMountPoint>

tune2fs -U random
/dev/mapper/<NewVGName>-<LVName1>

mount /dev/mapper/<NewVGName>-<LVName1>
<NewMountPoint>

6 If the UUID is different, then run the following command.


mount /dev/mapper/<NewVGName>-<LVName1> <NewMountPoint>
Performing granular restore 110
Troubleshooting

Troubleshooting
Troubleshooting snapshot restore process for Microsoft
Azure cloud
When you start a subsequent (twice) restore operation on the same VM, an error
occurs during restore operation. This error causes the following issues:
■ The tags from original OS disk are not copied to newly created restored OS
disk.
■ User logon might fail after the VM restore due to SSH failure.
Workaround:
Check if the SSH daemon is running on the system. If not, then perform the steps
in the following article.
learn.microsoft.com/en-us/troubleshoot/azure/virtual-machines/troubleshoot-ssh-connection

Filtering unsupported files and folders


If you try to restore files or folders from a partition or a file system that Snapshot
Manager does not support, then you get the following error in the restore job.
Error nbcs (pid=<processs id>) Failed to restore file(s) and folder(s)
from snapshot for asset <asset name>

Workaround:
You can filter any files or folders that Snapshot Manager does not support. In the
bp.conf file on the primary server, enable the CP DISKMAP check by setting the
following flag.
CP_DISKMAP_CHECK = true/yes

Backup from restore operation is partially successful


Backup from restore operation is partially successful when disk is full on the selected
target directory. Following messages are displayed:

Dec 29, 2022 2:57:51 PM - Info nbcs (pid=2244) Granular restore(SFR) is completed
Dec 29, 2022 2:57:51 PM - Info nbcs (pid=2244) Summary of SFR Operation - Success
files/folders count: 0 ,
Failed files/folders count: 1 , Warning files/folders
count: 0, Skipped files/folders count: 0
Dec 29, 2022 2:57:51 PM - Info nbcs (pid=2244)
Detailed restore summary report is available on recovery target host at location:
/var/log/flexsnap/restore/granular-restore-09b4d44d
.
Performing granular restore 111
Troubleshooting

.
Dec 29, 2022 2:57:51 PM - Warning bprd (pid=1977) Granular Restore from backup
completed with error.
Copy the files manually from live access mount:

ip-10-239-185-241:/mnt/vpfs_shares/vmfiles/8fcc/8fcc132b-a202-49a8-b654-81ff242a718a/livemount

Dec 29, 2022 2:57:51 PM - end Restore; elapsed time 0:01:51


the requested operation was partially successful(1)

For a backup from restore if live mount is created successfully then even though if
other errors are reported apart from ASSET_NOT_FOUND, it is considered as
partial success. If no network devices or a file system are mounted on the target
location and disk is full the following messages display in the job details:

Jan 02, 2023 12:11:16 AM - Error nbcs (pid=13934)


187776K space required for file/folder restore while 20K is total available space on
/disk1

In this case other network devices or the file system must have been mounted on
the target path, hence Snapshot Manager agent considers the free space on device
or file system. But after it tries to copy the file it fails with space error logged into
summary report. For example:

/var/log/flexsnap/restore/granular-restore-09b4d44d in above Job details log

Workaround:
■ Check the summary report on target host location. For example,

/var/log/flexsnap/restore/granular-restore-09b4d44d
[root@ip-10-239-187-148 granular-restore-09b4d44d]# cat root-error.log
Dec 29 09:27:44: ERROR - FILE: /disk1/dl380g9-149-vm15_package.zip
[Error 28] IOError: No space left on device

■ If the file copy operation failed due to disk space, then create some space and
copy the file from live mount.
The live mount path details can be found in the job details as follows:

Dec 29, 2022 2:57:51 PM - Warning bprd (pid=1977) Granular Restore from backup completed
with error.
Copy the files manually from live access mount:
ip-10-239-185-241:/mnt/vpfs_shares/vmfiles/8fcc/8fcc132b-a202-49a8-b654-81ff242a718a/livemount
Performing granular restore 112
Troubleshooting

Partial recovery is observed when user selects a


disconnected target virtual machine
Partial recovery may be due to the following reasons:
■ If the target virtual machine is disconnected (no connectivity through agent).
■ If any failure is seen during the copy of files or folders on target virtual machine.
■ When a Windows virtual machine content is restored on Linux target virtual
machine.
In these partial recovery cases, the created instant access is not deleted and is
available for the next 24 hours.
The instance access retention interval can be configured with in the
CLOUD_VM_IA_RETENTION_INTERVAL_IN_HOURS key in bp.conf file. (Default
value is 24 hours.)
Workaround:
User can perform manual steps to access the instant access share on target host
and then manfully copy the required files or folders.
(Copy files over NFS) To restore Linux image content on Linux host:
■ To mount an NFS share on a Linux system, install the NFS client package using
the following command:
$ sudo yum install nfs-utils

■ Using the following mount command, mount the Instant access on target Linux
host:

# Create a directory say /mnt/restore

$ mkdir -p /mnt/restore

# Mount the instant access

$ mount -t nfs <InstantAccessServer:InstantAccessPath> /mnt/restore

■ Instant access path can be retrieved from activity manager logs which is in the
following format:
<InstantAccessServer>:/mnt/vpfs_shares/vmfiles/<id>/<InstantAccessId>/livemount

(SMB access) To restore Windows image contents (with ACL) on Windows


target host:
■ SMB credentials of MSDP storage server of source virtual machine image must
be added to the Windows credential manager.
Performing granular restore 113
Troubleshooting

■ Use the given live mount to access virtual hard disks by navigating to Activity
Monitor > Job details.
The virtual hard disks are listed under the folder with vhd_ as the prefix.
■ From the Action tab, attach the required virtual hard disk and click on OK.
■ Select Assign the following drive letter option to assign the letter to virtual
disk to browse data and click on OK.
■ Navigate to the assigned drive in the previous step and copy the data manually.
(Live mount) To restore windows image contents on Linux target host:
■ Linux must have the CIFS package. Obtain the packages using the # yum
install cifs-utils command.

■ Create the mount directory using the # mkdir <my_mount_dir> command.


■ Use Samba username and password to mount the exported path as follows:
mount -t cifs -o username=<sambauser>
//<InstantAccessServer>/<InstantAccessPath> <my_mount_dir>

■ Copy the files using the following command:


# cp <my_mount_dir>/<file_path> <target_dir_path>

Issues with single file restore from backup of snapshot


Issue/Error Description Workaround

Log path to check For information related to restore details on target To resolve the failures or any exceptions
host, check the following logs: that occurred during the single file restore
on Snapshot Manager, refer to the following
■ path/file:
logs on the Snapshot Manager host:
/tmp/flexsnap-agentless-onhost.log
■ /var/log/flexsnap/restore/granular-restore-* /cloudpoint/logs/flexsnap.log

Pre-recovery check When restoring files and folders to disconnected Ensure that the target virtual machine is in
fails target virtual machine, the pre-recovery check fails connected state with agent configured for
with the following error: successful restore.

Target VM state: Target VM <vm_name>


has no agent configured

If recovery is started, the restore operation is


partially successful.
Performing granular restore 114
Troubleshooting

Issue/Error Description Workaround

Partial recovery for If you do not install the NFS client on the Windows Install the NFS client on the Window target
source Linux VM to target computer, a restore of files and folders from computer before you perform the restore
target Windows VM a source Linux VM is partially successful. The from a Linux VM to a Windows VM.
(no NFS client) following error displays:

Error nbcs (pid=42513) Invalid


operation for asset: <asset_id>
Warning bprd (pid=42045) Granular
Restore from backup completed with
error. Copy the files manually from
live access mount: <livemount_path>.
Note that live access mount is
available only for 24 hrs.

Restore job fails for Restore job fails with the following error when Select a different target VM.
deleted target VM restoring files and folders on target VM which is
deleted from cloud environment:

Error nbcs (pid=44859) Target VM not


found, asset_id <asset_id>

Create instant If instant access is not enabled on MSDP storage Verify if instant access is supported on the
access fails server, creation of the instant access fails during MSDP media server. Run the following
the restore job. pre-check script:

/usr/openv/pdde/vpfs/bin/ia_byo_precheck.sh

Target VM does not If the number of volumes that contain the selected Select a smaller number of volumes for the
have the free drives files are more than the number of free available restore.
to attach to the drives on target host, the operation fails.
virtual disk

Not enough space: The media server where MSDP is configured has Disable FIPS on the media server where
'*\\driverMapping.json FIPS enabled. MSDP is installed. Or, add the domain user
Samba credentials to the target VM.

Issue with Azure cloud provider VM's


If one of VM's disks is not initialized, downloading or restoring VM files using instant
access fails with the following error:

Jan 24, 2023 11:58:47 AM - Error NBWMC (pid=3716) Internal Error:


('failed to find operation system information, please check the source
VM', ('Failed to expose
VMDK', 1006), None)
Performing granular restore 115
Troubleshooting

Failed to create the instant access mount.


(4001)

libguestfs is a third-party tool that instant access uses to retrieve files from a VM
backup. If a disk is not initialized, libguestfs cannot retrieve the files.
Workaround:
Initialize the disk and backup the VM. Then try again to download or restore VM
files using instant access.
Chapter 4
Troubleshooting protection
and recovery of cloud
assets
This chapter includes the following topics:

■ Troubleshoot cloud workload protection issues

■ Troubleshoot PaaS workload protection and recovery issues

Troubleshoot cloud workload protection issues


Review the following log files to troubleshoot any issues with protection of cloud
assets:
■ Log files for configuration
■ Log files for snapshot creation
■ Log files for restore operations
■ Log files for snapshot deletion
During troubleshooting, ensure that you have also reviewed the limitations. See
“Limitations and considerations” on page 10.
For troubleshooting issues, see the NetBackup Status Codes Reference Guide.
To view the Snapshot Manager log files, see the Snapshot Manager logs topic in
the NetBackup Snapshot Manager Install and Upgrade Guide.

Log files for configuration


Use the following logs to troubleshoot cloud configuration issues.
Troubleshooting protection and recovery of cloud assets 117
Troubleshoot cloud workload protection issues

Table 4-1 Log files for configuration

Process Logs

tpconfig Windows
tpconfig command is one way for registering NetBackup install path/volmgr/debug/tpcommand
Snapshot Manager in NetBackup.
UNIX

/usr/openv/volmgr/debug/tpcommand

nbwebservice Windows

Plug-ins are configured using NetBackup REST NetBackup install path/webserver/logs


API.
UNIX

/usr/openv/wmc/webserver/logs

/usr/openv/logs/nbwebservices

nbemm Windows

nbemm stores the Snapshot Manager and plug-in NetBackup install path/path/logs/nbemm
information in EMM database.
UNIX

/usr/openv/logs/nbemm

Log files for asset discovery


Use the following logs to troubleshoot asset discovery issues.

Table 4-2 Log files for asset discovery

Process Logs

ncfnbcs Windows

Verifies if discovery was completed or not. NetBackup install path/bin/vxlogview –o 366

UNIX

/usr/openv/netbackup/bin/vxlogview -o 366

Picloud Windows

Provides the details of discovery operation. NetBackup install path/bin/vxlogview –i 497

UNIX

/usr/openv/netbackup/bin/vxlogview -i 497
Troubleshooting protection and recovery of cloud assets 118
Troubleshoot cloud workload protection issues

Table 4-2 Log files for asset discovery (continued)

Process Logs

nbwebservice Windows

To get details about the asset database NetBackup install path/webserver/logs


workflows that are part of the discovery operation.
UNIX
Note: Refer to the same log files for details of
/usr/openv/wmc/webserver/logs
assets that are added to protection plan.
/usr/openv/logs/nbwebservices

Log files for snapshot creation


Use the following logs to troubleshoot snapshot creation issues.

Table 4-3 Log files for snapshot creation

Process Logs

nbpem Windows

nbpem PID for given job is available in the NetBackup install path/bin/vxlogview –o 116
NetBackup activity monitor.
UNIX

/usr/openv/netbackup/bin/vxlogview -o 116

nbjm Windows

nbjm PID for given job is available in the NetBackup install path/bin/vxlogview –o 117
NetBackup activity monitor.
UNIX

/usr/openv/netbackup/bin/vxlogview -o 117

nbcs Windows

nbcs PID for given job is available in the NetBackup install path/bin/vxlogview –i 366 -P
NetBackup activity monitor. nbcs_process_id

UNIX

/usr/openv/netbackup/bin/vxlogview -i 366 -P
nbcs_process_id

The nbcs logs are available at the following location:

Windows

NetBackup install path/logs/ncfnbcs

UNIX

/usr/openv/logs/ncfnbcs
Troubleshooting protection and recovery of cloud assets 119
Troubleshoot cloud workload protection issues

Table 4-3 Log files for snapshot creation (continued)

Process Logs

nbrb Windows

nbrb is requested to provide a media server for NetBackup install path/bin/vxlogview –o 118
a given job. For Cloud, a particular media server
UNIX
is picked up from the associated list of media
servers for a Snapshot Manager. /usr/openv/netbackup/bin/vxlogview -i 118

Log files for restore operations


Use the following logs to troubleshoot restore issues.

Table 4-4
Process Logs

nbwebservice Windows

The snapshot restore operation is triggered by NetBackup install path/webserver/logs


NetBackup REST API.
UNIX

/usr/openv/wmc/webserver/logs

/usr/openv/logs/nbwebservices

bprd Windows

The NetBackup REST API communicates with NetBackup install path/netbackup/logs


bprd to initiate restore.
UNIX

/usr/openv/netbackup/logs/bprd

ncfnbcs Windows

nbcs PID for given job is available in the NetBackup install path/bin/vxlogview –i 366 -P
NetBackup activity monitor. nbcs_process_id

UNIX

/usr/openv/netbackup/bin/vxlogview -i 366 -P
nbcs_process_id

Log files for snapshot deletion


Use the following logs to troubleshoot snapshot deletion issues.
Troubleshooting protection and recovery of cloud assets 120
Troubleshoot PaaS workload protection and recovery issues

Table 4-5 Log files for snapshot deletion

Process Logs

bpdm Windows
The snapshot delete or clean-up operation is NetBackup install path/netbackup/logs
triggered by bpdm.
UNIX

/usr/openv/netbackup/logs/bpdm

ncfnbcs Windows

nbcs PID for given job is available in the NetBackup install path/bin/vxlogview –i 366 -P
NetBackup activity monitor. nbcs_process_id

UNIX

/usr/openv/netbackup/bin/vxlogview -i 366 -P
nbcs_process_id

Pre-recovery check fails with access denied error during


alternate location restore
When attempting to perform recovery of a VM from a backup image copy, if you do
not have the required privileges assigned to your role to perform alternate location
restore, you encounter the error during the pre-recovery check operation.
This may happen when you have privilege to perform only original location recovery,
and you are trying to do alternate location recovery.
Workaround
■ While doing original location restore, do not change any pre-populated fields in
the pre-recovery page.
■ If you want to perform alternate location recovery, ensure that you have the
required privileges.

Troubleshoot PaaS workload protection and


recovery issues
Backup fails with error: 3808 Cannot check if the database
exists.
You can see the following message in the Activity Monitor:
AuthorizationFailed -Message: The client '<clientId> '<objetId>' does not have
authorization to perform action 'Microsoft.Sql/servers/databases/read' over scope
Troubleshooting protection and recovery of cloud assets 121
Troubleshoot PaaS workload protection and recovery issues

'<resoourceId>' or the scope is invalid. If access was recently granted, please


refresh your credentials.
Explanation: This error occurs, when the Snapshot Manager and NetBackup are
deployed in AKS, and:
■ The media server pod node pool is a different node pool from the Snapshot
Manager node pool
■ Managed Identity is enabled in the Snapshot Manager Virtual Machine Scale
set
Workaround: Do any of the following:
■ In the media server for backup and restore, enable Managed Identity on the
Scale set. Also, assign required permission in the role attached to this managed
identity.
■ Create a storage unit on the MSDP server, and use only those media servers
that have the Managed Identity feature enabled on Scale configuration.

Backup fails when the database or the resource group has


Read-only lock applied, and partially successful when
Delete lock is applied.
Explanation: This issue occurs if the Read-only lock or Delete lock attribute is
applied to the database or the resource group.
Workaround: Before performing any backup or restore, remove any existing
Read-only lock and Delete lock attributes from the database or the resource group.

Status Code 150: Termination requested by administrator


Explanation: This appears when you manually cancel a backup or a restore job
from the activity monitor and a database is created on the portal during the partial
restore operation.
Workaround: Manually clean up the database on the provider portal, and temporary
staging location at the universal share mount location under a specific directory
created by database name.

Stale status messages in Activity monitor


Explanation: If the Snapshot Manager container service restarts abruptly; the
provider protected restore jobs may remain in the active state and you may not see
the updated status on the activity monitor details page.
Workaround: Restart the workflow containers using the following command in the
Snapshot Manager:
Troubleshooting protection and recovery of cloud assets 122
Troubleshoot PaaS workload protection and recovery issues

docker restart flexsnap-workflow-system-0-min


flexsnap-workflow-general-0-min

After restarting the containers, the restore jobs are updated with the latest status
in the activity monitor.

Status Code 233: Premature eof encountered


Explanation: Appears if the client name used for backup exceeds the length of
255 characters.
The bpdbm logs confirms the same by displaying the following error message:
db_error_add_to_file: Length of client is too long. Got 278, but
limit is 255. read_next_image: db_IMAGEreceive() failed: text exceeded
allowed length (225)

Note: This is observed when the primary server is RHEL.

Workaround:Rename the database such that the client name fits within the length
of 255 characters.

Error: Broken pipe (32), premature end of file encountered


EXITING with status 42, network read failed
Or,

Status 174: media manager - system error occurred


Explanation:Occurs during backup if the policy prefix length during protection plan
creation is larger than the allowed length. Due to this the file path length of the
catalog image exceeds 256 chars and fails with the above error message in activity
monitor.
The bpdbm logs confirms the same by displaying the following error message:
<16> db_error_add_to_file: cannot stat(\\?\C:\Program Files\Veritas
\NetBackup\db\images \azure-midb-1afb87487dc04ddc8fafe453dccb7ca3+
nbux-qa-bidi-rg+eastus+az-sql-mi-bidinet01+
testdb_bidinet02\1656000000\tmp\catstore\
BACKUPNOW+141a73e7-cdc4-4371-823a-f170447dba2d_
1656349831_FULL.f_imgUserGroupNames0): No such file or directory (2)
<16> ImageReadFilesFile::get_file_size: cannot stat(\\?\C:\Program
Files\Veritas\NetBackup\db
\images\azure-midb-1afb87487dc04ddc8fafe453d
ccb7ca3+nbux-qa-bidi-rg+eastus+az-sql-mi-bidinet01+testdb_
bidinet02\1656000000\tmp\catstore\BACKUPNOW+141a73e7-cdc4-4371
Troubleshooting protection and recovery of cloud assets 123
Troubleshoot PaaS workload protection and recovery issues

-823a-f170447dba2d_1656349831_FULL.f_imgUserGroupNames0): No such
file or directory (2) <16> ImageReadFilesFile::executeQuery: Cannot
copy \\?\C:\Program
Files\Veritas\NetBackup\db\images\azure-midb-1afb87487dc04ddc8fafe453dccb7
ca3+nbux-qa-bidi-rg+eastus+az-sql-mi-bidinet01+testdb_bidinet02\1
656000000\tmp\catstore\BACKUPNOW+141a73e7-cdc4-4371-823a-f170447d
ba2d_1656349831_FULL.f_imgUserGroupNames0

Note: This is observed when the primary server is Windows.

Workaround: Use a policy prefix name in protection plan with length less than 10
characters, so that the total length of the catalog path is less than 256 characters.

Status Code 3801: Cannot complete the requested


operation.
Explanation:NetBackup is not able to successfully carry out the requested operation.
Recommended action: Refer to the activity monitor details for the possible reasons
of failure.

Status Code 3817: Cannot complete the pre-backup


operation
Explanation: The error message seen in dbagentsutil logs as,pg_dump: error:
query failed: ERROR: permission denied for table test;pg_dump: error:
query was: LOCK TABLE public.test IN ACCESS SHARE MODE;Invoked
operation: PRE_BACKUP failed

Occurs when you try to backup a database which has multiple tables with different
roles. If tables have at least one different owner, other than the database owner,
and it is not a member of the database owner role, then the backup may fail.
Recommended action: You must have a role that has access to all tables inside
the database which you want to backup or restore.
For example, say that we wanted to backup the School database which has two
tables.
■ student, owner is postgres

■ teacher, owner is schooladmin

Create a new role. Say, NBUbackupadmin


Run the following command to create the role:
postgres=> CREATE USER NBUbackupadmin WITH PASSWORD '***********';
Troubleshooting protection and recovery of cloud assets 124
Troubleshoot PaaS workload protection and recovery issues

CREATE ROLE

To make this new role a member of postgres and schooladmin role, run:
postgres=> GRANT postgres TO NBUbackupadmin;

GRANT ROLE

postgres=> GRANT schooladmin TO NBUbackupadmin;

GRANT ROLE

Note: You must have a role who is either owner or member of the owner of the
table, for all tables inside the database.

Backup fails with Status 40 (Network connection broken)


Explanation: Backups fail due to loss of connectivity to the media server.
Recommended action: You can restart the backup job if the policy has checkpoints
enabled. Once the network issue is resolved, select the incomplete backup job in
the web UI and click Resume. The job resumes from the point it was stopped. If
the checkpoint is not enabled in the policy, the job shows up as a failed job in the
web UI.

Backup job fails with the error: "Failed to backup


database"
Explanation: The Job details contain additional details: ManagedIdentityCredential
authentication unavailable. The requested identity is not assigned to this resource.
The allocated media server doesn't have any Managed Identity attached to it.
Recommended action: If you use system or user managed identity for the PaaS
Azure SQL and Managed Instances, apply the same set of permissions/rules to
the media server(s) and the snapshot manager. If you use user-managed identity,
attach the same user-managed identity to the media server(s) and the snapshot
manager.

Error code 3842 - The requested backup type for the


corresponding PaaS asset is unsupported.
Differential incremental backup is supported for only for Azure SQL server and
Azure SQL Managed Instance. When you select an unsupported backup type, this
error appears.

Error code 3843 or 3844 - Failed to enable or disable CDC.


Appears when you do not have permissions to enable or disable CDC.
Troubleshooting protection and recovery of cloud assets 125
Troubleshoot PaaS workload protection and recovery issues

Explanation: Give NetBackup the necessary permissions to enable or disable CDC


in your Azure environment.

Note: Do not enable CDC manually. Provide the permissions to NetBackup for
enable or disable CDC.

Error: Client restore EXIT STATUS 5: the restore failed to


recover the requested files Cloud policy restore error
(2824)
Error: ERR - Failed to restore database [<db_name>] with
name [<db_name>]. ERR - Failed to open file ''. Errno = 12:
client restore EXIT STATUS 5: the restore failed to recover
the requested files
Explanation: Occurs during restore if the backup image is generated on 10.2 media
and restore goes to an older (< 10.2) media server.
Workaround: Change the restore media to 10.2 and remove the older media from
storage.

AWS DynamoDB table does not have the auto scaling


enabled, after restoring from a backup image with the auto
scaling option enabled
Explanation: Currently the AWS API response does not show if a table has auto
scaling enabled. So, during backup, this metadata is not captured in NetBackup,
and as a result the restored table does not have auto scaling enabled.
Workaround: Enable the auto-scaling property of the restored DynamoDB table
in the AWS portal manually.

CDC enabled Azure SQL MI incremental backups: Dropping


a CDC enabled database leads to full backup without
schema changes, instead of incremental.
Explanation: Azure SQL MI maintains CDC-enabled database details in the table
cdc_jobs inside the msdb schema. When the database is dropped, its cdc_jobs
entry should be deleted. Sometimes this entry does not get deleted from the
cdc_jobs table. So, when a new database is created with the same db_id which
already exists in the cdc_jobs table, the issue occurs.
Workaround: When you drop a database, check the entry of the dropped database
in the cdc_jobs table of the msdb schema. If the entry is present there, delete it
manually.
Troubleshooting protection and recovery of cloud assets 126
Troubleshoot PaaS workload protection and recovery issues

Troubleshooting Amazon Redshift issues


Restore fails for Amazon Redshift, if the query string is
larger than 100 KB
Explanation:
This is a known limitation of AWS. The maximum query statement size is 100 KB.
See the AWS documentation for the details:
https://docs.aws.amazon.com/redshift/latest/mgmt/data-api.html

After a successful Redshift database restore, if the number


of stored procedures, views, and functions are not the
same with the source database.
Workaround:
Do the following:
1 Mount the Instant Access (IA) path using the following API:
netbackup/recovery/workloads/cloud/paas/instant-access-mounts

2 Navigate to the mount path in the media server.


3 Ensure that the mount path directory hierarchy is as follows:
ClusterDirectory/DatabaseDirectory/DatabaseDirectory/SchemaDirectory/TableDirectory

4 In the SchemaDirectory, locate the files StoredProcedures.json,


Views.json, and Functions.json. Each of these files contains one or more
SQL statements which you can run in Amazon Redshift Query Editor-2.
Manually run these SQL statements.

botocore.exceptions.ClientError: An error occurred


(InvalidSignatureException) when calling the ListDatabases
operation
Explanation:
If the system time where you run the AWS Redshift APIs is not correct, you get this
error. This message appears in the logs:

Signature expired: 20230226T181919Z is now earlier than


20230226T181921Z (20230226T182421Z - 5 min.)"

Workaround:
Run the ntpdate command to fix the system time.
Troubleshooting protection and recovery of cloud assets 127
Troubleshoot PaaS workload protection and recovery issues

Backup or restore jobs fail with "NoCredentialsError:


Unable to locate credentials" error.
Explanation:
This error appears when region is not specified. You can see the following error in
the dbagentsutil logs. You can find the dbagentsutil logs at the following
location:
/usr/openv/netbackup/logs/

Workaround:
Do the following:
1 Download AWS CLI on the media server where the dbagent is running.
2 Run the command:
aws configure

3 Enter the region name for EC2 when prompted. Do not specify the values for
the other parameters.

Backup and restore stuck for Redshift databases


Explanation:
This error appears when the NetBackup Snapshot Manager that runs the discovery
does not have access to the Redshift cluster. You can see the following error in the
flexsnap logs:
Connect timeout on endpoint URL:
"https://redshift.us-east-2.amazonaws.com/

Workaround:
Without access permission, the Snapshot Manager requires the inbound rules to
be configured for the snapshot manager in the security group of the ‘VPC endpoint
of the Redshift service'.
On the AWS portal, select a cluster. Click Properties > click Network and security
settings > click the virtual private cloud object > click Endpoints. Search for
“redshift-endpoint” in the search field > click the VPC endpoint ID > click the Security
Groups tab. Click the Security Group ID > click Edit Inbound rules, and add the
following for media servers.

Type : HTTPS

Protocol : TCP

Port range : 443


Troubleshooting protection and recovery of cloud assets 128
Troubleshoot PaaS workload protection and recovery issues

Source : 10.177.77.210/32

* Here, the source refers to the media server instance.


Run discovery from NetBackup web UI again.

You might also like