NetBackup™ Snapshot Manager Install and Upgrade Guide
- Introduction
- Section I. NetBackup Snapshot Manager installation and configuration
- Preparing for NetBackup Snapshot Manager installation
- Deploying NetBackup Snapshot Manager using container images
- Deploying NetBackup Snapshot Manager extensions
- Installing the Snapshot Manager extension on a VM
- Installing the Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
- Installing the Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
- Installing the Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
- NetBackup Snapshot Manager cloud plug-ins
- NetBackup Snapshot Manager application agents and plug-ins
- Installing and configuring Snapshot Manager agent
- Configuring the Snapshot Manager application plug-in
- Microsoft SQL plug-in
- Oracle plug-in
- NetBackup protection plan
- Protecting assets with NetBackup Snapshot Manager's agentless feature
- Volume Encryption in NetBackup Snapshot Manager
- NetBackup Snapshot Manager security
- Preparing for NetBackup Snapshot Manager installation
- Section II. NetBackup Snapshot Manager maintenance
- NetBackup Snapshot Manager logging
- Upgrading NetBackup Snapshot Manager
- Uninstalling NetBackup Snapshot Manager
- Troubleshooting NetBackup Snapshot Manager
Configuring a GCP service account for Snapshot Manager
To protect the assets in Google Cloud Platform (GCP), Snapshot Manager requires permissions to be able to access and perform operations on those cloud assets. You must create a custom role and assign it with the minimum permissions that Snapshot Manager requires. You then associate that custom role with the service account that you created for Snapshot Manager.
Perform the following steps:
- Create a custom IAM role in GCP. While creating the role, add all the permissions that Snapshot Manager requires.
See Google Cloud Platform permissions required by Snapshot Manager.
For more information on creating and managing the custom roles, see Creating and managing custom roles section of Google documentation.
- Create a service account in GCP.
Grant the following roles to the service account:
The custom IAM role that you created in the earlier step. This is the role that has all the permissions that Snapshot Manager requires to access GCP resources.
The
iam.serviceAccountUser
role. This enables the service account to connect to the GCP using the service account context.
For more information on creating and managing service accounts, see Creating and managing service accounts section of Google documentation.
Note:
To use Shared VPC at GCP, additional Compute Network User named role assignment is required for the service account used to configure GCP plugin.