NetBackup™ Snapshot Manager Install and Upgrade Guide
- Introduction
- Section I. NetBackup Snapshot Manager installation and configuration
- Preparing for NetBackup Snapshot Manager installation
- Deploying NetBackup Snapshot Manager using container images
- Deploying NetBackup Snapshot Manager extensions
- Installing the Snapshot Manager extension on a VM
- Installing the Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
- Installing the Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
- Installing the Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
- NetBackup Snapshot Manager cloud plug-ins
- NetBackup Snapshot Manager application agents and plug-ins
- Installing and configuring Snapshot Manager agent
- Configuring the Snapshot Manager application plug-in
- Microsoft SQL plug-in
- Oracle plug-in
- NetBackup protection plan
- Protecting assets with NetBackup Snapshot Manager's agentless feature
- Volume Encryption in NetBackup Snapshot Manager
- NetBackup Snapshot Manager security
- Preparing for NetBackup Snapshot Manager installation
- Section II. NetBackup Snapshot Manager maintenance
- NetBackup Snapshot Manager logging
- Upgrading NetBackup Snapshot Manager
- Uninstalling NetBackup Snapshot Manager
- Troubleshooting NetBackup Snapshot Manager
Installing the Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
Following are the permissions required for configuring the Google Kubernetes Engine (GKE) cluster:
For pushing the images to google container registry, user must have the write permissions for cloud bucket storage. The
storage.admin
role covers all the required permissions.For more information on pushing the images, see Pushing images to a registry in your project.
The user must have the
IAM role assigned to it to configure the Kubernetes extension.For more information on the role based access control, see Define permissions using Roles or ClusterRoles.
Account associated with GCP provider configuration must have the following permissions for GKE based Kubernetes extension operations:
Permissions for cluster access:
container.clusters.get
Permissions for auto scale feature:
compute.instanceGroupManagers.get
compute.instanceGroupManagers.update
container.clusters.get
container.clusters.update
container.operations.get