NetBackup™ Snapshot Manager Install and Upgrade Guide
- Introduction
- Section I. NetBackup Snapshot Manager installation and configuration
- Preparing for NetBackup Snapshot Manager installation
- Deploying NetBackup Snapshot Manager using container images
- Deploying NetBackup Snapshot Manager extensions
- Installing the NetBackup Snapshot Manager extension on a VM
- Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
- Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
- Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
- NetBackup Snapshot Manager cloud providers
- Configuration for protecting assets on cloud hosts/VM
- Protecting assets with NetBackup Snapshot Manager's on-host agent feature
- Installing and configuring NetBackup Snapshot Manager agent
- Configuring the NetBackup Snapshot Manager application plug-in
- Microsoft SQL plug-in
- Oracle plug-in
- Protecting assets with NetBackup Snapshot Manager's agentless feature
- Snapshot Manager catalog backup and recovery
- NetBackup Snapshot Manager assets protection
- Volume Encryption in NetBackup Snapshot Manager
- NetBackup Snapshot Manager security
- Preparing for NetBackup Snapshot Manager installation
- Section II. NetBackup Snapshot Manager maintenance
- NetBackup Snapshot Manager logging
- Upgrading NetBackup Snapshot Manager
- Migrating and upgrading NetBackup Snapshot Manager
- Post-upgrade tasks
- Uninstalling NetBackup Snapshot Manager
- Troubleshooting NetBackup Snapshot Manager
Volume encryption for GCP
You can encrypt disks in GCP using the following methods:
Encryption by default (PMK or Google Managed Key)
Customer Managed Encryption Key (CMEK) using Google Cloud KMS
For more information on GCP encryption, see 'Encryption' section of the Google Cloud documentation.
Table: Encryption for creating snapshots
Disk encryption | Snapshot encryption |
---|---|
Platform Managed Key (PMK) | Same PMK is used as the source disk. |
CMK/CMEK | Same CMEK is used as the source disk. |
Table: Encryption for restoring snapshots
Snapshot encryption | Restored disk encryption |
---|---|
PMK | Same PMK is used as the snapshot. |
CMK/CMEK | Same CMEK is used as the snapshot, if the target restore location is within the scope of the key. |
Table: Encryption for restoring from backup
Snapshot encryption | Restored disk encryption |
---|---|
PMK | Same PMK is used as the source disk. |
CMK/CMEK | Same CMEK is used as the source disk, else PMK is used. |
Note:
For successful restoration, the target restore location must be inside the scope of the key during restoration.
Table: Encryption during VM restore from snapshot or backup
Snapshot encryption | Restored disk encryption |
---|---|
PMK | Encryption on disk can be PMK/CMK as per user selection during restore. |
CMK/CMEK | Encryption on disk can be PMK/CMK as per user selection during restore. |