NetBackup™ for OpenStack Administrator's Guide
- Introduction
- Deploying NetBackup for OpenStack
- Requirements
- NetBackup for OpenStack network considerations
- Preparing the installation
- Spinning up the NetBackup for OpenStack virtual machine
- Installing NetBackup for OpenStack Components
- Installing on RHOSP
- Prepare for deployment
- Updating the overcloud roles data file to include NetBackup for OpenStack services
- Additional Steps on NetBackup for OpenStack Appliance
- Installing on Ansible OpenStack Ussuri
- Installing on Kolla
- Pushing NetBackup for OpenStack images to the local registry
- Installing on RHOSP
- Configuring NetBackup for OpenStack
- Post Installation Health-Check
- Uninstalling NetBackup for OpenStack
- Uninstalling from RHOSP
- Uninstalling from Ansible OpenStack
- Uninstalling from Kolla Openstack
- Uninstalling from RHOSP
- Upgrading NetBackup for OpenStack
- Configuring NetBackup OpenStack Appliance
- Configuring NetBackup primary server
- NetBackup for OpenStack protections
- Performing snapshots, backups, and restores of OpenStack
- About restores
- Required restore.json file for CLI
- About schedules
- Performing Backup Administration tasks
- Disaster recovery
- Troubleshooting
- General Troubleshooting Tips
- Health check of NetBackup for OpenStack
- Important log files
Clean NetBackup for OpenStack haproxy resources
The following steps need to be run on all nodes, which have the haproxy service running. Those nodes can be identified by verifying the roles_data.yaml for the role that contains the entry OS::TripleO::Services::HAproxy.
Once the role that runs the NetBackup for OpenStack datamover API service has been identified, the following commands will clean the nodes from from all NetBackup for OpenStack resources..
Warning:
Run all commands as root or user with sudo permissions.
Edit the following file on the HAProxy nodes and remove all NetBackup for OpenStack entries.
/var/lib/config-data/puppet-generated/haproxy/etc/haproxy/haproxy.cfg
An example of these entries:
listen nbosdmapi bind 172.25.3.60:13784 transparent ssl crt /etc/pki/tls/private/ overcloud_endpoint.pem bind 172.25.3.60:8784 transparent http-request set-header X-Forwarded-Proto https if { ssl_fc } http-request set-header X-Forwarded-Proto http if !{ ssl_fc } http-request set-header X-Forwarded-Port %[dst_port] option httpchk option httplog server overcloud-controller-0.internalapi.localdomain 172.25.3.59:8784 check fall 5 inter 2000 rise 2
Restart the haproxy container once all edits have been done.
# For RHOSP17.1 onwards podman restart haproxy-bundle-podman-0