NetBackup™ Web UI Nutanix AHV Administrator's Guide

Last Published:
Product(s): NetBackup (10.0)
  1. Introducing the NetBackup web user interface
    1.  
      About the NetBackup web UI
    2.  
      Terminology
    3.  
      Sign in to the NetBackup web UI
    4.  
      Sign out of the NetBackup web UI
  2. Monitoring NetBackup
    1.  
      The NetBackup dashboard
    2.  
      Job monitoring
    3.  
      Search for or filter jobs in the jobs list
  3. Overview
    1.  
      Overview of configuring and protecting AHV assets in the NetBackup web UI
  4. Managing AHV clusters
    1.  
      Quick configuration checklist to protect AHV virtual machines
    2.  
      Configure secure communication between the AHV cluster and NetBackup host
    3.  
      Enable the iSCSI initiator service on windows backup host
    4.  
      Install the iSCSI initiator package on Linux backup host
    5.  
      Migrate Java GUI/CLI added clusters into WebUI
    6.  
      Configure Nutanix AHV cluster
    7.  
      Configure CHAP settings for iSCSI secure communication with AHV clusters
    8.  
      About the ports that NetBackup uses to communicate with AHV
    9.  
      Add or browse an AHV cluster
    10.  
      Remove AHV Clusters
    11.  
      Create an intelligent VM group
    12.  
      Assign permissions to the intelligent VM group
    13.  
      Update the intelligent VM group
    14.  
      Remove the intelligent VM group
    15.  
      Set CHAP for iSCSI
    16.  
      Add an AHV access host
    17.  
      Remove an AHV access host
    18.  
      Change resource limits for AHV resource types
    19.  
      Change the autodiscovery frequency of AHV assets
  5. Managing AHV credentials
    1.  
      Add new cluster credentials
    2.  
      Update and validate AHV cluster credentials
    3.  
      View the credential name that is applied to an asset
    4.  
      Edit or delete a named credential
  6. Protecting AHV virtual machines
    1.  
      Things to know before you protect AHV virtual machines
    2.  
      Protect AHV VMs or intelligent VM groups
    3.  
      Customize protection settings for an AHV asset
    4.  
      Schedules and retention
    5.  
      Backup options
    6.  
      Prerequisite to Enable virtual machine quiescing
    7.  
      Remove protection from VMs or intelligent VM groups
    8.  
      View the protection status of VMs or intelligent VM groups
  7. Recovering AHV virtual machines
    1.  
      Things to consider before you recover the AHV virtual machines
    2.  
      About the pre-recovery check
    3.  
      Recover an AHV virtual machine
    4.  
      About Nutanix AHV agentless files and folders restore
    5.  
      Prerequisites for agentless files and folder recovery
    6.  
      SSH key fingerprint
    7.  
      Recover files and folders with Nutanix AHV agentless restore
    8.  
      Recovery target options
    9.  
      Pre-recovery checks
    10.  
      About Nutanix-AHV agent-based files and folders restore
    11.  
      Prerequisites for agent based files and folder recovery
    12.  
      Recover files and folders with Nutanix AHV agent based restore
    13.  
      Limitations
  8. Troubleshooting AHV operations
    1.  
      Troubleshooting tips for NetBackup for AHV
    2.  
      Error during AHV credential addition
    3.  
      Error during the AHV virtual machines discovery phase
    4.  
      Errors for the Status for a newly discovered VM
    5.  
      Error run into while backing up AHV virtual machines
    6.  
      Error while restoring AHV virtual machines
  9. API and command line options for AHV
    1.  
      Using APIs and command line options to manage, protect, or recover AHV virtual machines
    2.  
      Additional NetBackup options for AHV configuration
    3.  
      Additional information about the rename file

SSH key fingerprint

To obtain the SSH key fingerprint of the Linux target host:

  1. Use the following command on RHEL or SUSE OS target host to get the SHA256-based RSA key.
    cat /etc/ssh/ssh_host_rsa_key.pub |awk '{print $2}' |base64 -d |sha256sum |
    awk '{print $1}'

    Note:

    The output of the commands is the RSA key. Similarly, change the public key path, execute the command to get ecdsa or DSS SSH key fingerprint configured on target host.

    • RSA key example:

      cat /etc/ssh/ssh_host_rsa_key.pub |awk '{print $2}'|base64 -d |
      sha256sum |awk '{print $1}'
    • Command output:

      b2352722053ac9f40bc1XXXXXXXXXXXXXXXXXXXXXXXXX419fa241ba9431fd6b9
  2. Copy the RSA fingerprint. You can provide this SSH key fingerprint when you add the target host details. Or you can also verify the displayed SSH key fingerprint after you click, Fetch SSH Key fingerprint on the Recovery Host page.

To generate SSH private key:

  1. Execute the following commands on Linux target host:
    • ssh-keygen -t rsa

    • -t option supports "ecdsa | rsa | dss"

  2. You must add/append target host public key in target vm ~/.ssh/authorized_keys file.