NetBackup™ Web UI Cloud Administrator's Guide
- Managing and protecting cloud assets
- About protecting cloud assets
- Limitations and considerations
- Configure Snapshot Manager's in NetBackup
- Managing intelligent cloud groups
- Protecting cloud assets or intelligent cloud groups
- Cloud asset cleanup
- Cloud asset filtering
- AWS and Azure government cloud support
- About protecting Microsoft Azure resources using resource groups
- About the NetBackup Accelerator for cloud workloads
- Configuring backup schedule for cloud workloads
- Backup options for cloud workloads
- Snapshot replication
- Configure AWS snapshot replication
- Using AWS snapshot replication
- Support matrix for account replication
- Protect applications in-cloud with application consistent snapshots
- Protecting PaaS assets
- Prerequisites for protecting PaaS assets
- Installing the native client utilities
- Configuring the storage server for instant access
- About incremental backup for PaaS workloads
- Limitations and considerations
- Discovering PaaS assets
- Viewing PaaS assets
- Managing PaaS credentials
- View the credential name that is applied to a database
- Add credentials to a database
- Add protection to PaaS assets
- Perform backup now
- Recovering cloud assets
- Performing granular restore
- Troubleshooting protection and recovery of cloud assets
IAM Role for AWS Configuration
If the Snapshot Manager is deployed in cloud, AWS configuration can be configured to use IAM role for authentication.
See Add a cloud provider for a Snapshot Manager.
Before proceeding, ensure the following:
IAM role is configured within AWS. See the NetBackup Snapshot Manager Install and Upgrade Guide for details.
After you upgrade NetBackup and Snapshot Manager to the latest version, you need to update the credentials. Run the following command:
tpconfig -update -snapshot_manager <snapshot manager host> -snapshot_manager_user_id <snapshot manager user ID> -manage_workload <workload type> -security_token <security token>
Note:
Post upgrade, credentials are updated to support only IAM role.
The following implementations of IAM role are supported:
Source account: In this case, the cloud assets that need to be protected are in the same AWS account as Snapshot Manager. Thus, AWS cloud is aware of the AWS account ID and role name, you need to only select the region.
Cross account: In this case, the cloud assets that need to be protected are in a different AWS account than Snapshot Manager. Thus, you need to enter the target account and the target role name details along with the region so that Snapshot Manager can access those assets.
You need to establish a trust relationship between the source and the target account. For example, if this is the role ARN for the role you want to use to configure the plugin:
arn:aws:iam::935923755:role/TEST_IAM_ROLE
So, to configure the plugin, provide the last part of the ARN, the name:TEST_IAM_ROLE
For more details, refer to the Access AWS Accounts Using IAM Roles related information in the Amazon Web Services documentation.