Protect applications in-cloud with application consistent snapshots | Managing and protecting cloud assets | NetBackup™ Web UI Cloud Administrator's Guide | Veritas™

NetBackup™ Web UI Cloud Administrator's Guide

Last Published:
Product(s): NetBackup (10.2)
  1. Managing and protecting cloud assets
    1.  
      About protecting cloud assets
    2.  
      Limitations and considerations
    3. Configure Snapshot Manager's in NetBackup
      1.  
        Configure a third-party CA certificate
      2.  
        Add a Snapshot Manager
      3. Add a cloud provider for a Snapshot Manager
        1.  
          IAM Role for AWS Configuration
      4.  
        Associate media servers with a Snapshot Manager
      5.  
        Discover assets on Snapshot Manager
      6.  
        Edit a Snapshot Manager
      7.  
        Enable or disable a Snapshot Manager
      8.  
        (Optional) Add the Snapshot Manager extension
    4. Managing intelligent cloud groups
      1.  
        Create an intelligent cloud group
      2.  
        Delete an intelligent cloud group
    5. Protecting cloud assets or intelligent cloud groups
      1.  
        Customize or edit protection for cloud assets or intelligent groups
      2.  
        Remove protection from cloud assets or intelligent groups
    6.  
      Cloud asset cleanup
    7.  
      Cloud asset filtering
    8.  
      AWS and Azure government cloud support
    9. About protecting Microsoft Azure resources using resource groups
      1.  
        Before you begin
      2.  
        Limitations and considerations
      3. About resource group configurations and outcome
        1.  
          Examples of resource group configurations
      4.  
        Troubleshoot resource group permissions
    10. About the NetBackup Accelerator for cloud workloads
      1.  
        How the NetBackup Accelerator works with virtual machines
      2.  
        Accelerator forced rescan for virtual machines (schedule attribute)
      3.  
        Accelerator backups and the NetBackup catalog
      4.  
        Accelerator messages in the backup job details log
    11.  
      Configuring backup schedule for cloud workloads
    12.  
      Backup options for cloud workloads
    13.  
      Snapshot replication
    14.  
      Configure AWS snapshot replication
    15.  
      Using AWS snapshot replication
    16.  
      Support matrix for account replication
    17.  
      Protect applications in-cloud with application consistent snapshots
    18. Protecting PaaS assets
      1.  
        Prerequisites for protecting PaaS assets
      2. Installing the native client utilities
        1.  
          Installing the MySQL client utility
        2.  
          Installing sqlpackage client utility
        3.  
          Installing Postgres client utility
      3.  
        Configuring the storage server for instant access
      4.  
        About incremental backup for PaaS workloads
      5.  
        Limitations and considerations
      6.  
        Discovering PaaS assets
      7.  
        Viewing PaaS assets
      8.  
        Managing PaaS credentials
      9.  
        View the credential name that is applied to a database
      10. Add credentials to a database
        1.  
          Creating an IAM database username
        2.  
          Creating a system or user managed identity username
      11.  
        Add protection to PaaS assets
      12.  
        Perform backup now
  2. Recovering cloud assets
    1.  
      Recovering cloud assets
    2.  
      Perform rollback recovery of cloud assets
    3. Recovering PaaS assets
      1.  
        Recovering non-RDS PaaS assets
      2.  
        Recovering RDS-based PaaS asset
      3.  
        Recovering Azure protected assets
      4.  
        Recovering duplicate images from AdvancedDisk
  3. Performing granular restore
    1.  
      About granular restore
    2.  
      Supported environment list
    3.  
      List of supported file systems
    4.  
      Before you begin
    5.  
      Limitations and considerations
    6.  
      Restoring files and folders from cloud virtual machines
    7.  
      Restoring volumes on cloud virtual machines
    8.  
      Troubleshooting
  4. Troubleshooting protection and recovery of cloud assets
    1.  
      Troubleshoot cloud workload protection issues
    2.  
      Troubleshoot PaaS workload protection and recovery issues

Protect applications in-cloud with application consistent snapshots

You can take application consistent (point-in-time) snapshots of the applications that are deployed on virtual machines in cloud. This lets you perform a point-in-time recovery of applications.

You can perform original location and alternate location restores for these workloads.

For alternate location restore, consider the following:

  • For alternate location restore of MS SQL workloads, the target host must be discovered but the application status should not be in connected or configured state.

  • For alternate location restore of Oracle workloads, the target host must be discovered but the application status should not be in connected or configured state.

Before you begin

Ensure that the database is prepared for snapshots. For details review the plug-in configuration notes in the Veritas Snapshot Manager documentation.

To configure applications for point-in-time recovery

  1. Connect to the virtual machine that hosts the applications.
    • After the cloud assets are discovered, go the Virtual Machines tab.

    • Select the virtual machine where the application is hosted. On the top right, click Manage credentials.

    • Enter the credentials. If the credentials for the VM are not configured, you must configure the credentials. See the Managing credentials chapter of the WebUI Administrator Guide.

    • After the virtual machines are connected, the virtual machines state is updated to Connected.

  2. Select the virtual machine where the application is hosted. On the top right, click Configure application.
  3. After the process is complete, the application status is updated to configured.
  4. The applications are displayed under the Applications tab after the next discovery.
  5. Apply the protection plan. See the NetBackup Web UI Administrator's Guide.

To edit or update virtual machine credentials

  1. Go to the Virtual Machines tab.
  2. Select the virtual machines for which you want to update credentials. On the top right, click Manage credentials.
  3. Update the credentials.

To edit or update application configuration

  1. Go to the Applications tab.
  2. Select the application for which you want to update. On the top right, click Edit configuration
  3. Update the credentials and click Configure.