NetBackup™ Web UI Cloud Administrator's Guide

Last Published:
Product(s): NetBackup (10.2)
  1. Managing and protecting cloud assets
    1.  
      About protecting cloud assets
    2.  
      Limitations and considerations
    3. Configure Snapshot Manager's in NetBackup
      1.  
        Configure a third-party CA certificate
      2.  
        Add a Snapshot Manager
      3. Add a cloud provider for a Snapshot Manager
        1.  
          IAM Role for AWS Configuration
      4.  
        Associate media servers with a Snapshot Manager
      5.  
        Discover assets on Snapshot Manager
      6.  
        Edit a Snapshot Manager
      7.  
        Enable or disable a Snapshot Manager
      8.  
        (Optional) Add the Snapshot Manager extension
    4. Managing intelligent cloud groups
      1.  
        Create an intelligent cloud group
      2.  
        Delete an intelligent cloud group
    5. Protecting cloud assets or intelligent cloud groups
      1.  
        Customize or edit protection for cloud assets or intelligent groups
      2.  
        Remove protection from cloud assets or intelligent groups
    6.  
      Cloud asset cleanup
    7.  
      Cloud asset filtering
    8.  
      AWS and Azure government cloud support
    9. About protecting Microsoft Azure resources using resource groups
      1.  
        Before you begin
      2.  
        Limitations and considerations
      3. About resource group configurations and outcome
        1.  
          Examples of resource group configurations
      4.  
        Troubleshoot resource group permissions
    10. About the NetBackup Accelerator for cloud workloads
      1.  
        How the NetBackup Accelerator works with virtual machines
      2.  
        Accelerator forced rescan for virtual machines (schedule attribute)
      3.  
        Accelerator backups and the NetBackup catalog
      4.  
        Accelerator messages in the backup job details log
    11.  
      Configuring backup schedule for cloud workloads
    12.  
      Backup options for cloud workloads
    13.  
      Snapshot replication
    14.  
      Configure AWS snapshot replication
    15.  
      Using AWS snapshot replication
    16.  
      Support matrix for account replication
    17.  
      Protect applications in-cloud with application consistent snapshots
    18. Protecting PaaS assets
      1.  
        Prerequisites for protecting PaaS assets
      2. Installing the native client utilities
        1.  
          Installing the MySQL client utility
        2.  
          Installing sqlpackage client utility
        3.  
          Installing Postgres client utility
      3.  
        Configuring the storage server for instant access
      4.  
        About incremental backup for PaaS workloads
      5.  
        Limitations and considerations
      6.  
        Discovering PaaS assets
      7.  
        Viewing PaaS assets
      8.  
        Managing PaaS credentials
      9.  
        View the credential name that is applied to a database
      10. Add credentials to a database
        1.  
          Creating an IAM database username
        2.  
          Creating a system or user managed identity username
      11.  
        Add protection to PaaS assets
      12.  
        Perform backup now
  2. Recovering cloud assets
    1.  
      Recovering cloud assets
    2.  
      Perform rollback recovery of cloud assets
    3. Recovering PaaS assets
      1.  
        Recovering non-RDS PaaS assets
      2.  
        Recovering RDS-based PaaS asset
      3.  
        Recovering Azure protected assets
      4.  
        Recovering duplicate images from AdvancedDisk
  3. Performing granular restore
    1.  
      About granular restore
    2.  
      Supported environment list
    3.  
      List of supported file systems
    4.  
      Before you begin
    5.  
      Limitations and considerations
    6.  
      Restoring files and folders from cloud virtual machines
    7.  
      Restoring volumes on cloud virtual machines
    8.  
      Troubleshooting
  4. Troubleshooting protection and recovery of cloud assets
    1.  
      Troubleshoot cloud workload protection issues
    2.  
      Troubleshoot PaaS workload protection and recovery issues

Creating a system or user managed identity username

For Azure SQL Server and Managed Instance

Do any of the following configurations:

Configure managed identity user as AAD admin:

  • Set AAD admin on the SQL server or the Managed instance.

  • Go to Settings > Azure Active Directory > Set admin. Search and set system-assigned or user-assigned managed identity, and save.

    Note:

    Only those media servers configured as system-assigned managed identity as AAD admin can perform backup and restore.

Create managed identity user on the database using SSMS client:

  • To set AAD admin for SQL server to create user, go to Settings > Active Directory admin > Set admin. Pick active directory the user, and save.

  • Login to the SQL database or Managed database to create user under that database.

        CREATE USER [<managed_identity>] FROM EXTERNAL PROVIDER;
        ALTER ROLE db_owner ADD MEMBER [<managed_identity>];
  • Provide login permission for that user on the SQL Server, run

       # CREATE USER [<managed_identity>] FROM EXTERNAL PROVIDER;
       # ALTER ROLE loginmanager ADD MEMBER [<managed_identity>];

    Note:

    You must create users for all media servers communicating with the database using the system-assigned managed identity.

    Note:

    To restore database, you must configure the managed identity user as AAD admin on the target server.

For MySQL
  • To configure the AAD admin for MySQL server to create user, go to Settings > Active Directory admin > Set admin. Pick the active directory user, and save.

  • Get the client ID for managed identity using Azure CLI, run

    # az ad sp list --display-name <managed_identity> --query [*].appId --out tsv
  • Generate access token to login, using Azure CLI, run:

    # az account get-access-token --resource-type oss-rdbms
  • Login using the AAD admin user and access token, run:

    # mysql -h <server name> --user <user name> --enable-cleartext-plugin --password=<token>
  • Create the manage identity user and grant the permissions, run:

    # SET aad_auth_validate_oids_in_tenant = OFF;
      # CREATE AADUSER '<db_user>' IDENTIFIED BY '<Generated_client_id>';
      # GRANT USAGE, DROP, SELECT, CREATE, SHOW VIEW, EVENT, LOCK TABLES , ALTER, CREATE VIEW, INSERT, REFERENCES, ALTER ROUTINE, PROCESS ON *.* TO '<db_user>'@'%'
For PostgreSQL
  • To configure the AAD admin for PostgreSQL server to create user, go to Settings > Active Directory admin > Set admin. Pick the active directory user, and save.

  • Get client ID for the managed identity:

     # az ad sp list --display-name <managed_identity>  --query [*].appId --out tsv
  • Generate the access token required to login, run:

    # az account get-access-token --resource-type oss-rdbms
  • Export the password for the generated token, run:

    # export PGPASSWORD=<token>
  • Login using the AAD admin user and the access token, run:

     # psql "host=<host name> port=5432 dbname=<dbname> user=<user name> sslmode=require"
  • Create user and grant permission, run:

    # SET aad_auth_validate_oids_in_tenant = OFF;
      # CREATE ROLE <db_user> WITH LOGIN PASSWORD '<client_id>' IN ROLE azure_ad_user;
      # GRANT azure_pg_admin TO <db_user>;
      # ALTER USER smipguser CREATEDB;
      # ALTER USER smipguser Replication;

Note:

Only user managed identity is supported for MySQL Flexible Server. Managed Identity support is not available for PostgreSQL Flexible Server.