NetBackup™ Web UI Administrator's Guide

Last Published:
Product(s): NetBackup (10.1.1)
  1. Introducing NetBackup
    1.  
      About NetBackup
    2.  
      NetBackup documentation
    3.  
      NetBackup web UI features
    4.  
      NetBackup administration interfaces
    5.  
      Terminology
    6.  
      First-time sign in to the NetBackup web UI
    7.  
      Sign in to the NetBackup web UI
    8.  
      Sign out of the NetBackup web UI
    9.  
      Documentation for Catalog Recovery Wizard, disk array hosts, disk pools, and Host Properties in the NetBackup web UI
  2. Section I. Monitoring and notifications
    1. Monitoring NetBackup activity
      1.  
        The NetBackup dashboard
      2. Activity monitor
        1.  
          View NetBackup daemons
        2.  
          Monitor NetBackup processes
      3. Job monitoring
        1.  
          Workloads that require a custom RBAC role for specific job permissions
        2.  
          View a job
        3.  
          View the jobs in the List view
        4.  
          View the jobs in the Hierarchy view
        5.  
          Jobs: cancel, suspend, restart, resume, delete
        6.  
          Search for or filter jobs in the jobs list
        7.  
          Create a jobs filter
        8.  
          Edit, copy, or delete a jobs filter
        9.  
          Import or export job filters
        10.  
          Troubleshooting the viewing of jobs
    2. Notifications
      1. Job notifications
        1. Send email notifications for job failures
          1.  
            Status codes that generate alerts
        2.  
          Send notifications to the backup administrator about failed backups
        3.  
          Send notifications to a host administrator about backups
        4.  
          Configure the nbmail.cmd script on the Windows hosts
      2. NetBackup event notifications
        1.  
          View notifications
        2.  
          Modify or disable NetBackup event notifications in the web UI
        3.  
          About configuring automatic notification cleanup tasks
  3. Section II. Configuring hosts
    1. Managing host properties
      1.  
        Overview of host properties
      2.  
        View or edit the host properties of a server or client
      3.  
        Reset a host's attributes
    2. Managing credentials for workloads and systems that NetBackup accesses
      1.  
        Overview of credential management in NetBackup
      2.  
        Add a credential in NetBackup
      3.  
        Add a credential for an external KMS
      4.  
        Add a credential for NetBackup Callhome Proxy
      5.  
        Edit or delete a named credential
      6.  
        Add a credential for Network Data Management Protocol (NDMP)
      7.  
        Edit or delete Network Data Management Protocol (NDMP) credentials in NetBackup
    3. Managing deployment
      1.  
        Managing the NetBackup Package repository
      2.  
        Update host
      3.  
        Deployment policies
  4. Section III. Configuring storage
    1. Overview of storage options
      1.  
        About storage configuration
    2. Configuring storage servers
      1.  
        Create a Cloud storage, OpenStorage, or AdvancedDisk storage server
      2.  
        Create a Media Server Deduplication Pool (MSDP) storage server
      3.  
        Create a Media Server Deduplication Pool (MSDP) storage server for image sharing
      4.  
        Using image sharing from the NetBackup web UI
    3. Configuring disk storage
      1.  
        About configuring BasicDisk storage
      2.  
        About configuring disk pool storage
      3.  
        Create a disk pool
    4. Configuring storage units
      1.  
        Overview of storage units
      2.  
        Create a storage unit
      3.  
        Edit or copy a storage unit
      4.  
        Delete a storage unit
    5. Configuring universal shares
      1. Create a universal share
        1.  
          Using instant access for MS-Windows and Standard policies
    6. Configuring server groups
      1.  
        About NetBackup server groups
      2.  
        Add a server group
      3.  
        Delete a server group
    7. Troubleshooting storage configuration
      1.  
        Troubleshooting storage configuration
      2.  
        Troubleshooting universal share configuration issues
  5. Section IV. Configuring backups
    1. Overview of backups in the NetBackup web UI
      1.  
        Backups methods supported in the NetBackup web UI
      2.  
        Protection plan vs. policy FAQs
      3.  
        Supported protection plan types
      4.  
        Support for NetBackup classic policies
    2. Managing protection plans
      1.  
        Create a protection plan
      2.  
        Customizing protection plans
      3.  
        Edit or delete a protection plan
      4.  
        Subscribe an asset or an asset group to a protection plan
      5.  
        Unsubscribe an asset from a protection plan
      6.  
        View protection plan overrides
      7.  
        About Backup Now
    3. Managing classic policies
      1.  
        Add a policy
      2.  
        Example policy - Exchange Server DAG backup
      3.  
        Example policy - Sharded MongoDB cluster
      4.  
        Edit, copy, or delete a policy
      5.  
        Deactivate or activate a policy
      6.  
        Edit or delete a client
      7.  
        Edit or delete a backup selection
      8.  
        Edit or delete a schedule
      9.  
        Perform manual backups
    4. Managing backup images
      1.  
        About the NetBackup catalog
      2.  
        Search for backup images
    5. Pausing data protection activity
      1.  
        Pause backups and other activity
      2.  
        Allow the automatic pause of data protection activity
      3.  
        Pause backups and other activity on a client
      4.  
        View paused backups and other paused activities
      5.  
        Resume data protection activity
  6. Section V. Managing security
    1. Security events and audit logs
      1.  
        View security events and audit logs
      2. About NetBackup auditing
        1.  
          User identity in the audit report
        2.  
          Audit retention period and catalog backups of audit records
        3.  
          Viewing the detailed NetBackup audit report
      3.  
        Send audit events to system logs
    2. Managing security certificates
      1.  
        About security management and certificates in NetBackup
      2.  
        NetBackup host IDs and host ID-based certificates
      3. Managing NetBackup security certificates
        1.  
          Reissue a NetBackup certificate
        2.  
          Managing NetBackup certificate authorization tokens
      4. Using external security certificates with NetBackup
        1.  
          Configure an external certificate for the NetBackup web server
        2.  
          Remove the external certificate configured for the web server
        3.  
          Update or renew the external certificate for the web server
        4.  
          View external certificate information for the NetBackup hosts in the domain
    3. Managing host mappings
      1.  
        View host security and mapping information
      2.  
        Approve or add mappings for a host that has multiple host names
      3.  
        Remove mappings for a host that has multiple host names
    4. Managing user sessions
      1.  
        Sign out a NetBackup user session
      2.  
        Unlock a NetBackup user
      3.  
        Configure when idle sessions should time out
      4.  
        Configure the maximum of concurrent user sessions
      5.  
        Configure the maximum of failed sign-in attempts
      6.  
        Display a banner to users when they sign in
    5. Managing the security settings for the primary server
      1.  
        Certificate authority for secure communication
      2.  
        Disable communication with NetBackup 8.0 and earlier hosts
      3.  
        Disable automatic mapping of NetBackup host names
      4.  
        Configure the global data-in-transit encryption setting
      5.  
        About NetBackup certificate deployment security levels
      6.  
        Select a security level for NetBackup certificate deployment
      7.  
        About TLS session resumption
      8.  
        Set a passphrase for disaster recovery
      9. About trusted primary servers
        1.  
          Add a trusted primary server
        2.  
          Remove a trusted primary server
    6. Using access keys, API keys, and access codes
      1.  
        Access keys
      2. API keys
        1.  
          Add an API key or view API key details (Administrators)
        2.  
          Edit, reissue, or delete an API key (Administrators)
        3.  
          Add an API key or view your API key details
        4.  
          Edit, reissue, or delete your API key
        5.  
          Use an API key with NetBackup REST APIs
      3. Access codes
        1.  
          Get CLI access through web UI authentication
        2.  
          Approve your CLI access request
        3.  
          Approve CLI access requests of other users
        4.  
          Edit access settings
    7. Configuring authentication options
      1.  
        Sign-in options for the NetBackup web UI
      2. Configure user authentication with smart cards or digital certificates
        1.  
          Configure smart card authentication with domain
        2.  
          Configure smart card authentication without domain
        3.  
          Edit the configuration for smart card authentication
        4.  
          Add or delete a CA certificate that is used for smart card authentication
        5.  
          Disable or temporarily disable smart card authentication
      3.  
        About single sign-on (SSO) configuration
      4. Configure NetBackup for single sign-on (SSO)
        1.  
          Configure the SAML KeyStore
        2.  
          Configure the SAML keystore and add and enable the IDP configuration
        3.  
          Enroll the NetBackup primary server with the IDP
        4.  
          Manage an IDP configuration
        5.  
          Video: Configure single sign-on in NetBackup
      5. Troubleshooting SSO
        1.  
          Redirection issues
        2.  
          Unable to sign in due to authorization-related issues
    8. Managing role-based access control
      1.  
        RBAC features
      2.  
        Authorized users
      3. Configuring RBAC
        1.  
          Notes for using NetBackup RBAC
        2.  
          Add AD or LDAP domains
        3.  
          View users in RBAC
        4.  
          Add a user to a role (non-SAML)
        5.  
          Add a smart card user to a role (non-SAML, without AD/LDAP)
        6.  
          Add a user to a role (SAML)
        7.  
          Remove a user from a role
        8.  
          Disable web UI access for operating system (OS) administrators
        9.  
          Disable command-line (CLI) access for operating system (OS) administrators
      4.  
        Default RBAC roles
      5. Add a custom RBAC role
        1.  
          Edit or remove a role a custom role
        2.  
          Add a custom RBAC role to restore Azure-managed instances
        3.  
          Add a custom RBAC role for a PaaS administrator
      6.  
        Role permissions
      7.  
        Manage access permission
      8.  
        View access definitions
  7. Section VI. Detection and reporting
    1. Detecting malware
      1.  
        About malware detection
      2.  
        Configure a new scan host pool
      3.  
        Add an existing scan host
      4.  
        Manage credentials
      5.  
        Remove the scan host
      6.  
        Deactivate the scan host
      7.  
        Scan a policy client backup images for malware
      8.  
        Perform malware scanning
      9.  
        Scan a VMware asset for malware
      10.  
        View the malware scan status
      11.  
        Actions for malware scanned images
      12.  
        Recover from malware-affected images (clients protected by policies)
      13.  
        Recover a VMware asset affected by malware
      14.  
        Troubleshooting
    2. Detecting anomalies
      1.  
        About backup anomaly detection
      2.  
        How a backup anomaly is detected
      3.  
        View anomalies
      4.  
        Configure anomaly detection settings
    3. Usage reporting and capacity licensing
      1.  
        Track protected data size on your primary servers
      2.  
        Add a local primary server
      3.  
        Select license types to display in usage reporting
      4.  
        Scheduling reports for capacity licensing
      5.  
        Other configuration for incremental reporting
      6.  
        Troubleshooting failures for usage reporting and incremental reporting
  8. Section VII. NetBackup workloads and NetBackup Flex Scale
    1. NetBackup SaaS Protection
      1.  
        Overview of NetBackup for SaaS
      2.  
        Adding NetBackup SaaS Protection Hubs
      3. Configuring the autodiscovery frequency
        1.  
          Proxy configuration for autodiscovery
      4.  
        Viewing asset details
      5.  
        Configuring permissions
      6.  
        Troubleshooting SaaS workload issues
    2. NetBackup Flex Scale
      1. Managing NetBackup Flex Scale
        1.  
          Access NetBackup from the Flex Scale infrastructure management console
        2.  
          Manage NetBackup and the NetBackup Flex Scale cluster management from the NetBackup Flex Scale web UI
        3.  
          Access NetBackup Flex Scale from the NetBackup web UI
    3. NetBackup workloads
      1.  
        Protection of other asset types and clients
  9. Section VIII. Disaster recovery and troubleshooting
    1. Managing Resiliency Platforms
      1.  
        About Resiliency Platform in NetBackup
      2.  
        Understanding the terms
      3. Configuring a Resiliency Platform
        1.  
          Add a Resiliency Platform
        2.  
          Configure a third-party CA certificate
        3.  
          Edit or delete a Resiliency Platform
        4.  
          View the automated or not-automated VMs
      4.  
        Troubleshooting NetBackup and Resiliency Platform issues
    2. Managing Bare Metal Restore (BMR)
      1.  
        About Bare Metal Restore (BMR)
      2.  
        Add a custom role for a Bare Metal Restore (BMR) administrator
    3. Troubleshooting the NetBackup Web UI
      1.  
        Tips for accessing the NetBackup web UI
      2.  
        If a user doesn't have the correct permissions or access in the NetBackup web UI
      3.  
        Unable to validate the user or group when configuring LDAP server

Approve or add mappings for a host that has multiple host names

A NetBackup host can have multiple host names. For example, both a private and a public name or a short name and a fully qualified domain name (FQDN). A NetBackup host may also share a name with other NetBackup host in the environment. NetBackup also discovers cluster names, including the host name and fully qualified domain name (FQDN) of the virtual name of the cluster.

See Examples of auto-discovered mappings for a cluster.

See Example of auto-discovered mappings for a cluster in a multiple NIC environment.

See Examples of auto-discovered mappings for SQL Server environments.

The NetBackup client name of a host (or the primary name) is automatically mapped to its host ID during certificate deployment. For successful communication between NetBackup hosts, NetBackup also automatically maps all hosts to their other host names. However, that method is less secure. Instead, you can choose to disable this setting. Then choose to manually approve the individual host name mappings that NetBackup discovers.

See Disable automatic mapping of NetBackup host names.

Approve the host mappings that NetBackup discovers

NetBackup automatically discovers many shared names or cluster names that are associated with the NetBackup hosts in your environment. Use the Mappings to approve tab to review and accept the relevant host names. When Automatically map host names to their NetBackup host ID is enabled, the Mappings to approve list shows only the mappings that conflict with other hosts.

Note:

You must map all available host names with the associated host ID. When you deploy a certificate to a host, the host name must map to the associated host ID. If it does not, NetBackup considers the host to be a different host. NetBackup then deploys a new certificate to the host and issues it a new host ID.

To approve the host names that NetBackup discovers

  1. On the left, select Security > Host mappings.
  2. Click the Mappings to approve tab.
  3. Click the name of the host.
  4. Review the mappings for the host and click Approve if you want to use the discovered mapping.

    Click Reject if you do not want to associate the mapping with the host.

    The rejected mappings do not appear in the list until NetBackup discovers them again.

  5. Click Save.

 

Map other host names to a host

You can manually map the NetBackup host to its host names. This mapping ensures that NetBackup can successfully communicate with the host using the other name.

To map a host name to a host

  1. On the left, select Security > Host mappings.
  2. Select the host and click Manage mappings.
  3. Click Add.
  4. Enter the host name or IP address and click Save.
  5. Click Close.

 

Map shared or cluster names to multiple NetBackup hosts

Add a shared or a cluster name mapping if multiple NetBackup hosts share a host name. For example, a cluster name.

Note the following before you create a shared or a cluster name mapping:

  • NetBackup automatically discovers many shared names or cluster names. Review the Mappings to approve tab.

  • If a mapping is shared between an insecure and a secure host, NetBackup assumes that the mapping name is secure. However, if at run-time the mapping resolves to an insecure host, the connection fails. For example, assume that you have a two-node cluster with a secure host (node 1) and an insecure host (node 2). In this case, the connection fails if node 2 is the active node.

To map shared or cluster names to multiple NetBackup hosts

  1. On the left, select Security > Host mappings.
  2. Click Add shared or cluster mappings.
  3. Enter a Shared host name or cluster name that you want to map to two or more NetBackup hosts.

    For example, enter a cluster name that is associated with NetBackup hosts in your environment.

  4. On the right, click Add.
  5. Select the NetBackup hosts that you want to add and click Add to list.

    For example, if you entered a cluster name in step 3 select the nodes in the cluster here.

  6. Click Save.
Examples of auto-discovered mappings for a cluster

For a cluster with hosts client01.lab04.com and client02.lab04.com, you may see the following entries. For each host, approve the mappings that are valid.

Host

Auto-discovered mapping

client01.lab04.com

client01

client01.lab04.com

clustername

client01.lab04.com

clustername.lab04.com

client02.lab04.com

client02

client02.lab04.com

clustername

client02.lab04.com

clustername.lab04.com

When you have approved all valid mappings, you see the Mapped host or IP address settings that are similar to the following entries.

Host

Mapped Host Names/IP Addresses

client01.lab04.com

client01.lab04.com, client01, clustername, clustername.lab04.com

client02.lab04.com

client02.lab04.com, client02, clustername, clustername.lab04.com

Example of auto-discovered mappings for a cluster in a multiple NIC environment

Backups of a cluster in a multi-NIC environment require special mappings. You must map the cluster node names to the virtual name of the cluster on the private network.

Table: Mapping host names for a cluster in a multi-NIC environment

Host

Mapped Host Names

Private name of Node 1

Virtual name of the cluster on the private network

Private name of Node 2

Virtual name of the cluster on the private network

For example, for a cluster in a multi-NIC environment with hosts client01-bk.lab04.com and client02-bk.lab04.com, you may see the following entries. For each host, approve the mappings that are valid.

Host

Auto-discovered Mapping

client01-bk.lab04.com

clustername-bk.lab04.com

client02-bk.lab04.com

clustername-bk.lab04.com

When you have approved all valid mappings, you see the Mapped host or IP address settings that are similar to the following entries.

Host

Mapped Host Names/IP Addresses

client01-bk.lab04.com

clustername-bk.lab04.com

client02-bk.lab04.com

clustername-bk.lab04.com

Examples of auto-discovered mappings for SQL Server environments

In Table: Example mapped host names for SQL Server environments, FCI is a SQL Server failover cluster instance. WSFC is Windows Server Failover Cluster.

Table: Example mapped host names for SQL Server environments

Environment

Host

Mapped Host Names

FCI (cluster with two nodes)

Physical name of Node 1

Virtual name of the SQL Server cluster

Physical name of Node 2

Virtual name of the SQL Server cluster

Basic or advanced availability group (primary and secondary)

Primary name

WSFC name

Secondary name

WSFC name

Basic or advanced availability group, with an FCI (primary FCI and secondary FCI)

Primary FCI name

WSFC name

Secondary FCI name

WSFC name

Physical name of Node 1

Virtual name of the SQL Server cluster

Physical name of Node 2

Virtual name of the SQL Server cluster