NetBackup™ Web UI Administrator's Guide
- Section I. About NetBackup
- Introducing NetBackup
- Administering NetBackup licenses
- Registering with Veritas Alta View
- Introducing NetBackup
- Section II. Monitoring and notifications
- Monitoring NetBackup activity
- Activity monitor
- Job monitoring
- Troubleshooting the viewing and managing of jobs
- Device monitor
- Notifications
- Monitoring NetBackup activity
- Section III. Configuring hosts
- Managing host properties
- Managing credentials for workloads and systems that NetBackup accesses
- Add a credential for CyberArk
- Managing deployment
- Section IV. Configuring storage
- Overview of storage options
- Configuring storage units
- Configuring disk storage
- Integrating MSDP Cloud and CMS
- Managing media servers
- Managing tape drives
- Staging backups
- Troubleshooting storage configuration
- Section V. Configuring backups
- Overview of backups in the NetBackup web UI
- Managing protection plans
- Managing classic policies
- Protecting the NetBackup catalog
- Catalog backups
- Managing backup images
- Pausing data protection activity
- Section VI. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Configuring multi-person authorization
- Managing user sessions
- Configuring multi-factor authentication
- Managing the global security settings for the primary server
- About trusted primary servers
- Using access keys, API keys, and access codes
- Configuring authentication options
- Managing role-based access control
- Disabling access to NetBackup interfaces for OS Administrators
- Section VII. Detection and reporting
- Section VIII. NetBackup workloads and NetBackup Flex Scale
- Section IX. Disaster recovery and troubleshooting
- Section X. Other topics
- Additional NetBackup catalog information
- About the NetBackup database
Add a custom RBAC role to restore Azure-managed instances
To restore Azure-managed instances, users must have the view permission for these instances. Administrators and similar users can provide other users with a custom role and this permission.
To assign the view permission for Azure-managed instances
- To get the access control ID of the managed instance, enter the following command:
GET /asset-service/workloads/cloud/assets?filter=extendedAttributes/ managedInstanceName eq 'managedInstanceName'
Search for accessControlId field in the response. Note down the value of this field.
- To get the role ID, enter the following command:
GET /access-control/roles
Search for the id field in the response. Note down the value of this field.
- Create an access definition, as follows:
POST /access-control/managed-objects/{objectId}/access-definitions
Request payload
{ "data": { "type": "accessDefinition", "attributes": { "propagation": "OBJECT_AND_CHILDREN" }, "relationships": { "role": { "data": { "id": "<roleId>", "type": "accessControlRole" } }, "operations": { "data": [ { "id": "|OPERATIONS|VIEW|", "type": "accessControlOperation" } ] }, "managedObject": { "data": { "id": "<objectId>", "type": "managedObject" } } } } }
Use the following values:
objectId: Use the value of accessControlId obtained from step 1.
roleId: Use the value of id obtained from step 2.
Note:
For an alternate restore, provide the |OPERATIONS|ASSETS|CLOUD|RESTORE_DESTINATION| permission in the operations list.