NetBackup™ Deployment Guide for Azure Kubernetes Services (AKS) Cluster

Last Published:
Product(s): NetBackup (10.0.0.1)
  1. Introduction to NetBackup on AKS
    1.  
      About NetBackup deployment on Azure Kubernetes Services (AKS) cluster
    2.  
      Required terminology
    3.  
      User roles and permissions
    4.  
      About MSDP Scaleout
    5.  
      About MSDP Scaleout components
    6.  
      Limitations in MSDP Scaleout
  2. Deployment with environment operators
    1. About deployment with the environment operator
      1.  
        Prerequisites
      2.  
        Contents of the TAR file
      3.  
        Known limitations
    2.  
      Deploying using the deploy.sh file
    3.  
      Deploying the operators manually
    4.  
      Deploying NetBackup and MSDP Scaleout manually
    5.  
      Configuring the environment.yaml file
    6.  
      Uninstalling NetBackup environment and the operators
    7.  
      Applying security patches
  3. Assessing cluster configuration before deployment
    1.  
      How does the Config-Checker utility work
    2.  
      Config-Checker execution and status details
  4. Deploying NetBackup
    1.  
      Preparing the environment for NetBackup installation on AKS
    2.  
      Recommendations of NetBackup deployment on AKS
    3.  
      Limitations of NetBackup deployment on AKS
    4. About primary server CR and media server CR
      1.  
        After installing primary server CR
      2.  
        After Installing the media server CR
    5.  
      Monitoring the status of the CRs
    6.  
      Updating the CRs
    7.  
      Deleting the CRs
    8.  
      Configuring NetBackup IT Analytics for NetBackup deployment
    9.  
      Managing NetBackup deployment using VxUpdate
    10.  
      Migrating the node pool for primary or media servers
  5. Upgrading NetBackup
    1.  
      Preparing for NetBackup upgrade
    2.  
      Upgrading NetBackup operator
    3.  
      Upgrading NetBackup application
    4.  
      Procedure to rollback when upgrade fails
  6. Deploying MSDP Scaleout
    1.  
      Deploying MSDP Scaleout
    2.  
      Prerequisites
    3.  
      Installing the docker images and binaries
    4.  
      Initializing the MSDP operator
    5.  
      Configuring MSDP Scaleout
    6.  
      Using MSDP Scaleout as a single storage pool in NetBackup
    7.  
      Configuring the MSDP cloud in MSDP Scaleout
  7. Upgrading MSDP Scaleout
    1.  
      Upgrading MSDP Scaleout
  8. Monitoring NetBackup
    1.  
      Monitoring the application health
    2.  
      Telemetry reporting
    3.  
      About NetBackup operator logs
    4.  
      Expanding storage volumes
    5.  
      Allocating static PV for Primary and Media pods
  9. Monitoring MSDP Scaleout
    1.  
      About MSDP Scaleout status and events
    2.  
      Monitoring with Azure Container insights
    3.  
      The Kubernetes resources for MSDP Scaleout and MSDP operator
  10. Managing the Load Balancer service
    1.  
      About the Load Balancer service
    2.  
      Notes for Load Balancer service
    3.  
      Opening the ports from the Load Balancer service
  11. Performing catalog backup and recovery
    1.  
      Backing up a catalog
    2.  
      Restoring a catalog
  12. Managing MSDP Scaleout
    1.  
      Adding MSDP engines
    2.  
      Adding data volumes
    3. Expanding existing data or catalog volumes
      1.  
        Manual storage expansion
    4.  
      MSDP Scaleout scaling recommendations
    5. MSDP Cloud backup and disaster recovery
      1.  
        About the reserved storage space
      2.  
        Cloud LSU disaster recovery
    6.  
      MSDP multi-domain support
    7.  
      Configuring Auto Image Replication
    8. About MSDP Scaleout logging and troubleshooting
      1.  
        Collecting the logs and the inspection information
  13. About MSDP Scaleout maintenance
    1.  
      Pausing the MSDP Scaleout operator for maintenance
    2.  
      Logging in to the pods
    3.  
      Reinstalling MSDP Scaleout operator
    4.  
      Migrating the MSDP Scaleout to another node pool
  14. Uninstalling MSDP Scaleout from AKS
    1.  
      Cleaning up MSDP Scaleout
    2.  
      Cleaning up the MSDP Scaleout operator
  15. Troubleshooting
    1.  
      View the list of operator resources
    2.  
      View the list of product resources
    3.  
      View operator logs
    4.  
      View primary logs
    5.  
      Pod restart failure due to liveness probe time-out
    6.  
      Socket connection failure
    7.  
      Resolving an invalid license key issue
    8.  
      Resolving an issue where external IP address is not assigned to a NetBackup server's load balancer services
    9.  
      Resolving the issue where the NetBackup server pod is not scheduled for long time
    10.  
      Resolving an issue where the Storage class does not exist
    11.  
      Resolving an issue where the primary server or media server deployment does not proceed
    12.  
      Resolving an issue of failed probes
    13.  
      Resolving token issues
    14.  
      Resolving an issue related to insufficient storage
    15.  
      Resolving an issue related to invalid nodepool
    16.  
      Resolving a token expiry issue
    17.  
      Resolve an issue related to inconsistency in file ownership
    18.  
      Resolve an issue related to KMS database
    19.  
      Resolve an issue related to pulling an image from the container registry
    20.  
      Resolving an issue related to recovery of data
    21.  
      Check primary server status
    22.  
      Pod status field shows as pending
    23.  
      Ensure that the container is running the patched image
    24.  
      Getting EEB information from an image, a running container, or persistent data
    25.  
      Resolving the certificate error issue in NetBackup operator pod logs
  16. Appendix A. CR template
    1.  
      Secret
    2.  
      MSDP Scaleout CR

Ensure that the container is running the patched image

There are three copies of the container image present in the Kubernetes environment during deployment or patching.

The first image copy is created on a local docker instance during image load operation. To check this copy, do the following:

  1. Run:

    $ docker load -i images/pdk8soptr-16.0.tar.gz

    Sample output:

    Loaded image: msdp-operator:16.0
  2. Taking the image name from step 1, run:

    $ docker image ls | grep msdp-operator

    Sample output:

    msdp-operator   16.0  353d2bd50105   2 days ago  480 MB
  3. Taking the value from step 2, run:

    $ docker inspect 353d2bd50105 | jq .[].Id

    "sha256:353d2bd50105cbc3c61540e10cf32a152432d5173bb6318b8e"

The second copy is created in Azure Container Registry (ACR). To check this copy, do the following:

  1. Run:

    $ docker image tag msdp-operator:16.0 testregistry.azurecr.io/msdp-operator:16.0

  2. Run:

    $ docker image ls | grep msdp-operator

    Sample output:

     msdp-operator            16.0 353d2bd50105 2 days ago 480 MB
     tregistry.azurecr.io/msdp-operator 16.0 353d2bd50105 2 days ago 480 MB 
  3. To push the image to the registry, run:

    $ docker push testregistry.azurecr.io/msdp-operator

    The push refers to a repository [testregistry.azurecr.io/msdp-operator]

    0a504041c925: Layer already exists

    16.0: digest: 
    sha256:d294f260813599562eb5ace9e0acd91d61b7dbc53c3 size:
     2622 
  4. To verify local image digest after the push operation, run:

    $ docker inspect 353d2bd50105 | jq .[].RepoDigests

    Sample output:

    [
       "testregistry.azurecr.io/msdp-operator@sha256:
    d294f260813599562eb5ace9e0acd91d61b7dbc53c3"
     ]
  5. To verify image presence in the registry, run:

    $ az acr repository list --name testregistry

    Sample output:

     [
       "msdp-operator",
     ]
  6. To verify image digest in registry, run:

    $ az acr repository show -n testregistry --image msdp-operator:16.0

    Sample output:

    {
       "changeableAttributes": {
         "deleteEnabled": true,
         "listEnabled": true,
         "readEnabled": true,
         "writeEnabled": true
       },
       "createdTime": "2022-02-01T13:43:26.6809388Z",
       "digest": "sha256:d294f260813599562eb5ace9e0acd91d61b7dbc53c3",
       "lastUpdateTime": "2022-02-01T13:43:26.6809388Z",
       "name": "16.0",
       "signed": false
     }

The third copy is located on a Kubernetes node running the container after it is pulled from the registry. To check this copy, do the following:

  1. Run;

    $ kubectl get nodes -o wide

    NAME                    STATUS   VERSION   INTERNAL-IP   OS-IMAGE             
    aks-agentpool-7601-vmss000 Ready  v1.21.7 10.240.0.4 Ubuntu 18.04.6 LTS   
  2. Use kubectl debug to run a container on the node:

    $ kubectl debug node/aks-nodepool1-7601-vmss000-it --image=mcr.microsoft.com/aks/fundamental/base-ubuntu:v0.0.11 root@aks-agentpool-7601-vmss000:/#

  3. You can interact with the node session from the privileged container:

    chroot /host

  4. Verify the presence of the image:

    /usr/local/bin/crictl image | grep msdp

    Sample output:

    testregistry.azurecr.io/msdp-operator  16.0  353d2bd50105c  182MB
  5. Verify the image ID on the Kubernetes node, run:

    /usr/local/bin/crictl inspecti 353d2bd50105c | jq .[].id

    Sample output

    "sha256:353d2bd50105cbc3c61540e10cf32a152432d5173bb6318b8e"
    null
  6. Verify the image digest on the Kubernetes node, run:

    /usr/local/bin/crictl inspecti 353d2bd50105c | jq .[].repoDigests

    Sample output

    [
      "testregistry.azurecr.io/msdp-operator@sha256:
    d294f260813599562eb5ace9e0acd91d61b7dbc53c3"
    ]
    null
How to make sure that you are running the correct image

Use the steps given above to identify image ID and Digest and compare with values obtained from the registry and the Kubernetes node running the container.

Note:

MSDP Scaleout images (uss-engine, uss-mds, uss-controller, msdp-operator) use IfNotPresent imagePullPolicy. A unique image tag is required in order for a Kubernetes node to pull an updated image.