Please enter search query.
Search <book_title>...
NetBackup™ Deployment Guide for Kubernetes Clusters
Last Published:
2024-06-17
Product(s):
NetBackup & Alta Data Protection (10.4.0.1)
- Introduction
- Section I. Configurations
- Prerequisites
- Recommendations and Limitations
- Configurations
- Configuration of key parameters in Cloud Scale deployments
- Section II. Deployment
- Section III. Monitoring and Management
- Monitoring NetBackup
- Monitoring Snapshot Manager
- Monitoring MSDP Scaleout
- Managing NetBackup
- Managing the Load Balancer service
- Managing PostrgreSQL DBaaS
- Performing catalog backup and recovery
- Managing MSDP Scaleout
- Section IV. Maintenance
- MSDP Scaleout Maintenance
- PostgreSQL DBaaS Maintenance
- Patching mechanism for Primary and Media servers
- Upgrading
- Cloud Scale Disaster Recovery
- Uninstalling
- Troubleshooting
- Troubleshooting AKS and EKS issues
- Troubleshooting AKS-specific issues
- Troubleshooting EKS-specific issues
- Troubleshooting AKS and EKS issues
- Appendix A. CR template
Updating database certificate in DBaaS
Create Secret containing DBaaS CA certificates. NetBackup version 10.4 stores db cert in db-cert
configMap instead of KeyVault/SecretsManager secret. The db-cert
configMap is created by trust manager.
Perform the following to create Secret containing DBaaS CA certificates:
AKS-specific:
TLS_FILE_NAME='/tmp/tls.crt' rm -f ${TLS_FILE_NAME} DB_CERT_URL="https://cacerts.digicert.com/DigiCertGlobalRootCA.crt.pem" curl ${DB_CERT_URL} --output ${TLS_FILE_NAME} kubectl -n netbackup create secret generic postgresql-netbackup-ca --save-config --dry-run=client --from-file ${TLS_FILE_NAME} -o yaml | kubectl apply -f -
EKS-specific:
TLS_FILE_NAME='/tmp/tls.crt' PROXY_FILE_NAME='/tmp/proxy.pem' rm -f ${TLS_FILE_NAME} ${PROXY_FILE_NAME} DB_CERT_URL="https://truststore.pki.rds.amazonaws.com/global/global-bundle.pem" DB_PROXY_CERT_URL="https://www.amazontrust.com/repository/AmazonRootCA1.pem" curl ${DB_CERT_URL} --output ${TLS_FILE_NAME} curl ${DB_PROXY_CERT_URL} --output ${PROXY_FILE_NAME} cat ${PROXY_FILE_NAME} >> ${TLS_FILE_NAME} kubectl -n netbackup create secret generic postgresql-netbackup-ca --save-config --dry-run=client --from-file ${TLS_FILE_NAME} -o yaml | kubectl apply -f -
Restart the primary pod using the following command:
kubectl rollout restart "statefulset/${PRIMARY}" --namespace "${NAMESPACE}"