请输入搜索词进行查询
搜索 <book_title>...
NetBackup™ Web UI 云管理指南
Last Published:
2024-07-11
Product(s):
NetBackup & Alta Data Protection (10.4.0.1)
- 管理和保护云资产
- 在 NetBackup 中配置 Snapshot Manager
- 管理云资产的智能组
- 保护云资产或云资产的智能组
- 关于使用资源组保护 Microsoft Azure 资源
- 关于适用于云工作负载的 NetBackup 加速器
- 保护 PaaS 资产
- 恢复云资产
- 执行粒度还原
- 对云资产的保护和恢复进行故障排除
安装 Amazon RDS for Oracle 客户端实用程序
Amazon RDS for Oracle 客户端实用程序的建议版本为 21.11.0.0.0-1.el8。
下载位置 |
instantclient-basic | |
instantclient-odbc |
要安装,请在终端中运行以下命令:
- c. yum install unixODBC
- rpm -ivh oracle-instantclient-basic-21.10.0.0.0-1.el8.x86_64.rpm
- d. rpm -ivh oracle-instantclient-odbc-21.10.0.0.0-1.el8.x86_64.rpm
安装 EFS 实用程序并配置权限
安装 EFS 实用程序
- 请访问 AWS 文档中的此页面:
https://docs.aws.amazon.com/efs/latest/ug/installing-amazon-efs-utils.html
- 请参考“为 Amazon Linux、Amazon Linux 2 以及 OpenSUSE 或 SLES 以外的 Linux 发行版构建并安装 amazon-efs-utils 作为 RPM 软件包”部分。
- 安装
stunnel
版本 5。 - 将区域从
/etc/amazon/efs/efs-utils.conf
修改为 RDS 实例区域。
在 AWS 上配置 EFS 和还原装入路径
需要先配置 Amazon Elastic File System (EFS),然后才能执行任何备份。
要配置 EFS,请参见以下知识库文章:
要配置还原装入路径,请参见以下知识库文章:
为 NetBackup 配置 AWS 权限
NetBackup 需要在 AWS 中具有权限才能执行备份和还原。要配置权限,请创建 AWS IAM 角色并为角色分配 NetBackup 所需的权限。有关如何创建 IAM 角色的更多信息,请参见 AWS 文档中的此链接:
https://docs.aws.amazon.com/iam/index.html
所需权限:
efsdescribemounttarget: { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "elasticfilesystem:DescribeMountTargets", "elasticfilesystem:DescribeFileSystems", ], "Resource": [ "arn:aws:elasticfilesystem:*:*:access-point/*", "arn:aws:elasticfilesystem:*:*:file-system/*" ] } ] } rdsdescribeoptiongroup { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "rds:CreateOptionGroup", "rds:ModifyDBInstance", "rds:ModifyOptionGroup", "s3:*" ], "Resource": "*" } ] } AmazonRDSReadOnlyAccess:(AWS Managed) { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "rds:Describe*", "rds:ListTagsForResource", "ec2:DescribeAccountAttributes", "ec2:DescribeAvailabilityZones", "ec2:DescribeInternetGateways", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcAttribute", "ec2:DescribeVpcs" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "cloudwatch:GetMetricStatistics", "cloudwatch:ListMetrics", "cloudwatch:GetMetricData", "logs:DescribeLogStreams", "logs:GetLogEvents", "devops-guru:GetResourceCollection" ], "Resource": "*" }, { "Action": [ "devops-guru:SearchInsights", "devops-guru:ListAnomaliesForInsight" ], "Effect": "Allow", "Resource": "*", "Condition": { "ForAllValues:StringEquals": { "devops-guru:ServiceNames": [ "RDS" ] }, "Null": { "devops-guru:ServiceNames": "false" } } } ] }
管理 Redshift 快照和信任关系需要以下权限:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "redshift:ListDatabases", "redshift:DescribeClusters", "redshift:CreateTags", "redshift:CreateClusterSnapshot", "redshift:DescribeClusterSnapshots", "redshift:DeleteClusterSnapshot", "redshift:DescribeClusterSubnetGroups", "redshift:RestoreFromClusterSnapshot", "ec2:DescribeInternetGateways", "ec2:DescribeAddresses", "ec2:DescribeAvailabilityZones", "ec2:DescribeVpcs", "ec2:DescribeAccountAttributes", "ec2:DescribeSubnets", "ec2:DescribeSecurityGroups", "iam:GetRole" ], "Resource": "*" } ] }
最小信任关系实体:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": [ "redshift.amazonaws.com", "ec2.amazonaws.com" ] }, "Action": "sts:AssumeRole" } ] }