Veritas NetBackup™ Flex Scale Administrator's Guide

Last Published:
Product(s): Appliances (3.1)
Platform: NetBackup Flex Scale OS
  1. Product overview
    1.  
      About Veritas NetBackup™ Flex Scale
  2. Viewing information about the NetBackup Flex Scale cluster environment
    1.  
      Accessing NetBackup Flex Scale and NetBackup
    2.  
      Accessing the NetBackup web user interface on the appliance
    3.  
      About the NetBackup Flex Scale web UI
    4.  
      About the NetBackup Flex Scale infrastructure management UI
    5. About the Dashboard view
      1.  
        Viewing all the activities
    6.  
      Working with NetBackup Flex Scale APIs
  3. NetBackup Flex Scale infrastructure management
    1. User management
      1.  
        Considerations for managing NetBackup Flex Scale users
      2.  
        Adding users
      3.  
        Changing user password
      4.  
        Removing users
      5.  
        Modifying user roles
      6.  
        Considerations for configuring AD/LDAP
      7.  
        Configuring AD server for Universal shares and Instant Access
      8.  
        Configuring AD/LDAP servers for NetBackup services
      9.  
        Configuring additional AD/LDAP servers for managing NetBackup services/Universal Shares/Instant Access
      10.  
        Configuring AD/LDAP servers on clusters deployed with only media servers
      11.  
        Directory services and certificate management
    2.  
      Region settings management
    3.  
      About NetBackup Flex Scale storage
    4. About Universal Shares
      1.  
        Creating a Protection Point for a Universal Share
    5.  
      Cloud bucket support for NetBackup Flex Scale
    6. Node and disk management
      1.  
        NetBackup Flex Scale network cabling
      2. Adding a node to the cluster using the NetBackup Flex Scale web interface
        1.  
          Considerations for adding a node when disaster recovery is configured
      3.  
        Adding a node using the REST APIs
      4.  
        Replacing a node in a cluster
      5.  
        Starting and stopping nodes
      6.  
        Rebooting a node
      7.  
        Adding an excluded node to the cluster
      8.  
        Replacing a disk
      9.  
        Adding an excluded disk to the cluster
      10.  
        Viewing the disk sync status
      11.  
        Viewing disk details
      12.  
        Viewing node details
      13.  
        Switching management console to another cluster node
    7. License management
      1.  
        Adding or removing storage licenses
      2.  
        Adding NetBackup licenses
    8.  
      Stopping NetBackup service containers
    9.  
      Starting NetBackup service containers
    10. Managing hardware vendor packages
      1.  
        Upgrading vendor packages
      2.  
        Uninstalling vendor packages
  4. NetBackup Flex Scale network management
    1.  
      About network management
    2.  
      Modifying DNS settings
    3.  
      About bonding Ethernet interfaces
    4. Bonding operations
      1. Bonding operations on data network
        1.  
          Creating a bond
        2.  
          Modifying a bond
        3.  
          Removing a bond
    5.  
      Configuring NetBackup Flex Scale in a non-DNS environment
    6. Data network configurations
      1.  
        Choosing the correct input method for data network configuration
      2. Network configuration on plain device (eth5)
        1.  
          Adding a data network
        2.  
          Modifying a data network
        3.  
          Deleting a data network
      3.  
        Network configuration on VLAN (eth5)
      4. Network configuration on bonded interfaces (bond0 on eth5 and eth7)
        1.  
          Adding a data network
      5.  
        VLAN on bond of eth5 and eth7 (bond0)
      6.  
        Network configuration on management interface (eth1)
      7.  
        Network configurations for adding a partial data network
      8.  
        Support for multiple VLAN when disaster recovery is configured
    7.  
      Configuring static routes on a NetBackup Flex Scale cluster
  5. NetBackup Flex Scale infrastructure monitoring
    1. About alert management
      1.  
        Viewing information about alerts
      2.  
        Managing alerts
    2. About event notification
      1.  
        Purging events
    3. About AutoSupport and Call Home
      1.  
        Setting up email alerts
      2.  
        Setting up SNMP alerts
      3.  
        Configuring Call Home settings
    4. Monitoring hardware components
      1.  
        Monitoring deviations in firmware, driver, and utilities
    5.  
      Performing health check for the cluster
    6.  
      Locating the disks
    7.  
      Monitoring usage and licensed capacity using Veritas NetInsights Console
  6. Resiliency in NetBackup Flex Scale
    1.  
      Erasure coding in NetBackup Flex Scale
    2.  
      Handling split-brain scenario in NetBackup Flex Scale
    3.  
      High availability of the NetBackup primary service
    4.  
      High availability of NetBackup services
    5.  
      NetBackup catalog protection
    6. NetBackup primary service catalog protection using checkpoints
      1.  
        Performing a recovery of the catalog file system using GUI
      2.  
        Performing a recovery of the catalog file system using REST APIs
  7. EMS server configuration
    1.  
      Configuring an external BYOS media server
    2.  
      Configuring an external NBA media server
  8. Site-based disaster recovery in NetBackup Flex Scale
    1.  
      About site-based disaster recovery in NetBackup Flex Scale
    2.  
      Configuring disaster recovery using GUI
    3.  
      Clearing the host cache
    4.  
      Automated NetBackup SLP management
    5.  
      DNS key management
    6.  
      Managing disaster recovery using GUI
    7. Performing disaster recovery using RESTful APIs
      1.  
        Establishing trust and setting up authentication
      2.  
        Configuring disaster recovery
      3.  
        Managing disaster recovery
    8.  
      Active-Active disaster recovery configuration
    9.  
      NetBackup optimized duplication using Storage Lifecycle Policies
  9. NetBackup Flex Scale security
    1. STIG overview for NetBackup Flex Scale
      1.  
        STIG-compliant password policy rules
      2.  
        Enabling STIG for NetBackup Flex Scale
      3.  
        Viewing the NetBackup Flex Scale STIG status
    2. FIPS overview for NetBackup Flex Scale
      1.  
        Viewing the NetBackup Flex Scale FIPS status
    3.  
      Managing the login banner
    4.  
      Changing the password policy
    5. Support for immutability in NetBackup Flex Scale
      1.  
        About lockdown modes
      2.  
        Selecting or changing the lockdown mode
      3.  
        Restricted access to Remote Management Platform (HPe iLO)
      4.  
        Configuring immutability using GUI
    6.  
      Authenticating users using digital certificates or smart cards
    7.  
      About system certificates on NetBackup Flex Scale
    8. Deploying external certificates on NetBackup Flex Scale
      1.  
        Deploying ECA using the GUI
      2.  
        Log locations
      3.  
        Considerations for performing other operations when ECA is deployed
  10. Troubleshooting
    1.  
      Services management
    2.  
      Audit logs
    3. Collecting logs for cluster nodes
      1.  
        Uploading logs to Veritas Support
      2.  
        Downloading logs
    4. Troubleshooting NetBackup Flex Scale issues
      1.  
        If cluster configuration fails (for example because an IP address that was already in use is specified) and you try to reconfigure the cluster, the UI displays an error but the configuration process continues to run
      2.  
        Validation error while adding VMware credentials to NetBackup
      3.  
        NetBackup Web UI incorrectly displays some NetBackup Flex Scale processes as failed
      4.  
        Unable to create BMR Shared Resource Tree (SRT) on NetBackup Flex Scale Appliance
      5.  
        NetBackup configuration files are not persistent across operations that require restarting the system
  11. Appendix A. Maintenance procedures for HPE servers
    1.  
      Replacement procedure for a chassis fan
    2.  
      Replacement procedure for power supply
    3.  
      Replacement procedure for a single OS disk
    4.  
      Replacement procedure for both OS disks on the management console node
    5.  
      Replacement procedure for both OS disks on a non- management console node
    6.  
      Replacement procedure for NVMe disks (SSDs)
    7.  
      Replacement procedure for RAID controller
    8.  
      Replacement procedure for an Integrated Lights-Out (iLO) port
    9.  
      Replacement procedure for quad-port NIC
    10.  
      Procedure for memory expansion (DIMMs)
    11.  
      Replacement procedure for memory (DIMMs)
    12.  
      Replacement procedure for Mellanox port
  12. Appendix B. Configuring NetBackup optimized duplication
    1. Configuring a Storage Lifecycle Policy for optimized duplication
      1.  
        Creating a Storage Lifecycle Policy for optimized duplication
      2.  
        Configuring a policy to use an SLP
      3.  
        Updating the policy to reverse the replication direction
  13. Appendix C. Disaster recovery terminologies
    1.  
      VVR technology in disaster recovery
    2.  
      About response fields in the GET disaster recovery API
  14. Appendix D. Configuring Auto Image Replication
    1.  
      Auto Image Replication configuration

Restricted access to Remote Management Platform (HPe iLO)

If you select enterprise or compliance mode, you can restrict remote management access to the node by selecting the Restrict remote management access check box. This option is not available for normal lockdown mode. Restricting remote management access to nodes provides an additional level of data security and limits the privileges and operations that you can perform.

After you enable this restriction, a sysadmin user with IPMI role on an HPE platform has only Login and Virtual Power and Reset privileges. With these privileges, the user can only view settings in iLO and perform power-related operations.

Prerequisite:

  • Ensure that the sysadmin user account with default password (P@ssw0rd) is present on all the nodes.

  • Ensure that the sysadmin user account has full administrative privileges before you enable this restriction.

  • Run full discovery after sysadmin IPMI user is added on all the cluster nodes.

After you enable restricted remote access, remember that:

  • In enterprise lockdown mode, you can enable or disable restricted remote management access.

  • In compliance lockdown mode, you can only enable restricted remote management access, but cannot disable the remote management access restriction.

  • You can also choose to enable or disable restricted remote management access after the initial configuration is complete.

Warning:

Once you enable restricted remote management access, all destructive operations are disabled for all the IPMI users. Users can view and perform limited operations in the IPMI web GUI but cannot access the remote console. Physical access to the system is required to logon to the console.

Table: HPE iLO lists the privileges given for a local account in iLO.

Table: HPE iLO

Privileges

Description

Login

Enables a user to log on to iLO.

Remote Console

Enables a user to access the host system remote console, including video, keyboard, and mouse control. Users with this privilege can access the BIOS, and therefore may be able to perform host-based BIOS, iLO, storage, and network tasks.

User Config

Enables a user to add, edit, and delete local iLO user accounts. A user with this privilege can change privileges for all users. If you are not assigned this privilege, you can view your own settings and change your own password.

iLO Config

Enables a user to configure most iLO settings, including security settings, and to update the iLO firmware. This privilege does not enable local user account administration. After iLO is configured, revoking this privilege from all users prevents reconfiguration from the following interfaces:

  • iLO web interface

  • iLO RESTful API

  • CLI

  • HPQLOCFG

Users who have access to the following interfaces can still reconfigure iLO:

  • UEFI System Utilities

  • HPONCFG

Only a user who has the Administer User Accounts privilege can enable or disable this privilege.

Virtual Media

Enables a user to use the virtual media feature on the host system.

Virtual Power and Reset

Enables a user to power-cycle or reset the host system. These activities interrupt the system availability. A user with this privilege can diagnose the system by using the Generate NMI to System button.

Host NIC Config

Enables a user to configure the host NIC settings. This privilege does not affect configuration through host-based utilities.

Host Bios Config

Allows configuration of the host BIOS settings by using the UEFI System Utilities. This privilege is required for replacing the active system ROM with the redundant system ROM. This privilege does not affect configuration through host-based utilities.

Host Storage Config

Enables a user to configure the host storage settings. This privilege does not affect configuration through host-based utilities.

Recovery Set

Enables a user to manage the System Recovery Set.

By default, the Recovery Set privilege is assigned to the default administrator account. This privilege can be added to a user account only by creating or editing the account with an account that already has this privilege.

If there is no user account with the Recovery Set privilege, and an account with this privilege is required, reset the management processor to the factory default settings. The factory default reset creates a default Administrator account with the Recovery Set privilege. This privilege is not available when iLO security is disabled with the system maintenance switch. For information about the default account credentials and how to configure this privilege without access to an account that has this privilege, see the iLO User Guide.