NetBackup™ Snapshot Manager Install and Upgrade Guide
- Introduction
- Section I. NetBackup Snapshot Manager installation and configuration
- Preparing for NetBackup Snapshot Manager installation
- Deploying NetBackup Snapshot Manager using container images
- Deploying NetBackup Snapshot Manager extensions
- Installing the Snapshot Manager extension on a VM
- Installing the Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
- Installing the Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
- Installing the Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
- NetBackup Snapshot Manager cloud plug-ins
- NetBackup Snapshot Manager application agents and plug-ins
- Installing and configuring Snapshot Manager agent
- Configuring the Snapshot Manager application plug-in
- Microsoft SQL plug-in
- Oracle plug-in
- NetBackup protection plan
- Protecting assets with NetBackup Snapshot Manager's agentless feature
- Volume Encryption in NetBackup Snapshot Manager
- NetBackup Snapshot Manager security
- Preparing for NetBackup Snapshot Manager installation
- Section II. NetBackup Snapshot Manager maintenance
- NetBackup Snapshot Manager logging
- Upgrading NetBackup Snapshot Manager
- Uninstalling NetBackup Snapshot Manager
- Troubleshooting NetBackup Snapshot Manager
Configuring AWS permissions for Snapshot Manager
To protect your Amazon Web Services (AWS) assets, Snapshot Manager must first have access to them. You must associate a permission policy with each Snapshot Manager user who wants to work with AWS assets.
Ensure that the user account or role is assigned the minimum permissions required for Snapshot Manager.
See AWS permissions required by Snapshot Manager.
To configure permissions on Amazon Web Services
- Create or edit an AWS user account from Identity and Access Management (IAM).
- Perform one of the following.
To create a new AWS user account, perform the following:
From IAM, select the Users pane and click Add user.
In the User name field, enter a name for the new user.
Select the Access type. This value determines how AWS accesses the permission policy. (This example uses Programmatic access).
Select Next: Permissions.
On the Set permissions for username screen, select Attach existing policies directly.
Select the previously created permission policy (shown below) and select Next: Review.
On the Permissions summary page, select Create user.
Obtain the Access Key and Secret Key for the newly created user.
To edit an AWS user account, perform the following:
Select Add permissions.
On the Grant permissions screen, select Attach existing policies directly.
Select the previously created permission policy (shown below), and select Next: Review.
On the Permissions summary screen, select Add permissions.
- To configure the AWS plug-in for the created or edited user, refer to the plug-in configuration notes.
More Information