NetBackup™ Snapshot Manager Install and Upgrade Guide
- Introduction
- Section I. NetBackup Snapshot Manager installation and configuration
- Preparing for NetBackup Snapshot Manager installation
- Deploying NetBackup Snapshot Manager using container images
- Deploying NetBackup Snapshot Manager extensions
- Installing the NetBackup Snapshot Manager extension on a VM
- Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
- Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
- Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
- NetBackup Snapshot Manager cloud providers
- Configuration for protecting assets on cloud hosts/VM
- Protecting assets with NetBackup Snapshot Manager's on-host agent feature
- Installing and configuring NetBackup Snapshot Manager agent
- Configuring the NetBackup Snapshot Manager application plug-in
- Microsoft SQL plug-in
- Oracle plug-in
- Protecting assets with NetBackup Snapshot Manager's agentless feature
- NetBackup Snapshot Manager assets protection
- Volume Encryption in NetBackup Snapshot Manager
- NetBackup Snapshot Manager security
- Preparing for NetBackup Snapshot Manager installation
- Section II. NetBackup Snapshot Manager maintenance
- NetBackup Snapshot Manager logging
- Upgrading NetBackup Snapshot Manager
- Migrating and upgrading NetBackup Snapshot Manager
- Post-upgrade tasks
- Uninstalling NetBackup Snapshot Manager
- Troubleshooting NetBackup Snapshot Manager
Configuring AWS permissions for NetBackup Snapshot Manager
To protect your Amazon Web Services (AWS) assets, NetBackup Snapshot Manager must first have access to them. You must associate a permission policy with each NetBackup Snapshot Manager user who wants to work with AWS assets.
Ensure that the user account or role is assigned the minimum permissions required for NetBackup Snapshot Manager.
See AWS permissions required by NetBackup Snapshot Manager.
To configure permissions on Amazon Web Services
- Create or edit an AWS user account from Identity and Access Management (IAM).
- Perform one of the following.
To create a new AWS user account, perform the following:
From IAM, select the Users pane and click Add user.
In the User name field, enter a name for the new user.
Select the Access type. This value determines how AWS accesses the permission policy. (This example uses Programmatic access).
Select Next: Permissions.
On the Set permissions for username screen, select Attach existing policies directly.
Select the previously created permission policy (shown below) and select Next: Review.
On the Permissions summary page, select Create user.
Obtain the Access Key and Secret Key for the newly created user.
To edit an AWS user account, perform the following:
Select Add permissions.
On the Grant permissions screen, select Attach existing policies directly.
Select the previously created permission policy (shown below), and select Next: Review.
On the Permissions summary screen, select Add permissions.
- To configure the AWS plug-in for the created or edited user, refer to the plug-in configuration notes.
More Information