NetBackup™ Snapshot Manager Install and Upgrade Guide
- Introduction
- Section I. NetBackup Snapshot Manager installation and configuration
- Preparing for NetBackup Snapshot Manager installation
- Deploying NetBackup Snapshot Manager using container images
- Deploying NetBackup Snapshot Manager extensions
- Installing the NetBackup Snapshot Manager extension on a VM
- Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
- Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
- Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
- NetBackup Snapshot Manager cloud providers
- Configuration for protecting assets on cloud hosts/VM
- Protecting assets with NetBackup Snapshot Manager's on-host agent feature
- Installing and configuring NetBackup Snapshot Manager agent
- Configuring the NetBackup Snapshot Manager application plug-in
- Microsoft SQL plug-in
- Oracle plug-in
- Protecting assets with NetBackup Snapshot Manager's agentless feature
- NetBackup Snapshot Manager assets protection
- Volume Encryption in NetBackup Snapshot Manager
- NetBackup Snapshot Manager security
- Preparing for NetBackup Snapshot Manager installation
- Section II. NetBackup Snapshot Manager maintenance
- NetBackup Snapshot Manager logging
- Upgrading NetBackup Snapshot Manager
- Migrating and upgrading NetBackup Snapshot Manager
- Post-upgrade tasks
- Uninstalling NetBackup Snapshot Manager
- Troubleshooting NetBackup Snapshot Manager
Volume encryption for GCP
You can encrypt disks in GCP using the following methods:
Encryption by default (PMK or Google Managed Key)
Customer Managed Encryption Key (CMEK) using Google Cloud KMS
For more information on GCP encryption, see: Google Cloud Encryption.
Table: Encryption for creating snapshots
Disk encryption | Snapshot encryption |
---|---|
Platform Managed Key (PMK) | Same PMK is used as the source disk. |
CMEK | Same CMEK is used as the source disk. |
Table: Encryption for restoring snapshots
Snapshot encryption | Restored disk encryption |
---|---|
PMK | Same PMK is used as the snapshot. |
CMEK | Same CMEK is used as the snapshot, if the target restore location is within the scope of the key. |
Table: Encryption for restoring from backup
Snapshot encryption | Restored disk encryption |
---|---|
PMK | Same PMK is used as the source disk. |
CMEK | Same CMEK is used as the source disk, else PMK is used. |
Note:
For successful restoration, the target restore location must be inside the scope of the key during restoration.