Veritas Access Appliance 8.0 Solutions Guide for NetBackup

Last Published:
Product(s): Appliances (8.0)
Platform: Access Appliance OS,Veritas 3340,Veritas 3350
  1. Access Appliance integration with NetBackup
    1.  
      About Access Appliance as a NetBackup client
    2.  
      About Access Appliance as backup storage for NetBackup
    3.  
      Use cases for long-term data retention
  2. System requirements
    1.  
      Supported configurations and versions for NetBackup with Veritas Data Deduplication
    2.  
      Supported configurations and versions for NetBackup with MSDP-C
  3. Configuring Veritas Data Deduplication with Access Appliance
    1.  
      About Veritas Data Deduplication
    2.  
      Benefits of using Veritas Data Deduplication with Access Appliance
    3. Configuring Veritas Data Deduplication without WORM
      1.  
        Configuring Veritas Data Deduplication using the GUI
      2.  
        Configuring Veritas Data Deduplication using the Access CLISH
    4. Configuring Veritas Data Deduplication with WORM
      1.  
        Configuring Veritas Data Deduplication with WORM using GUI
      2.  
        Configuring Veritas Data Deduplication with WORM using the Access CLISH
    5.  
      Managing Veritas Data Deduplication using the Access CLISH
    6. Managing Veritas Data Deduplication using GUI
      1.  
        Unconfiguring Veritas Data Deduplication
      2.  
        Adding secondary IP for Veritas Data Deduplication
      3.  
        Deleting secondary IP for Veritas Data Deduplication
    7. Accessing Access Appliance WORM storage shell for management tasks
      1. About the Access Appliance WORM storage server shell
        1. About the dedupe command
          1.  
            Stopping and starting the MSDP services
        2.  
          About the retention command
        3.  
          About the setting command
        4.  
          About the support command
    8.  
      Support for multiple domains across networks for Veritas Data Deduplication
    9.  
      Veritas Data Deduplication storage layout
    10.  
      Configuring a Veritas Data Deduplication storage unit on NetBackup
    11.  
      Configuring global deduplication using the Veritas Data Deduplication storage server across the domain
    12.  
      Enabling Veritas Data Deduplication encryption
    13.  
      Support for bandwidth throttling during duplication
    14. Support for NetBackup Auto Image Replication
      1.  
        Separating the duplication and replication network
  4. Configuring MSDP-C with Access Appliance
    1.  
      Starting the Access S3 server and provisioning the S3 bucket
    2.  
      Configuring Access S3 bucket with NetBackup MSDP-C
  5. Migrating the NetBackup images from existing storage to Veritas Access storage
    1.  
      Migrating NetBackup images from CloudCatalyst/S3/MSDP-C to Veritas Data Deduplication storage
    2.  
      Migrating the NetBackup images from the Veritas Data Deduplication STU to the MSDP-C STU
  6. Configuring Access Appliance with the NetBackup client
    1.  
      Configuring Access Appliance for NetBackup client
    2.  
      Installing the NetBackup client add-on packages
    3.  
      Prerequisites for configuring the NetBackup client
    4.  
      Configuring the NetBackup client
    5.  
      Adding an optional media server
    6.  
      Adding multiple primary servers
    7.  
      Adding file systems to the backup configuration
    8.  
      Removing file systems from backup configuration
    9.  
      Changing the virtual IP address used by the NetBackup client
    10.  
      Upgrade the NetBackup client
    11.  
      Unconfiguring the NetBackup client
    12.  
      Enabling Veritas Data Deduplication catalog backup with NetBackup client
    13.  
      Disabling Veritas Data Deduplication catalog backup from NetBackup client
    14.  
      Displaying the status of NetBackup services
    15.  
      Configuring backup operations using NetBackup or other third-party backup applications
    16.  
      Restoring filesystems backed up with NetBackup client
  7. Troubleshooting
    1.  
      Additional resources
    2.  
      Generating Access Appliance S3 server keys using the helper script
  8.  
    Index

Starting the Access S3 server and provisioning the S3 bucket

You can use the following procedure to start the S3 server and provision the S3 bucket.

Note:

The size of the bucket for MSDP-C should not be more than 1 PiB.

Note:

NetBackup bucket with WORM-enabled is only supported with Compliance mode.

To start the S3 server and provision the S3 bucket using the Access GUI

  1. In S3 buckets for NetBackup area, click Provision storage.

    Or

    Navigate to Quick Actions > Provision Storage > Storage for NetBackup > S3 without cloud. Click Next.

  2. Click Configure S3 server.
  3. Select the storage pool and click Start S3 server. If you want to enable SSL for S3 server. then turn on the Enable SSL toggle button.
  4. Click Activate LTR Policy.
  5. If you want to configure NetBackup MSDP-C on a non-WORM bucket, select NetBackup LTR S3 Bucket policy and click Complete prerequisites.

    If you want to configure NetBackup MSDP-C on a WORM bucket, select NetBackup LTR S3 Bucket (WORM) policy and click Complete prerequisites.

  6. For non-WORM use case, select the storage pool. Click Activate policy.

    For WORM use case, select the storage pool.

  7. Perform this step only for WORM use case. During activation, under Set WORM, the minimum and maximum retention period should be left as blank for MSDP-C buckets. This will be applied from NetBackup during configuration. Click Activate policy.
  8. Generate S3 keys. You can use any local/AD/LDAP user credentials. Under Name, enter the username for which you want to create keys and under Password, specify the user password.

    Click on Generate S3 Keys.

  9. Note down the access key and secret key.
  10. Click Provision Storage.
  11. Select the storage policy according to the activation, set the bucket size as per the requirement, and specify the access and the secret keys.