NetBackup™ Web UI Nutanix AHV Administrator's Guide

Last Published:
Product(s): NetBackup & Alta Data Protection (10.3.0.1, 10.3)
  1. Overview
    1.  
      Overview of configuring and protecting AHV assets in the NetBackup web UI
  2. Managing AHV clusters
    1.  
      Quick configuration checklist to protect AHV virtual machines
    2.  
      Configure secure communication between the AHV cluster and NetBackup host and Nutanix Prism Central and NetBackup host
    3.  
      Enable the iSCSI initiator service on windows backup host
    4.  
      Install the iSCSI initiator package on Linux backup host
    5.  
      Migrate Java GUI/CLI added clusters into WebUI
    6.  
      Prerequisites to configure Nutanix AHV cluster
    7.  
      About support for Nutanix segmented iSCSI network
    8.  
      Configure CHAP settings for iSCSI secure communication with AHV clusters
    9.  
      About the ports that NetBackup uses to communicate with AHV
    10.  
      Add or browse an AHV cluster
    11.  
      Remove AHV Clusters
    12.  
      Add a new Nutanix Prism Central
    13.  
      Add new Prism Central server credentials
    14.  
      Remove Nutanix Prism Central
    15.  
      Create an intelligent VM group
    16.  
      Assign permissions to the intelligent VM group
    17.  
      Update the intelligent VM group
    18.  
      Remove the intelligent VM group
    19.  
      Set CHAP for iSCSI
    20.  
      Add an AHV access host
    21.  
      Remove an AHV access host
    22.  
      Change resource limits for AHV resource types
    23.  
      Change the autodiscovery frequency of AHV assets
  3. Managing credentials
    1. Managing AHV cluster credentials
      1.  
        Add new cluster credentials
      2.  
        Update and validate AHV cluster credentials
    2. Managing Nutanix Prism Central credentials
      1.  
        Add new Nutanix Prism Central credentials
      2.  
        Update and validate Nutanix Prism Central credentials
    3.  
      View the credential name that is applied to an asset
    4.  
      Edit or delete a named credential
  4. Protecting AHV virtual machines
    1.  
      Things to know before you protect AHV virtual machines
    2.  
      Protect AHV VMs or intelligent VM groups
    3.  
      Protect AHV VMs within VPC
    4.  
      Customize protection settings for an AHV asset
    5.  
      Schedules and retention
    6.  
      Backup options
    7.  
      Prerequisite to Enable virtual machine quiescing
    8.  
      Remove protection from VMs or intelligent VM groups
    9.  
      View the protection status of VMs or intelligent VM groups
  5. Recovering AHV virtual machines
    1.  
      Things to consider before you recover the AHV virtual machines
    2.  
      About the pre-recovery check
    3.  
      Recover an AHV virtual machine
    4.  
      Recover an AHV VM within VPC
    5.  
      About Nutanix AHV agentless files and folders restore
    6.  
      Prerequisites for agentless files and folder recovery
    7.  
      SSH key fingerprint
    8.  
      Recover files and folders with Nutanix AHV agentless restore
    9.  
      Recovery target options
    10.  
      Pre-recovery checks for Nutanix AHV
    11.  
      About Nutanix-AHV agent-based files and folders restore
    12.  
      Prerequisites for agent-based files and folder recovery
    13.  
      Recover files and folders with Nutanix AHV agent based restore
    14.  
      Limitations
  6. Troubleshooting AHV operations
    1.  
      Troubleshooting tips for NetBackup for AHV
    2.  
      Error during AHV credential addition
    3.  
      Error during the AHV virtual machines discovery phase
    4.  
      Errors for the Status for a newly discovered VM
    5.  
      Error run into while backing up AHV virtual machines
    6.  
      Error while restoring AHV virtual machines
  7. API and command line options for AHV
    1.  
      Using APIs and command line options to manage, protect, or recover AHV virtual machines
    2.  
      Additional NetBackup options for AHV configuration
    3.  
      Additional information about the rename file

Recovery target options

Table: Recovery target options

Step overview

Description and reference

Target host

  • Target host field is pre-populated with the source AHV VM hostname/IP stored during last successful discovery for respective AHV cluster of the VM.

    Warning:

    An agent-based restore is performed if the NetBackup client is installed and configured with provided hostname or IP.

  • If you want to perform a restore on another NetBackup client, click Search and select the required client from list.

    Note:

    Ensure that you select clients with homogenous platforms.

  • If search option is unavailable, manually enter target host.

  • If you want to perform restore on host on which NetBackup client is not installed, enter the host FQDN or IP in target host. Agentless restore options are displayed.

Agentless restore options

  • Change staging location on target host: If you want to provide a different staging location other than the default staging location, enter the desired path. Staging location path must have only ASCII characters.

    Note:

    Default staging location is user's home directory.

  • File restore options: Based on your requirement, select one of the following appropriate files restores options between:

    • Restore everything to original directory

    • Restore everything to different directory Provide different directory path to restore.

    • Flatten existing directory structure Select this option to restore everything to a single directory without creating any subfolders when files are selected from different directories.

Recovery Host

  • Recovery host field is pre-populated with backup host, that was used to during the backup operation for selected AHV VM.

    Note:

    Recovery host field is empty if the selected VM and backup host platform are not homogenous.

    Note:

    To restore files to Ubuntu target host use either RHEL or SUSE as recovery host.

  • Click on search to select another recovery host. It shows a list of compatible Media servers. If you want to select NetBackup client as a recovery host, click on Media servers > Clients.

  • If search option is not available, manually enter recovery host.

    Note:

    Recovery host should be of homogeneous platform as the source VM and NetBackup 9.1 or later server or client must be installed.

  • In flex scale environment, if all media servers are not listed in media server tab, then user either need view permission on media server or can manually type the media server to proceed.

  • If you have performed restore on same target host earlier, recovery host is pre-populated with the previously used recovery host based on pre-assigned permissions provided to user performing this restore.

Linux SSH Connectivity

For selected source Linux VM SSH connectivity the following options are displayed:

  • Target host SSH port Specify SSH port of the target host. Default value is 22.

    If you have performed restore on same target host earlier, SSH port is pre-populated with previously used value based on pre-assigned permissions by the user performing this restore.

  • Target host SSH key fingerprint To authenticate target host, provide SSH key fingerprint in hexadecimal format.

    • You can either manually enter target host SSH key fingerprint or click on Fetch SSH Key fingerprint.

    • Fetch SSH Key fingerprint: If Fetch SSH Key fingerprint option is not available, you must provide SSH key fingerprint manually. See SSH key fingerprint.

    • If you have performed restore on same target host earlier, SSH key fingerprint is pre-populated with previously used value based on pre-assigned permissions by the user performing this restore. You can overwrite pre-populated value for re-establishing trust.

  • Fetch SSH Key fingerprint

    • Display list of SSH key fingerprint along with NetBackup supported Key types configured on target host.

    • Select one of the listed fingerprints and click OK. NetBackup establishes trust with target host using selected fingerprint.

  • Target host credentials

    • Username Specify target host username. This user must be either root or non-root sudoer.

      Sudoer user See Prerequisites for agentless files and folder recovery.

    • Provide password Select this option to choose password-based authentication.

      • Password Specify target host password for provided user.

    • Provide SSH private key Select this option to choose SSH private key based authentication. See SSH key fingerprint.

      • SSH private key Specify SSH private key.

      • Key passphrase If SSH private key is created using passphrase, specify key passphrase

Windows WMI Connectivity

  • Username Specify target host username. This user can be domain or local user and must be part of local administrator group. localusername or domain\username is supported format for username.

  • Password Specify target host password for the specified user.