NetBackup™ Web UI Cloud Administrator's Guide

Last Published:
Product(s): NetBackup & Alta Data Protection (10.3.0.1, 10.3)
  1. Managing and protecting cloud assets
    1.  
      About protecting cloud assets
    2.  
      Limitations and considerations
    3. Configure Snapshot Manager in NetBackup
      1.  
        Add a Snapshot Manager
      2. Add a cloud provider for a Snapshot Manager
        1.  
          IAM Role for AWS Configuration
      3.  
        Associate media servers with a Snapshot Manager
      4.  
        Discover assets on Snapshot Manager
      5.  
        Enable or disable a Snapshot Manager
      6.  
        (Optional) Add the Snapshot Manager extension
    4. Managing intelligent cloud groups
      1.  
        Create an intelligent cloud group
      2.  
        Delete an intelligent cloud group
    5. Protecting cloud assets or intelligent cloud groups
      1.  
        Customize or edit protection for cloud assets or intelligent groups
      2.  
        Remove protection from cloud assets or intelligent groups
    6.  
      Cloud asset cleanup
    7.  
      Cloud asset filtering
    8.  
      AWS and Azure government cloud support
    9. About protecting Microsoft Azure resources using resource groups
      1.  
        Before you begin
      2.  
        Limitations and considerations
      3. About resource group configurations and outcome
        1.  
          Examples of resource group configurations
      4.  
        Troubleshoot resource group permissions
    10. About the NetBackup Accelerator for cloud workloads
      1.  
        How the NetBackup Accelerator works with virtual machines
      2.  
        Accelerator forced rescan for virtual machines (schedule attribute)
      3.  
        Accelerator backups and the NetBackup catalog
      4.  
        Accelerator messages in the backup job details log
    11.  
      Configuring backup schedule for cloud workloads
    12.  
      Backup options for cloud workloads
    13.  
      Snapshot replication
    14.  
      Configure AWS snapshot replication
    15.  
      Using AWS snapshot replication
    16.  
      Support matrix for account replication
    17.  
      Protect applications in-cloud with application consistent snapshots
    18. Protecting PaaS assets
      1.  
        Prerequisites for protecting PaaS assets
      2. Installing the native client utilities
        1.  
          Installing the MySQL client utility
        2.  
          Installing the sqlpackage client utility
        3.  
          Installing PostgresSQL client utility
        4.  
          Installing MongoDB client utility
        5.  
          Installing the Amazon RDS for Oracle client utility
      3.  
        Configuring the storage server for instant access
      4. Configuring storage for different deployments
        1.  
          For MSDP cloud deployments
        2.  
          For Kubernetes deployments
        3.  
          For VM-based BYO deployments
      5.  
        About incremental backup for PaaS workloads
      6.  
        Limitations and considerations
      7.  
        Discovering PaaS assets
      8.  
        Viewing PaaS assets
      9.  
        Managing PaaS credentials
      10.  
        View the credential name that is applied to a database
      11. Add credentials to a database
        1.  
          Creating an IAM database username
        2.  
          Configuring permissions for database user
        3.  
          Creating a system or user managed identity username
      12.  
        Add protection to PaaS assets
      13.  
        Perform backup now
  2. Recovering cloud assets
    1.  
      Recovering cloud assets
    2.  
      Perform rollback recovery of cloud assets
    3. Recovering PaaS assets
      1.  
        Recovering non-RDS PaaS assets
      2.  
        Recovering RDS-based PaaS asset
      3.  
        Recovering Azure protected assets
      4.  
        Recovering duplicate images from AdvancedDisk
  3. Performing granular restore
    1.  
      About granular restore
    2.  
      Supported environment list
    3.  
      List of supported file systems
    4.  
      Before you begin
    5.  
      Limitations and considerations
    6.  
      Restoring files and folders from cloud virtual machines
    7.  
      Restoring volumes on cloud virtual machines
    8.  
      Performing steps after volume restore containing LVM
    9.  
      Troubleshooting
  4. Troubleshooting protection and recovery of cloud assets
    1.  
      Troubleshoot cloud workload protection issues
    2. Troubleshoot PaaS workload protection and recovery issues
      1.  
        Troubleshooting Amazon Redshift issues

Limitations and considerations

Consider the following when protecting cloud workloads.

For all databases
  • NetBackup deployments in Flex Appliance and Flex Scale do not support PaaS workloads.

  • Supports only default the ports for all the databases across providers. Workload instances configured with custom ports are not supported.

  • Database names containing the characters '#' and '/' are not supported for backup and restore operations. Also, the database name should adhere to naming conventions suggested by the cloud vendors.

  • ";" is not supported in server or database password.

  • Backup and restore of a database with non-7 bit ASCII characters are not supported for a primary server running Windows, and having a media server version prior to 10.1.1.

  • You can duplicate the PaaS backup image to a supported storage server. But before you start a restore, you need to duplicate the image back to an MSDP server with universal share enabled. See Recovering duplicate images from AdvancedDisk.

  • With NetBackup 10.3, you can perform backup and restore of supported Azure PaaS databases with Managed Identity based database authentication. This is not supported for Azure Database for MariaDB server. This feature requires at least one media server of version 10.2 or higher.

  • For authentication of Azure database, It is recommended to use User Assigned managed identity to work across all media servers. A database user with a system-assigned managed identity, which is associated with the media server or vm-scale-set (AKS/EKS), does not work with any other media server or media in any other vm-scale set (AKS/EKS).

  • Azure Managed Identity is not supported across subscriptions of different tenants.

For PostgreSQL
  • Restore of security privileges is not supported.

  • During restore you can use - no-owner and - no-privileges option. After restore, the metadata captured at the time of backup are shown as owner/ACL in the progress log restore activity on the web UI.

  • Restore does not fail if the owner or role does not exist on the destination.

  • Post restore, the database has the role associated according to the credentials provided in NetBackup against the destination instance.

  • Users need to modify the ownership of databases post restore.

  • Backup and restore are not supported if the only SSL (Secure Sockets Layer) connection is enforced at the server level for GCP PostgreSQL workload.

  • Azure Postgres database restore from single to flexible server or vice versa is not supported because of the cloud provider limitations.

  • The following characters are not supported in the database name in the restore workflow: `, @, \, [, ], !, #, %, ^, ., ,, &, *, (, ), <, >, ?, /, |, }, {, ~, :, ', ", ;, +, = and -.

  • Uppercase username is not supported for new users added after PostgreSQL server creation.

For AWS DynamoDB
  • Alternate restore for region and account is not supported.

  • Restore from imported images from a different primary server is only supported using NetBackup REST API.

For AWS RDS SQL
  • Only Express and Web editions for AWS RDS SQL are supported.

  • For credential validation, IAM is not supported for AWS RDS SQL. You can use the username and password method.

  • Only Amazon RDS data management type is supported. The data management type RDS Custom is not supported for AWS RDS SQL instance editions.

  • Databases using Transparent Data Encryption (TDE) are backed up without TDE, but using MSDP encryption. This allows for restoring your database in more scenarios like loss of the TDE encryption key, cloud region outage, disaster recovery to another cloud and so on.

For MySQL
  • Restore operation require superuser privileges if the dump file contains the CREATE DEFINER statement for backups taken on version lower than 10.2.

  • Backup taken on version 10.3 or higher cannot be restored using version lower than 10.2.

  • Backup and restore are not supported if the only SSL connection is enforced at the server level for GCP MySQL workload.

  • You can restore MySQL database to an alternate instance with another MySQL version than the backup instance, depending on MySQL's version compatibility.

For GCP SQL Server
  • Backup and restore of read-only databases are not supported.

  • Provider credentials are validated for full backup and restore and not as database credentials.

  • Backup and restore of single-user-mode databases are not supported.

  • If one operation is in progress, the subsequent jobs wait in the queue. If the job in progress takes time to complete, the jobs in the queue may get timed out, and fail.

For incremental backups using GCP SQL Server
  • Incremental backups after any DML changes, might fail when a table is renamed after CDC is enabled on the table. As a workaround, you must manually modify any objects that reference the renamed table. For example, if you rename a table that is referenced in a trigger, you must modify the trigger to contain the new table name. Refer to this Azure documentation link to list dependencies on the table before renaming it.

  • Backup and restore of databases having binary or image data are not supported. Bulk insert on Cloud SQL Server requires sysadmin permission that GCP does not allow.

  • While duplicating incremental backups on the different storage servers, NetBackup generates different copy numbers for the same recovery point. If you try to restore an incremental copy where no earlier full and other incremental backups are present, the restore may fail.

  • If you have multiple media servers, the incremental backups can run only on version 10.3 or later. 

  • System databases and CDC schema are backed up and restored on the target database.

  • You must the set the CDC retention period greater than the period used to schedule incremental backup frequency.

  • Incremental backups for databases with multiple tables can take longer to backup as CDC enablement for multiple tables takes longer time.

  • Incremental backups are not supported for database editions Web and Express.

  • Any attempts to enable CDC fail if a custom schema or a user named CDC already exists in the database.

  • To ensure application consistency, NetBackup relies on previous full backup and all the subsequent incremental backups. If a random backup image is expired, it may cause application inconsistency due to data loss.

  • CDC requires SQL Server Standard or Enterprise editions. If a database is attached or restored with the KEEP_CDC option to any edition other than Standard or Enterprise backup fails. The error message 932 is displayed.

For Azure SQL and SQL Managed Instance
  • The Azure VM which is used as a media server, should be in the same Vnet as that of an Azure-managed instance. Alternatively, if the media server and SQL managed instance are in different Vnet, then both the Vnets must be peered to access the database instance.

  • Backup fails when Readlock is placed on the database or resource group.

  • Backup is partially successful when Delete lock is placed on the database or resource group. The tempdb stale entry does not get deleted from the Azure cloud portal. You need to manually delete it.

  • To restore a database on an Azure SQL server or Azure Managed Instance, you must assign AAD admin privilege on the target server. Before the restore, do the following, as required:

    • The system or the user-managed identity of the media servers.

    • The vm-scale-set in which NetBackup media is deployed (in case of AKS or EKS deployment).

For Azure SQL Server and SQL Managed Instance incremental backup
  • You can enable Change Data Capture (CDC) only on databases tiers S3 and above. Sub-core (Basic, S0, S1, S2) Azure SQL Server and SQL Managed Instance databases are not supported for CDC.

  • You may encounter backup or restore issues for databases having encrypted columns in the table. As a workaround, Microsoft suggests using Publish/Extract commands to tackle this issue.

  • Restore may fail for a database having blob data in the table.

  • To duplicate incremental backups on different storage servers; NetBackup generates different copy numbers for the same recovery point. If you try to restore an incremental copy where no earlier reference of full and other incremental backup is present, the restore fails.

    Note:

    Incremental backup of Azure SQL Server can run only on NetBackup media server version 10.2 and above. Incremental backup of Azure SQL Managed Instance can run only on NetBackup media server version 10.3 and above.

  • The user ID used for the cloud service must have permission to enable and disable CDC. Without this permission, you can see errors such as follows:

    3842: "Failed to enable CDC" 
    and
    3844: "Failed to disable CDC"
  • Any attempt to enable CDC fails if a custom schema or a user with the name cdc exists in the database. The term cdc is reserved for system use.

  • In a database with the CDC schema created before taking the first full backup, the schema does not get backed up or restored.

  • If you restore to any edition other than Standard or Enterprise, the operation is blocked because CDC requires SQL Server Standard or Enterprise editions. Error message 932 is displayed.

  • Avoid backing up databases with BLOB data tables. If a table contains BLOB data, then the backup might be successful, but the restore fails.

  • Encryption setting of an Azure SQL Server or Azure SQL Managed Instance database may not be preserved (Is_encryption=0) during a restore.

For Azure Cosmos DB for MongoDB
  • Discovery, protection, and restore are not supported if the account is configured using the vCore cluster.

  • Backup and restore are not supported if the account is configured with a customize key.

  • NetBackup does not support Azure cosmos DB for MongoDB version 3.2.

  • Overwrite existing database option is not supported.

  • Rules for naming databases:

    • The length of the database names must be between 3 and 63 characters.

    • Database names support all characters except #, /, ?,&, <, >, =, }, $, {, ], [, ", ', ., \ .

For Azure Cosmos DB for NoSQL
  • Backup and restore are not supported if the account is configured with a customize key.

  • Protection of Azure Cosmos DB for MongoDB version 3.2 is not supported.

  • Overwrite existing database option is not supported.

  • Rules for naming databases:

    • The length of the database names must be between 3 and 63 characters.

    • Database names support all characters except #, /, ?,&, <, >, =, }, $, {, ], [, ", ', ., \ .

For Amazon RDS for Oracle
  • Backup and restore are only supported for EFS-supported Oracle instances.

  • Standard and Enterprise Edition are supported.

  • Multi-tenant container databases and read replicas are not supported.

  • Backup and restore are not supported for TDE enabled RDS Oracle instances.

  • Only Amazon RDS data management type is supported. The data management type RDS Custom is not supported.

  • Option group attached to RDS Oracle should have the same database engine version and same database engine name.

  • Restore is supported using the EFS staging path only, including the manual restore from the Instant access database tab.

For Amazon Redshift
  • Restores to alternate region or alternate account are not supported.

  • NetBackup protects the individual AWS Redshift cluster databases. Protection of the entire AWS Redshfit cluster is not supported.

  • Only user databases are protected. System databases are not displayed or protected.

  • Restore from imported images from a different primary server is supported only using NetBackup REST API.

  • Only Redshift clusters are supported. Serverless Redshift is not supported.

  • All clusters whose databases you are taking backup must be in the available state.

  • Table names having double quotes and case-sensitive names are not restored.

  • File count during restore may show one file less than the total number of backed up files.

  • It is not recommended take backup of databases having empty tables.

  • NetBackup provides crash-consistent Redshift data protection. Consider the type of activity and application requirements before taking backups to determine if an application needs to checkpoint or quiesce for backup operations.