NetBackup™ Web UI Cloud Administrator's Guide
- Managing and protecting cloud assets
- Configure Snapshot Manager in NetBackup
- Managing intelligent cloud groups
- Protecting cloud assets or intelligent cloud groups
- About protecting Microsoft Azure resources using resource groups
- About the NetBackup Accelerator for cloud workloads
- Protecting PaaS assets
- Installing the native client utilities
- Configuring storage for different deployments
- Add credentials to a database
- Recovering cloud assets
- Performing granular restore
- Troubleshooting protection and recovery of cloud assets
Installing the Amazon RDS for Oracle client utility
Amazon RDS for Oracle client utility recommended version is 21.11.0.0.0-1.el8.
Download locations | instantclient-basic | |
instantclient-odbc |
To install, run the following commands in the terminal:
- c. yum install unixODBC
- rpm -ivh oracle-instantclient-basic-21.10.0.0.0-1.el8.x86_64.rpm
- d. rpm -ivh oracle-instantclient-odbc-21.10.0.0.0-1.el8.x86_64.rpm
To install the EFS utility
- Visit this page in AWS documentation:
https://docs.aws.amazon.com/efs/latest/ug/installing-amazon-efs-utils.html
- Refer to the section: To build and install amazon-efs-utils as an RPM package for Amazon Linux, Amazon Linux 2, and Linux distributions other than OpenSUSE or SLES.
- Install
stunnel
version 5. - Modify region from
/etc/amazon/efs/efs-utils.conf
to your RDS instance region.
You need to configure the Amazon Elastic File System (EFS) before you can perform any backup or restore. For restore, you also need to configure the EFS mount path.
To configure EFS, see the following knowledge base article:
To configure the mount path for restore, see the following knowledge base article:
NetBackup required permissions to in AWS to perform backup and restore. To configure the permissions, create an AWS IAM role and assign the permissions required by NetBackup to the role. For more information on how to create an IAM role, see this link in AWS documentation:
https://docs.aws.amazon.com/iam/index.html
Required permissions:
efsdescribemounttarget: { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "elasticfilesystem:DescribeMountTargets", "elasticfilesystem:DescribeFileSystems", ], "Resource": [ "arn:aws:elasticfilesystem:*:*:access-point/*", "arn:aws:elasticfilesystem:*:*:file-system/*" ] } ] } rdsdescribeoptiongroup { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": "rds:DescribeOptionGroupOptions", "Resource": "arn:aws:rds:*:*:og:*" } ] } AmazonRDSReadOnlyAccess:(AWS Managed) { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "rds:Describe*", "rds:ListTagsForResource", "ec2:DescribeAccountAttributes", "ec2:DescribeAvailabilityZones", "ec2:DescribeInternetGateways", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcAttribute", "ec2:DescribeVpcs" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "cloudwatch:GetMetricStatistics", "cloudwatch:ListMetrics", "cloudwatch:GetMetricData", "logs:DescribeLogStreams", "logs:GetLogEvents", "devops-guru:GetResourceCollection" ], "Resource": "*" }, { "Action": [ "devops-guru:SearchInsights", "devops-guru:ListAnomaliesForInsight" ], "Effect": "Allow", "Resource": "*", "Condition": { "ForAllValues:StringEquals": { "devops-guru:ServiceNames": [ "RDS" ] }, "Null": { "devops-guru:ServiceNames": "false" } } } ] }