NetBackup™ Web UI Cloud Administrator's Guide
- Managing and protecting cloud assets
- Configure Snapshot Manager in NetBackup
- Managing intelligent groups for cloud assets
- Protecting cloud assets or intelligent groups for cloud assets
- About protecting Microsoft Azure resources using resource groups
- About the NetBackup Accelerator for cloud workloads
- Protecting PaaS assets
- Installing the native client utilities
- Configuring storage for different deployments
- Add credentials to a database
- Recovering cloud assets
- Performing granular restore
- Troubleshooting protection and recovery of cloud assets
- Troubleshoot PaaS workload protection and recovery issues
Configuring permissions for the database user
For MySQL
Create a database user with a master login and grant these permissions:
mysql --protocol=tcp --host=instance_fqdn --user=admin -p --port=3306
CREATE USER dbuser IDENTIFIED BY '<password>';
GRANT SELECT, INSERT, UPDATE, DELETE, CREATE, DROP, RELOAD, PROCESS, REFERENCES, INDEX, ALTER, SHOW DATABASES, LOCK TABLES, CREATE VIEW, SHOW VIEW, CREATE ROUTINE, ALTER ROUTINE, EVENT, TRIGGER ON *.* TO `dbuser`@'%' WITH GRANT OPTION;
For PostgreSQL
Create a database user under the server and grant the following permissions:
psql -h instance_fqdn -U postgres
CREATE USER dbuser WITH PASSWORD '<password>' CREATEDB;
(For AWS RDS PostgreSQL) GRANT rds_superuser TO dbuser;
(For AZURE PostgreSQL) GRANT azure_pg_admin TO dbuser;
(For GCP PostgreSQL) GRANT cloudsqlsuperuser TO dbuser;
For SQL Server
Create a database user under the server and grant the following permission:
Create a login on the server:
CREATE LOGIN dbuser WITH PASSWORD='<password>'
Create a user for the database in the server:
CREATE USER [dbuser] FOR LOGIN [dbuser]
ALTER ROLE [db_owner] ADD MEMBER [dbuser]
Note:
The database user must not be part of any database deny role. For example: db_denydatareader and db_denydatawriter.