NetBackup™ Web UI Cloud Administrator's Guide
- Managing and protecting cloud assets
- Configure Snapshot Manager in NetBackup
- Managing intelligent groups for cloud assets
- Protecting cloud assets or intelligent groups for cloud assets
- About protecting Microsoft Azure resources using resource groups
- About the NetBackup Accelerator for cloud workloads
- Protecting PaaS assets
- Installing the native client utilities
- Configuring storage for different deployments
- Add credentials to a database
- Recovering cloud assets
- Performing granular restore
- Troubleshooting protection and recovery of cloud assets
- Troubleshoot PaaS workload protection and recovery issues
Installing the Amazon RDS for Oracle client utility
Amazon RDS for Oracle client utility recommended version is 21.11.0.0.0-1.el8.
Download locations | instantclient-basic | |
instantclient-odbc |
To install, run the following commands in the terminal:
- c. yum install unixODBC
- rpm -ivh oracle-instantclient-basic-21.10.0.0.0-1.el8.x86_64.rpm
- d. rpm -ivh oracle-instantclient-odbc-21.10.0.0.0-1.el8.x86_64.rpm
To install the EFS utility
- Visit this page in AWS documentation:
https://docs.aws.amazon.com/efs/latest/ug/installing-amazon-efs-utils.html
- Refer to the section: To build and install amazon-efs-utils as an RPM package for Amazon Linux, Amazon Linux 2, and Linux distributions other than OpenSUSE or SLES.
- Install
stunnel
version 5. - Modify region from
/etc/amazon/efs/efs-utils.conf
to your RDS instance region.
You need to configure the Amazon Elastic File System (EFS) before you can perform any backup.
To configure EFS, see the following knowledge-base article:
To configure the mount path for restore, see the following knowledge base article:
NetBackup required permissions in AWS to perform backup and restore. To configure the permissions, create an AWS IAM role and assign the permissions required by NetBackup to the role. For more information on how to create an IAM role, see this link in AWS documentation:
https://docs.aws.amazon.com/iam/index.html
Required permissions:
efsdescribemounttarget: { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "elasticfilesystem:DescribeMountTargets", "elasticfilesystem:DescribeFileSystems", ], "Resource": [ "arn:aws:elasticfilesystem:*:*:access-point/*", "arn:aws:elasticfilesystem:*:*:file-system/*" ] } ] } rdsdescribeoptiongroup { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "rds:CreateOptionGroup", "rds:ModifyDBInstance", "rds:ModifyOptionGroup", "s3:*" ], "Resource": "*" } ] } AmazonRDSReadOnlyAccess:(AWS Managed) { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "rds:Describe*", "rds:ListTagsForResource", "ec2:DescribeAccountAttributes", "ec2:DescribeAvailabilityZones", "ec2:DescribeInternetGateways", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcAttribute", "ec2:DescribeVpcs" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "cloudwatch:GetMetricStatistics", "cloudwatch:ListMetrics", "cloudwatch:GetMetricData", "logs:DescribeLogStreams", "logs:GetLogEvents", "devops-guru:GetResourceCollection" ], "Resource": "*" }, { "Action": [ "devops-guru:SearchInsights", "devops-guru:ListAnomaliesForInsight" ], "Effect": "Allow", "Resource": "*", "Condition": { "ForAllValues:StringEquals": { "devops-guru:ServiceNames": [ "RDS" ] }, "Null": { "devops-guru:ServiceNames": "false" } } } ] }