NetBackup™ Web UI Administrator's Guide
- Section I. About NetBackup
- Section II. Monitoring and notifications
- Monitoring NetBackup activity
- The NetBackup dashboard
- Activity monitor
- Job monitoring
- Workloads that require a custom RBAC role for specific job permissions
- View a job
- View the jobs in the List view
- View the jobs in the Hierarchy view
- Jobs: cancel, suspend, restart, resume, delete
- Search for or filter jobs in the jobs list
- Create a jobs filter
- Edit, copy, or delete a jobs filter
- Import or export job filters
- View the status of a redirected restore
- Troubleshooting the viewing and managing of jobs
- Device monitor
- Notifications
- Registering the data collector
- Monitoring NetBackup activity
- Section III. Configuring hosts
- Managing host properties
- Overview of host properties
- View or edit the host properties of a server or client
- Host information and settings in Host properties
- Reset a host's attributes
- Active Directory properties
- Backup pool host properties
- Busy file settings properties
- Clean up properties
- Client name properties
- Client attributes properties
- Client settings properties for UNIX clients
- Client settings properties for Windows clients
- Cloud Storage properties
- Credential access properties
- Data Classification properties
- Default job priorities properties
- Distributed application restore mapping properties
- Encryption properties
- Enterprise Vault properties
- Enterprise Vault hosts properties
- Exchange properties
- Exclude list properties
- Fibre transport properties
- Firewall properties
- General server properties
- Global attributes properties
- Logging properties
- Lotus Notes properties
- Media properties
- Network properties
- Network settings properties
- Nutanix AHV access hosts
- Port ranges properties
- Preferred network properties
- Add or edit a Preferred network setting
- How NetBackup uses the directives to determine which network to use
- Configurations to use IPv6 networks
- Configurations to use IPv4 networks
- Order of directive processing in the Preferred network properties
- bptestnetconn utility to display Preferred network information
- Configuration to prohibit using a specified address
- Configuration to prefer a specified address
- Configuration that restricts NetBackup to one set of addresses
- Configuration that limits the addresses, but allows any interfaces
- Properties setting in host properties
- RHV access hosts properties
- Resilient network properties
- Resource limit properties
- Restore failover properties
- Retention periods properties
- Scalable Storage properties
- Servers properties
- SharePoint properties
- SLP settings properties
- Throttle bandwidth properties
- Timeouts properties
- Universal settings properties
- UNIX client properties
- UNIX Server properties
- User account settings properties
- VMware access hosts properties
- Windows client properties
- Configuration options not found in the host properties
- About using commands to change the configuration options on UNIX or Linux clients and servers
- Managing credentials for workloads and systems that NetBackup accesses
- Managing deployment
- Managing host properties
- Section IV. Configuring storage
- Overview of storage options
- Configuring disk storage
- About configuring BasicDisk storage
- About configuring disk pool storage
- Create a disk pool
- Edit a disk pool
- Create a Media Server Deduplication Pool (MSDP, MSDP Cloud) storage server
- Edit a storage server
- Integrating MSDP Cloud and CMS
- Create a Media Server Deduplication Pool (MSDP) storage server for image sharing
- Create an AdvancedDisk, OpenStorage (OST), or Cloud Connector storage server
- Share images from an on-premises location to the cloud
- Overview of universal shares
- Create a universal share
- View or edit a universal share
- Delete a universal share
- Managing media servers
- Configuring storage units
- Managing tape drives
- Managing robots and tape drives
- Inventorying robots
- About robot inventory
- When to inventory a robot
- About showing a robot's contents
- Showing the media in a robot
- About comparing a robot's contents with the volume configuration
- Comparing media in a robot with the volume configuration
- About previewing volume configuration changes
- Previewing volume configuration changes for a robot
- About updating the NetBackup volume configuration
- Updating the NetBackup volume configuration with a robot's contents
- Robot inventory options
- Advanced options for robot inventory settings
- Configure media ID generation rules
- Barcode rules settings
- Media ID generation options
- Configure media settings
- About media type mapping rules
- Configure media type mappings
- Managing volumes
- About NetBackup tape volumes
- About adding volumes
- Add volumes
- Volume properties
- Edit volumes
- About moving volumes
- Move volumes
- Delete a volume
- About rules for moving volumes between groups
- Changing the volume group assignment
- Changing the media owner of a volume
- Rescanning and updating barcodes
- About barcode rules
- Freezing or unfreezing a volume
- Labeling a volume
- Erase a volume
- Suspending or unsuspending volumes
- Managing volume pools
- Managing volume groups
- Staging backups
- Troubleshooting storage configuration
- Section V. Configuring backups
- Overview of backups in the NetBackup web UI
- Managing protection plans
- Managing classic policies
- Protecting the NetBackup catalog
- About the NetBackup catalog
- Catalog backups
- The catalog backup process
- Prerequisites for backing up the NetBackup catalog
- Configuring catalog backups
- Backing up NetBackup catalogs manually
- Concurrently running catalog backups with other backups
- Catalog policy schedule considerations
- How catalog incrementals and standard backups interact on UNIX
- Determining whether or not a catalog backup succeeded
- Strategies that ensure successful NetBackup catalog backups
- Disaster recovery emails and the disaster recovery files
- Disaster recovery packages
- Set the passphrase to encrypt disaster recovery packages
- Recovering the catalog
- Managing backup images
- Pausing data protection activity
- Section VI. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Configuring multi-person authorization
- About multi-person authorization
- Workflow to configure multi-person authorization for NetBackup operations
- RBAC roles and permissions for multi-person authorization
- Multi-person authorization process with respect to roles
- NetBackup operations that need multi-person authorization
- Configure multi-person authorization
- View multi-person authorization tickets
- Manage multi-person authorization tickets
- Add exempted users
- Schedule expiration and purging of multi-person authorization tickets
- Disable multi-person authorization
- Managing user sessions
- Configuring multifactor authentication
- About multifactor authentication
- Configure multifactor authentication for your user account
- Disable multifactor authentication for your user account
- Enforce multifactor authentication for all users
- Configure multifactor authentication for your user account when it is enforced in the domain
- Reset multifactor authentication for a user
- Managing the global security settings for the primary server
- View the Certificate authority for secure communication
- Disable communication with NetBackup 8.0 and earlier hosts
- Disable automatic mapping of NetBackup host names
- Configure the global data-in-transit encryption setting
- About NetBackup certificate deployment security levels
- Select a security level for NetBackup certificate deployment
- About TLS session resumption
- Set a passphrase for disaster recovery
- Validate the disaster recovery package passphrase
- About trusted primary servers
- Configure the audit retention period
- Using access keys, API keys, and access codes
- Configuring authentication options
- Managing role-based access control
- Disabling access to NetBackup interfaces for OS Administrators
- Section VII. Detection and reporting
- Detecting anomalies
- About backup anomaly detection
- Configure backup anomaly detection settings
- View backup anomalies
- Disable backup anomaly detection and computation of entropy and file attributes for a client
- About system anomaly detection
- Configure system anomaly detection settings
- Configure rules-based anomaly detection
- Configure risk engine-based anomaly detection
- View system anomalies
- Malware scanning
- Usage reporting and capacity licensing
- Detecting anomalies
- Section VIII. NetBackup workloads and NetBackup Flex Scale
- Section IX. Administering NetBackup
- Management topics
- Managing client backups and restores
- About server-directed restores
- About client-redirected restores
- About restoring the files that have Access Control Lists (ACLs)
- About setting the original atime for files during restores on UNIX
- Restoring the System State
- About the backup and restore of compressed files on VxFS file systems
- About backups and restores on ReFS
- Section X. Disaster recovery and troubleshooting
- Section XI. Other topics
- Additional NetBackup catalog information
- About the NetBackup database
- About the NetBackup database installation
- Post-installation tasks
- Using the NetBackup Database Administration utility on Windows
- Using the NetBackup Database Administration utility on UNIX
Create a universal share
A universal share offers the ability to ingest data directly into a space efficient SMB (CIFS) or NFS share. Space efficiency is achieved by storing the ingested data directly to an existing NetBackup deduplication pool (MSDP). No NetBackup software needs to be installed on the client that mounts the share. Any operating system that is running a POSIX-compliant file system and can mount an SMB (CIFS) or NFS network share can write data to a universal share.
You can manage universal shares across NetBackup Appliance, Flex Appliance, Flex Scale, Flex WORM/non-WORM, MSDP AKS/EKS deployment, build-your-own (BYO) and BYO-In-Cloud servers.
See the NetBackup Deduplication Guide for more information about universal share policies, universal share for cloud LSU limitation, prerequisites, and configuration.
If you want to view specific storage servers containing universal shares, click on in the top right. Then, select the storage servers that contain universal shares, and they are displayed in the table.
To create a universal share in the NetBackup web UI
- If necessary, configure an MSDP storage server.
See Create a Media Server Deduplication Pool (MSDP, MSDP Cloud) storage server .
- On the left, click Storage > Disk storage.
- Click on the Universal shares tab. Then click Add.
Provide the following required information:
Enter a Display name. This name is used in the universal share path.
Select a Type. If you want to set up Cloud cache properties, you must select Regular. If Accelerator type is selected, you must specify the Disk volume.
Select the Storage server.
Select the Disk volume.
When Accelerator is selected in Type, you can only select a cloud disk volume in the pop-up.
Click the search icon to get the volume list, and select the disk volume. PureDiskVolume is selected by default.
This option is available only if universal share with object storage in cloud feature is enabled. For more information, see the NetBackup Deduplication Guide.
In Cloud cache properties, specify the size of the local disk cache in the Request cloud cache disk space.
The Request cloud cache disk space can only be set here on initial setup. Any subsequent changes must be made on the storage server properties page.
Note:
When you update the Cloud cache properties setting in storage server properties page, there is an interruption of the current shared mounts. When you click Save, the vpfsd process restarts to apply the new value.
In addition, new universal shares cannot be created if the available size is less than 128GB.
Select the Protocol: NFS or SMB (CIFS)
Select the Direct NFS check box to improve the performance of Network Attached Storage (NAS) over standard NFS for Oracle Databases. With direct NFS, you can add the 'insecure' export option to the export path.
For example, /mnt/vpfs_shares/dnfs/dnfs client-abcd(rw,insecure,mp,fsid=4161bb04-f62f-40f3-af09-0d9a8713694b)
Specify a Host that is allowed to mount the share and then click Add to list. You can use the host name, IP address, short name, or the FQDN to specify the Host. You can enter multiple hosts for each share.
When Accelerator is selected in Type, the Host can only be FQDN.
At this point, continue to enter values in the remaining fields or click Save to save the universal share. You can update the remaining fields later from the universal share's details page:
Select a Quota type: Unlimited or Custom. If you select Custom, also specify the quota in MB, GB, or TB units.
The Custom quota value limits the amount of data that is ingested into the share. Quotas are enforced using the front-end terabyte (FETB) calculation method. They are Implemented per share and can be modified at any time. You do not need to remount the share for the change to a take effect.
To update the quote type or value from the universal share's details page, click Edit in the Quota section.
Specify the User names (Local or Active Directory) and the Group names (Active Directory only). Only the specified users or groups can access the share. You can add and update the User names and the Group Names later from the details page of an existing universal share.
Note:
Currently, the User names and the Group names are supported only for the SMB (CIFS) protocol.
Specify Kerberos security methods if the selected protocol is NFS and the Kerberos service is supported on the selected Storage server.
If you select more than one Kerberos security methods, you can specify any method as mount command option to the share from client host.
Kerberos 5
Uses Kerberos V5 instead of local UNIX UIDs and GIDs to authenticate the users.
Kerberos 5i
Uses Kerberos V5 for user authentication and performs integrity checking of NFS operations using the secure checksums to prevent tampering of the data.
Kerberos 5p
Uses Kerberos V5 for user authentication and integrity checking. It encrypts NFS traffic to prevent traffic sniffing. This option is the most secure setting but it also involves the most performance overhead.