NetBackup™ for Kubernetes Administrator's Guide
- Overview of NetBackup for Kubernetes
- Deploying and configuring the NetBackup Kubernetes operator
- Customize Kubernetes workload
- Deploying certificates on NetBackup Kubernetes operator
- Managing Kubernetes assets
- Managing Kubernetes intelligent groups
- Managing Kubernetes policies
- Protecting Kubernetes assets
- Managing image groups
- Protecting Rancher managed clusters in NetBackup
- Recovering Kubernetes assets
- About incremental backup and restore
- Enabling accelerator based backup
- Enabling FIPS mode in Kubernetes
- About Openshift Virtualization support
- Troubleshooting Kubernetes issues
Customization of datamover properties
You can customize datamover properties by passing key-value pairs in the backup server specific configmap.
Table: Datamover properties
Key Name | Possible Values |
---|---|
VXMS_VERBOSE | Range:[0,99] |
VERBOSE | Range:[0,5] |
DTE_CLIENT_MODE |
|
USE_CTIME_FOR_INCREMENTALS | YES / NO |
USE_CTIME_FOR_DIRECTORY_INCRS | YES / NO |
DO_NOT_RESET_FILE_ACCESS_TIME | YES / NO |
Note:
Any other configuration setting that is supported by NetBackup client can be set for datamover by adding it under datamover.properties key in the datamover configmap. These configurations will be added in bp.conf
file inside the datamover.
To update the configmap, add the key value pairs as follows:
apiVersion: v1 data: datamover.properties: | image=reg.domain.com/datamover/image:latest VERBOSE=5 DTE_CLIENT_MODE=OFF VXMS_VERBOSE=5 version: "1" kind: ConfigMap metadata: name: backupserver.sample.domain.com namespace: kops-ns
Starting with NetBackup 10.5, TLS 1.3 protocol is supported. NetBackup 10.5 and later versions use TLS 1.3 protocol by default in secure communication workflows as follows:
secure proxy
data-in-transit encryption (DTE)
external KMS server
AD/LDAP server
MSDP
HTTPS communication using cURL
To configure TLS related properties, the required settings can be updated in this configmap. For more details about TLS settings refer the article.