NetBackup™ Deployment Guide for Kubernetes Clusters

Last Published:
Product(s): NetBackup & Alta Data Protection (10.4.0.1)
  1. Introduction
    1.  
      About Cloud Scale deployment
    2.  
      About NetBackup Snapshot Manager
    3.  
      About MSDP Scaleout
    4.  
      Required terminology
    5.  
      User roles and permissions
  2. Section I. Configurations
    1. Prerequisites
      1.  
        Preparing the environment for NetBackup installation on Kubernetes cluster
      2.  
        Prerequisites for MSDP Scaleout and Snapshot Manager (AKS/EKS)
      3. Prerequistes for Kubernetes cluster configuration
        1.  
          Config-Checker utility
        2.  
          Data-Migration for AKS
        3.  
          Webhooks validation for EKS
      4. Prerequisites for Cloud Scale configuration
        1.  
          Cluster specific settings
        2.  
          Cloud specific settings
      5.  
        Prerequisites for deploying environment operators
    2. Recommendations and Limitations
      1.  
        Recommendations of NetBackup deployment on Kubernetes cluster
      2.  
        Limitations of NetBackup deployment on Kubernetes cluster
      3.  
        Limitations in MSDP Scaleout
    3. Configurations
      1.  
        Contents of the TAR file
      2.  
        Initial configurations
      3.  
        Configuring the environment.yaml file
      4. Loading docker images
        1.  
          Installing the docker images for NetBackup
        2.  
          Installing the docker images for Snapshot Manager
        3.  
          Installing the docker images and binaries for MSDP Scaleout
      5.  
        Configuring NetBackup IT Analytics for NetBackup deployment
      6. Configuring NetBackup
        1. Primary and media server CR
          1.  
            After installing primary server CR
          2.  
            After Installing the media server CR
        2.  
          Elastic media server
    4. Configuration of key parameters in Cloud Scale deployments
      1.  
        Tuning touch files
      2.  
        Setting maximum jobs
      3.  
        Enabling intelligent catalog archiving
      4.  
        Enabling security settings
      5.  
        Configuring email server
      6.  
        Reducing catalog storage management
      7.  
        Configuring zone redundancy
      8.  
        Enabling client-side deduplication capabilities
  3. Section II. Deployment
    1. Deploying operators
      1.  
        Deploying the operators
    2. Deploying Postgres
      1.  
        Deploying Postgres
      2.  
        Enable request logging, update configuration, and copying files from/to PostgreSQL pod
    3. Deploying Cloud Scale
      1.  
        Installing Cloud Scale
    4. Deploying MSDP Scaleout
      1. MSDP Scaleout configuration
        1.  
          Initializing the MSDP operator
        2.  
          Configuring MSDP Scaleout
        3.  
          Configuring the MSDP cloud in MSDP Scaleout
        4.  
          Using MSDP Scaleout as a single storage pool in NetBackup
        5.  
          Using S3 service in MSDP Scaleout
        6.  
          Enabling MSDP S3 service after MSDP Scaleout is deployed
      2.  
        Deploying MSDP Scaleout
    5. Verifying Cloud Scale deployment
      1.  
        Verifying Cloud Scale deployment
  4. Section III. Monitoring and Management
    1. Monitoring NetBackup
      1.  
        Monitoring the application health
      2.  
        Telemetry reporting
      3.  
        About NetBackup operator logs
      4.  
        Monitoring Primary/Media server CRs
      5.  
        Expanding storage volumes
      6. Allocating static PV for Primary and Media pods
        1.  
          Recommendation for media server volume expansion
        2.  
          (AKS-specific) Allocating static PV for Primary and Media pods
        3.  
          (EKS-specific) Allocating static PV for Primary and Media pods
    2. Monitoring Snapshot Manager
      1.  
        Overview
      2.  
        Logs of Snapshot Manager
      3.  
        Configuration parameters
    3. Monitoring MSDP Scaleout
      1.  
        About MSDP Scaleout status and events
      2.  
        Monitoring with Amazon CloudWatch
      3.  
        Monitoring with Azure Container insights
      4.  
        The Kubernetes resources for MSDP Scaleout and MSDP operator
    4. Managing NetBackup
      1.  
        Managing NetBackup deployment using VxUpdate
      2.  
        Updating the Primary/Media server CRs
      3.  
        Migrating the cloud node for primary or media servers
    5. Managing the Load Balancer service
      1.  
        About the Load Balancer service
      2.  
        Notes for Load Balancer service
      3.  
        Opening the ports from the Load Balancer service
    6. Managing PostrgreSQL DBaaS
      1.  
        Changing database server password in DBaaS
      2.  
        Updating database certificate in DBaaS
    7. Performing catalog backup and recovery
      1.  
        Backing up a catalog
      2. Restoring a catalog
        1.  
          Primary server corrupted
        2.  
          MSDP-X corrupted
        3.  
          MSDP-X and Primary server corrupted
    8. Managing MSDP Scaleout
      1.  
        Adding MSDP engines
      2.  
        Adding data volumes
      3. Expanding existing data or catalog volumes
        1.  
          Manual storage expansion
      4.  
        MSDP Scaleout scaling recommendations
      5. MSDP Cloud backup and disaster recovery
        1.  
          About the reserved storage space
        2. Cloud LSU disaster recovery
          1.  
            Recovering MSDP S3 IAM configurations from cloud LSU
      6.  
        MSDP multi-domain support
      7.  
        Configuring Auto Image Replication
      8. About MSDP Scaleout logging and troubleshooting
        1.  
          Collecting the logs and the inspection information
  5. Section IV. Maintenance
    1. MSDP Scaleout Maintenance
      1.  
        Pausing the MSDP Scaleout operator for maintenance
      2.  
        Logging in to the pods
      3.  
        Reinstalling MSDP Scaleout operator
      4.  
        Migrating the MSDP Scaleout to another node pool
    2. PostgreSQL DBaaS Maintenance
      1.  
        Configuring maintenance window for PostgreSQL database in AWS
      2.  
        Setting up alarms for PostgreSQL DBaaS instance
    3. Patching mechanism for Primary and Media servers
      1.  
        Overview
      2.  
        Patching of containers
    4. Upgrading
      1.  
        Upgrading Cloud Scale deployment for Postgres using Helm charts
      2. Upgrading NetBackup individual components
        1.  
          Upgrading NetBackup operator
        2. Upgrading NetBackup application
          1.  
            Upgrade NetBackup from previous versions
          2.  
            Procedure to rollback when upgrade of NetBackup fails
        3.  
          Upgrading MSDP Scaleout
        4. Upgrading Snapshot Manager
          1.  
            Post-migration tasks
    5. Cloud Scale Disaster Recovery
      1.  
        Cluster backup
      2.  
        Environment backup
      3.  
        Cluster recovery
      4.  
        Cloud Scale recovery
      5.  
        Environment Disaster Recovery
      6.  
        DBaaS Disaster Recovery
    6. Uninstalling
      1.  
        Uninstalling NetBackup environment and the operators
      2.  
        Uninstalling Postgres using Helm charts
      3.  
        Uninstalling Snapshot Manager from Kubernetes cluster
      4. Uninstalling MSDP Scalout from Kubernetes cluster
        1.  
          Cleaning up MSDP Scaleout
        2.  
          Cleaning up the MSDP Scaleout operator
    7. Troubleshooting
      1. Troubleshooting AKS and EKS issues
        1.  
          View the list of operator resources
        2.  
          View the list of product resources
        3.  
          View operator logs
        4.  
          View primary logs
        5.  
          Socket connection failure
        6.  
          Resolving an issue where external IP address is not assigned to a NetBackup server's load balancer services
        7.  
          Resolving the issue where the NetBackup server pod is not scheduled for long time
        8.  
          Resolving an issue where the Storage class does not exist
        9.  
          Resolving an issue where the primary server or media server deployment does not proceed
        10.  
          Resolving an issue of failed probes
        11.  
          Resolving token issues
        12.  
          Resolving an issue related to insufficient storage
        13.  
          Resolving an issue related to invalid nodepool
        14.  
          Resolving a token expiry issue
        15.  
          Resolve an issue related to KMS database
        16.  
          Resolve an issue related to pulling an image from the container registry
        17.  
          Resolving an issue related to recovery of data
        18.  
          Check primary server status
        19.  
          Pod status field shows as pending
        20.  
          Ensure that the container is running the patched image
        21.  
          Getting EEB information from an image, a running container, or persistent data
        22.  
          Resolving the certificate error issue in NetBackup operator pod logs
        23.  
          Pod restart failure due to liveness probe time-out
        24.  
          NetBackup messaging queue broker take more time to start
        25.  
          Host mapping conflict in NetBackup
        26.  
          Issue with capacity licensing reporting which takes longer time
        27.  
          Local connection is getting treated as insecure connection
        28.  
          Primary pod is in pending state for a long duration
        29.  
          Backing up data from Primary server's /mnt/nbdata/ directory fails with primary server as a client
        30.  
          Storage server not supporting Instant Access capability on Web UI after upgrading NetBackup
        31.  
          Taint, Toleration, and Node affinity related issues in cpServer
        32.  
          Operations performed on cpServer in environment.yaml file are not reflected
        33.  
          Elastic media server related issues
        34.  
          Failed to register Snapshot Manager with NetBackup
        35.  
          Post Kubernetes cluster restart, flexsnap-listener pod went into CrashLoopBackoff state or pods were unable to connect to flexsnap-rabbitmq
        36.  
          Post Kubernetes cluster restart, issues observed in case of containerized Postgres deployment
      2. Troubleshooting AKS-specific issues
        1.  
          Data migration unsuccessful even after changing the storage class through the storage yaml file
        2.  
          Host validation failed on the target host
        3.  
          Primary pod goes in non-ready state
      3. Troubleshooting EKS-specific issues
        1.  
          Resolving the primary server connection issue
        2.  
          NetBackup Snapshot Manager deployment on EKS fails
        3.  
          Wrong EFS ID is provided in environment.yaml file
        4.  
          Primary pod is in ContainerCreating state
        5.  
          Webhook displays an error for PV not found
  6. Appendix A. CR template
    1.  
      Secret
    2. MSDP Scaleout CR
      1.  
        MSDP Scaleout CR template for AKS
      2.  
        MSDP Scaleout CR template for EKS

Changing database server password in DBaaS

Note:

When setting the PostgreSQL password in DBaaS, ensure that the password does not contain the following special characters:

equal (=), double quote ("), single quote ('), percentage (%), at sign (@), ampersand (&), question mark (?), underscore (_), and hash (#)

Azure-specific

  1. Launch an Azure CLI pod into the AKS cluster using the following command:

    $ kubectl run az-cli --image=mcr.microsoft.com/azure-cli:2.53.0 --command sleep infinity

    Note:

    Access to Azure Key Vault is restricted to specific subnets. Passwords stored in Azure Key Vault can be easily updated from a pod running in AKS.

    Connecting to Postgres database using Azure requires installing rdbms-connections. This functionality is applicable to azure-cli 2.53.0.

  2. Exec into the Azure CLI pod as follows:

    $ kubectl exec -it az-cli -- /bin/ash

  3. From Azure CLI pod, log into Azure account:

    $ az login --scope https://graph.microsoft.com//.default

  4. (Optional) Create a key vault policy to allow the current user to retrieve the database credential.

    Obtain the name of your resource group, key vault and ID of the current user by using the following respective commands:

    • Resource group name:

      $ RESOURCE_GROUP=<resource_group_name>

    • Key vault name:

      $ KEY_VAULT_NAME=$(az keyvault list --resource-group $RESOURCE_GROUP --resource-type vault | jq -r '.[].name')

    • Current user ID name:

      $ USER_ID=$(az account show | jq -r '.user.name')

    Create a key vault access policy as follows:

    $ az keyvault set-policy -n $KEY_VAULT_NAME --upn $USER_ID --resource-group $RESOURCE_GROUP --secret-permissions all

  5. Obtain the login name for the key vault (DBADMINUSER):

    $ DBADMINUSER=$(az keyvault secret show --vault-name $KEY_VAULT_NAME --name dbadminlogin | jq -r .value)

  6. Obtain the password for the key vault (OLD_DBADMINPASSWORD):

    $ OLD_DBADMINPASSWORD=$(az keyvault secret show --vault-name $KEY_VAULT_NAME --name dbadminpassword | jq -r .value)

  7. Obtain the server name (DBSERVER):

    DBSERVER=$(az postgres flexible-server list --resource-group $RESOURCE_GROUP | jq -r '.[].name')

  8. (Optional) Verify the current password encryption method by using the following command:

    az postgres flexible-server execute -p "$OLD_DBADMINPASSWORD" -u $DBADMINUSER -n $DBSERVER -d postgres -q "SELECT * from azure_roles_authtype();" -o table

    Following message is displayed:

    Successfully connected to twilk-db.
    Ran Database Query: 'SELECT * from azure_roles_authtype();'
    Retrieving first 30 rows of query output, if applicable.
    Closed the connection to twilk-db
    Authtype    Rolename
    ----------  -------------------------
    NOLOGIN     azuresu
    NOLOGIN     pg_database_owner
    NOLOGIN     pg_read_all_data
    NOLOGIN     pg_write_all_data
    NOLOGIN     pg_monitor
    NOLOGIN     pg_read_all_settings
    NOLOGIN     pg_read_all_stats
    NOLOGIN     pg_stat_scan_tables
    NOLOGIN     pg_read_server_files
    NOLOGIN     pg_write_server_files
    NOLOGIN     pg_execute_server_program
    NOLOGIN     pg_signal_backend
    NOLOGIN     azure_pg_admin
    NOLOGIN     replication
    MD5         nbdbadmin

    To install rdbms-connect extension, ensure that you select the Y option. If installing the extension fails in the az-cli container, then some dependencies must be missing. Install the missing dependencies with apk add gcc musl-dev and try again.

    The nbdbadmin auth type must be SCRAM-256. Resetting the password as follows will re-encrypt the password correctly.

  9. Set the new password as follows:

    Before setting the new password ensure that you know your database server name or obtain it by using the following command:

    NEW_DBADMINPASSWORD="<new_password>"

    Use the following command to set the new password:

    az postgres flexible-server execute -p $OLD_DBADMINPASSWORD -u $DBADMINUSER -n $DBSERVER -d postgres -q "ALTER USER\"nbdbadmin\" WITH PASSWORD '$NEW_DBADMINPASSWORD';"

    Or

    If you are only trying to re-encrypt the current password without changing it, use the following command:

    az postgres flexible-server execute -p $OLD_DBADMINPASSWORD -u $DBADMINUSER -n $DBSERVER -d postgres -q "ALTER USER\"nbdbadmin\" WITH PASSWORD '$OLD_DBADMINPASSWORD';"

    Note:

    You can reset the flexible server password by using the following command. This command does not require az extension and potentially could be run outside of the az-cli container.

    az postgres flexible-server update -g $RESOURCE_GROUP -n $DBSERVER --admin-password <password>

  10. Use the following command to verify if the password is using the correct encryption method (SCRAM-SHA-256):

    az postgres flexible-server execute -p "$OLD_DBADMINPASSWORD" -u $DBADMINUSER -n $DBSERVER -d postgres -q "SELECT * from azure_roles_authtype();" -o table

    Successfully connected to twilk-db.
    Ran Database Query: 'SELECT * from azure_roles_authtype();'
    Retrieving first 30 rows of query output, if applicable.
    Closed the connection to twilk-db
    Authtype    Rolename
    ----------  -------------------------
    NOLOGIN     azuresu
    NOLOGIN     pg_database_owner
    NOLOGIN     pg_read_all_data
    NOLOGIN     pg_write_all_data
    NOLOGIN     pg_monitor
    NOLOGIN     pg_read_all_settings
    NOLOGIN     pg_read_all_stats
    NOLOGIN     pg_stat_scan_tables
    NOLOGIN     pg_read_server_files
    NOLOGIN     pg_write_server_files
    NOLOGIN     pg_execute_server_program
    NOLOGIN     pg_signal_backend
    NOLOGIN     azure_pg_admin
    NOLOGIN     replication
    SCRAM-256   nbdbadmin
  11. Store the updated password in key vault:

    Note:

    This step can be skipped if the password is not changed.

    az keyvault secret set --vault-name $KEY_VAULT_NAME --name dbadminpassword --value "$NEW_DBADMINPASSWORD"

  12. (Optional) Delete the key vault access policy created in step 4 above:

    $ az keyvault delete-policy -n $KEYVAULT --upn $USER_ID

  13. Exit from the azure CLI pod:

    $ exit

  14. Delete the az CLI pod:

    $ kubectl delete pod az-cli

  15. (Applicable only for an existing cloudscale deployment) Restart the primary pod:

    $ kubectl rollout restart "statefulset/${PRIMARY}" --namespace "${NAMESPACE}"

    In the above command,

    • NAMESPACE is the namespace containing your NetBackup deployment

    • PRIMARY is the name of primary pod's stateful set

    Use the following command to obtain NAMESPACE and PRIMARY:

    $ kubectl get --namespace "${NAMESPACE}" primaryserver -o jsonpath='{.items[0].status.attributes.resourceName}'

AWS-specific

  1. Use lambda function to change the password.

    LAMBDA_ARN is the ARN of the password changing lambda function. This can be obtained from the lambda function page on AWS console.

    NEW_PASSWORD is the new password to be used.

    $ aws lambda invoke --function-name $LAMBDA_ARN \ --cli-binary-format raw-in-base64-out --payload '{"password":"$NEW_PASSWORD"}' \ response_file

  2. Wait for database to be available.

    Obtain the POSTGRESQL_ID (database identifier)of your RDS Postgres database from the RDS database page of the AWS console, using the following command:

    $ aws rds wait db-instance-available --db-instance-identifier $POSTGRESQL_ID

  3. Restart the primary pod:

    $ kubectl rollout restart "statefulset/${PRIMARY}" --namespace "${NAMESPACE}"

    In the above command,

    • NAMESPACE is the namespace containing your NetBackup deployment

    • PRIMARY is the name of primary pod's stateful set

    Use the following command to obtain NAMESPACE and PRIMARY:

    $ kubectl get --namespace "${NAMESPACE}" primaryserver -o jsonpath='{.items[0].status.attributes.resourceName}'

Containerized PostgreSQL

  1. Exec into primary pod and change database password using the following command:

    $ kubectl exec -it <primary-pod-name> -n netbackup -- bash

    # /usr/openv/db/bin/nbdb_admin -dba "<new-password>"

    # exit

  2. Update the database connection secret with new password:
    • Set the new password:

      $ kubectl patch secret dbsecret -n netbackup -p '{"stringData": {"dbadminpassword": "<new-password>" }}'

    • Verify the new password:

      $ kubectl get secret dbsecret -n netbackup -o jsonpath='{.data.dbadminpassword}' | base64 --decode

  3. Restart the Postgres and primary pods:
    • Identify Postgres and primary statefulsets:

      $ kubectl get statefulset -n netbackup

    • Restart Postgres pod:

      $ kubectl rollout restart "statefulset/nb-postgresql" -n netbackup

    • Wait for the Postgres pod to restart:

      $ kubectl rollout status --watch --timeout=600s "statefulset/nb-postgresql" -n netbackup

    • Restart primary pod:

      $ kubectl rollout restart "statefulset/<primary-statefulset>" -n netbackup

    • Wait for primary pod to restart:

      $ kubectl rollout status --watch --timeout=600s "statefulset/<primary-statefulset>" -n netbackup