NetBackup102 WebUIGuide Admin
NetBackup102 WebUIGuide Admin
Administrator's Guide
Release 10.2
NetBackup™ Web UI Administrator’s Guide
Last updated: 2023-03-17
Legal Notice
Copyright © 2023 Veritas Technologies LLC. All rights reserved.
Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas
Technologies LLC or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This product may contain third-party software for which Veritas is required to provide attribution
to the third party (“Third-party Programs”). Some of the Third-party Programs are available
under open source or free software licenses. The License Agreement accompanying the
Software does not alter any rights or obligations you may have under those open source or
free software licenses. Refer to the Third-party Legal Notices document accompanying this
Veritas product or available at:
https://www.veritas.com/about/legal/license-agreements
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Veritas Technologies
LLC and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Veritas as on premises or
hosted services. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in
accordance with the terms of this Agreement.
http://www.veritas.com
Technical Support
Technical Support maintains support centers globally. All support services will be delivered
in accordance with your support agreement and the then-current enterprise technical support
policies. For information about our support offerings and how to contact Technical Support,
visit our website:
https://www.veritas.com/support
You can manage your Veritas account information at the following URL:
https://my.veritas.com
If you have questions regarding an existing support agreement, please email the support
agreement administration team for your region as follows:
Japan [email protected]
Documentation
Make sure that you have the current version of the documentation. Each document displays
the date of the last update on page 2. The latest documentation is available on the Veritas
website:
https://sort.veritas.com/documents
Documentation feedback
Your feedback is important to us. Suggest improvements or report errors or omissions to the
documentation. Include the document title, document version, chapter title, and section title
of the text on which you are reporting. Send feedback to:
You can also see documentation information or ask a question on the Veritas community site:
http://www.veritas.com/community/
https://sort.veritas.com/data/support/SORT_Data_Sheet.pdf
Contents
■ About NetBackup
■ NetBackup documentation
■ Terminology
■ Documentation for Catalog Recovery Wizard, disk array hosts, disk pools, and
Host Properties in the NetBackup web UI
About NetBackup
NetBackup provides a complete, flexible data protection solution for a variety of
platforms. The platforms include Windows, UNIX, and Linux systems.
NetBackup administrators can set up periodic or calendar-based schedules to
perform automatic, unattended backups for clients across a network. An
administrator can carefully schedule backups to achieve systematic and complete
backups over a period of time, and optimize network traffic during off-peak hours.
The backups can be full or incremental: Full backups back up all indicated client
files, while incremental backups back up only the files that have changed since the
last backup.
Introducing NetBackup 15
About NetBackup
The NetBackup administrator can allow users to back up, restore, or archive the
files from their computer. (An archive operation backs up a file, then deletes it from
the local disk if the backup is successful.)
NetBackup includes both the server and the client software as follows:
■ Server software resides on the computer that manages the storage devices.
■ Client software resides on computers that contain data to back up. (Servers
also contain client software and can be backed up.)
Figure 1-1 shows an example of a NetBackup storage domain.
NetBackup
primary server
Media servers
SAN
OpenStorage
Media Manager tape Storage unit disk pool
storage unit
NetBackup
clients
performance by distributing the network load. Media servers can also be referred
to by using the following terms:
■ Device hosts (when tape devices are present)
■ Storage servers (when I/O is directly to disk)
■ Data movers (when data is sent to independent, external disk devices like
OpenStorage appliances)
During a backup or archive, the client sends backup data across the network to a
NetBackup server. The NetBackup server manages the type of storage that is
specified in the backup policy.
During a restore, users can browse, then select the files and directories to recover.
NetBackup finds the selected files and directories and restores them to the disk on
the client.
NetBackup documentation
For a complete list of NetBackup technical documents for each supported release,
see the NetBackup Documentation Landing Page at the following URL:
https://www.veritas.com/docs/DOC5332
No responsibility is assumed for the installation and use of the Adobe Acrobat
Reader.
Backup policies
NetBackup classic policies are available for the Administrator that wants to continue
to use policies for data protection.
See “Support for NetBackup classic policies” on page 105.
Name of Description
interface
NetBackup web With the NetBackup web user interface (UI), you can view NetBackup activities and manage
user interface NetBackup configuration, from a primary server.
To start the NetBackup web UI:
■ Users must have a role that is configured for them in NetBackup RBAC.
■ Open a web browser and go to the following URL: https://primaryserver/webui/login
Character-based, Run the tpconfig command to start a character-based, menu interface for device management.
menu interface
Use the tpconfig interface from any terminal (or terminal emulation window) that has a termcap
or a terminfo definition.
Command line NetBackup commands are available on both Windows and UNIX platforms. Enter NetBackup
commands at the system prompt or use the commands in scripts.
All NetBackup administrator programs and commands require root or administrator user privileges
by default.
Terminology
The following table describes the concepts and terms in web user interface.
Term Definition
Term Definition
Classic policy In the NetBackup web UI, indicates that a legacy policy protects
the asset.
External certificate A security certificate that is issued from any CA other than
NetBackup.
NetBackup certificate A security certificate that is issued from the NetBackup CA.
Protection plan A protection plan defines when backups are performed, how long
the backups are retained, and the type of storage to use. Once
a protection plan is set up, assets can be subscribed to the
protection plan.
Role For RBAC, defines the operations that a user can perform and
the assets or objects that they can access. For example, you can
configure a role to manage recovery of specific databases and
the credentials that are needed for backups and restores.
Term Definition
Workload The type of asset. For example: VMware, Microsoft SQL Server,
or Cloud.
■ Host properties
Section 1
Monitoring and notifications
■ Chapter 3. Notifications
Chapter 2
Monitoring NetBackup
activity
This chapter includes the following topics:
■ Activity monitor
■ Job monitoring
Jobs Lists job information, including the number of active and queued jobs and the status
of attempted and completed jobs.
Malware detection Displays the malware scan result status for the images including Impacted, Not
impacted, Failed, In progress, and Pending.
Anomaly detection Displays the total anomalies that are reported so far.
Note: An anomalies count of 0 indicates there are no anomalies generated or that the
anomaly detection services are not running.
Monitoring NetBackup activity 28
Activity monitor
Paused protection activities Lists any paused protection activities for clients. These activities include new backups,
duplication, and image expiration. NetBackup pauses protection if it detects malware
in backup images.
Tokens Displays the information about the authorization tokens in your environment.
Certificates Displays the information about the NetBackup host ID-based security certificates or
the external certificates in your environment.
For external certificates, the following information is shown for NetBackup 8.2 and later
hosts:
■ Total hosts. The total number of hosts. The hosts most be online and able to
communicate with NetBackup primary server.
■ Missing. The number of hosts that do not have an external certificate enrolled.
■ Valid. The number of hosts that have an external certificate enrolled.
■ Expired. The number of hosts with expired external certificates.
Security events The Access history view includes a record of logon events. The Audit events view
includes the events that users initiate on the NetBackup primary server.
Usage reporting Lists the size of the backup data for the NetBackup primary servers in your organization.
This reporting is useful to track capacity licensing. Use the drop-down lists in the top
right to select the time period and the view that you want to display. Click on a server
name to see specific details for that server.
Additional details are available for how to configure NetBackup to display primary server
information in this widget.
See “Track protected data size on your primary servers” on page 249.
Activity monitor
Use the Activity monitor to monitor and control the following aspects of NetBackup.
Updates to the Activity monitor occur as jobs are initiated, updated, and completed.
Monitoring NetBackup activity 29
Activity monitor
Jobs Displays in-process or completed jobs for the primary server. The Jobs
tab also displays details about the jobs.
Daemons Displays the status of NetBackup daemons on the primary server. Click
Change server to display daemons on a media server in the
environment.
Processes Displays the NetBackup processes that run on the primary server. Click
Change server to display processes on a media server in the
environment.
Job monitoring
Use the Jobs node in the Activity monitor to monitor the jobs in your NetBackup
environment. The default view for jobs is the List view that contains the
non-hierarchical list of all the jobs. You can also use the Hierarchical view to see
the hierarchy of parent and child jobs. The role of the parent job is to initiate
requested tasks in the form of children jobs.
View a job
For each job that NetBackup runs you can see the following details: the file list and
the status of the job, the logged details for the job, and the job hierarchy.
The jobs that you can view depend on the type of RBAC role that you have.
See “Job monitoring” on page 30.
To view a job and the job details
1 On the left, click Activity monitor. Then click the Jobs tab.
2 Click the job name that you want to view.
If you want to open the job in a separate window, at the top right click Open
in new window.
4 Click the Details tab to view the logged details about a job. You can filter the
logs by error type using the drop-down menu.
See “Search for or filter jobs in the jobs list” on page 34.
5 Click the Job hierarchy tab to view the complete hierarchy for the job, including
any ancestor and any child jobs.
See “View the jobs in the Hierarchy view” on page 33.
3 Locate the top-level job and expand it to see the child jobs.
To manage a job
1 On the left, click Activity monitor. Then click the Jobs tab.
2 Select one or more jobs.
3 The top menu shows the actions that you can perform for the selected jobs.
Cancel You can cancel the jobs that have not yet completed. They can be in
one of the following states: queued, re-queued, active, incomplete,
or suspended.
When a parent job is canceled, any child jobs are also canceled.
Suspend You can suspend backup and restore any jobs that contain
checkpoints.
Restart You can restart the jobs that have completed, failed, or that have
been canceled or suspended. A new job ID is created for the new job.
Resume You can resume the jobs that have been suspended or are in an
incomplete state.
Delete You can delete the jobs that have completed. When a parent job is
deleted, any child jobs are also deleted.
Private All new filters are private by default. These filters appear
in “My list” in the Manage filters page. Only the owner
can view a private filter.
7 Add any additional conditions for the filter or add a sub-query to apply to a
condition.
For example, assume that you want to view all completed jobs that have a
status code of 196 or 239. Create the following query:
State = Done
AND
(Status code = 196
OR
Status code = 239)
Example 1. Query filter for all jobs with the VMware policy type.
Monitoring NetBackup activity 37
Job monitoring
Example 2. Query filter for all jobs that are done and have a status code of 196 or
239.
6 Make the changes that you want to the filter and click Save.
4 Click My list.
5 Locate the filter that you want to delete and click Delete > Yes.
■ The jobs in the hierarchy view have parent jobs, but you do not have permission
to view the parent jobs.
Contact your NetBackup system administrator to get the necessary RBAC role
permissions.
■ NetBackup limits the number of tabs that you can have open with the Jobs
hierarchy view.
If you cannot expand a parent job and see its child jobs, try closing any additional
Jobs tabs that you have open.
Chapter 3
Notifications
This chapter includes the following topics:
■ Job notifications
Job notifications
The following types of email notifications are available for NetBackup jobs.
■ Notifications when job failures occur. NetBackup supports the ticketing systems
that use inbound email service for ticket creation.
See “Send email notifications for job failures” on page 41.
■ Notifications to the backup administrator about backups with a non-zero status.
See “Send notifications to the backup administrator about failed backups”
on page 44.
■ Notifications to the host administrator about successful and failed backups for
a specific host.
See “Send notifications to a host administrator about backups” on page 45.
Prerequisites
Review the following requirements before you configure email notifications using
a ticketing system.
■ The ticketing system is up and running.
■ The SMTP server is up and running.
■ A policy is configured in the ticketing system to create tickets (or incidents)
based on the inbound emails that NetBackup sends.
To configure email notifications
1 At the top right, click Settings > Email notifications.
2 Go to the Email notifications tab.
3 Select Send email notifications.
4 Enter the email information including the recipient's email address, the sender's
email address, and the email sender's name.
5 Enter the SMTP server details including the SMTP server name and port
number.
Provide the SMTP username and password if you have specified the credentials
earlier on the SMTP server.
6 Click Save.
7 Log on to the ticketing system to view the tickets that were created based on
NetBackup alerts.
3 Enter the status codes or a range of status codes (separated by commas) for
which you do not want to receive email notifications.
4 Click Save.
Job ID: 50
10 Allocation failed
196 Client backup was not attempted because backup window closed
6 Enter the email address of the host administrator. (Separate multiple addresses
with commas.)
7 Click Save.
Primary and media NetBackup sends notifications from the server if you configure the
server following setting:
Client. NetBackup sends notifications from the client if you configure the
following setting:
-server The name of the SMTP server that is configured to accept and relay
emails.
@IF "%~4"=="" (
blat %3 -s %2 -t %1 -i Netbackup -server emailserver.company.com -q
) ELSE (
blat %3 -s %2 -t %1 -i Netbackup -server emailserver.company.com -q -attach %4
)
6 Save nbmail.cmd.
Notifications 47
NetBackup event notifications
Note: Job events are not included with these notifications. See job details in the
Activity Monitor for information about job events.
A Notifications icon is located at the top right in the web UI. You can click the icon
to open the Notifications window and view a list of critical notifications 10 at a time.
If a number is displayed with the icon, it indicates how many unseen critical
messages exist. After you have opened the window, the number is reset.
From the window, you can choose to see a more comprehensive list of all
notifications. Each event has a category for its NetBackup or external component
and is assigned a severity level:
■ Error
■ Critical
■ Warning
■ Information
■ Debug
■ Notice
You can sort, filter, and search the list. The comprehensive list also lets you review
details about each event. The details include the full description as well as any
appropriate extended attributes.
NetBackup notifications are not available if the NetBackup Messaging Broker
(nbmqbroker) is not running. See the NetBackup Troubleshooting Guide for
information about restarting the service.
Notifications 48
NetBackup event notifications
View notifications
To view notifications
1 At the top right, click the Notifications icon to view a list of critical notifications
10 at a time.
Note: If a number is displayed with the icon, it indicates how many unseen
critical messages exist. After you have opened the Notifications window, the
number is reset.
Click Load 10 more to view the next 10 notifications. After you have viewed
30 notifications, click Show all to view any remaining messages.
Use Refresh to load the most recent notifications again.
2 To view all notifications, click Show all to open the Events page. On the page,
you can do the following:
■ Click an event to view its details. The details include the full description as
well as extended attributes.
■ To sort the list, click any of the column headings except Description. Events
are sorted by default by the date received.
■ To filter events, click Filter. You can filter by Severity and Timeframe.
In the Filters menu, select the parameter values you want to filter by, and
then click Apply filters.
To remove all filters, click Clear all.
■ To search for events, enter the search string in the Search field. You can
search for values in all columns except Description and Received.
■ Windows:
install_path\var\global\wmc\h2Stores\notifications\properties
■ UNIX:
/usr/openv/var/global/wmc/h2Stores/notifications/properties
DISABLE.NotificationType = true
Or DISABLE.NotificationType.Action = true
Or DISABLE.namespace
For valid NotificationType and Action values, see the following topic.
See Table 3-2 on page 50.
For example:
■ To disable notifications about all storage unit events:
DISABLE.StorageUnit = true
Or NotificationType.Action.severity = value
Valid priority values are: LOW, MEDIUM, HIGH
Valid severity values are: CRITICAL, ERROR, WARNING, INFO, DEBUG
For example:
■ To set priority and severity for create storage unit events:
StorageUnit.CREATE.priority = LOW
StorageUnit.CREATE.severity = INFO
Note: It can take up to one minute for the events of type Policy, SLP, and Catalog
to generate after the corresponding action has been performed.
Notifications 50
NetBackup event notifications
Storage Unit CREATE INFO The storage unit {Storage_Unit_Name} was created.
StorageUnit
Note: Any change to a basic
disk staging schedule (DSSU),
such as adding, deleting, or
modifying, generates relevant
storage unit notifications. With
those notifications, some
additional policy notifications
are also generated with policy
name
__DSSU_POLICY_{Storage_Unit_Name}.
Storage Unit Group CREATE INFO The storage unit group {Storage_Unit_Group_Name} was
created.
StorageUnitGroup
Storage life cycle policy Create INFO Event for Storage Lifecycle Policy received. No additional
details found.
SLP
The Storage Lifecycle Policy {Policy_Name} was created.
Storage life cycle policy state UPDATE INFO The SLP version {Version} was changed.
change
SlpVersionActInactEvent
Notifications 52
NetBackup event notifications
Machine
Drive CREATE INFO The drive {Drive_Name} was created for host {Host_Name}.
DriveChange
DELETE CRITICAL The drive {Drive_Name} was deleted for host {Host_Name}.
Library Event - Robot CREATE INFO The library {Library_Name} was created for host
{Host_Name}.
Library
Media Group CREATE INFO The media group {Media_Group_ID} was created.
MediaGroup
Media Pool CREATE INFO The media pool {Media_Pool_ID} was created.
MediaPool
RetentionEvent
TAGSDISCOVERYEVENT
no actions CRITICAL
Note: An appropriate notification is generated when an
autodiscovery action or a Discover Now action fails for
VMWare, RHV, Nutanix, or Cloud servers.
KMS Certificate Expiration EXPIRY WARNING The certificate that is used to communicate with the KMS
server {KMS_Server_Name}${server} is about to expire in
KMSCredentialStatus
{days_to_expiration}. If the certificate is not renewed on
time, communication with the KMS server fails.
Message Broker Service Status RUNNING INFO The NetBackup Messaging Broker service is running.
NetBackup internal notifications are now enabled.
ServiceStatus
Notifications 54
NetBackup event notifications
Protection Plan Subscription Create INFO Received an event for protection plan subscription.
Catalog Image Expiration Not CRITICAL Event for Catalog Image received. No additional details
applicable found.
Catalog
Catalog Image Image_Name was modified.
Note: Also applicable for
manual image expiration. Catalog Image Image_Name expired.
Usage Reporting No actions INFO or The usage report generation has started.
ERROR
UsageReportingEvent The usage report is generated successfully.
NetBackup Configuration Not CRITICAL The NetBackup configuration file contains multiple
Health applicable CLIENT_NAME entries.
Catalog Backup Health Not CRITICAL One or more users who can access the identity files that
applicable need to be backed up as part of the disaster recovery (DR)
package, do not exist on the system.
Certificate Health Not CRITICAL The certificate for host $ {hostName} is going to expire
applicable soon.
Notifications 55
NetBackup event notifications
Web Truststore Health Not CRITICAL One or more files and / or directories do not have
applicable appropriate web service user permissions.
CRL Health Not CRITICAL The CRL on host $ {hostName} is not refreshed.
applicable
NetBackup Configuration Not CRITICAL The service user does not have the required permissions
Health applicable on one or more links or junction target directories. Run the
'Install_Path\NetBackup\bin\goodies\nbserviceusercmd.exe
-addAcl' command to assign the correct permissions.
NetBackup Configuration Not INFO Assigned the execute permission to the service user on
Health applicable one or more NetBackup directories.
NetBackup Configuration Not WARNING Could not assign the execute permission to the service
Health applicable user on one or more NetBackup directories.
■ POST/config/hosts/{hostId}/configurations
Notifications 56
NetBackup event notifications
■ GET/config/hosts/{hostId}/configurations/configurationName (for a
specific property)
■ PUT/config/hosts/{hostId}/configurations/configurationName
■ DELETE/config/hosts/{hostId}/configurations/configurationName
See the NetBackup 10.2 API Reference on SORT for more information about these
APIs.
The maximum number of records that are stored, after which the cleanup process
removes the oldest record, overriding the retention value.
Note: If you unintentionally reset a host’s attributes, you can undo the changes by
restarting the bpcd service. Otherwise, the host attributes are automatically updated
with the appropriate values after 24 hours.
Chapter 5
Managing credentials for
workloads and systems
that NetBackup accesses
This chapter includes the following topics:
More information
See “Add a credential for NetBackup Callhome Proxy” on page 64.
See “Add a credential for an external KMS” on page 63.
See “Add a credential for Network Data Management Protocol (NDMP)” on page 71.
Managing credentials for workloads and systems that NetBackup accesses 63
Add a credential in NetBackup
See the Veritas Usage Insights Getting Started Guide for details on using a Call
Home proxy server.
To configure credentials for a workload (for example, SQL Server), refer to the
guide for that workload for details.
3 Click Next.
4 Select External KMS.
5 Provide the credential details that are needed for authentication.
Managing credentials for workloads and systems that NetBackup accesses 64
Add a credential for NetBackup Callhome Proxy
3 Click Next.
Managing credentials for workloads and systems that NetBackup accesses 65
Edit or delete a named credential
Note: Ensure that the credential category used for AHV cluster is AHV and for
Nutanix Prism Central is Prism Central.
4 Click Next.
5 Select CyberArk as the category.
6 Provide the credential details for CyberArk server:
These details are used to authenticate the communication between the
NetBackup primary server and the external CMS server:
■ Certificate - Specify the certificate file contents.
■ Private key - Specify the private key file contents.
Managing credentials for workloads and systems that NetBackup accesses 67
Add a credential for CyberArk
7 Click Next.
8 Add a role that you want to have access to the credential.
■ Click Add.
■ Select the role.
■ Select the credential permissions that you want the role to have.
Note: The External credential can only be created if an external CMS server
configuration exists.
Note: While configuring the external CMS server for CyberArk server, user
can use the DNS hostname or IPV4 address. However it is recommended to
use the DNS hostname for connecting to the host. CyberArk configuration fails
if IPV6 address is used.
3 Click Next.
4 On the Associate credentials page, Select existing credential or Add a new
credential.
For adding a new credential, See “Add a credential for CyberArk” on page 66.
5 Click Next and follow the prompts to complete the wizard.
7 Click Add.
For more information about NDMP credentials, see the NetBackup NAS
Administrator's Guide.
■ Update host
■ Deployment policies
To add packages
1 From Hosts > Deployment management, select Add package or Add,
depending if there are already packages in the repository.
2 In the dialog box, navigate to where your VxUpdate packages are located and
select them. Be aware that NetBackup can only add the packages that reside
on the primary server's file system.
The interface displays only VxUpdate packages. A directory may have files
but if there are no VxUpdate packages, it shows as empty.
3 Select Ok to add the packages.
Depending on the number and the size of packages you add, it may take a
while for them to display in the repository.
To delete packages
1 From Hosts > Deployment management, select the packages you want to
delete.
2 Select Delete.
Note: You can also delete individual packages from the action menu.
If you delete a parent package, all child packages that are associated with that
parent are removed.
If you delete a server package, the associated client package is also deleted. For
example, if you delete the Windows 8.3 server package, the Windows 8.3 client
package is also removed.
Update host
The Update host option lets you launch immediate jobs to update or upgrade your
NetBackup environment.
After you select Hosts > Host Properties and make one or more valid selections,
the Update host option appears in the upper right. Certain restrictions apply to the
use of the Update host option:
■ All computers you select must be of the same type. Select either all client
computers or all media servers. If you select mixed computer types, the Update
host option disappears.
■ Primary servers are not supported. If you select a primary server, the Update
host option disappears.
Managing deployment 75
Deployment policies
■ The operating system and versions column must contain data for the Update
host option to appear. If these columns do not contain data, attempt to connect
to the host.
After you specify computers to update, select Update host to launch the update
process. You are prompted for the information shown:
■ Attributes
On this screen, specify: The package you want deployed, the operation type,
any limit on concurrent jobs, and how to handle Java and the JRE.
■ Hosts
Displays the hosts you want to upgrade. From this screen, you can remove
hosts.
■ Security options (if it appears)
Either accept the default (Use existing certificates when possible) or specify
the appropriate security information for your environment.
■ Review
Displays all the options you selected on previous screens.
Select Update to start the deployment job.
Deployment policies
Under Hosts > Deployment management, you now have a Deployment policies
tab. Use this tab to add, edit, copy, deactivate, delete, and launch your policies.
To add a new policy:
1 Navigate to Hosts > Deployment management > Deployment policies and
select Add.
2 Enter the required information for deployment policies.
The required deployment policy information is similar to the update host
information.
See “Update host” on page 74.
3 Select Save.
Similarly, to edit, copy, deactivate, or delete deployment policies, select the policy.
Then select the appropriate action from banner.
To manually initiate policies, select the desired policy and select Deploy now from
the menu.
Section 3
Configuring storage
Note: If you use Key Management Service (KMS), it must be configured before
you can select the KMS option in the storage server setup. Refer to NetBackup
Security and Encryption Guide for more information.
To ensure that A.I.R. and other storage capabilities are displayed accurately for
the storage servers on the NetBackup web UI, upgrade the media server. You must
upgrade the media server that has NetBackup versions 8.2 or earlier. After you
upgrade the media server then use the command line to update the storage server.
Use the following command to update the storage server:
/usr/openv/netbackup/bin/admincmd/nbdevconfig -updatests
-storage_server <storage server name> -stype PureDisk
■ Create a Media Server Deduplication Pool (MSDP) storage server for image
sharing
4 (Optional) In Media servers, click Add to add any additional media servers
you want to use.
Click Next after selecting additional media servers or if you want to continue
without selecting additional media servers.
5 On the Review page, confirm that all options are correct and click Save.
After you click Save, the credentials you entered are validated. If the credentials
are invalid, click Change and you can correct the issue with the credentials.
6 (Optional) At the top, click on Create disk pool.
6 (Optional) In Media servers, click Add to add any additional media servers
you want to use.
Click Next after selecting additional media servers or if you want to continue
without selecting additional media servers.
7 On the Review page, confirm that all options are correct and click Save.
If the MSDP storage server creation is unsuccessful, follow the prompts on the
screen to correct the issue.
To configure MSDP to use cloud storage, use the following procedure
(drop-down in Volumes step) to select an existing disk pool volume or create
a new one.
8 (Optional) At the top, click on Create disk pool.
9 (Optional) To create a cloud logical storage unit and disk pool with replication,
click on Create disk pool.
Enter the required information to create a disk pool.
In the next tab, select and add the required cloud volume. Select the cloud
storage provider and the required details of the storage provider. Enter the
credentials to access the cloud storage provider and then define the advanced
settings.
Note: Currently, AWS S3 and Azure storage API types are supported.
Note: When you enable Server-Side Encryption, you can configure AWS
Customer-Managed keys. These keys cannot be deleted once they are in use
by NetBackup. Each object is encrypted with the key during upload and deleting
the key from AWS causes NetBackup restore failures.
Note: Veritas Alta Recovery Vault supports multiple options. For Veritas Alta
Recovery Vault Amazon and Amazon Government options in the web UI, you
must contact your Veritas NetBackup account manager for credentials or with
any questions.
For more information on environments and deployment, refer to Veritas Alta
Recovery Vault.
For more information, refer to the NetBackup Cloud Administrator’s Guide and
NetBackup Deduplication Guide.
Configuring storage servers 83
Create a Media Server Deduplication Pool (MSDP) storage server for image sharing
Note: The fast import option is an import operation that is specific to image
sharing. You can import the backed-up images from the cloud storage to the
cloud recovery server that is used for image sharing. After a fast import, you
can restore the images. For AWS cloud provider, you can also convert the VM
image to an AWS AMI. For Azure cloud provider, you can convert the VM
image to VHD.
4. In the Fast import images page, select the backup images that you want to
import and click Import.
5. Verify the activity completion status in the Activity Monitor.
Converting the VM images to AWS AMI or VHD in Azure.
1. On the left select VMware and then select the imported VMware image to
convert.
Configuring storage servers 85
Using image sharing from the NetBackup web UI
3 In Volumes, use the Volume drop down to select a volume or add a new
volume. If you want to add a new disk pool volume, use the Add volume option.
Note: When you enable Server-Side Encryption, you can configure AWS
Customer-Managed keys. These keys cannot be deleted once they are in use
by NetBackup. Each object is encrypted with the key during upload and deleting
the key from AWS causes NetBackup restore failures.
Note: Veritas Alta Recovery Vault supports multiple options. For Veritas Alta
Recovery Vault Amazon and Amazon Government options in the web UI, you
must contact your Veritas NetBackup account manager for credentials or with
any questions.
For more information on environments and deployment, refer to Veritas Alta
Recovery Vault.
For more information about Veritas Alta Recovery Vault Azure options, refer
to About Veritas Alta Recovery Vault Azure in the NetBackup Deduplication
Guide.
Enter all required information based on the selection and click Next.
4 In Replication, click Add to add replication targets to the disk pool.
This step lets you select a trusted primary server or add a trusted primary
server. You can add a primary server that supports NetBackup Certificate
Authority (NBCA), ECA, and ECA together with NBCA.
Replication is supported only on MSDP.
Review all the information that is entered for the replication targets and then
click Next.
5 On the Review page, verify that all settings and information are correct. Click
Finish.
The disk pool creation and replication configuration continue in the background
if you close the window. If there is an issue with validating the credentials and
configuration of the replication, you can use the Change option to adjust any
settings.
Chapter 10
Configuring storage units
This chapter includes the following topics:
5 In the Media server tab, select the media servers you want to use and then
click Next.
You can have NetBackup select your media server automatically or you can
select your media servers manually using the radio buttons.
6 Review the setup of the storage unit and then click Save.
See “Create a disk pool” on page 87.
See “Create a Media Server Deduplication Pool (MSDP) storage server” on page 81.
See “Create a Cloud storage, OpenStorage, or AdvancedDisk storage server ”
on page 79.
See “Create a protection plan” on page 107.
Note: See the NetBackup Deduplication Guide for more information about universal
share policies, universal share for cloud LSU limitation, prerequisites, and
configuration.
Configuring universal shares 94
Create a universal share
3 At this point, continue to enter values in the remaining fields or click Save to
save the universal share. You can update the remaining fields later from the
universal share’s details page:
■ Select a Quota type: Unlimited or Custom. If you select Custom, also specify
the quota in MB, GB, or TB units.
The Custom quota value limits the amount of data that is ingested into the
share. Quotas are enforced using the front-end terabyte (FETB) calculation
method. They are Implemented per share and can be modified at any time.
You do not need to remount the share for the change to a take effect.
To update the quote type or value from the universal share’s details page,
click Edit in the Quota section.
■ Specify User names (Local or Active Directory) and Group names (Active
Directory only). Only the specified users or groups can access the share.
You can add and update the User names and Group Names later from
the details page of an existing universal share.
Configuring universal shares 95
Create a universal share
Note: Currently, User names and Group names are supported only for
the SMB (CIFS) protocol.
4 To view details about a universal share, click its name in the Universal Shares
table.
5 To delete a universal share, select one or more and click Delete or select
Delete from the action menu.
Deleting a universal share also deletes all data in the share. This action is
irreversible and may take some time if the amount of data is large. Any active
data transfers are immediately terminated, and any mounted shares are
immediately removed.
Note: Instant access on Flex WORM storage requires the following services: NGINX,
NFS. SAMBA, WINBIND (if Active Directory is required), SPWS, VPFS.
Chapter 12
Configuring server groups
This chapter includes the following topics:
Caution: NetBackup allows a server group name to be the same as the name of
a media server. To avoid confusion, do not use same name for a server group and
a media server.
Configuring server groups 97
Delete a server group
Server group name Provide a unique name for the server group. Do not use
the name for an existing media server or other host.
You cannot change the name of an existing server
group.
5 To add a server to the group, click Add, select the server, then click Add.
To remove a server from the group, select the server and click Remove.
6 Click Save.
To reduce the cloud volume size, open the contentrouter.cfg file from
/msdp/etc/puredisk/ and change the values. After changing the values,
restart the MSDP services and then create the cloud volume.
The local MSDP storage does not In the Select long-term retention storage configuration page for protection
display the compression and the plans, the local MSDP storage does not display the compression and the
encryption values correctly. encryption values correctly.
Troubleshooting storage configuration 99
Troubleshooting universal share configuration issues
3 Resolve the issues that are identified in the log. For example, restart any
services that are required for instant access.
Troubleshooting storage configuration 101
Troubleshooting universal share configuration issues
Make sure that the InstantAcess flag is listed in the command's output.
If the flag is not listed, see one of the guides mentioned above to enable instant
access on the storage server.
3 Run the following command:
nbdevconfig -getconfig -stype PureDisk -storage_server
storage_server_name
Whenever a universal share is created on the NetBackup web UI, a mount point is
also created on the storage server.
For example:
Question Answer
In the web UI’s Protected by The asset is not currently subscribed to a protection plan.
column, what does Classic However, it was subscribed to a protection plan. Or, it
policy only mean? was covered by a classic policy at one time and it has a
Last backup status. There may or may not be an active
classic policy protecting the asset (contact the NetBackup
administrator to find out).
Where can I find the details of a The details of a classic policy are not visible in the web
classic policy? UI, with the exception of a few policy types.
How can I manage a classic Some policy types can be managed in the NetBackup
policy? web UI.
When should I subscribe an asset A protection plan lets you easily add and remove assets
to a protection plan versus from the plan and see which assets are protected. A
protecting the asset with a classic workload administrator can fully control who can view or
policy? manage protection plans and assets.
Can I use both a protection plan Yes. The web UI shows the details of the protection plan
and a classic policy to protect an but not the details of the classic policy. You can contact
asset? the NetBackup administrator for the classic policy details.
What action should I take when You can ask the NetBackup administrator if a classic
an asset is unsubscribed from a policy protects the asset.
protection plan and the web UI
shows Classic policy only for
that asset?
Overview of backups in the NetBackup web UI 105
Supported protection plan types
■ MS-SQL-Server
■ MS-Windows
■ NBU-Catalog
■ NDMP
■ Oracle
■ SAP
■ Standard
■ Sybase
■ Universal-Share
■ VMware
Chapter 15
Managing protection plans
This chapter includes the following topics:
Before you create a protection plan, you must configure all storage options.
See “About storage configuration” on page 77.
To create a protection plan
1 On the left, click Protection > Protection plans and then click Add.
2 In Basic properties, enter a Name, Description, and select a Workload from
the drop-down list.
Optional selection:
Managing protection plans 108
Create a protection plan
Note: If you select Automatic for the schedule type, then all schedules for this
protection plan are Automatic. If you select a Full, Differential incremental,
or Cumulative Incremental for the schedule type, then all schedules for this
protection plan must be one of these options.
If you select Automatic for the schedule type, NetBackup automatically sets
the schedule type for you. NetBackup calculates when to do a Full or
Differential incremental based on frequency you specify.
Managing protection plans 109
Create a protection plan
Note: The protection plan creation does not work for the VMware workload
when certain schedule frequencies are set with WORM storage lock duration.
The protection plan creation does not work when: schedule frequencies are
set to less than one week and WORM storage Lock Maximum Duration less
than one week greater than the requested retention period.
If you use a protection plan to protect VMware with WORM capable storage,
set the WORM storage Lock Maximum Duration to greater than one week.
Or, explicitly select the schedule type in the protection plan.
Review the Backup schedule preview window and verify that all schedules
are set correctly.
Managing protection plans 111
Create a protection plan
4 In Storage options, configure the storage type per schedule you configured
in step 3.
The options vary depending on storage options currently setup to work with
NetBackup.
A protection plan can only use the storage that a NetBackup 8.1.2 or newer
media server can access.
Snapshot storage only Snapshot If you use the Snapshot only storage option, no other storage
Manager is option can be selected. Go to step 5.
required for
this option.
Perform snapshot backups Microsoft SQL For instructions on configuring protection plans for Microsoft
Server is SQL Server, see the NetBackup Web UI Microsoft SQL
required for Server Administrator's Guide.
this option.
Backup storage OpenStorage Click Edit to select the storage target. Click Use selected
is required for storage after selecting the storage target.
this option.
The NetBackup Accelerator feature allows protection plans
Tape, storage
to run faster than traditional backups, by creating a compact
unit groups,
data stream that uses less network bandwidth. If the storage
and
server on the NetBackup primary server supports NetBackup
Replication
Accelerator, this feature is included in the protection plan.
Director not
For more details on NetBackup Accelerator, contact the
supported.
NetBackup administrator or see the NetBackup
Administrator’s Guide, Volume I or the NetBackup for VMware
Administrator’s Guide.
Replication target The backup Click Edit to select the replication target primary server.
storage must Select a primary server and then select a storage lifecycle
be a source in policy. Click Use selected replication target to return to the
a targeted storage options screen.
A.I.R.
Cloud workloads support the MSDP and MSDP-C storage
environment.
units for replication (AIR).
Long-term retention storage OpenStorage Click Edit to select the cloud storage provider. Click Use
is required for selected storage after selecting the cloud provider target.
this option.
Cloud workloads support the AdvancedDisk, Cloud storage,
Tape, storage
MSDP, and MSDP-C as storage units for duplication.
unit groups,
and
Replication
Director not
supported.
Transaction log options Microsoft SQL If you use the option Select custom storage options, click
Server is Edit to select the backup storage.
required for
this option.
5 In Backup options, configure all options based on your workload type. The
options in this area change depending on workload, schedule, or storage
options selected.
For the Cloud workload:
■ For any of the selected cloud provider options, if you select Enable granular
recovery for files or folders, ensure that you have opted to retain a
snapshot while adding a backup schedule, as granular recovery can be
performed only from a snapshot image.
■ For any of the selected cloud provider option, if you select Exclude selected
disks from backups, then the selected disks would not be backed-up and
hence the VM would not be recovered completely. Any application running
on the excluded disks might not work.
Note: The boot disks cannot be excluded from the backups even if they
have data or tags associated with them.
■ If you have selected the cloud provider as Google Cloud Platform, select
Enable regional snapshot, to enable regional snapshots.
If the regional snapshot option is enabled, the snapshot is created in the
same region in which the asset exists. Otherwise, the snapshot is created
in a multi-regional location.
■ (Microsoft Azure or Azure Stack Hub cloud provider) Select Specify
snapshot destination resource group to associate snapshots to a
particular peer resource group. This resource group is within the same
Managing protection plans 113
Customizing protection plans
Note: For NetBackup deployed in AKS and EKS environments, ensure that
this universal share contains the export host that is added to the subnet as
the media server or media server pod.
Table 15-1 Protection plan settings that can be configured and edited
Storage options X
Backup options X
Advanced options X
Managing protection plans 114
Edit or delete a protection plan
Table 15-1 Protection plan settings that can be configured and edited
(continued)
Note: You cannot edit these settings in a protection plan: Backup options and
Advanced options. If you want to adjust these settings and additional schedule
settings, you must create a new protection plan and subscribe assets to the new
plan. Or, you can customize the plan for the asset.
See “Customizing protection plans” on page 113.
Note: You cannot edit these settings when you subscribe an asset: Storage options
or Permissions. Changes to Schedules are limited. If you want to adjust these
settings, you must create a new protection plan and subscribe assets to the new
plan. Or, you can customize the plan for the asset.
See “Customizing protection plans” on page 113.
For SQL Server transaction log schedules you can change the start window,
the recurrence, and the retention period.
■ Backup options
Adjust the backup options that were set up in the original protection plan.
The options in this area change depending on workload.
■ Advanced
Change or add any options that were set up in the original protection plan.
You need the following permissions to make these changes:
■ Edit attributes, to edit Backup options and Advanced options.
■ Edit full and incremental schedules, to edit the start window for these
schedule types.
■ Edit transaction log schedules, to edit the settings for SQL Server
transaction log schedules.
7 Click Protect.
Note: When you unsubscribe an asset from a protection plan, there is a possibility
that the asset displays Classic policy in the web UI. This situation can happen
when an asset is subscribed to a protection plan and a backup runs for that asset.
Then the asset is unsubscribed from the protection plan while it has a valid backup
image. The web UI displays Classic policy, but there may or may not be an active
policy protecting the asset.
■ PostgreSQL
■ RHV
■ VMware
Note: To use Backup Now you must have subscribe permissions for at least one
protection plan. You can select only one asset at a time for each Backup Now
operation.
Note: The option of Backup type is only available for Microsoft SQL Server
assets. You can select the type of backup you want to perform using the
drop-down. The drop-down only contains the backup types that are available
in the protection plan.
■ Add a policy
Add a policy
Use the following procedure to create a backup policy in the NetBackup web UI.
Example policies are also available.
See “Example policy - Exchange Server DAG backup” on page 120.
See “Example policy - Sharded MongoDB cluster” on page 121.
For details on policy options, refer to the NetBackup Administrator's Guide, Volume
I and to the appropriate workload or database guides.
Note: You must have the RBAC Administrator role or similar permissions to create
and manage policies.
Managing classic policies 120
Example policy - Exchange Server DAG backup
To add a policy
1 On the left, select Protection > Policies.
2 Click Add.
3 On the Attributes tab, do the following:
■ Select the Policy type that you want to create.
■ Select the Policy storage that you want to use.
■ Select or configure any other policy attributes.
4 On the Schedules tab, configure all the necessary schedules. For example,
Full and incremental schedules.
5 Depending on the policy type that you selected, add the clients, database
instances, or virtual machines that you want to protect. Perform this
configuration on the Clients or the Instances and databases tab.
■ For most policy types you configure a list of clients on the Clients tab.
■ For Oracle and MS-SQL-Server policy types, you select instances or
databases on the Instances and databases tab. Or if you use scripts or
batch files, you select clients on the Clients tab.
6 Depending on the policy type that you selected, add the files, database
instances, or other objects that you want to protect. This configuration is
performed on the Backup selections tab.
7 For the policy types that have additional tabs, review and select the other policy
options that are needed to complete the setup.
8 Click Create.
4 On the Schedules tab, configure all the necessary schedules. For example,
Full and incremental schedules.
7 Click Create.
4 On the Schedules tab, configure all the necessary schedules. For example,
Full and incremental schedules.
5 On the Clients tab, add the client name. Use the format
MongoDBNode-portnumber.
6 On the Backup selections tab, add the application type, the backup hosts,
and manually add the ALL_DATABASES directive.
ALL_DATABASES
7 Click Create.
For details on policy options, refer to the NetBackup Administrator's Guide, Volume
I and to the appropriate workload or database guides.
Note: You must have the RBAC Administrator role or similar permissions to manage
policies.
Edit a policy
You can make changes to policy attributes, schedules, clients, or backup selections.
To edit a policy
1 On the left, select Protection > Policies.
2 Select the policy that you want to change and click Edit.
3 Make the changes that you want, then click Save.
Copy a policy
You can copy a policy to save time creating new policies. This option is especially
useful for the policies that contain many of the same policy attributes, schedules,
clients, or backup selections.
To copy a policy
1 On the left, select Protection > Policies.
2 Select the policy that you want to copy and click Copy policy.
3 Provide a name for the policy and click Copy.
Delete a policy
You can delete a policy if you no longer need it. To maintain protection of the clients
or hosts, add them to another policy before you delete the current policy.
To delete a policy
1 On the left, select Protection > Policies.
2 Select one or more policies and click Delete > Delete.
Deactivate a policy
You can deactivate a policy to temporarily pause any backup requests for that
policy. For example, if you want to perform maintenance on the clients in the policy.
Note that manual backups or user-requested backups cannot run if a policy is
deactivated.
To deactivate a policy
1 On the left, click Policies.
2 Select the policy, then click Deactivate.
Activate a policy
Activate a policy when you are ready for backup schedules in the policy to run.
To activate a policy
1 On the left, click Policies.
2 Select the policy, then click Activate.
Edit a client
You can edit the client name in a policy or change the operating system that is
selected for a client. If you select multiple clients, you can only change the operating
system.
To edit a client
1 On the left, select Protection > Policies.
2 Select the client and click Edit.
3 Make any changes that you want and click Save.
Delete a client
You can delete a client from a policy. For example, if another policy protects the
client or if a client is decommissioned.
When you delete a client from a policy, the NetBackup client software is not deleted
or uninstalled from the client. Backups for the client can be recovered until the
backups expire.
Managing classic policies 125
Edit or delete a backup selection
To delete a client
1 On the left, select Protection > Policies.
2 Select one or more clients and click Delete > Yes.
Edit a schedule
You can edit the settings of a schedule for a policy.
Managing classic policies 126
Perform manual backups
To edit a schedule
1 On the left, select Protection > Policies.
2 Select the schedule and click Edit.
3 Make the changes that you want. Then click Save.
Delete a schedule
You can delete a schedule from a policy.
To delete a schedule
1 On the left, select Protection > Policies.
2 Select one or more schedules and click Delete > Yes.
■ Verify.
■ Duplicate.
■ Phase 1 import.
■ Phase 2 import.
Search results
When you search for backup images, the image list displays at the bottom of the
screen. Click Show or hide columns to display additional information about the
images.
The NetBackup web UI also indicates any image information for the Copy DTE
mode and Copy hierarchy DTE mode. These attributes indicate if a copy or the
ancestor copies are created securely.
Chapter 18
Pausing data protection
activity
This chapter includes the following topics:
The following conditions occur when a client is added in the paused protection list:
■ Automatic or manual replication of the client will be paused
■ Automatic or manual duplication of that the will be paused
■ Only automatic image cleanup for the client will be paused if the Automatic
pause protection > Pause image expiration option is enabled.
■ Chapter 23. Managing the security settings for the primary server
■ Chapter 24. Using access keys, API keys, and access codes
Activity monitor actions Canceling, suspending, resuming, restarting, or deleting any type of job
creates an audit record.
Alerts and email notifications If an alert cannot be generated or an email notification cannot be sent for
NetBackup configuration settings. For example, SMTP server configuration
and the list of excluded status codes for alerts.
Security events and audit logs 135
About NetBackup auditing
Anomalies When a user reports an anomaly as false positive, the action is audited and
logged for that user.
Asset actions Deleting an asset, such as a vCenter server, as part of the asset cleanup
process is audited and logged.
Authorization failure Authorization failure is audited when you use the NetBackup web UI, the
NetBackup APIs, or Enhanced Auditing.
Certificate management Creating, revoking, renewing, and deploying of NetBackup certificates and
specific NetBackup certificate failures.
Certificate Verification Failures (CVFs) Any failed connection attempts that involve SSL handshake errors, revoked
certificates, or host name validation failures.
For certificate verification failures (CVFs) that involve SSL handshakes and
revoked certificates, the timestamp indicates when the audit record is posted
to the primary server. (Rather than when an individual certificate verification
fails.) A CVF audit record represents a group of CVF events over a time
period. The record details provide the start and the end times of the time
period as well as the total number of CVFs that occurred in that period.
Disk pools and Volume pools actions Adding, deleting, or updating disk or volume pools.
Host database NetBackup operations that are related to the host database.
IRE configuration and states Adding, updating, and deleting IRE allowed subnets or schedule. IRE external
network is opened or closed by IRE schedule or by an administrator.
Logon attempts Any successful or any failed logon attempts for the NetBackup web UI or
the NetBackup APIs.
Policies actions Adding, deleting, or updating policy attributes, clients, schedules, and backup
selections lists.
Restore and browse image user actions All the restore and browse image content (bplist) operations that a user
performs are audited with the user identity.
Security configuration Information that is related to changes that are made to the security
configuration settings.
Security events and audit logs 136
About NetBackup auditing
Starting a restore job NetBackup does not audit when other types of jobs begin. For example,
NetBackup does not audit when a backup job begins.
Starting and stopping the NetBackup Starting and stopping of the nbaudit manager is always audited, even if
Audit Manager (nbaudit). auditing is disabled.
Storage lifecycle policy actions Attempts to create, modify, or delete a storage lifecycle policy (SLP) are
audited and logged. However, activating and suspending an SLP using the
command nbstlutil are not audited. These operations are audited only
when they are initiated from a NetBackup graphical user interface or API.
Token management Creating, deleting, and cleanup of tokens and specific token issuing failures.
User management Adding and deleting Enhanced Auditing users in the Enhanced Auditing
mode.
User action that fails to create an audit If auditing is enabled but a user action fails to create an audit record, the
record audit failure is captured in the nbaudit log. NetBackup status code 108 is
returned (Action succeeded but auditing failed). The NetBackup
does not return an exit status code 108 when auditing fails.
Any failed actions. NetBackup logs failed actions in NetBackup error logs. Failed actions do not
display in audit reports because a failed attempt does not bring about a
change in the NetBackup system state.
The effect of a configuration change The results of a change to the NetBackup configuration are not audited. For
example, the creation of a policy is audited, but the jobs that result from its
creation are not.
The completion status of a manually While the act of initiating a restore job is audited, the completion status of
initiated restore job the job is not audited. Nor is the completion status of any other job type,
whether initiated manually or not. The completion status is displayed in the
Activity Monitor.
Internally initiated actions NetBackup-initiated internal actions are not audited. For example, the
scheduled deletion of expired images, scheduled backups, or periodic image
database cleanup is not audited.
Security events and audit logs 137
About NetBackup auditing
Rollback operations Some operations are carried out as multiple steps. For example, creating
an MSDP-based storage server consists of multiple steps. Every successful
step is audited. Failure in any of the steps results in a rollback, or rather, the
successful steps may need to be undone. The audit record does not contain
details about rollback operations.
Host properties actions Changes made with the bpsetconfig or the nbsetconfig commands,
or the equivalent property in host properties, are not audited. Changes that
are made directly to the bp.conf file or to the registry are not audited.
■ For any operations that do not require credentials or require the user to sign in,
operations are logged without a user identity.
Where number_of_days indicates (in days) how long audit records are to be
retained for the audit report.
In the following example, the records of user actions are retained for 30 days
and then deleted.
To ensure that audit records are not missed from a catalog backup, configure
the catalog backup frequency to be less frequent or equal to the
-AUDIT_RETENTION_PERIOD.
-sdate The start date and time of the report data you want
to view.
<"MM/DD/YY
[HH:[MM[:SS]]]">
-edate The end date and time of the report data you want
to view.
<"MM/DD/YY
[HH:[MM[:SS]]]">
■ [-order <DTU|DUT|TDU|TUD|UDT|UTD>].
Indicate the order in which the information
appears.
D (Description)
T (Timestamp)
U (User)
Security events and audit logs 140
About NetBackup auditing
The following information only displays if you use the -fmt DETAIL or the -fmt
PARSABLE options.
REASON The reason that the action was performed. A reason displays if a
reason was specified for the operation that created the change.
DETAILS An account of all of the changes, listing the old values and the
new values.
communication. Additionally, the NetBackup web server uses these certificates for
communication between the NetBackup web UI and the NetBackup hosts.
Deployment of external certificates, updating or replacing external certificates, and
CRL management for the external CA are managed outside of NetBackup.
For more information on external certificates, see the NetBackup Security and
Encryption Guide.
You can view and revoke NetBackup certificates and view information about the
NetBackup CA. More detailed information about NetBackup certificate management
and certificate deployment is available in the NetBackup Security and Encryption
Guide.
Note: Do not revoke a certificate of the primary server. If you do, NetBackup
operations may fail.
Managing security certificates 146
Managing NetBackup security certificates
Note: The information here only applies to the security certificates that are issued
by the NetBackup certificate authority (CA). External certificates must be managed
outside of NetBackup.
host administrator must use to obtain a new certificate. This reissue token retains
the same host ID as the original certificate. The token can only be used once.
Because it is associated to a specific host, the token cannot be used to request
certificates for other hosts.
To reissue a NetBackup certificate for a host
1 On the left, select Security > Certificates.
2 Click NetBackup certificates.
3 Select the host and click Actions > Generate reissue token.
4 Enter a token name and indicate how long the token should be valid for.
5 Click Create.
6 Click Copy to clipboard and click Close.
7 Share the authorization token so the host’s administrator can obtain a new
certificate.
Note: The information here only applies to the security certificates that are issued
by the NetBackup certificate authority (CA). External certificates must be managed
outside of NetBackup.
Depending on the security level for NetBackup certificate deployment, you may
need an authorization token to issue a new NetBackup certificate to a host. You
can create a token when it is required or find and copy a token if it is needed again.
Tokens can be cleaned up or deleted if they are no longer needed.
To reissue a certificate, a reissue token is required in most cases. A reissue token
is associated with the host ID.
4 Click Create.
Cleanup tokens
Use the Cleanup tokens utility to delete tokens from the token database that are
expired or that have reached the maximum number of uses allowed.
To cleanup tokens
1 On the left, select Security > Tokens.
2 Click Cleanup > Yes.
Delete a token
You can delete a token can be deleted before it is expired or before the Maximum
uses allowed is reached.
To delete a token
1 On the left, select Security > Tokens.
2 Select the name of the tokens that you want to delete.
3 On the top right, click Delete.
Note: Windows certificate store is not supported as certificate source for the
NetBackup web server.
■ install_path/netbackup/bin/nbwmc start
Windows install_path\NetBackup\wmc\bin\install\
UNIX install_path/wmc/bin/install
install_path/netbackup/bin/bpclusterutil -unfreeze
5 Verify that you can access the NetBackup web user interface using a browser,
without a certificate warning message.
install_path/netbackup/bin/bpclusterutil -unfreeze
Note: Before you can see external certificate information, you must configure
NetBackup for external certificates. See the NetBackup Security and Encryption
Guide for details.
As you add external certificates to the hosts in the NetBackup domain, use the
External certificates dashboard to track which hosts need attention. To support
an external certificate, a host must be upgraded and enrolled with an external
certificate.
Managing security certificates 153
Using external security certificates with NetBackup
■ Approve or add mappings for a host that has multiple host names
For host name-based certificates for 8.0 and earlier NetBackup hosts, refer to the
respective version of the NetBackup Security and Encryption Guide.
To view NetBackup host information
1 On the left, select Security > Host mappings.
Review the security status and any other host names that are mapped to this
host.
2 For additional details for this host, click the name of the host.
Managing host mappings 155
Approve or add mappings for a host that has multiple host names
Note: You must map all available host names with the associated host ID. When
you deploy a certificate to a host, the host name must map to the associated host
ID. If it does not, NetBackup considers the host to be a different host. NetBackup
then deploys a new certificate to the host and issues it a new host ID.
5 Click Save.
5 Select the NetBackup hosts that you want to add and click Add to list.
For example, if you entered a cluster name in step 3 select the nodes in the
cluster here.
6 Click Save.
client01.lab04.com client01
client01.lab04.com clustername
client01.lab04.com clustername.lab04.com
client02.lab04.com client02
client02.lab04.com clustername
client02.lab04.com clustername.lab04.com
After you approve all the valid mappings, you see the Mapped host or IP address
settings that are similar to the following entries.
Managing host mappings 158
Example host mappings
Table 21-1 Multiple host name entries for a host in a multi-NIC environment
client01-name.domain.com clientname-host1.domain.com,
osname-host1.domain.com
Managing host mappings 159
Example host mappings
client01-bk.lab04.com clustername-bk.lab04.com
client02-bk.lab04.com clustername-bk.lab04.com
After you approve all the valid mappings, you see the Mapped host or IP address
settings that are similar to the following entries.
client01-bk.lab04.com clustername-bk.lab04.com
client02-bk.lab04.com clustername-bk.lab04.com
Table 21-4 Example mapped host names for SQL Server environments
FCI (cluster with two nodes) Physical name of Node 1 Virtual name of the SQL
Server cluster
Note: Changes to a user’s roles are not immediately reflected in the web UI. An
administrator must terminate the active user session before any changes take effect.
Or, the user must sign out and sign in again.
5 To unlock a locked account after a period of time, select the number of minutes
for Unlock locked accounts after.
6 Click Save.
For active users, the updates are applied the next time the user signs in.
By default, NetBackup certificates are deployed on the primary server and its
clients.
■ External certificates.
You can configure NetBackupto only communicate with the hosts that use an
external certificate. Requires that a host is upgraded to 8.2 or later and has an
external certificate that is installed and enrolled. In this case, NetBackup does
not communicate with any hosts that use NetBackup certificates. However, you
can enable Allow communication with NetBackup 8.0 and earlier hosts to
communicate with any hosts that use NetBackup 8.0 or earlier.
■ Both NetBackup certificates and external certificates.
With this configuration, NetBackup communicates with the hosts that use a
NetBackup certificate or an external certificate. If a host has both types of
certificates, NetBackup uses the external certificate for communication.
Note: By default, the DTE mode for 9.1 clients is set to Off and for 10.0 and later
clients, it is set to Automatic.
■ Preferred Off
■ Preferred On
■ Enforced
Very High An authorization token is required for every new NetBackup The CRL that is present on the host
certificate request. is refreshed every hour.
Managing the security settings for the primary server 170
About NetBackup certificate deployment security levels
High (default) No authorization token is required if the host is known to The CRL that is present on the host
the primary server. A host is considered to be known to the is refreshed every 4 hours.
primary server if the host can be found in the following
entities:
Medium The certificates are issued without an authorization token The CRL that is present on the host
if the primary server can resolve the host name to the IP is refreshed every 8 hours.
address from which the request was originated.
Managing the security settings for the primary server 171
Select a security level for NetBackup certificate deployment
High (Default) NetBackup does not require an authorization token if the host is
known to the primary server, which means the host appears in a
NetBackup configuration file, the EMM database, a backup policy,
or the host is a legacy client.
4 Click Save.
Managing the security settings for the primary server 172
About TLS session resumption
■ Custom (overrides the security level settings) - The value of this interval can
be configured at a minute granularity, within the range of 1 minute to 720 minutes.
Note: This feature currently only applies to NBCA. ECA to be supported in a future
release.
passphrase can be changed with the NetBackup APIs or the CLIs (nbseccmd
-setpassphraseconstraints).
See the information for disaster recovery settings in the NetBackup Security and
Encryption Guide.
To set a passphrase for disaster recovery
1 At the top, click Settings > Global security.
2 Click Disaster recovery.
3 Enter and confirm a passphrase.
Note: The passphrase should meet additional constraints that you may have
set. You can check the additional constraints using the nbseccmd command
or the passphrase-constraints web API.
4 Click Save.
Table 23-2 Determining the certificate authority (CA) to use for a trust
relationship between servers
NetBackup CA NetBackup CA
NetBackup CA NetBackup CA
Note: The NetBackup web UI does not support adding a trusted primary that uses
version 8.0 or earlier.
You can create a trust relationship between the primary servers that use the
NetBackup CA or an external CA.
To add a trusted primary server
1 For the servers that use the NetBackup certificate authority (CA), first obtain
an authorization token for each server and the fingerprint for each server.
2 At the top, select Settings > Global security.
3 Select Trusted primary servers.
4 Click the Add button.
5 Follow the prompts in the wizard.
6 Repeat these steps on the remote primary server.
More information
For more information on using an external CA with NetBackup, see the NetBackup
Security and Encryption Guide.
Managing the security settings for the primary server 175
About trusted primary servers
Note: Any trusted primary servers at NetBackup version 8.0 or earlier must be
removed using the NetBackup Administration Console.
You can remove a trusted primary server, which removes the trust relationship
between primary servers. Note the following implications:
■ Any replication operations fail that require the trust relationship.
■ A remote primary server is not included in any usage reporting after you remove
the trust relationship.
To remove a trusted primary server
1 Ensure that all replication jobs to the target primary server are complete.
2 Delete all storage lifecycle policies (SLPs) that use the trusted primary as a
destination. Before deleting an SLP, ensure that there are no backup policies
or protection plans that use the SLP for storage.
3 At the top, select Settings > Global security.
4 Select Trusted primary servers.
5 Select Actions > Remove.
6 Click Remove trust.
7 Repeat step 3 through step 6 on the remote primary server.
Chapter 24
Using access keys, API
keys, and access codes
This chapter includes the following topics:
■ Access keys
■ API keys
■ Access codes
Access keys
NetBackup access keys provide access the NetBackup interfaces through API keys
and access codes.
See “API keys” on page 176.
See “Access codes” on page 181.
API keys
A NetBackup API key is a pre-authenticated token that identifies a NetBackup user
to NetBackup RESTful APIs. The user can use the API key in an API request header
when a NetBackup API requires authentication. API keys can be created for
authenticated NetBackup users (groups are not supported). A specific API key is
only created one time and cannot be recreated. Each API key has a unique key
value and API key tag. NetBackup audits operations that are performed with that
key with the full identity of the user.
The 'View' RBAC permission is required to create an API key.
The following actions are available for administrators and API key users.
Using access keys, API keys, and access codes 177
API keys
■ Administrators with the applicable role or RBAC permissions can manage API
keys for all users. These roles are the Administrator, the Default Security
Administrator, or a role with RBAC permissions for API keys.
■ An authenticated NetBackup user can add and manage their own API key in
the NetBackup web UI. If a user does not have access to the web UI, they can
use the NetBackup APIs to add or manage a key.
More information
See “User identity in the audit report” on page 137.
See the NetBackup Security and Encryption Guide for information on using API
keys with the bpnbat command.
Note: For SAML users, avoid selecting an expiration date for the API key that occurs
after the SAML session expires. If the date occurs after the session expires, this
action can introduce a security risk with that API key.
You can edit the description of an API key or change the expiration date of an active
API key.
To edit the expiration date or description for an API key
1 On the left, select Security > Access keys > API keys.
2 Locate the API key that you want to edit.
3 Click Actions > Edit.
4 Note the current expiration date for the key and extend the date as wanted.
5 Make any wanted changes to the description.
6 Click Save.
Note: For SAML users, avoid selecting an expiration date for the API key that occurs
after the SAML session expires. If the date occurs after the session expires, this
action can introduce a security risk with that API key.
Using access keys, API keys, and access codes 179
API keys
When an API key expires you can reissue the API key. This action creates a new
API key for the user.
To reissue an API key
1 On the left, select Security > Access keys > API keys.
2 Locate the API key that you want to edit.
3 Click the Actions menu. Then select Reissue > Reissue.
5 Click Add.
6 To copy the API key, click Copy and close.
Store this key in a safe place. After you click Copy and close, the key cannot
be retrieved again. If this API key replaces a previous key for your account,
you must update any scripts, etc. to reflect the new API key.
3 (Non-SAML users) Note the current expiration date for the key and extend the
date as wanted.
4 Make any wanted changes to the description.
5 Click Reissue.
Access codes
To run certain NetBackup administrator commands, for example bperror, you need
to authenticate through the web UI. You need to generate an access code through
the command-line interface, get the access request approved from the administrator,
and then access the command.
With the web UI authentication for CLI access, NetBackup administrators can
delegate the associated privileges to other users. By default, only a root administrator
or an administrator can perform NetBackup operations through the command-line
interface. The web UI authentication support allows non-root users to administer
NetBackup who have CLI access that the Security Administrator has granted. You
can also administer NetBackup with a non-RBAC user role (such as Operating
System Administrator) even though you are not registered as a NetBackup user.
Each time you need to generate a new access code to access CLIs.
Using access keys, API keys, and access codes 182
Access codes
3 If you have the Command Line (CLI) Administrator role, you can use the web
UI to approve the CLI access request using the access code.
See “Approve your CLI access request” on page 182.
If you do not have the Command Line (CLI) Administrator role, request the
administrator to approve the CLI access request.
See “Approve CLI access requests of other users” on page 182.
4 Once the CLI access request is approved, go to the command-line interface
and run the required command.
By default, the CLI access session is valid for 24 hours.
See “Edit access settings” on page 183.
■ Troubleshooting SSO
■ To use SSO, you must have a SAML 2.0 compliant identity provider
configured in your environment.
■ Only one AD or LDAP domain is supported for each primary server domain.
This feature is not available for local domain users.
■ Configuration of the IDP requires the NetBackup APIs or the NetBackup
command nbidpcmd.
■ API keys are used to authenticate a user or a group and cannot be used
with SAML-authenticated users or groups.
■ Global logout is not supported.
See “Configure NetBackup for single sign-on (SSO)” on page 191.
3 Select a domain.
Only the domains that are configured for NetBackup display in this list.
If you do not want to validate the users with domain, you can select Continue
without the domain.
4 Edit the Certificate mapping attribute.
5 Leave the OCSP URI field empty if you want to use the URI value from the
user certificate. Or, provide the URI that you want to use.
Delete a CA certificate
You can delete a CA certificate if it is no longer used for smart card authentication.
Note that if a user attempts to use the associated digital certificate or smart card
certificate, they are not able to sign in to NetBackup.
To delete a CA certificate
1 At the top right, select Settings > Smart card authentication.
2 Select the CA certificates that you want to delete.
3 Click Delete > Delete.
Configuring authentication options 189
About single sign-on (SSO) configuration
Network connectivity
Network connectivity
Redirect to primary
Redirect to IDP
No network
connectivity
Browser host
Primary server Identity provider
Configuring authentication options 191
Configure NetBackup for single sign-on (SSO)
1. Download the IDP Download and save the IDP metadata XML file from the
metadata XML file IDP.
2. Configure the SAML See “Configure the SAML KeyStore” on page 192.
keystore, and add and
See “Configure the SAML keystore and add and enable
enable the IDP
the IDP configuration” on page 195.
configuration on the
NetBackup primary
server
3. Download the service The NetBackup primary server is the SP in the NetBackup
provider (SP) environment. You can access the SP metadata XML file
metadata XML file from the NetBackup primary server by entering the following
URL in your browser:
https://masterserver/netbackup/sso/saml2/metadata
4. Enroll the NetBackup See “Enroll the NetBackup primary server with the IDP”
primary server as a on page 196.
service provider (SP)
with the IDP
Configuring authentication options 192
Configure NetBackup for single sign-on (SSO)
5. Add SAML users and SAML users and SAML user groups are available in RBAC
the SAML groups that only if the IDP is configured and enabled on the NetBackup
use SSO to the primary server. For steps on adding RBAC roles, see the
necessary RBAC roles following topic.
After the initial setup, you can choose to enable, update, disable, or delete the IDP
configuration.
See “Manage an IDP configuration” on page 197.
After the initial setup, you can choose to update, renew, or delete the NetBackup
CA SAML keystore . You can also configure and manage the ECA SAML keystore.
Once the NetBackup CA KeyStore is created, ensure that you update the NetBackup
CA KeyStore every time the NetBackup CA certificate is renewed.
To renew the NetBackup CA KeyStore
1 Log on to the NetBackup primary server as root or administrator.
2 Run the following command:
nbidpcmd -rCert -M master_server
3 Download the new SP metadata XML file from the NetBackup primary server
by entering the following URL in your browser:
https://primaryserver/netbackup/sso/saml2/metadata
Where primaryserver is the IP address or host name of the NetBackup primary
server.
4 Upload the new SP metadata XML file to the IDP.
See “Enroll the NetBackup primary server with the IDP” on page 196.
To remove the NetBackup CA KeyStore
1 Log on to the NetBackup primary server as root or administrator.
2 Run the following command
nbidpcmd -dCert -M master_server
3 Download the new SP metadata XML file from the NetBackup primary server
by entering the following URL in your browser:
https://primaryserver/netbackup/sso/saml2/metadata
Where primaryserver is the IP address or host name of the NetBackup primary
server.
4 Upload the new SP metadata XML file to the IDP.
5 See “Enroll the NetBackup primary server with the IDP” on page 196.
Note: If you are using a combination of an ECA and the NetBackup CA in your
environment, by default, the ECA is considered while establishing trust with the IDP
server. To use the NetBackup CA, you must first remove the ECA KeyStore.
Configuring authentication options 194
Configure NetBackup for single sign-on (SSO)
■ Run the following command to use ECA certificate chain and private key
provided by the user:
nbidpcmd -cECACert -certPEM certificate chain file -privKeyPath
private key file [-ksPassPath Keystore Passkey File] [-f] [-M
<master_server>]
■ Certificate chain file specifies the certificate chain file path. The file must
be in PEM format and must be accessible to the primary server on which
the configuration is being performed.
■ Private key file specifies the private key file path. The file must be in PEM
format and must be accessible to the primary server on which the
configuration is being performed.
■ KeyStore passkey file specifies the KeyStore password file path and must
be accessible to the primary server on which the configuration is being
performed.
■ Primary server is the host name or IP address of primary server on which
you want to perform SAML ECA KeyStore configuration. The NetBackup
primary server where you run the command is selected by default.
Configure the SAML keystore and add and enable the IDP
configuration
Before proceeding with the following steps, ensure that you have downloaded the
IDP metadata XML file and saved it on the NetBackup primary server.
To configure SAML keystore and add and enable an IDP configuration
1 Log on to the primary server as root or administrator.
2 Run the following command.
For IDP and NetBackup CA SAML KeyStore configuration:
nbidpcmd -ac -n IDP configuration name -mxp IDP XML metadata file
[-t SAML2] [-e true | false] [-u IDP user field] [-g IDP user
group field] [-cCert] [-f] [-M primary server]
■ Use ECA certificate chain and private key provided by the user:
nbidpcmd -ac -n IDP configuration name -mxp IDP XML metadata
file[-t SAML2] [-e true | false] [-u IDP user field] [-g IDP
user group field] -cECACert -certPEM certificate chain file
-privKeyPath private key file [-ksPassPath KeyStore passkey
file] [-f] [-M primary server]
■ IDP user field and IDP user group field are the SAML attribute
names, which are mapped to the userPrincipalName and the memberOf
attributes of the AD or LDAP.
Note: Ensure that the SAML attribute names are defined in the format of
username@domainname and (CN=group name, DC=domainname)
respectively.
Table 25-2 IDP-specific steps for enrolling the NetBackup primary server
ADFS https://www.veritas.com/docs/100047744
Okta https://www.veritas.com/docs/100047745
PingFederate https://www.veritas.com/docs/100047746
Azure https://www.veritas.com/docs/100047748
Shibboleth https://www.veritas.com/docs/00047747
Configuring authentication options 197
Configure NetBackup for single sign-on (SSO)
Table 25-3
Corresponding AD SAML attribute format
or LDAP attribute
userPrincipalName username@domainname
Note: While adding the IDP configuration to the NetBackup primary server, the
values entered for the user (-u) and user group (-g) options must match the SAML
attribute names that are mapped to the userPrincipalName and the memberOf
attributes in the AD or LDAP.
See “Configure the SAML keystore and add and enable the IDP configuration”
on page 195.
Note: Even though you can configure multiple IDPs on a NetBackup primary server,
only one IDP can be enabled at a time.
If you want to update the IDP user or IDP user group values in an IDP configuration,
you must first delete the configuration. The single sign-on (SSO) option is not
available for users until you re-add the configuration with the updated IDP user or
IDP user group values.
To update IDP user or IDP user group in an IDP configuration
1 Log on to the primary server as root or administrator.
2 Delete the IDP configuration.
nbidpcmd -dc -n IDP configuration name
nbidpcmd -ac -n IDP configuration name -mxp IDP XML metadata file
[-t SAML2] [-e true | false] [-u IDP user] [-g IDP user group
field] [-M Master Server
Note: Ensure that the SAML attribute names are defined in the format of
username@domainname and (CN=group name, DC=domainname)
respectively.
Troubleshooting SSO
This section provides steps for troubleshooting issues related to SSO.
Redirection issues
If you are facing issues with redirection, check the error messages in web services
log files to narrow down the cause of the issue. NetBackup creates logs for the
NetBackup web server and for the web server applications. These logs are written
to the following location:
Configuring authentication options 201
Troubleshooting SSO
■ UNIX: /usr/openv/logs/nbwebservice
■ Windows:install_path\NetBackup\logs\nbwebservice
To ensure that the latest configuration details are available to the NetBackup primary
server, download the latest copy of the XML metadata file from the IDP. Use the
IDP XML metadata file to add and enable the latest IDP configuration on the
NetBackup primary server. See “Configure the SAML keystore and add and enable
the IDP configuration” on page 195.
Table 25-4
Web Service log error message Explanation and recommended action
userPrincipalName not found in While adding the IDP configuration to the NetBackup primary
response. server, the value entered for the user (-u) option must match the
SAML attribute name, which is mapped to the
userPrincipalName attribute in AD or LDAP. For more
information, See “Configure the SAML keystore and add and
enable the IDP configuration” on page 195.
userPrincipalName is not in expected The IDP sends SAML responses to the NetBackup primary server,
format which contains SAML user and SAML user group information. To
enable the IDP to successfully send this information, ensure the
value of userPrincipalName attribute sent by the IDP is defined
in the format of username@domainname.
Authentication issue instant is too This error can occur because of the following reasons:
old or in the future
■ The date and time of IDP server and the NetBackup primary
server is not synchronized.
■ By default, the NetBackup primary server allows a user to
remain authenticated for a period of 24 hours. You might
encounter this error, If an IDP allows a user to remain
authenticated for a period longer than 24 hours. To resolve
this error, you can update the SAML authentication lifetime of
the NetBackup primary server to match that of the IDP.
Specify the new SAML authentication lifetime in the
<installpath>\var\global\wsl\config\web.conf
file on the NetBackup primary server.
For example, If your IDP has an authentication lifetime as 36
hours, update the entry in the web.conf file as follows:
SAML_ASSERTION_LIFETIME_IN_SECS=129600
Response is not success This error can occur because of the following reasons:
Table 25-5
Cause Explanation and recommended action
RBAC roles are not assigned to the After an IDP configuration is added and enabled on the NetBackup primary
SAML users and the SAML groups. server, ensure that necessary RBAC roles are assigned to SAML users and
SAML user groups that use SSO. Note that SAML users and SAML user
groups are available in RBAC only after the IDP configuration is added and
enabled on the NetBackup primary server.
RBAC roles are assigned to SAML users When you add a SAML users or SAML user group in RBAC, the SAML user
and SAML user groups associated with or SAML user group entry is associated with the IDP configuration that is
an IDP configuration that is not currently added and enabled at that time.
added and enabled.
If you add and enable a new IDP configuration, ensure that you also add
another entry for the SAML user or SAML user group. The new entry is
associated with the new IDP configuration.
RBAC roles are assigned to local SAML user or SAML user group records might appear similar to
domain users or Active Directory (AD) corresponding local domain users or AD or LDAP domain users already
or LDAP domain users (instead of SAML added in the RBAC.
users and SAML user groups).
After an IDP configuration is added and enabled on the NetBackup primary
server, ensure that you add SAML users and SAML user groups in RBAC
and assign the necessary permissions. Note that SAML users and SAML
user groups are available in RBAC only after the IDP configuration is added
and enabled on the NetBackup primary server.
For steps on adding SAML users and user groups, See “Add a user to a role
(non-SAML)” on page 208.
Configuring authentication options 204
Troubleshooting SSO
The NetBackup primary server is unable The IDP sends SAML responses to the NetBackup primary server, which
to retrieve user group information from contains SAML user and SAML user group information. To enable the IDP
the IDP to successfully send this information, ensure the following:
■ RBAC features
■ Authorized users
■ Configuring RBAC
■ Role permissions
RBAC features
The NetBackup web user interface provides the ability to apply role-based access
control in your NetBackup environment. Use RBAC to provide access for the users
that do not currently have access to NetBackup. Or, for current NetBackup users
with administrator access you can provide limited access and permissions, based
on their role in your organization.
For information on access control and auditing information for root users and
administrators, refer to the NetBackup Security and Encryption Guide.
Managing role-based access control 206
Authorized users
Feature Description
Roles allow users to perform Add users to one or more default RBAC roles or create custom roles to fit the role
specific tasks of your users. Add a user to the Administrator role to give full NetBackup
permissions to that user.
Users can access NetBackup RBAC users can perform common tasks for their business role, but are restricted
areas and the features that fit their from accessing other NetBackup areas and features. RBAC also controls the
role assets that users can view or manage.
Authorized users
The following users are authorized to sign in to and use the NetBackup web UI.
Table 26-2 Users that are authorized to use the NetBackup web UI
nbasecadmin Appliance user Default Security This role can grant access to other appliance users.
Administrator role
appadmin Flex Appliance user The default admin user for the NetBackup appliance
does not have access to the web UI.
Users that have an RBAC role that Varies See “Configuring RBAC” on page 206.
gives access to the web UI
Configuring RBAC
To configure role-based access control for the NetBackup web UI, perform the
following steps.
Managing role-based access control 207
Configuring RBAC
1 Configure any Active Before you can add domain users, Active Directory or LDAP domains must
Directory or LDAP domains. be authenticated with NetBackup.
2 Determine the permissions Determine the permissions that your users need to perform their daily tasks.
that your users need.
You can use the default RBAC roles or use a default role as a template to
create a new role. Or, you can create a completely custom role to fit your
needs.
3 Add users to the appropriate See “Add a user to a role (non-SAML)” on page 208.
roles.
See “Add a user to a role (SAML)” on page 210.
4 Determine the permissions See “Disable web UI access for operating system (OS) administrators”
that you want for OS on page 211.
administrators
See “Disable command-line (CLI) access for operating system (OS)
administrators” on page 211.
■ Not all RBAC-controlled operations can be used from the NetBackup web UI.
These types of operations are included in RBAC so a role administrator can
create roles for API users as well as for web UI users.
■ Some tasks require a user to have permissions in multiple RBAC categories.
For example, to establish a trust relationship with a remote primary server, a
user must have permissions for both Remote primary servers and Trusted
primary servers.
groupname admins
DOMAIN\groupname WINDOWS\Admins
groupname@domain admins@unix
4 (Conditional) From the Sign-in type list, select Smart card user.
Note: The Sign-in type list is available only if there is an IDP configuration
available for NetBackup. The smart card user option in the Sign-in type list is
available when the smart card configuration is done without AD or LDAP domain
mapping.
Administrator The Administrator role has full permissions for NetBackup and can manage all aspects
of NetBackup.
Default Apache Cassandra This role has all the permissions that are necessary to manage and protect Apache
Administrator Cassandra assets with protection plans.
Default AHV Administrator This role has all the permissions that are necessary to manage Nutanix Acropolis
Hypervisor and to back up those assets with protection plans.
Default Cloud Administrator This role has all the permissions that are necessary to manage cloud assets and to
back up those assets with protection plans.
Note that a PaaS administrator requires additional permissions that you can add to a
custom role.
See “Add a custom RBAC role for a PaaS administrator” on page 217.
Default Cloud Object Store This role has all the permissions to manage the protection for cloud objects using
Administrator classic policies.
Default NetBackup Command This role has all the permissions that are necessary to manage NetBackup using the
Line (CLI) Administrator NetBackup command line (CLI). With this role a user can run most of the NetBackup
commands with a non-root account.
Note: A user that has only this role cannot sign into the web UI.
Default Kubernetes This role has all the permissions that are necessary to manage Kubernetes and to
Administrator back up those assets with protection plans. The permissions for this role give a user
the ability to view and manage jobs for Kubernetes assets. To view all jobs for this
asset type, a user must have the default role for that workload. Or, a similar custom
role must have the following option applied when the role is created: Apply selected
permissions to all existing and future workload assets.
Default Microsoft SQL Server This role has all the permissions that are necessary to manage SQL Server databases
Administrator and to back up those assets with protection plans. In addition to this role, the NetBackup
user must meet the following requirements:
Default MySQL Administrator This role has all the permissions that are necessary to manage MySQL instances and
databases and to back up those assets with protection plans.
Default NAS Administrator This role has all the permissions that are necessary to perform the backup and restore
of NAS volumes using a NAS-Data-Protection policy. To view all jobs for the backups
and restores of a NAS volume, a user must have this role. Or, the user must have a
custom role with same permissions applied when the role was created.
Managing role-based access control 213
Default RBAC roles
Default Oracle Administrator This role has all the permissions that are necessary to manage Oracle databases and
to back up those assets with protection plans.
Default PostgreSQL This role has all the permissions that are necessary to manage PostgreSQL instances
Administrator and databases and to back up those assets with protection plans.
Default Resiliency This role has all the permissions to protect Veritas Resiliency Platform (VRP) for VMware
Administrator assets.
Default RHV Administrator This role has all the permissions that are necessary to manage Red Hat Virtualization
machines and to back up those assets with protection plans. This role gives a user the
ability to view and manage jobs for RHV assets.
To view all jobs for RHV assets, a user must have this role. Or, the user must have a
similar custom role with following option applied when the role was created: Apply
selected permissions to all existing and future RHV assets.
Default SaaS Administrator This role has all the permissions to view and manage SaaS assets.
Default Security Administrator This role has permissions to manage NetBackup security including role-based access
control (RBAC), certificates, hosts, identity providers and domains, global security
settings, and other permissions. This role can also view settings and assets in most
areas of NetBackup: workloads, storage, licensing, and other areas.
Default Storage Administrator This role has permissions to configure disk-based storage and storage lifecycle policies.
SLP settings are managed with the Administrator role.
Default Universal Share This role has the permissions to manage policies and storage servers. It also can
Administrator manage the assets for Windows and Standard client types and for universal shares.
Default VMware Administrator This role has all the permissions that are necessary to manage VMware virtual machines
and to back up those assets with protection plans. To view all jobs for VMware assets,
a user must have this role. Or, the user must have a similar custom role with following
option applied when the role was created: Apply selected permissions to all existing
and future VMware assets.
Note: Veritas reserves the right to update the RBAC permissions for default roles
in future releases. Any revised permissions are automatically applied to users of
these roles when NetBackup is upgraded. If you have copies of default roles these
roles are not updated automatically. (Or, if you have any custom roles that are
based on default roles.) If you want these custom roles to include changes to default
roles, you must manually apply the changes or recreate the custom roles.
Managing role-based access control 214
Add a custom RBAC role
Note: Veritas reserves the right to update the RBAC permissions for default roles
in future releases. Any revised permissions are automatically applied to users of
these roles when NetBackup is upgraded. Any copies of default roles (or any custom
roles that are based on default roles) are not automatically updated.
Note: When you change permissions for a custom role, the changes affect all users
that are assigned to that role.
Global permissions for the role On the Global permissions tab, click
Edit.
Access definitions for the role Click the Access definitions tab.
Note: When you remove a role, any users that are assigned to that role lose the
permissions that the role provided.
GET /asset-service/workloads/cloud/assets?filter=extendedAttributes/
managedInstanceName eq 'managedInstanceName'
Search for accessControlId field in the response. Note down the value of this
field.
2 To get the role ID, enter the following command:
GET /access-control/roles
Search for the id field in the response. Note down the value of this field.
3 Create an access definition, as follows:
POST /access-control/managed-objects/{objectId}/access-definitions
Request payload
"data": {
"type": "accessDefinition",
"attributes": {
Managing role-based access control 217
Add a custom RBAC role
"propagation": "OBJECT_AND_CHILDREN"
},
"relationships": {
"role": {
"data": {
"id": "<roleId>",
"type": "accessControlRole"
}
},
"operations": {
"data": [
{
"id": "|OPERATIONS|VIEW|",
"type": "accessControlOperation"
}
]
},
"managedObject": {
"data": {
"id": "<objectId>",
"type": "managedObject"
}
}
}
}
}
6 On the Assets tab, under desired policy type / workload section select the
following permissions:
■ Instant access
■ Restore from malware-infected images (Required to restore from malware
infected images)
7 Click Assign.
8 Under Users, click Assign. Then add each user that you want to have access
to this custom role.
9 When you are done configuring the role, click Add role.
6 Click Assign.
7 Under Users, click Assign. Then add each user that you want to have access
to this custom role.
8 When you are done configuring the role, click Add role.
Role permissions
Role permissions define the operations that roles users have permission to perform.
For details on individual RBAC permissions and dependencies, refer to the
NetBackup API documentation.
http://sort.veritas.com
Category Description
These operations are only available from the NetBackup APIs. Refer to the
following guides for information on JVM tuning options: NetBackup Installation
Guide, NetBackup Upgrade Guide.
Category Description
Protection plans Manage how backups are performed with protection plans.
Credentials Manage credentials for assets and for other features of NetBackup.
Caution: Use caution when removing access definitions. This action may remove
critical access to NetBackup for the role’s users.
■ Configurations
1. Primary server identifies the available scan host from the specified scan host
pool.
2. After the backup images are queued for an on-demand scan, the primary server
identifies the storage server. An instant access mount is created on the storage
server of the configured share type that is specified in scan host pool.
Note: Currently primary server starts 50 scan threads at a time. Once the
thread is available it processes next job in the queue. Until then the queued
jobs are in pending state.
From NetBackup version 10.2 onwards, large backups are scanned in batches
of 500k files. Each batch is scanned by a separate scan thread. This feature
is supported for Standard, MS-Windows and NAS-Data-Protection workloads.
3. Primary server identifies available MSDP media server and instructs the media
server to initiate the malware scan.
4. MSDP media server deploys the thin client on the scan host over SSH.
5. Thin client mounts the instant access mount on the scan host.
6. Scan is initiated using the malware tool that is configured in the scan host pool.
7. After the scan is completed, the scan host unmounts the instant access mount
from the scan host.
8. Malware scan status is updated to the media server over SSH. Scan logs are
copied to the media server log directory.
9. Media server updates the scan status and the infected file list (if there are any
infected files) to the primary server.
10. Primary server updates the scan results and deletes instant access.
11. Malware scan status notification is generated.
Malware detection performs an automated cleanup of scan jobs that are older than
30 days.
Malware scanning 227
Configurations
Note: You can download a malware scanner from the Microsoft Azure Marketplace
and the AWS Marketplace. Follow the instructions on how to install, configure, and
use the malware scanner for AWS and Azure.
Refer to the following for more information:
AWS: AWS Marketplace and NetBackup Marketplace Deployment on AWS Cloud
Microsoft Azure: Microsoft Azure Marketplace and Microsoft Azure Marketplace
Configurations
Configuring scan host pool
Note: To configure a new scan host See “Prerequisites for scan host pool”
on page 227.
Note: By default three parallel scans are supported per scan host and this limit is
configurable. Having more scan hosts in the scan pool will increase the number of
parallel scans.
See “Configuring resource limits” on page 230.
4 On the Manage malware scanner hosts page, click Add existing to select
pre-existing host.
Note: List includes all scan hosts from all scan host pools.
5 On the Add existing malware scanner host window, select the desired one
or more scan hosts.
6 Click Add.
Managing credentials
Add new credentials
1 On the Manage credentials page, select Add new credentials and click Next.
2 On the Manage credentials page, add the details such as Credential name,
tag, description.
3 On the Host credentials tab, add Host username, Host password, SSH
port, RSA key, and Share type.
■ Run the following command to ensure that the SSH connection between
MDSP media server and host is working:
Malware scanning 230
Configurations
ssh username@remote_host_name
■ Run the following command to verify that it is listing the RSA key for remote
scan host:
ssh-keyscan scan_host_name 2>/dev/null | grep ssh-rsa
■ To obtain the RSA key for the remote scan host, use the following command
on Linux MSDP media server:
ssh-keyscan scan_host_name 2>/dev/null | grep ssh-rsa | awk
'{print $3}' | base64 -d | sha256sum
For example, the output is
33f697637ab3f0911c1d462d4bde8be3eec61a33403e8f6a88daecb415a31eef
- where the RSA key is
33f697637ab3f0911c1d462d4bde8be3eec61a33403e8f6a88daecb415a31eef
Note: Ensure that you remove the - character from RSA key when you
copy.
5 Click Save.
3 On the Malware detection resource limits page, click Edit to edit the number
of parallel scans limit per scan host.
4 On the Edit scan host limit page, set the global limit which would be
considered when parallel scans limit is not set for a scan host.
Else click on Add to add a scan host to override the global setting.
5 Enter the new host name and set the limits.
Note: Default global limit is 3 scans per scan host. Minimum value is 1 and
maximum value is 10.
Click Save.
Note: With NetBackup version 10.2 onwards, global parallel scans limit configured
through MALWARE_DETECTION_JOBS_PER_SCAN_HOST configuration option
is not applicable. Configure the global parallel scans limit using Web UI.
For more information on the above options of scanning, refer to the following
on-demand scan:
■ See “Backup images” on page 233.
Malware scanning 232
Performing malware scan
6 For the Start date/time and End date/time verify the date and time range or
update it.
7 In the Scanner host pool, Select the appropriate host pool name.
8 (Applicable only for NAS-Data-Protection policy type) In the Volume field,
Select volume backed up for NAS devices.
Note: Volume level filtering only fetches top level directories of the
NAS-Data-Protection volume backup. Volume level filtering is applicable only
if the top level directory is a volume. In such case, user has the option to select
individual backup images by using the Backup images option in the Search
by option.
9 From the Current status of malware scan, select one of the following:
■ Not scanned
■ Not infected
■ Infected
■ All
Malware scanning 233
Performing malware scan
Warning: There are more than 100 images in your search. Unable to scan
more than 100 images. Adjust the date range and try again.
Note: When we hover on failed status, the tool tip displays the reason for
failed scan.
The backup images which failed in validation, are ignored. Malware scanning
is supported for backup image stored on MSDP storage with instant access
capability for the supported policy type only.
■ Pending
■ In progress
Backup images
This section describes the procedure for scanning policy client backup images for
malware.
To scan a policy client backup images for malware
1 On left, click Detection and reporting > Malware detection.
2 On the Malware detection page, click Scan for malware.
3 In the Search by option, select Backup images .
4 In the search criteria, review and edit the following:
■ Policy name
■ Client name
Malware scanning 234
Performing malware scan
Note: Displays clients that contain supported policy type backup images.
■ Policy type
■ Type of backup
■ Copies
Note: If the selected copy does not support instant access, then the backup
image is skipped for the malware scan.
Note: Only MSDP (PureDisk) storage type disks pools are listed.
5 Click Search.
Note: Select the search criteria accordingly and ensure that the selected scan
host is active and scan host availability.
6 From the Select the backups to scan table select one or more images for
scan.
7 In the Select a malware scanner host pool, Select the appropriate host pool
name.
Note: Scan host from the selected scan host pool must be able to access the
instant access mount created on MSDP storage server with configured
NFS/SMB share type.
Malware scanning 235
Performing malware scan
Note: When we hover on failed status, the tool tip displays the reason for
failed scan.
Note: The backup images which failed in validation, are ignored. Malware
scanning is supported for backup image stored on MSDP storage with
instant access capability for the supported policy type only.
■ In progress
■ Pending
Note: You can cancel the malware scan for one or more in progress and
pending jobs.
NAS-Data-Protection
Each NAS volume or share is read over NFS or SMB, and backed up using a
configured number of backup streams. Maximum number of streams per volume
determines the number of backup streams that are deployed for backing up each
volume. For example, if a policy contains 10 volumes and the value of this parameter
is set to 4, then a group of 4 backup streams for each volume is seen, thereby total
of 40 child backup streams and 10 parent backup streams as part of backup
execution of the policy.
Malware scanning 236
Performing malware scan
Note: Number of scans depends on the number of batches that were created to
perform the scan. Only the parent stream backup image is visible on the Malware
detection UI.
Note: If the selected client in the above step supports multiple policy types,
then user has an option of selecting a single policy type for scanning.
8 For the Start date/time and End date/time verify the date and time range or
update it.
9 In the Scanner host pool, Select the appropriate host pool name.
10 In the Volume field, Select volume backed up for NAS devices.
Note: Volume level filtering only fetches top level directories of the
NAS-Data-Protection volume backup. Volume level filtering is applicable only
if the top level directory is a volume. In such case, user has the option to select
individual backup images by using the Backup images option in the Search
by option.
11 From the Current status of malware scan, select one of the following:
■ Not scanned
■ Not infected
Malware scanning 237
Performing malware scan
■ Infected
■ All
Warning: There are more than 100 images in your search. Unable to scan
more than 100 images. Adjust the date range and try again.
Note: When we hover on failed status, the tool tip displays the reason for
failed scan.
The backup images which failed in validation, are ignored. Malware scanning
is supported for backup image stored on MSDP storage with instant access
capability for the supported policy type only.
■ Pending
■ In progress
For more information on the malware scan status, See “View the malware scan
status” on page 239.
Note: Ensure that you select the Malware scan status option as All to scan the
NAS-Data-Protection backup images created on earlier version of NetBackup media
server.
■ Backup images are stored on MSDP storage with instant access capability, for
the supported policy type only.
■ The scan host pool must be configured with scan hosts.
■ The last backup must be successful.
■ You must have an RBAC role with permissions to perform malware scans.
To scan a VMware asset for malware
1 On left, click VMware > Virtual machines.
2 Locate and click on the VM.
3 Select Actions > Scan for malware.
4 On the Malware scan page, perform the following:
■ Select the date range for the scan by selecting Start date/time and End
date/time.
■ Select Scanner host pool
■ From the Select current status of malware scan list select one of the
following:
■ Not scanned
■ Not infected
■ Infected
■ All
Note: The malware scanner host can initiate a scan of three images at the
same time.
6 After the scan starts, you can see the Malware Scan Progress on Malware
Detection, the following fields are visible:
■ Not scanned
■ Not infected
■ Infected
■ Failed
■ In progress
■ Pending
Note: A list of infected files from the selected malware scanning result is
exported in .csv format. The file name is of following format:
backupid_infected_files_timestamp.csv
Note: .csv file contains backup time and names of the infected files.
Malware scanning 241
Managing scan tasks
Note: You can cancel the malware scan only from in progress and pending
states.
Rescan image
1 On the left, select Detection and reporting > Malware detection.
2 For desired client, from actions menu, click Rescan image .
3 Click Rescan to confirm.
4 In case of bulk rescan, when you select one or more image with different or
empty scanner host pool, you need to select a new scanner host pool.
■ Click Rescan image
■ From the Select a malware scanner host pool pop-up select a new scan
host.
Note: New scan host pool is applicable for all the selected images for this
rescan.
Destination client The client to which you want to restore the backup.
Policy type The type of policy that is associated with the backup you want to
restore.
Restore type The type of restore that you want to perform. The restore types that
are available depend on the policy type that you choose.
4 Click Next.
5 Select the Start date and End date.
Or, click Backup history to view and select specific images. Click Select to
add the selected images for recovery.
Note: The table displays all the backup image details for selected time frame.
You can filter and sort the images based on the malware scan results, schedule
type, or policy name.
To restore from malware-affected recovery points, you must have the Administrator
role or equivalent RBAC permissions. To recover a VMware asset that is affected
by malware, see the following topic:
See “Recover from malware-affected images (clients protected by policies) ”
on page 241.
To recover a VMware asset affected by malware
1 On left, click VMware > Virtual machine.
2 Locate the VM and click Actions > Recover.
3 On the Recovery points tab you can see Malware scan status of each
recovery point, as follows:
■ Not scanned
■ Not infected
■ Infected
■ Failed
Note: To restore from malware-affected recovery points, you must have the
Administrator role or equivalent RBAC permissions.
6 Click Recover and select the type of recovery. Then follow the prompts.
For more details on recovering a VM, see the NetBackup Web UI VMware
Administrator’s Guide.
Chapter 28
Detecting anomalies
This chapter includes the following topics:
■ View anomalies
Note: By default, the anomaly detection algorithm runs on the NetBackup primary
server. If you see any impact on the primary server because of the anomaly detection
process, you can configure a media server to detect anomalies.
The following backup job metadata, attributes, or features are verified during backup
anomaly detection:
■ Backup image size
■ Number of backup files
■ Data that is transferred in KB
■ Deduplication rate
■ Backup job completion time
Detecting anomalies 245
How a backup anomaly is detected
Step Description
Step 1 Install or upgrade NetBackup software on the primary server and the media
server.
Step 3 Configure anomaly detection settings using the NetBackup web UI.
View anomalies
NetBackup can now detect anomalies in backup metadata. It can detect any unusual
job data in the data backup flow. For example, it can detect a file count or a file size
that is different than the usual count or size.
See “About backup anomaly detection” on page 244.
To view anomalies
1 On the left, select Detection and reporting > Anomaly detection.
The following columns are displayed:
■ Job ID - Job ID of the job for which the anomaly is detected
■ Client name - Name of the NetBackup client where the anomaly is detected
■ Policy type - The policy type of the associated backup job
■ Count - The number of anomalies that are detected for this job
■ Score - Severity of the anomaly. The score is higher if the severity of the
anomaly is more.
■ Anomaly severity - Severity of the anomalies that are notified for this job
■ Anomaly summary - Summary of the anomalies that are notified for this job
■ Received - Date when the anomaly is notified
■ Review status - Indicates whether the detected anomaly is reported as a
false positive, an actual anomaly, or it can be ignored.
■ Policy name - The policy name of the associated backup job
■ Schedule name - The schedule name of the associated backup job
Detecting anomalies 247
Configure anomaly detection settings
4 Click Save.
5 Click Edit to modify the following Basic Settings:
■ Anomaly detection sensitivity
■ Data retention settings
■ Data gathering settings
■ Anomaly proxy server settings
6 Click Save.
7 Click Advanced settings.
8 Edit Disable anomaly settings for clients.
9 Click Save.
10 Edit Disable policy type or specific features for machine learning.
11 Click Save.
Chapter 29
Usage reporting and
capacity licensing
This chapter includes the following topics:
Requirements
NetBackup automatically collects data for the usage reporting, provided the following
requirements are met:
■ The primary servers (or primary servers) are at NetBackup 8.1.2 or later.
■ You use capacity licensing.
■ You use automatic, scheduled reports. If you manually generate capacity license
reports, the data does not display in the usage report in the NetBackup web UI.
■ The following file exists:
UNIX: /usr/openv/var/global/incremental/Capacity_Trend.out
Windows: install_path\var\global\incremental\Capacity_Trend.out
The Usage tab displays an error if the backup data is not available. Or, if the
usage report is not generated (file does not exist).
■ If you want one of your primary servers to gather usage reporting data for other
remote primary servers, additional configuration is required. You must create a
trust relationship between the primary servers. You must also add the local
primary server (where you plan to run nbdeployutil) to the Servers list on
each remote primary server.
See “Add a local primary server” on page 250.
See “Add a trusted primary server” on page 174.
Additional information
■ Details are available on capacity licensing, scheduling, and options for capacity
licensing reports.
See “Scheduling reports for capacity licensing” on page 251.
■ Veritas Usage Insights for NetBackup Getting Started Guide. Details on how to
use Usage Insights to manage your NetBackup deployment and licensing. This
tool provides accurate, near real-time reporting for the total amount of data that
is backed up.
The older reports are placed in the archive folder. Veritas recommends that you
retain at least 90 days of reporting data. Data can be kept longer than 90 days,
depending on the requirements of your environment. Older reports can help to show
how the capacity usage has changed over time. Delete the reports or the folder
when they are no longer required.
Use Case I: Using the default values for the licensing report
The nbdeployutilconfig.txt file is not required when you use the default
parameters. nbdeployutil uses the following default values for capacity licensing:
■ FREQUENCY_IN_DAYS=7
■ MASTER_SERVERS=local_server
■ PARENTDIR=folder_name
For Windows: install_path\NetBackup\var\global\incremental
For UNIX: /usr/openv/var/global/incremental
■ PURGE_INTERVAL=120 (number of days)
■ MACHINE_TYPE_REQUERY_INTERVAL = 90 (number of days)
Use Case II: Using custom values for the licensing report
If the file nbdeployutilconfig.txt is not present, create a file using the following
format:
[NBDEPLOYUTIL_INCREMENTAL]
MASTER_SERVERS=<server_names>
FREQUENCY_IN_DAYS=7
PARENTDIR=<folder_name_with_path>
PURGE_INTERVAL=120
MACHINE_TYPE_REQUERY_INTERVAL=90
Usage reporting and capacity licensing 253
Scheduling reports for capacity licensing
Default 7
(recommended)
Minimum 1
For example:
■ MASTER_SERVERS=newserver, oldserver
■ MASTER_SERVERS=newserver, oldserver.domain.com
■ MASTER_SERVERS=myserver1.somedomain.com, newserver.domain.com
5 Edit the PARENTDIR value to include the full path for location where the data is
gathered and reported.
6 Edit the PURGE_INTERVAL to indicate the interval (in days) for how often you
want to delete the report data. Data that is older than 120 days is automatically
purged.
Default 120
Minimum 90
Default 90
Minimum 1
To use the data that was gathered previously to generate a capacity licensing
report
1 Locate the folder that was generated for the gathered data after the previous
run of nbdeployutil and copy it to the following location:
On Windows: install_path\NetBackup\var\global\incremental
On UNIX: /usr/openv/var/global/incremental
2 Create the gather_end.json file inside the copied folder and add the following
text:
{"success":0}
The next incremental run considers the data inside the copied folder to generate
a capacity licensing report.
Note: Delete any other gather folders inside the copied folder to avoid gaps
for the period in which data is gathered. The missing data is automatically
generated during the next incremental run.
Usage reporting and capacity licensing 256
Troubleshooting failures for usage reporting and incremental reporting
To create a custom interval report using existing gathered data for capacity
licensing
To create a report for a time interval that is different than the default interval
of 90 days, run the following command:
On Windows:
On UNIX:
--start="mm/dd/yyyy HH:MM:SS"
--end="mm/dd/yyyy HH:MM:SS"
If the latest gather operation fails to retrieve front-end data size (FEDS) data,
the custom report fails because the required backup information is not available.
Let the next scheduled incremental gather run successfully and then try to
generate the custom report.
■ nbdeployutil fails to gather data and generate the report for your environment.
Refer to the logs to understand when the task failed and the reason for the
failure.
■ nbdeployutil fails with a bpimagelist error with status 37 after you run the utility
manually. Ensure that you added the primary servers to the additional servers
list.
See “Add a local primary server” on page 250.
■ The following error displays because of internal web service communication
failures:
Internal Web API error occurred for primary server SERVER_NAME. Run
nbdeployutil again with the gather option on primary server SERVER_NAME.
■ For VMware or NDMP, when the backup agent fails to post licensing information
to the database, a status code 5930 or 26 displays in the Activity Monitor: For
more information, see the NetBackup Status Codes Reference Guide.
■ nbdeployutil may fail with errors related to loading the Perl modules. In such
a scenario, it is recommended to refer the Perl documentation related to the
reported error.
You can use netbackup_deployment_insights with the same troubleshooting
points.
Section 7
NetBackup workloads and
NetBackup Flex Scale
■ Configuring permissions
Note: If a SaaS asset is deleted from NetBackup SaaS Protection web UI, the
deleted asset is not removed from the NetBackup database immediately. The
deleted asset remains in the NetBackup database for 30 days.
Features Description
Integration with NetBackup The NetBackup web UI provides RBAC roles, which enable
role-based access control its users to view assets in SaaS workload. The user does not
(RBAC) need to be a NetBackup administrator to add a NetBackup
SaaS Protection Hub or view assets in the Hub.
Cross Launch You can cross launch the NetBackup SaaS Protection web
UI.
4 Click Add.
After the credentials are successfully validated, the Hub is added and
autodiscovery runs to discover available assets in the Hub.
See “Configure NetBackup for single sign-on (SSO)” on page 191.
3 Execute the bpsetconfig command and provide the following proxy details.
bpsetconfig> SAAS_PROXY_HOST = X.X.X.X
bpsetconfig> SAAS_PROXY_TUNELLING = 1
SAAS_PROXY_TUNNELING 0 or 1
2 Click the Hubs tab to view details on Hubs, StorSites, and Stors.
You can navigate to the required asset using the left panel. You can perform
the following actions on the Hubs tab:
■ View a list of the Hubs.
■ Search for a Hub in the list.
■ Add new Hubs.
■ Validate the credentials.
■ Sort columns.
■ Click Actions to perform the following:
■ Edit credentials.
■ Delete the Hub.
■ Manually discover assets in the Hub.
For more information, refer to the NetBackup SaaS Protection administrator's guide.
Configuring permissions
Using the NetBackup web UI, you can assign different access privileges to the user
roles on the assets. For example, view, update, delete, and manage access.
See “Manage access permission” on page 220.
NetBackup SaaS Protection 265
Troubleshooting SaaS workload issues
Note: The user with access permission on the SaaS workload in NetBackup, and
no or limited permissions in NetBackup SaaS Protection can still view the NetBackup
SaaS Protection assets on the NetBackup web UI.
■ bpVMUtil
■ Windows: <install path>\Veritas\NetBackup\logs\bpVMutil
■ UNIX: <install path>/openv/netbackup/logs/bpVMutil
■ APIs/nbWebServices
■ Windows: <install path>\Veritas\NetBackup\logs\nbwebservice
■ UNIX: <install path>/openv/logs/nbwebservice
Failed to add a Hub due to incorrect Hub Enter appropriate Hub name and valid
name or invalid user credentials. credentials.
Failed to add a Hub due to issue in credential Check if the credentials are not expired. Also
validation. check if the credentials are valid.
Failed to add a Hub due to limited Assign appropriate permissions to the user
permissions. on the SaaS workload.
Failed to delete a Hub due to limited Assign appropriate permissions to the user
permissions. on the SaaS workload.
Failed to perform discovery on the Hub due Assign appropriate permissions to the user
to limited permissions. on the SaaS workload.
The services are not deleted from NetBackup The services get removed from NetBackup
after deleted the associated Connector from after 30 days from Connector deletion.
NetBackup SaaS Protection.
Connecting to the proxy host X.X.X.X on port Configure proxy settings on the primary
3128 with type SOCKS5 server using the bpsetconfig utility.
Chapter 31
NetBackup Flex Scale
This chapter includes the following topics:
NetBackup Flex Scale web UI To access the NetBackup Flex Scale features, expand
Cluster Management.
https://ManagementServerIPorFQDN/webui
See “Manage NetBackup and the NetBackup Flex Scale
cluster management from the NetBackup Flex Scale web
UI” on page 269.
NetBackup Flex Scale 268
Managing NetBackup Flex Scale
NetBackup Flex Scale infrastructure management console To open NetBackup, click the NetBackup node. This
action launches the NetBackup Flex Scale web UI in the
IPv4: https://ManagementServerIPorFQDN:14161/
same browser tab. To access the NetBackup Flex Scale
IPv6: https://ManagementServerIP:14161/ infrastructure management console again, click Cluster
Management.
To access NetBackup and Flex Scale cluster management from the NetBackup
Flex Scale web UI
1 In a web browser, enter the URL for the NetBackup Flex Scale web UI.
https://ManagementServerIPorFQDN/webui
The ManagementServerIPorFQDN is the host name or IP address of the
NetBackup Flex Scale server that you want to sign in to.
2 Enter the credentials for a user with the Appliance Administrator role and click
Sign in.
The web UI displays the NetBackup functionality and the NetBackup Flex Scale
Cluster management node.
■ You can view detailed information alerts and error messages in the Notifications
section.
Term Description
Infrastructure management The component that discovers, monitors, and manages the
server (IMS) asset infrastructure within a data center. The IMS transmits
information about the asset infrastructure to the Resiliency
Manager. The IMS is deployed as a virtual appliance. To
achieve scale, multiple IMSs can be deployed in the same
data center.
Data center The location that contains source data center and a target
data center. Each data center has one or more IMSs.
Automated virtual machines The assets that are a part of a resiliency group and you can
perform actions, such as migrate, recover, and rehearsal.
Term Description
Recovery Point Object Recovery Point Objective is the point in time you can recover
(RPO) to in the event of a disaster.
6 In the Add data center and Infrastructure management server dialog box,
select a data center.
7 In the Infrastructure management server section, select a preferred server.
8 Click Add.
After you add the Resiliency Platform in NetBackup, the NetBackup primary
server will be configured automatically in the Resiliency Platform.
Managing Resiliency Platforms 277
Configuring a Resiliency Platform
Note: If the NetBackup has FIPS mode enabled and you need to fetch the respective
certificates, refer Integrating with NetBackup topic in Resiliency Platform
product documentation. You need to install Resiliency Platform certificates in
FIPS trust store and then add the Resiliency Platform. (Only done when NetBackup
has FIPS mode enabled)
3 Click the Actions menu for the Resiliency Platform that you want to edit and
select Edit.
4 Enter the updated Resiliency Platform API access key and NetBackup API
access key.
5 Click Next.
6 In the Edit data center and Infrastructure management server dialog box,
select the Data center and then select the preferred infrastructure management
server.
7 Click Save.
8 To delete a Resiliency Platform, from the Actions menu, select Delete.
Table 33-1
Tab Column Description
Issue Action
Failed to configure the current NetBackup Check the logs at the following location in
primary server with the Resiliency Platform. Veritas Resiliency Platform’s Resiliency
manager:
■ /var/opt/VRTSitrp/logs/copydata-service.log
■ /var/opt/VRTSitrp/logs/api-service.log
Failed to establish a persistent connection ■ Verify that the logged in user has
between the current NetBackup primary permissions in credentials namespace.
server and the Resiliency Platform. ■ Check the logs at the following location
on the NetBackup primary server:
■ /usr/openv/logs/nbwebservice/ in
NetBackup installation directory
■ C:\Program
Files\Veritas\NetBackup\logs\nbwebservice
in NetBackup windows
Managing Resiliency Platforms 281
Troubleshooting NetBackup and Resiliency Platform issues
Issue Action
Failed to launch the Veritas Resiliency Verify that same authentication domain is
Platform used to configure Veritas Resiliency Platform
and NetBackup.
Chapter 34
Managing Bare Metal
Restore (BMR)
This chapter includes the following topics:
6 For ESXi servers, additional permissions are needed for Host properties.
■ On the Global tab, expand the NetBackup management section.
■ Select the following permissions:
8 Click Assign.
9 Under Workloads, click Assign.
Select the VMware assets that you want the role to have access to.
■ To give the role access to all VMware assets and future assets that you
add, select Apply selected permissions to all existing and future
VMware assets.
■ To select individual assets, deselect Apply selected permissions to all
existing and future VMware assets and click Add.
For example, you can select one or more: datastores, datastore clusters,
ESXi servers, ESXi clusters, resource pools, vApps.
■ If a user doesn't have the correct permissions or access in the NetBackup web
UI
Step 2 Verify that the firewall is open Refer to the following article:
for port 443.
https://www.veritas.com/docs/100042950
Troubleshooting the NetBackup Web UI 286
Tips for accessing the NetBackup web UI
Table 35-1 Solutions when the web user interface does not display
(continued)
Step 4 Verify that the Check the nbwebservice logs for more details.
nbwebservice is up.
Step 5 Verify that the vnetd Verify that the vnetd -http_api_tunnel service is running.
-http_api_tunnel is
For more details, check the vnetd -http_api_tunnel logs with
running.
OID 491.
Step 6 Ensure that the external ■ Use the Java Keytool commands to validate the following file:
certificate for the NetBackup Windows:
web server is accessible and install_path\var\global\wsl\credentials\nbwebservice.jks
has not expired. UNIX: /usr/openv/var/global/wsl/credentials
nbwebservice.jks
■ Check whether the nbwebgroup has a permission to access the
nbwebservice.jks file.
■ Contact Veritas Technical Support.