NetBackup105_WebUIGuide_Admin (1)
NetBackup105_WebUIGuide_Admin (1)
Administrator's Guide
Release 10.5
NetBackup™ Web UI Administrator’s Guide
Last updated: 2024-09-23
Legal Notice
Copyright © 2024 Veritas Technologies LLC. All rights reserved.
Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas
Technologies LLC or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This product may contain third-party software for which Veritas is required to provide attribution
to the third party (“Third-party Programs”). Some of the Third-party Programs are available
under open source or free software licenses. The License Agreement accompanying the
Software does not alter any rights or obligations you may have under those open source or
free software licenses. Refer to the Third-party Legal Notices document accompanying this
Veritas product or available at:
https://www.veritas.com/about/legal/license-agreements
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Veritas Technologies
LLC and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Veritas as on premises or
hosted services. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in
accordance with the terms of this Agreement.
http://www.veritas.com
Technical Support
Technical Support maintains support centers globally. All support services will be delivered
in accordance with your support agreement and the then-current enterprise technical support
policies. For information about our support offerings and how to contact Technical Support,
visit our website:
https://www.veritas.com/support
You can manage your Veritas account information at the following URL:
https://my.veritas.com
If you have questions regarding an existing support agreement, please email the support
agreement administration team for your region as follows:
Japan [email protected]
Documentation
Make sure that you have the current version of the documentation. Each document displays
the date of the last update on page 2. The latest documentation is available on the Veritas
website:
https://sort.veritas.com/documents
Documentation feedback
Your feedback is important to us. Suggest improvements or report errors or omissions to the
documentation. Include the document title, document version, chapter title, and section title
of the text on which you are reporting. Send feedback to:
You can also see documentation information or ask a question on the Veritas community site:
http://www.veritas.com/community/
https://sort.veritas.com/data/support/SORT_Data_Sheet.pdf
Contents
Add an API key or view your API key details ............................... 468
Edit, reissue, or delete your API key ......................................... 468
Use an API key with NetBackup REST APIs ............................... 469
Access codes ............................................................................ 470
Request CLI access through web UI authentication ..................... 470
Approve the CLI access request of another user ......................... 471
Edit the settings for command-line access ................................. 472
■ About NetBackup
■ NetBackup documentation
■ Terminology
About NetBackup
NetBackup provides a complete, flexible data protection solution for a variety of
platforms. The platforms include Windows, UNIX, and Linux systems.
NetBackup administrators can set up periodic or calendar-based schedules to
perform automatic, unattended backups for clients across a network. An
administrator can carefully schedule backups to achieve systematic and complete
backups over a period of time, and optimize network traffic during off-peak hours.
The backups can be full or incremental: Full backups back up all indicated client
files, while incremental backups back up only the files that have changed since the
last backup.
The NetBackup administrator can allow users to back up, restore, or archive the
files from their computer. (An archive operation backs up a file, then deletes it from
the local disk if the backup is successful.)
NetBackup includes both the server and the client software as follows:
■ Server software resides on the computer that manages the storage devices.
Introducing NetBackup 25
About NetBackup
■ Client software resides on computers that contain data to back up. (Servers
also contain client software and can be backed up.)
Figure 1-1 shows an example of a NetBackup storage domain.
NetBackup
primary server
Media servers
SAN
OpenStorage
Media Manager tape Storage unit disk pool
storage unit
NetBackup
clients
■ Data movers (when data is sent to independent, external disk devices like
OpenStorage appliances)
During a backup or archive, the client sends backup data across the network to a
NetBackup server. The NetBackup server manages the type of storage that is
specified in the backup policy.
During a restore, users can browse, then select the files and directories to recover.
NetBackup finds the selected files and directories and restores them to the disk on
the client.
Backup policies
NetBackup classic policies are available for the Administrator that wants to continue
to use policies for data protection.
See “Support for NetBackup classic policies” on page 342.
NetBackup documentation
For a complete list of NetBackup technical documents for each supported release,
see the NetBackup Documentation Landing Page at the following URL:
https://www.veritas.com/docs/DOC5332
No responsibility is assumed for the installation and use of the Adobe Acrobat
Reader.
Name of Description
interface
NetBackup web With the NetBackup web user interface (UI), you can view NetBackup activities and manage
user interface NetBackup configuration, from a primary server.
To start the NetBackup web UI:
■ Users must have a role that is configured for them in NetBackup RBAC.
■ Open a web browser and go to the following URL: https://primaryserver/webui/login
Character-based, Run the tpconfig command to start a character-based, menu interface for device management.
menu interface
Use the tpconfig interface from any terminal (or terminal emulation window) that has a termcap
or a terminfo definition.
Command line NetBackup commands are available on both Windows and UNIX platforms. Enter NetBackup
commands at the system prompt or use the commands in scripts.
All NetBackup administrator programs and commands require root or administrator user privileges
by default.
For complete information on all NetBackup commands, see the NetBackup Commands Reference
Guide.
Root or administrator access is no longer needed for the web UI once you have
delegated one or more users with permissions to create RBAC roles.
Item Description
Profile When you click the profile icon, you can see the following information:
Activity monitor Displays NetBackup job information and provides the control over the jobs,
services, processes, and drives.
Recovery Administrators can use the Recovery node to perform the following kinds
of recovery:
Workloads Contains the supported workloads for NetBackup and tools to manage the
workload environment, asset credentials, and recovery.
Storage This node contains the utilities for managing the media and devices that
NetBackup uses to store backups.
Introducing NetBackup 35
Using the NetBackup web UI
Item Description
Catalog Search for backup images and perform various actions, including: verify the
backup contents, duplicate a backup image, promote a copy, expire a backup
image, and import a backup image.
Credential management Centrally manages the credentials that NetBackup uses to access systems
and the workloads that it protects. You can manage credentials for workloads
and for systems, client credentials (for NDMP and disk arrays hosts), and
External CMS server configurations.
Item Description
Security This node contains the utilities to manage settings for security and hosts:
Other licensed utilities Additional licensed utilities appear under the main NetBackup nodes.
Terminology
The following table describes the concepts and terms in web user interface.
Introducing NetBackup 37
Terminology
Term Definition
Classic policy In the NetBackup web UI, indicates that a legacy policy protects
the asset.
External certificate A security certificate that is issued from any CA other than
NetBackup.
NetBackup certificate A security certificate that is issued from the NetBackup CA.
Protection plan A protection plan defines when backups are performed, how long
the backups are retained, and the type of storage to use. Once
a protection plan is set up, assets can be subscribed to the
protection plan.
Term Definition
Role For RBAC, defines the operations that a user can perform and
the assets or objects that they can access. For example, you can
configure a role to manage recovery of specific databases and
the credentials that are needed for backups and restores.
Workload The type of asset. For example: VMware, Microsoft SQL Server,
or Cloud.
Chapter 2
Administering NetBackup
licenses
This chapter includes the following topics:
■ Add licenses
■ View licenses
■ Renew licenses
■ Remove licenses
Note: Veritas recommends the use of a browser and the NetBackup web UI to
manage licenses remotely.
Add licenses
You can add licenses after primary server installation using the NetBackup web UI.
To add licenses after primary server installation
1 In the NetBackup web UI, click Settings > License management.
2 On the License management screen, click Add license.
3 Add license file using one of the following methods:
■ Veritas Entitlement Management System (VEMS) - Use this method to
add the license from the VEMS portal.
■ Sign in to your Veritas account by specifying the Username and
Password.
■ Select the entitlement that you want to add.
For more information, refer to the Veritas Entitlement Management
System (VEMS) User's Guide.
■ File system - Use this method to add a license file that you have already
downloaded on your local host.
■ Click Browse to select the .slf license file that you want to add.
4 Click Add.
Administering NetBackup licenses 41
View licenses
View licenses
You can view the NetBackup licenses that you have already added, using the web
UI.
To view NetBackup licenses
1 In the NetBackup web UI, click Settings > License management.
2 You can see the following license details:
■ Name - Name of the license
■ Status - Status of the license, such as Active
■ License type - Type of license such as Perpetual, Subscription
■ Activation - Date when the license was activated
■ Expiration - Date when the license will be expired
■ Entitlement ID - Unique identification number of each license with respect
to the product features it offers and the customer account that is entitled to
use it
Renew licenses
You can renew subscription type of licenses.
To renew licenses
1 In the NetBackup web UI, click Settings > License management.
2 Click the Actions option for the license that you want to renew.
3 Click Renew.
4 For the VEMS option, enter the username and password.
For the File system option, select the license file.
5 Click Sign in.
6 Click Renew.
Remove licenses
You can remove licenses.
Administering NetBackup licenses 42
Remove licenses
To remove licenses
1 In the NetBackup web UI, click Settings > License management.
2 Click the Actions option for the license that you want to remove.
3 Click Remove.
Section 2
Monitoring and notifications
■ Chapter 5. Notifications
■ Activity monitor
■ Job monitoring
Jobs Lists job information, including the number of active and queued jobs and the status
of attempted and completed jobs.
You can click on a link for specific job details, for example Active jobs. NetBackup
opens the Jobs list in the Activity monitor and creates a temporary filter for those jobs
on the Jobs tab.
■ If you navigate to another area of the web UI, the filter is removed (if you did not
copy and save it).
■ To save the filter, hover over the filter in the toolbar and click Actions > View. Click
Copy, make any changes that you want, and then click Save.
■ You can click Actions > Delete to immediately delete the filter.
Monitoring NetBackup activity 45
The NetBackup dashboard
Backup anomaly detection Displays the total anomalies that are reported so far.
Note: An anomalies count of 0 indicates there are no anomalies generated or that the
anomaly detection services are not running.
Malware detection Displays the malware scan result status for the images including Impacted, Not
impacted, Failed, In progress, and Pending.
Paused protection Lists any paused protection activities for clients. These activities include new backups,
duplication, and image expiration. NetBackup pauses protection if it detects malware
in backup images.
Certificates Displays the information about the NetBackup host ID-based security certificates and
any external certificates in your environment.
■ # Certificates. The total number of certificates. Note that the hosts most be online
and able to communicate with the NetBackup primary server.
■ Revoked. The number of hosts that have a NetBackup certificate that is revoked.
■ Valid. The number of hosts that have a NetBackup certificate enrolled.
■ Expired. The number of hosts with expired NetBackup certificates.
For external certificates, the following information is shown for NetBackup 8.2 and later
hosts:
■ # Certificates. The total number of external certificates. Note that the hosts most
be online and able to communicate with the NetBackup primary server.
■ Not configured. The number of hosts that do not have an external certificate enrolled.
■ Valid. The number of hosts that have an external certificate enrolled.
■ Expired. The number of hosts with expired external certificates.
Tokens Displays the information about the authorization tokens in your environment.
Usage reporting Lists the size of the backup data for the NetBackup primary servers in your organization.
This reporting is useful to track capacity licensing. Use the drop-down lists in the top
right to select the time period and the view that you want to display. Click on a server
name to see specific details for that server.
Additional details are available for how to configure NetBackup to display primary server
information in this widget.
See “Track protected data size on your primary servers” on page 557.
Security events The Access history view includes a record of logon events. The Audit events view
includes the events that users initiate on the NetBackup primary server.
Activity monitor
Use the Activity monitor to monitor and control the following aspects of NetBackup.
Updates to the Activity monitor occur as jobs are initiated, updated, and completed.
Jobs Displays in-process or completed jobs for the primary server. The Jobs
tab also displays details about the jobs.
Daemons Displays the status of NetBackup daemons on the primary server. Click
Change server to display daemons on a media server in the
environment.
Processes Displays the NetBackup processes that run on the primary server. Click
Change server to display processes on a media server in the
environment.
Job monitoring
Use the Jobs node in the Activity monitor to monitor the jobs in your NetBackup
environment. The default view for jobs is the List view that contains the
non-hierarchical list of all the jobs. You can also use the Hierarchical view to see
the hierarchy of parent and child jobs. The role of the parent job is to initiate
requested tasks in the form of children jobs.
View a job
For each job that NetBackup runs you can see the following details: the file list and
the status of the job, the logged details for the job, and the job hierarchy.
The jobs that you can view depend on the type of RBAC role that you have.
See “Job monitoring” on page 47.
To view a job and the job details
1 On the left, click Activity monitor. Then click the Jobs tab.
2 Click the job name that you want to view.
If you want to open the job in a separate window, at the top right click Open
in new window.
4 Click the Details tab to view the logged details about a job. You can filter the
logs by error type using the drop-down menu.
See “Search for or filter jobs in the jobs list” on page 52.
5 Click the Job hierarchy tab to view the complete hierarchy for the job, including
any ancestor and any child jobs.
See “View the jobs in the Hierarchy view” on page 51.
3 Locate the top-level job and expand it to see the child jobs.
Cancel You can cancel the jobs that have not yet completed. They can be in
one of the following states: queued, re-queued, active, incomplete,
or suspended.
When a parent job is canceled, any child jobs are also canceled.
Suspend You can suspend backup and restore any jobs that contain
checkpoints.
Restart You can restart the jobs that have completed, failed, or that have
been canceled or suspended. A new job ID is created for the new job.
Resume You can resume the jobs that have been suspended or are in an
incomplete state.
Delete You can delete the jobs that have completed. When a parent job is
deleted, any child jobs are also deleted.
Monitoring NetBackup activity 52
Job monitoring
Private All new filters are private by default. These filters appear
in “My list” in the Manage filters page. Only the owner
can view a private filter.
7 Add any additional conditions for the filter or add a sub-query to apply to a
condition.
For example, assume that you want to view all completed jobs that have a
status code of 196 or 239. Create the following query:
State = Done
AND
(Status code = 196
OR
Status code = 239)
■ To save this query and return to the Jobs list, click Save.
■ To save this query and apply the filter you just created, click Save and
apply.
Example 1. Query filter for all jobs with the VMware policy type.
Example 2. Query filter for all jobs that are done and have a status code of 196 or
239.
6 Make the changes that you want to the filter and click Save.
■ The jobs in the hierarchy view have parent jobs, but you do not have permission
to view the parent jobs.
Contact your NetBackup system administrator to get the necessary RBAC role
permissions.
■ NetBackup limits the number of tabs that you can have open with the Jobs
hierarchy view.
If you cannot expand a parent job and see its child jobs, try closing any additional
Jobs tabs that you have open.
Some job actions may not be available to workload administrators with limited RBAC
permissions on certain assets.
See “Job actions not available for workload administrators with limited RBAC
permissions on assets” on page 58.
Pending requests See “About pending requests and actions” on page 62.
and actions
See “About pending requests for storage units” on page 63.
Disk pools More information about disk pools is available in the NetBackup guide
for your disk storage option:
Adds to the When NetBackup adds the mount request to the queue, NetBackup
pending requests creates an operator-pending action. The action appears in the Device
queue monitor. A queued mount request leads to one of the following actions:
Pending request Specifies that a pending request is for a tape mount that NetBackup
cannot service automatically. Operator assistance is required to
complete the request. NetBackup displays the request in the Pending
requests pane.
NetBackup assigns pending status to a mount request when it cannot
determine the following:
Pending action Specifies that a tape mount request becomes a pending action when
the mount operation encounters problems, and the tape cannot be
mounted. Operator assistance is required to complete the request, and
NetBackup displays an action request in the Pending requests pane.
Pending actions usually occur with drives in robotic libraries.
■ Density
■ Recorded media ID
■ Mode
5 Find a drive type that matches the density for the pending request.
6 Verify that the drive is up and not assigned to another request.
7 Locate the drive. Then ensure that the drive and the pending request are on
the same host.
8 If necessary, get the media, write-enable it, and insert it into the drive.
9 Wait for the drive to become ready, as explained in the vendor’s drive equipment
manual.
10 Locate the request. Then click Actions > Assign request.
11 Verify that the request was removed from the Pending requests pane.
12 Click on the drive name, then click on the Drive status tab.
Verify that the job request ID appears in the Request ID column for the drive.
■ Job notifications
Job notifications
The following types of email notifications are available for NetBackup jobs.
■ Notifications when job failures occur. NetBackup supports the ticketing systems
that use inbound email service for ticket creation.
See “Send email notifications for job failures” on page 66.
■ Notifications to the backup administrator about backups with a non-zero status.
See “Send notifications to the backup administrator about failed backups”
on page 69.
■ Notifications to the host administrator about successful and failed backups for
a specific host.
See “Send notifications to a host administrator about backups” on page 70.
Prerequisites
Review the following requirements before you configure email notifications using
a ticketing system.
■ The ticketing system is up and running.
■ The SMTP server is up and running.
■ A policy is configured in the ticketing system to create tickets (or incidents)
based on the inbound emails that NetBackup sends.
To configure email notifications
1 At the top right, click Settings > Email notifications.
2 Go to the Email notifications tab.
3 Turn on Send email notifications.
4 Enter the email information including the recipient's email address, the sender's
email address, and the email sender's name.
5 Enter the SMTP server details including the SMTP server name and port
number.
Provide the SMTP username and password if you have specified the credentials
earlier on the SMTP server.
6 Select Save.
7 Log on to the ticketing system to view the tickets that were created based on
NetBackup alerts.
Job ID: 50
Table 5-1 lists some of the conditions or status codes for which alerts are generated.
These alerts are sent to the ticketing system through email notifications.
10 Allocation failed
196 Client backup was not attempted because backup window closed
6 Enter the email address of the host administrator. (Separate multiple addresses
with commas.)
7 Click Save.
install_path\NetBackup\bin\
Primary and media NetBackup sends notifications from the server if you configure the
server following setting:
Client. NetBackup sends notifications from the client if you configure the
following setting:
-server The name of the SMTP server that is configured to accept and relay
emails.
@IF "%~4"=="" (
blat %3 -s %2 -t %1 -i Netbackup -server emailserver.company.com -q
) ELSE (
blat %3 -s %2 -t %1 -i Netbackup -server emailserver.company.com -q -attach %4
)
6 Save nbmail.cmd.
Notifications 72
NetBackup event notifications
Note: Job events are not included with these notifications. See job details in the
Activity Monitor for information about job events.
A Notifications icon is located at the top right in the web UI. You can click the icon
to open the Notifications window and view a list of critical notifications 10 at a time.
If a number is displayed with the icon, it indicates how many unseen critical
messages exist. After you have opened the window, the number is reset.
From the window, you can choose to see a more comprehensive list of all
notifications. Each event has a category for its NetBackup or external component
and is assigned a severity level:
■ Error
■ Critical
■ Warning
■ Information
■ Debug
■ Notice
You can sort, filter, and search the list. The comprehensive list also lets you review
details about each event. The details include the full description as well as any
appropriate extended attributes.
NetBackup notifications are not available if the NetBackup Messaging Broker
(nbmqbroker) is not running. See the NetBackup Troubleshooting Guide for
information about restarting the service.
Notifications 73
NetBackup event notifications
View notifications
To view notifications
1 At the top right, click the Notifications icon to view a list of critical notifications
10 at a time.
Note: If a number is displayed with the icon, it indicates how many unseen
critical messages exist. After you have opened the Notifications window, the
number is reset.
Click Load 10 more to view the next 10 notifications. After you have viewed
30 notifications, click Show all to view any remaining messages.
Use Refresh to load the most recent notifications again.
2 To view all notifications, click Show all to open the Events page. On the page,
you can do the following:
■ Click an event to view its details. The details include the full description as
well as extended attributes.
■ To sort the list, click any of the column headings except Description. Events
are sorted by default by the date received.
■ To filter events, click Filter. You can filter by Severity and Timeframe.
In the Filters menu, select the parameter values you want to filter by, and
then click Apply filters.
To remove all filters, click Clear all.
■ To search for events, enter the search string in the Search field. You can
search for values in all columns except Description and Received.
■ Windows:
install_path\var\global\wmc\h2Stores\notifications\properties
■ UNIX:
/usr/openv/var/global/wmc/h2Stores/notifications/properties
Notifications 74
NetBackup event notifications
Or DISABLE.NotificationType.Action = true
Or DISABLE.namespace
For valid NotificationType and Action values, see the following topic.
See “NetBackup event types supported with notifications” on page 75.
For example:
■ To disable notifications about all storage unit events:
DISABLE.StorageUnit = true
Or NotificationType.Action.severity = value
Valid priority values are: LOW, MEDIUM, HIGH
Valid severity values are: CRITICAL, ERROR, WARNING, INFO, DEBUG
For example:
■ To set priority and severity for create storage unit events:
StorageUnit.CREATE.priority = LOW
StorageUnit.CREATE.severity = INFO
Notifications 75
NetBackup event notifications
Note: It can take up to one minute for the events of type Policy, SLP, and Catalog
to generate after the corresponding action has been performed.
no actions CRITICAL
Note: An appropriate notification is generated when an
autodiscovery action or a Discover Now action fails for
VMWare, RHV, Nutanix, or Cloud servers.
CRL Health Not CRITICAL The CRL on host $ {hostName} is not refreshed.
applicable
Catalog Backup Health Not CRITICAL One or more users who can access the identity files that
applicable need to be backed up as part of the disaster recovery (DR)
package, do not exist on the system.
Catalog Image Expiration Not CRITICAL Event for Catalog Image received. No additional details
applicable found.
Catalog
Catalog Image Image_Name was modified.
Note: Also applicable for
manual image expiration. Catalog Image Image_Name expired.
Certificate Health Not CRITICAL The certificate for host $ {hostName} is going to expire
applicable soon.
Notifications 76
NetBackup event notifications
NetBackup Configuration Not CRITICAL The NetBackup configuration file contains multiple
Health applicable CLIENT_NAME entries.
NetBackup Configuration Not CRITICAL The service user does not have the required permissions
Health applicable on one or more links or junction target directories. Run the
'Install_Path\NetBackup\bin\goodies\nbserviceusercmd.exe
-addAcl' command to assign the correct permissions.
NetBackup Configuration Not INFO Assigned the execute permission to the service user on
Health applicable one or more NetBackup directories.
NetBackup Configuration Not WARNING Could not assign the execute permission to the service
Health applicable user on one or more NetBackup directories.
DBPaaS Operation RCA Not CRITICAL Cannot complete backup. See the Root Cause Identifier
applicable (RCA) link for more information.
Drive CREATE INFO The drive {Drive_Name} was created for host {Host_Name}.
DriveChange
DELETE CRITICAL The drive {Drive_Name} was deleted for host {Host_Name}.
KMS Certificate Expiration EXPIRY WARNING The certificate that is used to communicate with the KMS
server {KMS_Server_Name}${server} is about to expire in
KMSCredentialStatus
{days_to_expiration}. If the certificate is not renewed on
time, communication with the KMS server fails.
Library Event - Robot CREATE INFO The library {Library_Name} was created for host
{Host_Name}.
Library
Machine
Media Group CREATE INFO The media group {Media_Group_ID} was created.
MediaGroup
Media Pool CREATE INFO The media pool {Media_Pool_ID} was created.
MediaPool
Message Broker Service Status RUNNING INFO The NetBackup Messaging Broker service is running.
NetBackup internal notifications are now enabled.
ServiceStatus
Protection Plan Subscription Create INFO Received an event for protection plan subscription.
RetentionEvent
Storage life cycle policy Create INFO Event for Storage Lifecycle Policy received. No additional
details found.
SLP
The Storage Lifecycle Policy {Policy_Name} was created.
Storage life cycle policy state UPDATE INFO The SLP version {Version} was changed.
change
SlpVersionActInactEvent
Storage Unit CREATE INFO The storage unit {Storage_Unit_Name} was created.
StorageUnit
Note: Any change to a basic
disk staging schedule (DSSU),
such as adding, deleting, or
modifying, generates relevant
storage unit notifications. With
those notifications, some
additional policy notifications
are also generated with policy
name
__DSSU_POLICY_{Storage_Unit_Name}.
Storage Unit Group CREATE INFO The storage unit group {Storage_Unit_Group_Name} was
created.
StorageUnitGroup
Usage Reporting No actions INFO or The usage report generation has started.
ERROR
UsageReportingEvent The usage report is generated successfully.
TAGSDISCOVERYEVENT
Web Truststore Health Not CRITICAL One or more files and / or directories do not have
applicable appropriate web service user permissions.
■ POST/config/hosts/{hostId}/configurations
■ GET/config/hosts/{hostId}/configurations/configurationName (for a
specific property)
Notifications 81
NetBackup event notifications
■ PUT/config/hosts/{hostId}/configurations/configurationName
■ DELETE/config/hosts/{hostId}/configurations/configurationName
See the NetBackup 10.5 API Reference on SORT for more information about these
APIs.
The maximum number of records that are stored, after which the cleanup process
removes the oldest record, overriding the retention value.
Note: Either Veritas Alta View or NetBackup IT Analytics can be registered with a
single data collector at a time.
Registering the data collector 83
Register the data collector with Veritas Alta View
However, the Veritas Alta View server may be disconnected from the primary server
if the token of Veritas Alta View has expired.
To renew the Veritas Alta View token
1 On the top right, click Settings > Data collector registration.
2 Verify if the WebSocket status is disconnected because the token has expired.
3 In the Veritas Alta View UI, on the NetBackup domains > Hosts tab, select
the primary server that is disconnected from this Veritas Alta View server.
4 Click Actions > Generate token.
Copy the token.
5 In the NetBackup web UI, on the Data collector registration screen, click
Renew Veritas Alta View token.
6 In the Renew Veritas Alta View token dialog box, enter the token that you
have generated in the Veritas Alta View UI.
7 Click Renew.
4 Select the Use proxy server option and specify the proxy server settings.
This is an optional step.
5 Click Register.
After the registration with the data collector, you can monitor, manage, and
report on NetBackup domains using NetBackup IT Analytics.
Note: Either Veritas Alta View or NetBackup IT Analytics can be registered with a
single data collector at a time.
■ Clean up properties
■ Encryption properties
Managing host properties 89
■ Exchange properties
■ Firewall properties
■ Logging properties
■ Media properties
■ Network properties
■ Servers properties
■ SharePoint properties
■ Timeouts properties
Method Description
NetBackup Web UI interface Most properties are listed in the NetBackup web UI in Hosts > Host properties.
Depending on the host to be configured, select the Primary server, Media server, or
Client.
Managing host properties 91
View or edit the host properties of a server or client
Method Description
Command line Use the nbgetconfig command or bpgetconfig command to obtain a list of
configuration entries. Then use nbsetconfig or bpsetconfig to change the options
as needed.
These commands update the appropriate configuration files on both Windows (registry)
and UNIX (bp.conf file) primary servers and clients.
vm.conf file The vm.conf file contains configuration entries for media and device management.
Backup, Archive, and Administrators can specify configuration options for NetBackup clients.
Restore client interface
See the NetBackup Backup, Archive, and Restore Getting Started Guide.
Host mappings Lists any host mappings that are configured for the
host.
Note: If you unintentionally reset a host’s attributes, you can undo the changes by
restarting the bpcd service. Otherwise, the host attributes are automatically updated
with the appropriate values after 24 hours.
Property Description
Perform consistency check before backup Checks snapshots for data corruption. Applies only to snapshots that
when using Microsoft Volume Shadow Copy the Microsoft Volume Shadow Copy Services (VSS) performs.
Service snapshot provider
If corrupt data is found and this option is not selected, the job fails.
See “Windows open file backup tab of the Client attributes properties”
on page 107.
Continue with backup if consistency check Continues the backup job even if the consistency check fails.
fails
It may be preferable for the job to continue, even if the consistency
check fails. For example, a backup of the database in its current state
may be better than no backup at all. Or, it may be preferable for the
backup of a large database to continue if it encounters only a small
problem.
For the hosts that you add to the backup host pool, their volumes are distributed
for backup purposes on the backup hosts. This configuration results in a better
backup performance.
You can create a backup host pool with different versions of NetBackup hosts. You
can create Windows backup host pools only with version 9.0.1 or later. Windows
hosts with a version earlier than 9.0.1 are not displayed.
Note the following important points:
■ In a backup host pool you can either have Linux hosts or Windows hosts only.
A pool does not support hosts with both platforms.
■ All the hosts in the backup host pool must use the same OS version. This way
each host has the same version of NFS for consistent backups.
■ For backup hosts with a multi-NIC setup, add the host name that is already used
on the NetBackup primary server. Do not add an alias name or any other host
names in the backup host pool.
Property Description
Working directory Specifies the path to the busy-files working directory. On a UNIX client, the value in the
user’s $HOME/bp.conf file takes precedence if it exists. By default, NetBackup creates
the busy_files directory in the /usr/openv/netbackup directory.
Administrator email Specifies the recipient of the busy-file notification message when the action is set to Send
address email. By default, the mail recipient is the administrator. On a UNIX client, the value in the
user’s $HOME/bp.conf file takes precedence if it exists. By default,
BUSY_FILE_NOTIFY_USER is not in any bp.conf file and the mail recipient is root.
Process busy files Enables busy files to be processed according to the host property settings. NetBackup
follows the Busy file settings if it determines that a file changes during a backup. By
default, Process busy files is not enabled and NetBackup does not process the busy files.
File action file list Specifies the absolute path and file name of the busy file. The metacharacters *, ?, [], [ - ]
can be used for pattern matching of file names or parts of file names.
Add Adds a new file entry. Enter the file and path directly, or browse to select a file.
Actions > Delete Deletes the selected file from the file action list.
Retry count Specifies the number of times to try the backup. The default retry count is 1.
Busy file action The following options specify which action to take when busy-file processing is enabled.
On a UNIX client, the value in the user’s $HOME/bp.conf file takes precedence if it exists.
■ Send email sends a busy sends a busy file notification message to the user that is
specified in Administrator email address.
■ Retry the backup retries the backup on the specified busy file. The Retry count value
determines the number of times NetBackup tries a backup.
■ Ignore excludes the busy file from busy file processing.
/usr/openv/netbackup/bin/goodies/bpend_notify_busy
to the path:
/usr/openv/netbackup/bin/bpend_notify
2 Set the file access permissions to allow group and others to run bpend_notify.
3 Configure a policy with a user backup schedule for the busy file backups.
This policy services the backup requests that the repeat option in the actions
file generates. The policy name is significant. By default, NetBackup
alphabetically searches (uppercase characters first) for the first available policy
with a user backup schedule and an open backup window. For example, a
policy name of AAA_busy_files is selected ahead of B_policy.
Clean up properties
To access this setting, in the web UI select Hosts > Host properties. Select the
primary server. If necessary click Connect, then click Edit primary server. Click
Clean-up.
The Clean up properties manage the retention of various logs and incomplete jobs.
The Clean up properties apply to primary servers.
The Clean up host properties contain the following settings.
Managing host properties 99
Clean up properties
Property Description
Keep true image restoration (TIR) Specifies the number of days to keep true image restore information on disk.
information After the specified number of days, the images are pruned (removed). Applies
to all policies for which NetBackup collects true image restore information.
The default is one day.
When NetBackup performs a true image backup, it stores the following
images on the backup media:
■ Backed up files
■ True image restore information
NetBackup also stores the true image restore information on disk in the
following directories:
On Windows:
install_path\NetBackup\db\images
On UNIX:
/usr/openv/netbackup/db/images
NetBackup retains the information for the number of days that this property
specifies.
Move restore job from incomplete Indicates the number of days that a failed restore job can remain in an
state to done state Incomplete state. After that time, the Activity monitor shows the job as Done.
The default is 7 days. The maximum setting is 365 days. If Checkpoint Restart
for restores is used, the Restore retries property allows a failed restore job
to be retried automatically.
Property Description
Move backup job from incomplete Indicates the maximum number of hours that a failed backup job can remain
state to done state in an incomplete state. After that time, the Activity Monitor shows the job as
Done. The minimum setting is 1 hour. The maximum setting is 72 hours.
The default is 3 hours.
When an active job has an error, the job goes into an Incomplete state. In
the Incomplete state, the administrator can correct the condition that caused
the error. If an Incomplete job does not complete successfully and is moved
to the Done state, the job retains the error status.
Note: A resumed job reuses the same job ID, but a restarted job receives
a new job ID. The job details indicate that the job was resumed or restarted.
Note: This property does not apply to suspended jobs. Suspended jobs
must be resumed manually before the retention period of the job is met and
the image expires. If a suspended job is resumed after the retention period
is met, the job fails and is moved to the Done state.
Image cleanup interval Specifies the maximum interval that can elapse before an image cleanup is
run. Image cleanup is run after every successful backup session (that is, a
session in which at least one backup runs successfully). If a backup session
exceeds this maximum interval, an image cleanup is initiated.
Catalog cleanup wait time Specifies the minimum interval that can elapse before an image cleanup is
run. Image cleanup is not run after a successful backup session until this
minimum interval has elapsed since the previous image cleanup.
Note: Using an IPv6 address as a client name in a policy can cause backups to
fail. Specify a host name instead of an IPv6 address.
Managing host properties 101
Client attributes properties
Attribute Description
Allow client browse Allows all clients to browse files for restoring. This attribute is overridden if
the Browse and restore ability option on the General tab is set to Deny
both for a particular clients.
Allow client restore Allows all clients to restore files. This attribute is overridden if the Browse
and restore ability option on the General tab is set to Allow browse only
or Deny both.
Managing host properties 102
Client attributes properties
Attribute Description
Clients Specifies the list of clients in the client database on the currently selected
primary server. A client must be in the client database before you can change
the client properties in Client attributes.
Windows: install_path\NetBackup\db\client
UNIX: /usr/openv/netbackup/db/client
If a client is not listed in the Clients list, click Add to add a client to the client
database. Enter a client name in the text box or select a client. Then click
Add.
The name that is entered here must match the Client name property for the
specific client. If it does not match, the client cannot browse its own backups.
Use the bpclient command to add clients to the client database if dynamic
addressing (DHCP) is in use.
On UNIX: You also can create, update, list, and delete client entries by using
the bpclient command that is located in the following directory:
/usr/openv/netbackup/bin/admincmd
General tab Specifies how to configure the selected Windows primary servers (clients).
Connect options tab Specifies how to configure the connection between a NetBackup server and
a NetBackup client.
See “Connect options tab of the Client attributes properties” on page 106.
Windows open file backup tab Specifies whether a client uses Windows Open File Backup. Also, specifies
whether Volume Snapshot Provider or Volume Shadow Copy Service
is used as the snapshot provider.
See “Windows open file backup tab of the Client attributes properties”
on page 107.
Managing host properties 103
Client attributes properties
Property Description
Disable backups until: Makes the specified clients in the General tab unavailable for backups until
the specified date and time. By default, clients are online and included in the
policies in which they are listed.
When Disable backups until is selected for a client, no jobs are scheduled
for that client. Since the client is not part of any job, no backup status is listed
for the client.
If a client is taken offline, any job is allowed to complete that includes the
client and is already running.
If a backup or restore job is manually submitted for a client that is offline, the
Activity monitor displays the job as failed with a status code 1000 (Client is
offline).
Note: Changes to this property do not appear in the audit report.
Disable restores until: Makes the specified clients in the General tab unavailable for restores until
the specified date and time. By default, clients are online and available for
restore.
Managing host properties 104
Client attributes properties
Property Description
Maximum data streams Specifies the maximum number of jobs that are allowed at one time for each
selected client. (This value applies to the number of jobs on the client, even
if multistreaming is not used.)
■ If the Maximum data streams property is not set, the limit is either the
one indicated by the Maximum jobs per client property or the Limit
jobs per policy property, whichever is lower.
■ If the Maximum data streams property is set, NetBackup ignores the
Maximum jobs per client property. NetBackup uses either Maximum
data streams or Limit jobs per policy, whichever is lower.
See “Global attributes properties” on page 144.
Browse and restore Specifies the client permissions to list and restore backups and archives.
Select the clients in the General tab of the Client attributes and choose a
Browse and restore property.
To use the Global client attributes settings, select Use global settings.
■ To allow users on the selected clients to both browse and restore, select
Allow both.
■ To allow users on the selected clients to browse but not restore, select
Allow browse only.
■ To prevent users on the selected clients from the ability to browse or
restore, select Deny both.
Browse and restore scheduled Specifies whether the clients can list and restore from scheduled backups.
backups (This setting does not affect user backups and archives.)
Windows administrators and root users can list and restore from scheduled
backups as well as user backups regardless of the Browse and restore
scheduled backups setting.
Deduplication Specifies the deduplication action for clients if you use the NetBackup Data
Protection Optimization Option.
A client is offline and the job is already in progress. Offline clients continue to be included in any job.
A client is offline and job retries were started before the Job retries continue as normal.
client was taken offline.
Any duplication job that is associated with a storage Continues to run until complete.
lifecycle policy and an offline client.
The user attempts a manual backup for an offline client. The backup fails with a status code 1000 (Client is offline).
The user can either wait until the client is brought online
again or bring the client online manually. Use either the
NetBackup web UI or the bpclient command to do so
before resubmitting the manual job.
Caution: If the primary server is offline, hot catalog backups cannot run.
use the same name, backups fail. In some environments, careful configuration may
be required to ensure that the client and the primary server use the same name for
the storage server. Such environments include those that use VLAN tagging and
those that use multi-homed hosts.
NetBackup does not support the following for client-side deduplication:
■ Multiple copies per each job configured in a NetBackup backup policy. For the
jobs that specify multiple copies, the backup images are sent to the storage
server and may be deduplicated there.
■ NDMP hosts. The backup jobs fail if you try to use client-side deduplication for
NDMP hosts.
Option Description
Always use the media server (the Always deduplicates the data on the media server. The default.
default) Jobs fail if one of the following is true:
Prefer to use client-side deduplication Deduplicates the data on the client and then sends it directly to the storage
server.
Always use client-side deduplication Always deduplicates the backup data on the client and then sends it directly
to the storage server.
You can override the Prefer to use client-side deduplication or Always use
client-side deduplication host property in the backup policies.
More information about client deduplication is available in the NetBackup
Deduplication Guide.
The properties in the Connect options tab describe how a NetBackup server
connects to NetBackup clients. The tab appears on the Client attributes page.
The Connect options tab contains the following options.
Property Description
BPCD connect back Specifies how daemons are to connect back to the NetBackup Client daemon
(BPCD) and contains the following options:
Ports Specifies the method that the selected clients should use to connect to the server
and contains the following options:
Property Description
Add Adds a NetBackup client to the list, if you want to change the default settings for Windows
open file backups.
Enable Windows open Specifies that Windows open file backup is used for the selected clients.
file backup for the
This option functions independently from the Perform Snapshot backups policy option
selected client
that is available when the Snapshot Client is licensed.
If a client is included in a policy that has the Perform Snapshot backups policy option
disabled and you do not want snapshots, the Enable Windows open file backups for this
client property must be disabled as well for the client. If both options are not disabled, a
snapshot is created, though that may not be the intention of the administrator.
Snapshot Provider Selects the snapshot provider for the selected clients:
Property Description
Snapshot usage
Note: The Individual drive snapshot property and the Global drive snapshot property
only apply to the non-multistreamed backups that use Windows open file backup. All
multistreamed backup jobs share the same volumes snapshots for the volumes in the
multistreamed policy. The volume snapshots are taken in a global fashion.
Property Description
Snapshot error control Determines the action to take if there is a snapshot error:
Note: Volume snapshots typically become invalid during the course of a backup because
insufficient cache storage was allocated for the volume snapshot. Reconfigure the cache
storage configuration of the Windows open file backup snapshot provider to a configuration
that best suits your client’s installation.
Property Description
Locked file action Determines what happens when NetBackup tries to back up a file with mandatory
file locking enabled in its file mode.
Select one of the following options:
■ Wait
By default, NetBackup waits for files to become unlocked. If the wait exceeds
the Client read timeout host property that is configured on the primary
server, the backup fails with a status 41.
See “Timeouts properties” on page 206.
■ Skip
NetBackup skips the files that currently have mandatory locking set by another
process. A message is logged if it was necessary to skip a file.
File compression memory Specifies the amount of memory available on the client when files are
compressed during backup. If you select compression, the client software uses
this value to determine how much space to request for the compression tables.
The more memory that is available to compress code, the greater the
compression and the greater the percentage of computer resources that are
used. If other processes also need memory, use a maximum value of half the
actual physical memory on a computer to avoid excessive swapping.
Reset file access time to the value Specifies that the access time (atime) for a file displays the backup time. By
before backup default, NetBackup preserves the access time by resetting it to the value it had
before the backup.
Note: This setting affects the software and the administration scripts that
examine a file’s access time.
Keep status of user-directed Specifies the number of days to keep progress reports before the reports are
backups, archives, and restores deleted. The default is 3 days. The minimum is 0. The maximum is 9,999 days.
Logs for user-directed operations are stored on the client system in the following
directory:
install_path\NetBackup\logs\user_ops\loginID\logs
Managing host properties 112
Client settings properties for UNIX clients
Property Description
Use VxFS File Change Log (FCL) Determines if NetBackup uses the File Change Log on VxFS clients.
for incremental backups
The default is off.
See “VxFS file change log (FCL) for incremental backups property” on page 112.
Default cache device path for This setting identifies a raw partition available to the copy-on-write process. This
snapshots raw partition is used when either nbu_snap or VxFS_Snapshot are selected
as the snapshot method. The partition must exist on all the clients that are
included in the policy.
Add Adds the file endings to the list of file endings that you do not want to compress.
Click Add, then type the file extension. Click Add to add the ending to the list.
Do not compress files ending with Specifies a list of file extensions. During a backup, NetBackup does not compress
these file extensions files with these extensions because the file may already be in a compressed
format.
Do not use wildcards to specify these extensions. For example, .A1 is allowed,
but not .A* or .A[1-9]
Files that are already compressed become slightly larger if compressed again.
If compressed files with a unique file extension already exist on a UNIX client,
exclude it from compression by adding it to this list.
NetBackup can use the FCL to determine which files to select for incremental
backups, which can potentially save unnecessary file system processing time. The
FCL information that is stored on each client includes the backup type, the FCL
offset, and the timestamp for each backup.
The advantages of this property depend largely on the number of file system changes
relative to the file system size. The performance affect of incremental backups
ranges from many times faster or slower, depending on file system size and use
patterns.
For example, enable this property for a client on a very large file system that
experiences relatively few changes. The incremental backups for the client may
complete sooner since the policy needs to read only the FCL to determine what
needs to be backed up on the client.
If a file experiences many changes or multiple changes to many files, the time
saving benefit may not be as great.
The following items must be in place for the Use VxFS File Change Log (FCL) for
incremental backups property to work:
■ Enable the Use VxFS File Change Log (FCL) for incremental backups
property for every client that wants NetBackup to take advantage of the FCL.
■ Enable the FCL on the VxFS client.
See the Veritas File System Administrator’s Guide for information about how to
enable the FCL on the VxFS client.
■ Enable the Use VxFS File Change Log (FCL) for incremental backups
property on the client(s) in time for the first full backup. Subsequent incremental
backups need this full backup to stay synchronized.
■ Specify the VxFS mount point in the policy backup selections list in one of the
following ways:
■ Specify ALL_LOCAL_DRIVES.
■ Specifying the actual VxFS mount point.
■ Specifying a directory at a higher level than the VxFS mount point, provided
that Cross mount points is enabled.
If the policy has Collect true image restore information or Collect true image
restore information with move detection enabled, it ignores the Use VxFS File
Change Log (FCL) for incremental backups property on the client.
The following table describes the additional options that are available on the VxFS
file change log feature.
Managing host properties 114
Client settings properties for Windows clients
Option Description
Activity Monitor messages Displays any messages that note when the file change log
is used during a backup as follows:
Keeping the data files The data files must be in sync with the FCL for this property
synchronized with the FCL to work. To keep the data files synchronized with the FCL,
do not turn the FCL on the VxFS client off and on.
Note: If NetBackup encounters any errors as it processes
the FCL, it switches to the normal files system scan. If this
switch occurs, it appears in the Activity Monitor.
Property Description
General level Enables logs for bpinetd, bpbkar, tar, and nbwin. The higher the level, the
more information is written. The default is Minimum logging.
Managing host properties 115
Client settings properties for Windows clients
Property Description
Wait time before clearing archive Specifies how long the client waits before the archive bits for a differential
bit incremental backup are cleared. The minimum allowable value is 300 (default).
The client waits for acknowledgment from the server that the backup was
successful. If the server does not reply within this time period, the archive bits are
not cleared.
This option works together with the Use Accelerator policy attribute and the
Accelerator forced rescan schedule attribute.
Time overlap Specifies the number of minutes to add to the date range for incremental backups
when you use date-based backups. This value compensates for differences in
the speed of the clock between the NetBackup client and server. The default is
60 minutes.
This value is used during incremental backups when you use the archive bit and
when you examine the create time on folders. This comparison is done for archive
bit-based backups as well as date-based backups.
Communications buffer size Specifies the size (in kilobytes) of the TCP and the IP buffers that NetBackup
uses to transfer data between the NetBackup server and client. For example,
specify 10 for a buffer size of 10 kilobytes. The minimum allowable value is 2,
with no maximum allowable value. The default is 128 kilobytes.
User-directed timeouts Specifies the seconds that are allowed between when a user requests a backup
or restore and when the operation begins. The operation fails if it does not begin
within this time period.
This property has no minimum value or maximum value. The default is 60 seconds.
Perform default search for Instructs NetBackup to search the default range of backup images automatically.
restore The backed up folders and files within the range appear whenever a restore
window is opened.
Clear the Perform default search for restore check box to disable the initial
search. With the property disabled, the NetBackup Restore window does not
display any files or folders upon opening. The default is that the option is enabled.
Managing host properties 116
Client settings properties for Windows clients
Property Description
Note: Setting the TCP level to 2 or 3 can cause the status reports to be very
large. It can also slow a backup or restore operation.
Maximum error messages for Defines how many times a NetBackup client can send the same error message
single issue to a NetBackup server. For example, if the archive bits cannot be reset on a file,
this property limits how many times the message appears in the server logs. The
default is 10.
Keep status of user-directed Specifies how many days the system keeps progress reports before NetBackup
backups, archives and restores automatically deletes them. The default is 3 days.
Managing host properties 117
Client settings properties for Windows clients
For more information, see the NetBackup Bare Metal Restore Administrator’s
Guide.
The NetBackup Cloud Storage properties apply to the currently selected primary
server.
The hosts that appear in this Cloud Storage list are available to select when you
configure a storage server. The Service provider type of your cloud vendor
determines whether a service host is available or required.
NetBackup includes service hosts for some cloud storage providers. You can add
a new host to the Cloud Storage list if the Service provider type allows it. If you
add a host, you also can change its properties or delete it from the Cloud Storage
list. (You cannot change or delete the information that is included with NetBackup.)
If you do not add a service host to this Cloud Storage list, you can add one when
you configure the storage server. The Service provider type of your cloud vendor
determines whether a Service host name is available or required.
Cloud Storage host properties contain the following properties:
Property Description
Cloud Storage The cloud storage that corresponds to the various cloud service
providers that NetBackup supports are listed here.
Associated cloud The cloud storage servers that correspond to the selected cloud
storage servers for storage are displayed.
<host>
For more information about NetBackup cloud storage, see the NetBackup Cloud
Administrator's Guide.
Managing host properties 119
Credential access properties
Certain NetBackup hosts that are not named as clients in a policy must be enabled
to access NDMP or disk array credentials. Use the Credential access properties
to enter the names of those NetBackup hosts.
The Credential access host properties contain the following settings.
Property Description
NDMP Clients list To add an NDMP client to the NDMP clients list, click Add. Enter the names of the
NDMP hosts that are not named as clients in a policy.
Disk clients list To add a disk client to the Disk clients list, click Add. Enter the names of the NetBackup
hosts that meet all of the following criteria:
■ The host must be designated in a policy as the Off-host backup host in an alternate
client backup.
■ The host that is designated as the off-host backup computer must not be named
as a client on the Clients tab in any NetBackup policy.
■ The policy for the off-host backup must be configured to use one of the disk array
snapshot methods for the EMC CLARiiON, HP EVA, or IBM disk arrays.
Note: The credentials for the disk array or NDMP host are specified in the
NetBackup web UI. Click Credential management and then click on the Client
credentials tab.
Note: Data classifications cannot be deleted. However, the name, description, and
the rank can be changed. The classification ID remains the same.
Property Description
Rank column The Rank column displays the rank of the data classifications. The order of the data
classifications determines the rank of the classification in relationship to the others in
the list. The lowest numbered rank has the highest priority.
Use the Up and Down buttons to move the classification up or down in the list.
To create a new data classification, click Add. New data classifications are added to
bottom of the list.
Name column The Name column displays the data classification name. While data classifications
cannot be deleted, the data classification names can be modified.
NetBackup provides the following data classifications by default:
Description column In the Description, enter a meaningful description for the data classification.
Descriptions can be modified.
Data Classification ID The Data classification ID is the GUID value that identifies the data classification and
is generated when a new data classification is added and the host property is saved.
.
A data classification ID becomes associated with a backup image by setting the Data
classification attribute in the policy. The ID is written into the image header. The storage
lifecycle policies use the ID to identify the images that are associated with classification.
Property Description
Property Description
Job priority The priority that a job has as it competes with other jobs for backup resources. The
value can range from 0 to 99999. The higher the number, the greater the priority of the
job.
A new priority setting affects all the policies that are created after the host property has
been changed.
A higher priority does not guarantee that a job receives resources before a job with a
lower priority. NetBackup evaluates jobs with a higher priority before those with a lower
priority.
However, the following factors can cause a job with a lower priority to run before a job
with a higher priority:
■ To maximize drive use, a low priority job may run first if it can use a drive that is
currently loaded. A job with a higher priority that requires that the drive be unloaded
would wait.
■ If a low priority job can join a multiplexed group, it may run first. The job with a
higher priority may wait if it is not able to join the multiplexed group.
■ If the NetBackup Resource Broker (nbrb) receives a job request during an
evaluation cycle, it does not consider the job until the next cycle, regardless of the
job priority.
■ A higher priority job needs to unload the media in a drive because the retention
level (or the media pool) of the loaded media is not what the job requires. A
lower priority job can use the media that is already loaded in the drive. To
maximize drive utilization, the Resource Broker gives the loaded media and
drive pair to the job with the lower priority.
■ A higher priority job is not eligible to join an existing multiplexing group but a
lower priority job is eligible to join the multiplexing group. To continue spinning
the drive at the maximum rate, the lower priority job joins the multiplexing group
and runs.
■ The Resource Broker receives resource requests for jobs and places the requests
in a queue before it processes them. New resource requests are sorted and
evaluated every 5 minutes. Some external events (a new resource request or
a resource release, for example) can also start an evaluation. If the Resource
Broker receives a request of any priority while it processes requests in an
evaluation cycle, the request is not evaluated until the next evaluation cycle
starts.
App1 SQLDB1
App2 SQLDB1
FE1 SQLDB1
Managing host properties 124
Encryption properties
Property Description
Add This option adds a component host that is authorized to run restores on a SharePoint,
Exchange, or SQL Server application host.
For SharePoint, NetBackup catalogs backup images under the front-end server name.
To allow NetBackup to restore SQL Server back-end databases to the correct hosts
in a farm, provide a list of the SharePoint hosts.
For Exchange, any operations that use Granular Recovery Technology (GRT) require
that you provide a list of the Exchange virtual and the physical host names. You must
also include the off-host client and the granular proxy host.
For SQL Server, this configuration is required for restores of a SQL Server cluster or
a SQL Server availability group (AG).
Note: For VMware backups and restores that protect SharePoint, Exchange, or SQL
Server, you only need to add the hosts that browse for backups or perform restores.
You must also configure a mapping if you use a Primary VM Identifier other than the
VM hostname. See the administrator's guide for the database agent for more details.
Note: Use either the client's short name or its fully qualified domain name (FQDN).
You do not need to provide both names in the list.
Actions > Edit Edits the application host or component host of the currently selected mapping.
Encryption properties
To access these settings, in the web UI click Hosts > Host properties. Select the
client. If necessary, click Connect, then click Edit client. Click Encryption.
The Encryption properties control encryption on the currently selected client.
More information is available in the NetBackup Security and Encryption Guide.
The Encryption permissions property indicates the encryption setting on the
selected NetBackup client as determined by the primary server.
Managing host properties 125
Encryption properties
Property Description
Not allowed Specifies that the client does not permit encrypted backups.
If the server requests an encrypted backup, the backup job
ends due to error.
Property Description
Use standard Pertains to the 128-bit and the 256-bit options of NetBackup Encryption.
encryption
Client cipher The following cipher types are available: AES-256-CFB and AES-128-CFB.
More information about the ciphers file is available in the NetBackup Security and Encryption
Guide.
Note: If you recover a Windows computer that has BitLocker encryption enabled,
you must re-enable BitLocker encryption following the restore.
Off-host backup is not supported with volumes that run Windows BitLocker Drive
Encryption.
Property Description
User name Specify the user ID for the account that is used to log on to Enterprise Vault
(DOMAIN\user name).
Note: In 10.0 and later, credentials are stored in the Credential Management
System (CMS).
Consistency check before Select what kind of consistency checks to perform on the SQL Server databases
backup before NetBackup begins a backup operation.
Continue with backup if Continues the backup job even if the consistency check fails.
consistency check fails
It may be preferable for the job to continue, even if the consistency check fails.
For example, a backup of the database in its current state may be better than no
backup at all. Or, it may be preferable for the backup of a large database to
continue if it encounters only a small problem.
Option Description
Add Adds the source and the destination hosts within the Enterprise Vault configuration.
You must provide the name of the Source host and the name of the Destination host.
Actions > Edit Changes the source host and the destination host.
Exchange properties
To access this setting, in the web UI select Hosts > Host properties. Select the
Windows client. If necessary click Connect, then click Edit client. Click Windows
client > Exchange.
The Exchange properties apply to the currently selected Windows client . For
clustered or replicated environments, configure the same settings for all nodes. If
you change the attributes for the virtual server name, only the DAG host server is
updated.
For complete information on these options, see the NetBackup for Exchange Server
Administrator's Guide.
The Exchange host properties contain the following settings.
Property Description
You can specify a different Windows system to act as a proxy for the source client
when you duplicate or browse a backup (with bplist) that uses GRT. Use a
proxy if you do not want to affect the source client or if it is not available.
Perform consistency check Disable this option if you do not want to perform a consistency check during a
before backup with Microsoft DAG backup. If you select Continue with backup if consistency check fails,
Volume Shadow Copy Service NetBackup continues to perform the backup even if the consistency check fails.
(VSS)
Managing host properties 129
Exchange properties
Property Description
Provide the credentials for the account for NetBackup Exchange operations. This
account must have the necessary permissions to perform Exchange restores.
The permissions that are required depend on the Exchange version that you have.
The account also needs the right to “Replace a process level token.”
■ If you specify the minimal NetBackup account for the Exchange credentials in
the client host properties, NetBackup can back up only active copies of the
Managing host properties 130
Exclude list properties
Property Description
Exclude list Displays the excluded files and directories and the policies and schedules that they
apply to.
Use case-sensitive exclude Indicates that the files and directories to exclude are case-sensitive.
list
Managing host properties 131
Exclude list properties
Property Description
Exceptions to the exclude Displays any exceptions to the exclude list and the policies and schedules that they
list apply to. When the policies in this list run, the files and directories in the Exceptions
to the exclude list are backed up. Adding an exception can be useful to exclude all
files in a directory except one file.
For example, if the file list of items to back up contains /foo, and the exclude list
contains /foo/bar, adding /fum to the exceptions list does not back up the /fum
directory. However, adding fum to the exceptions list backs up any occurrences of fum
(file or directory) that occur within /foo/bar.
■ End a file path with \ to exclude only directories with that path name (for example,
C:\users\test\). If the pattern does not end in \ (for example, C:\users\test),
NetBackup excludes both files and directories with that path name.
■ To exclude all files with a given name, regardless of their directory path, enter
the name. For example:
test
rather than
C:\test
This example is equivalent to prefixing the file pattern with
\
\*\
\*\*\
\*\*\*\
and so on.
The following syntax rules apply only to UNIX clients:
■ Do not use patterns with links in the names. For example, assume /home is a
link to /usr/home and /home/doc is in the exclude list. The file is still backed
up in this case because the actual directory path, /usr/home/doc, does not
match the exclude list entry, /home/doc.
■ Blank lines or lines which begin with a pound sign (#) are ignored.
C:\users\doe\abc\
C:\users\*\test
C:\*\temp
core
Given the exclude list example, the following files, and directories are excluded
from automatic backups:
■ The file or directory named C:\users\doe\john.
■ The directory C:\users\doe\abc\ (because the exclude entry ends with \).
■ All files or directories named test that are two levels beneath users on drive
C.
Managing host properties 134
Exclude list properties
■ All files or directories named temp that are two levels beneath the root directory
on drive C.
■ All files or directories named core at any level and on any drive.
Given the exclude list example, the following files and directories are excluded from
automatic backups:
■ The file or directory named /home/doe/john.
■ The directory /home/doe/abc (because the exclude entry ends with /).
■ All files or directories named test that are two levels beneath home.
■ All files or directories named temp that are two levels beneath the root directory.
■ All files or directories named core at any level.
Note: Exclude and include lists do not apply to user backups and archives.
To illustrate the use of an include list, we use the example from the previous
discussion. The exclude list in that example causes NetBackup to omit all files or
directories named test from all directories beneath /home/*/test.
In this case, add a file named /home/jdoe/test back into the backup by creating
an include_list file on the client. Add the following to the include_list file:
To create an include list for a specific policy or policy and schedule combination,
use a .policyname or .policyname.schedulename suffix. The following are two
examples of include list names for a policy that is named wkstations that contains
a schedule that is named fulls.
/usr/openv/netbackup/include_list.workstations
/usr/openv/netbackup/include_list.workstations.fulls
The first file affects all scheduled backups in the policy that is named wkstations.
The second file affects backups only when the schedule is named fulls.
For a given backup, NetBackup uses only one include list: the list with the most
specific name. Given the following two files:
include_list.workstations
include_list.workstations.fulls
Because the include list specifies full paths and the exclude list excludes everything,
NetBackup replaces the backup selection list with the client’s include list.
Primary server Global Fibre transport properties that apply to all SAN clients.
Client The Fibre transport properties apply to the SAN client that you select.
The default values for clients are the global property settings of the
primary server. Client properties override the global Fibre transport
properties.
The Fibre transport properties contain the following settings. All properties are not
available for all hosts. In this table, FT device is an HBA port on a Fibre Transport
media server. The port carries the backup and restore traffic. A media server may
have more than one FT device.
Managing host properties 137
Fibre transport properties
Property Description
Maximum concurrent FT This property appears only when you select an FT media server .
connections
This property specifies the number of FT connections to allow to the selected
media server or media servers. A connection is equivalent to a job.
If no value is set, NetBackup uses the following defaults:
NetBackup supports 644 buffers per media server for Fibre Transport. To
determine the number of buffers that each connection uses, divide 644 by the
value you enter. More buffers per connection equal better performance for each
connection.
Use defaults from the primary This property appears only when you select a client .
server configuration
This property specifies that the client follow the properties as they are configured
on the primary server.
Preferred The Preferred property specifies to use an FT device if one is available within
the configured wait period in minutes. If an FT device is not available after the
wait period elapses, NetBackup uses a LAN connection for the operation.
If you select this option, also specify the wait period for backups and for restores.
For the global property that is specified on the primary server, the default is
Preferred.
Managing host properties 138
Fibre transport properties
Property Description
Always The Always property specifies that NetBackup should always use an FT device
for backups and restores of SAN clients. NetBackup waits until an FT device is
available before it begins the operation.
However, an FT device must be online and up. If not, NetBackup uses the LAN.
An FT device may be unavailable because none are active, none have been
configured, or the SAN Client license expired.
Fail The Fail property specifies that NetBackup should fail the job if an FT device is
not online and up. If the FT devices are online but busy, NetBackup waits until a
device is available and assigns the next job to the device. An FT device may be
unavailable because none are active, none have been configured, or the SAN
Client license expired.
Never The Never property specifies that NetBackup should never use an FT pipe for
backups and restores of SAN clients. NetBackup uses a LAN connection for the
backups and restores.
If you specify Never for the primary server, Fibre Transport is disabled in the
NetBackup environment. If you select Never, you can configure FT usage on a
per-client basis.
If you specify Never for a media server, Fibre Transport is disabled for the media
server.
If you specify Never for a SAN client, Fibre Transport is disabled for the client.
NetBackup provides one finer level of granularity for Fibre transport. SAN client
usage preferences override the FT properties that you configure through Host
properties.
/usr/openv/netbackup/db/config/NUMBER_DATA_BUFFERS_FT
Table 7-28 shows the values that NetBackup supports for the
NUMBER_DATA_BUFFERS_FT file. NetBackup supports 644 buffers per media server
for Fibre transport.
16 40 40
12 53 53
10 64 64
If you want, you then can limit the number of connections for a media server with
the Maximum concurrent FT connections setting in the Fibre transport host
properties.
Firewall properties
To access this setting, in the web UI select Hosts > Host properties. Select the
primary server or media server. If necessary click Connect, then click Edit primary
server or Edit media server. Click Firewall.
The Firewall properties determine how the selected primary servers and media
servers connect to the legacy services that run on that NetBackup host.
Servers are added to the Hosts list of the Firewall properties. To configure port
usage for clients, see the Client attributes properties.
See “Client attributes properties” on page 101.
The Firewall host properties contain the following settings.
Managing host properties 140
Firewall properties
Property Description
Default connect options By default, the Default connect options include firewall-friendly connect options
including the fewest possible ports to open.
The default options can be set differently for an individual server or client with the
settings in Attributes for selected hosts.
To change the default connect options for the selected server or client, click Edit.
Hosts You can configure different default connect options for the hosts that are displayed in
this list.
Attributes for selected This section displays the connect options for the selected server. To change the
hosts connection options for a server, first select the host name in the Hosts list.
BPCD connect back This property specifies how daemons are to connect back to the NetBackup Client
daemon (BPCD) as follows:
Property Description
Ports Select whether a reserved or non-reserved port number should be used to connect to
the host name:
To configure port usage for clients, see the Client attributes properties.
Property Description
Delay on multiplexed restores This property specifies how long the server waits for additional restore requests
of multiplexed images on the same tape. All of the restore requests that are
received within the delay period are included in the same restore operation (one
pass of the tape).
Check the capacity of disk This property applies to the disk storage units of 6.0 media servers only.
storage units every Subsequent releases use internal methods to monitor disk space more frequently.
Managing host properties 142
General server properties
Property Description
Must use local drive This property appears for primary servers only, but applies to all media servers
as well. This property does not apply to NDMP drives.
If a client is also a media server or a primary server and Must use local drive is
selected, a local drive is used to back up the client. If all drives are down, another
can be used.
This property increases performance because backups are done locally rather
than sent across the network. For example, in a SAN environment a storage unit
can be created for each SAN media server. Then, the media server clients may
be mixed with other clients in a policy that uses ANY AVAILABLE storage unit.
When a backup starts for a client that is a SAN media server, the backups go to
the SAN connected drives on that server.
Use direct access recovery for By default, NetBackup for NDMP is configured to use Direct Access Recovery
NDMP restores (DAR) during NDMP restores. DAR can reduce the time it takes to restore files
by allowing the NDMP host to position the tape to the exact location of the
requested file(s). Only the data that is needed for those files is read.
Clear this check box to disable DAR on all NDMP restores. Without DAR,
NetBackup reads the entire backup image, even if only a single restore file is
needed.
Enable message-level cataloging This option performs message-level cataloging when you duplicate Exchange
when duplicating Exchange images backup images that use Granular Recovery Technology (GRT) from disk to tape.
that use Granular Recovery To perform duplication more quickly, you can disable this option. However, then
Technology users are not able to browse for individual items on the image that was duplicated
to tape.
Property Description
Media host override list Specific servers can be specified in this list as servers to perform restores,
regardless of where the files were backed up. (Both servers must be in the same
primary and media server cluster.) For example, if files were backed up on media
server A, a restore request can be forced to use media server B.
The following items describe situations in which the capability to specify servers
is useful:
■ Two (or more) servers share a robot and each have connected drives. A restore
is requested while one of the servers is either temporarily unavailable or is
busy doing backups.
■ A media server was removed from the NetBackup configuration, and is no
longer available.
To change an entry in the list, select a host name, then click Actions > Edit.
Configure the following options:
■ Add the original backup media server and the restore server to the Media
host override list.
3 Stop and restart the NetBackup Request Daemon (bprd) on the primary server.
This process applies to all storage units on the original backup server. Restores
for any storage unit on the Original backup server go to the server that is
listed as the Restore server.
To revert to the original configuration for future restores, delete the line from
the Media host override list.
Property Description
Job retry delay This property specifies how often NetBackup retries a job. The default is 10 minutes.
The maximum is 60 minutes; the minimum is 1 minute.
Managing host properties 145
Global attributes properties
Property Description
Maximum jobs per second This property specifies the throttle on the maximum number of backup jobs that are
allowed to go from the Queued to Active state per second. By default, the value of this
property is 0, which means no throttling occurs.
After the maximum number of jobs is reached in one second, subsequent jobs will
remain in the Queued state. In the next second, jobs are released in a first-in-first-out
order from the Queued state until the maximum jobs value is reached again or until all
throttled jobs or new jobs have been made active.
This property can be used to smooth out the resource utilization curve. It is particularly
useful when backup windows open and a large number of jobs are scheduled to start
within a short time period.
https://www.veritas.com/support/en_US/article.100047119
Maximum jobs per client This property specifies the maximum number of backup and archive jobs that NetBackup
clients can perform concurrently. The default is one job.
NetBackup can process concurrent backup jobs from different policies on the same
client only in the following situations:
Policy update interval This property specifies how long NetBackup waits to process a policy after a policy is
changed. The interval allows the NetBackup administrator time to make multiple changes
to the policy. The default is 10 minutes. The maximum is 1440 minutes; the minimum
is 1 minute.
Compress catalog interval This property specifies how long NetBackup waits after a backup before it compresses
the image catalog file.
Managing host properties 146
Global attributes properties
Property Description
Schedule backup attempts NetBackup considers the failure history of a policy to determine whether or not to run
a scheduled backup job. The Schedule backup attempts property sets the timeframe
for NetBackup to examine.
This property determines the following characteristics for each policy:
Note: This attribute does not apply to user backups and archives.
Maximum vault jobs This property specifies the maximum number of vault jobs that are allowed to be active
on the primary server. The greater the maximum number of vault jobs, the more system
resources are used.
If the active vault jobs limit is reached, subsequent vault jobs are queued and their
status is shown as Queued in the Activity monitor.
If a duplication job or eject job waits, its status is shown as Active in the Activity monitor.
Administrator email This property specifies the addresses where NetBackup sends notifications of scheduled
address property backups or administrator-directed manual backups.
To send the information to more than one administrator, separate multiple email
addresses by using a comma, as follows:
[email protected],[email protected]
See “Send notifications to the backup administrator about failed backups” on page 69.
Managing host properties 147
Global attributes properties
Constraint Description
Number of storage devices NetBackup can perform concurrent backups to separate storage units or to drives
within a storage unit. For example, a single Media Manager storage unit supports as
many concurrent backups as it has drives. A disk storage unit is a directory on disk,
so the maximum number of jobs depends on system capabilities.
Server and client speed Too many concurrent backups on an individual client interfere with the performance
of the client. The best setting depends on the hardware, operating system, and
applications that are running.
The Maximum jobs per client property applies to all clients in all policies.
To accommodate weaker clients (ones that can handle only a small number of jobs
concurrently), consider using one of the following approaches:
■ Set the Maximum data streams property for those weaker clients appropriately.
(Open the host properties for the primary server. Then click Client attributes >
General tab.)
See “General tab of the Client attributes properties” on page 103.
■ Use the Limit jobs per policy policy setting in a client-specific policy. (A
client-specific policy is one in which all clients share this characteristic).
Network loading The available bandwidth of the network affects how many backups can occur
concurrently. The load might be too much for a single Ethernet. For loading problems,
consider backups over multiple networks or compression.
A special case exists to back up a client that is also a server. Network loading is not a
factor because the network is not used. Client and server loading, however, is still a
factor.
Note: Catalog backups can run concurrently with other backups. To do so, set the
Maximum jobs per client value to greater than two for the primary server. The
higher setting ensures that the catalog backup can proceed while the regular backup
activity occurs.
Logging properties
To access the Logging properties, in the web UI select Hosts > Host properties.
If necessary click Connect, then click Edit primary server, Edit media server, or
Edit client. Click Logging.
The logging settings determine the behavior for NetBackup logging on the primary
server, media server, and the clients:
■ Overall logging level or global logging level for all NetBackup processes.
■ Overrides for the specific processes that use legacy logging.
■ Logging levels for the services that use unified logging.
■ Logging for critical processes.
■ On clients, the logging level for database applications.
■ Log retention settings for NetBackup and for NetBackup Vault (if it is installed).
All NetBackup processes use either unified logging or legacy logging. You can set
a global or a unique logging level for certain processes and services. Retention
levels limit the size of the log files or (for the primary server) the number of days
the logs are kept. If you use NetBackup Vault, you can select separate logging
retention settings for that option.
For complete details on logging, see the NetBackup Logging Reference Guide.
Managing host properties 149
Logging properties
Property Description
Global logging level This setting establishes a global logging level for all processes that are set to Same
as global.
The Global logging level affects the legacy and unified logging level of all NetBackup
processes on the server or client. This setting does not affect the following logging
processes:
■ PBX logging
See the NetBackup Troubleshooting Guide for more information on how to access
the PBX logs.
■ Media and device management logging (vmd, ltid, avrd, robotic daemons, media
manager commands)
Process-specific overrides These settings let you override the logging level for the specific processes that use
legacy logging.
Debug logging levels for These settings let you manage the logging level for the specific services that use unified
NetBackup services logging.
Logging for critical The option lets you enable logging for the critical processes:
processes
■ Primary server processes: bprd and bpdbm.
■ Media server processes: bpbrm, bptm, and bpdm.
■ Client process: bpfis
Retention period Specifies the length of time NetBackup keeps information from the error catalog, job
catalog, and debug logs. Note that NetBackup derives its reports from the error catalog.
The logs can consume a large amount of disk space, so do not keep the logs any
longer than necessary. The default is 28 days.
Property Description
Maximum log size Specifies the size of the NetBackup logs that you want to retain. When the NetBackup
log size grows to this value, the older logs are deleted.
Vault logs retention period If NetBackup Vault is installed, select the number of days to keep the Vault session
directories, or select Forever.
Logging levels
You can choose to apply the same logging level for all NetBackup processes. Or,
you can select logging levels for specific processes or services.
Same as global The process uses the same logging level as the Global logging level.
Minimum logging (default) A small amount of information is logged for the process.
Use this setting unless advised otherwise by Veritas Technical Support. Other settings
can cause the logs to accumulate large amounts of information.
Levels 1 through 4 Progressively more information is logged at each level for the process.
Database logging level The logging level for database agent logs. X
For details on which logs to create and refer
to, see the guide for the specific agent.
Service Description
Policy execution manager The Policy execution manager (NBPEM) creates policy and client tasks and
determines when jobs are due to run. If a policy is modified or if an image expires,
NBPEM is notified and the appropriate policy and client tasks are updated.
Job manager The Job Manager (NBJM) accepts the jobs that the Policy Execution Manager
submits and acquires the necessary resources.
Resource broker The Resource Broker (NBRB) makes the allocations for storage units, tape drives,
client reservations.
Managing host properties 152
Lotus Notes properties
processname_VERBOSE = 0
processname_VERBOSE = -2
Maximum number of The maximum number of logs that can be prefetched in a single restore job during recovery.
logs to restore Specify a value greater than 1.
A value less than or equal to 1, does not gather transaction logs during recovery. One
transaction log extent per job is restored to the Domino server’s log directory.
Transaction log A path where NetBackup can temporarily store the prefetched transaction logs during recovery.
cache path If you do not specify a path, during recovery NetBackup restores the logs to the Domino
server's transaction log directory.
Note the following:
■ If the specified path does not exist then it is created during restore.
■ The user must have write permission for the folder.
■ Transaction logs are restored to the original location, the Domino transaction log directory,
if a path is not specified.
■ If the value of Maximum number of logs to restore is less than or equal to 1 then this
path is ignored. The logs are not prefetched; one transaction log per job is restored to the
Domino Server’s log directory.
■ If there is not sufficient space to restore the specified number of logs, NetBackup tries to
restore only the number of logs that can be accommodated.
INI path The notes.ini file that is associated with the Domino partitioned servers used to back up
and restore the Notes database. This setting does not apply to non-partitioned servers.
■ On Windows:
If the notes.ini file is not located in the default directory, indicate its location.
■ On UNIX:
If the notes.ini is not located in the directory that is specified in the Path, indicate its
location here.
Include the directory and the notes.ini file name.
Path The path where the Notes program files reside on the client. NetBackup must know where
these files are to perform backup and restore operations.
■ On Windows:
The path for program directory (where nserver.exe resides).
■ On UNIX:
A path that includes the Domino data directory, the Notes program directory, and the
Notes resource directory.
Managing host properties 154
Media properties
Media properties
To access this setting, in the web UI select Hosts > Host properties. Select the
server. If necessary, click Connect. Then click Edit primary server or Edit media
server. Click Media.
The Media host properties contain the following settings.
Property Description
Allow media overwrite This property overrides the NetBackup overwrite protection for specific media types.
property Normally, NetBackup does not overwrite certain media types. To disable overwrite
protection, place a check in the check box of one or more of the listed media formats.
For example, place a check in the CPIO check box to permit NetBackup to overwrite
the cpio format.
By default, NetBackup does not overwrite any of the formats on removable media, and
logs an error if an overwrite attempt occurs. This format recognition requires that the
first variable length block on a media be less than or equal to 32 kilobytes.
The following media formats on removable media can be selected to be overwritten:
See “Results when media overwrites are not permitted” on page 157.
Managing host properties 155
Media properties
Property Description
Enable SCSI reserve This property allows exclusive access protection for tape drives. With access protection,
other host bus adaptors cannot issue commands to control the drives during the
reservation.
The protection setting configures access protection for all tape drives from the media
server on which the option is configured. You can override the media server setting
for any drive path from that media server.
See “Recommended use for Enable SCSI reserve property” on page 158.
The following are the protection options:
■ The SCSI persistent reserve option provides SCSI persistent reserve protection
for SCSI devices. The devices must conform to the SCSI Primary Commands - 3
(SPC-3) standard.
■ The SPC-2 SCSI reserve option (default) provides SPC-2 SCSI reserve protection
for SCSI devices. The devices must conform to the reserve and release management
method in the SCSI Primary Commands - 2 standard.
■ To operate NetBackup without tape drive access protection, clear the Enable SCSI
reserve property. If unchecked, other HBAs can send the commands that may
cause a loss of data to tape drives.
Note: Ensure that all of your hardware processes SCSI persistent reserve commands
correctly. All of your hardware includes Fibre Channel bridges. If the hardware does
not process SCSI persistent reserve commands correctly and NetBackup is configured
to use SCSI persistent reserve, no protection may exist.
Allow multiple retentions This property lets NetBackup mix retention levels on tape volumes. It applies to media
per media in both robotic drives and nonrobotic drives. The default is that the check box is clear
and each volume can contain backups of only a single retention level.
Allow backups to span tape This property, when checked, lets backups span to multiple tape media. This property
media lets NetBackup select another volume to begin the next fragment. The resulting backup
has data fragments on more than one volume. The default is that Allow backups to
span tape media is checked and backups are allowed to span media.
If the end of media is encountered and this property is not selected, the media is set
to FULL and the operation terminates abnormally. This action applies to both robotic
drives and nonrobotic drives.
Managing host properties 156
Media properties
Property Description
Allow backups to span disk This property lets backups span disk volumes when one disk volume becomes full.
volumes The default is that this property is enabled.
The Allow backups to span disk volumes property does not apply to AdvancedDisk
or OpenStorage storage units. Backups span disk volumes within disk pools
automatically.
The following destinations support disk spanning:
■ A BasicDisk storage unit spanning to a BasicDisk storage unit. The units must be
within a storage unit group.
■ An OpenStorage or AdvancedDisk volume spanning to another volume in the disk
pool.
For disk spanning to occur, the following conditions must be met:
Enable standalone drive This property lets NetBackup use whatever labeled or unlabeled media is found in a
extension nonrobotic drive. The default is that the Enable standalone drive extension property
is enabled.
Enable job logging This property allows the logging of the job information. This logging is the same
information that the NetBackup Activity monitor uses. The default is that job logging
occurs.
The default is that media sharing is disabled. (The property is cleared and no server
groups are configured.)
Property Description
Media ID prefix This property specifies the media ID prefix to use in media IDs when the unlabeled
(non-robotic) media is in nonrobotic drives. The prefix must be one to three alpha-numeric characters.
NetBackup appends numeric characters. By default, NetBackup uses A and assigns
media IDs such as A00000, A00001, and so on.
For example, if FEB is specified, NetBackup appends the remaining numeric characters.
The assigned media IDs become FEB000, FEB001, and so on.
Media unmount delay To specify a Media unmount delay property indicates that the unloading of media is
delayed after the requested operation is complete. Media unmount delay applies only
to user operations, to include backups and restores of database agent clients, such
as those running NetBackup for Oracle. The delay reduces unnecessary media
unmounts and the positioning of media in cases where the media is requested again
a short time later.
The delay can range from 0 seconds to 1800 seconds. The default is 180 seconds. If
you specify 0, the media unmount occurs immediately upon completion of the requested
operation. Values greater than 1800 are set to 1800.
Media request delay This property specifies how long NetBackup waits for media in nonrobotic drives.
(non-robotic)
During the delay period, NetBackup checks every 60 seconds to see if the drive is
ready. If the drive is ready, NetBackup uses it. Otherwise, NetBackup waits another
60 seconds and checks again. If the total delay is not a multiple of 60, the last wait is
the remainder. If the delay is less than 60 seconds, NetBackup checks after the end
of the delay.
For example, set the delay to 150 seconds. NetBackup waits 60 seconds, checks for
ready, waits 60 seconds, checks for ready, waits 30 seconds, and checks for ready
the last time. If the delay was 50 seconds (a short delay is not recommended),
NetBackup checks after 50 seconds.
If the volume has not been previously ■ Sets the volume’s state to FROZEN
assigned for a backup ■ Selects a different volume
■ Logs an error
If the volume is in the NetBackup media ■ Sets the volume’s state to SUSPENDED
catalog and was previously selected for ■ Aborts the requested backup
backups ■ Logs an error
Managing host properties 158
Media properties
If the volume is mounted for a backup of the The backup is aborted and an error is logged.
NetBackup catalog The error indicates the volume cannot be
overwritten.
If the volume is mounted to restore files or list NetBackup aborts the request and logs an
the media contents error. The error indicates that the volume
does not have a NetBackup format.
■ The operating system tape drivers may require extensive configuration to use
SCSI persistent reserve. For example, if the tape drives do not support SPC-3
Compatible Reservation Handling (CRH), ensure that the operating system does
not issue SPC-2 reserve and release commands.
If any of the hardware does not support SCSI persistent reserve, it is not
recommended that SCSI persistent reserve is used.
Network properties
To access this setting, in the web UI select Hosts > Host properties. Select the
client. If necessary click Connect, then click Edit client. Click Windows client >
Network.
Use the Network properties to configure the communications requirements between
clients and the primary server. These properties apply to the currently selected
Windows client .
The Network host properties contain the following settings.
Property Description
NetBackup client service This property specifies the port that the NetBackup client uses to communicate with
port (BPCD) the NetBackup server. The default is 13782.
Note: If you change this port number, remember that it must be the same for all
NetBackup servers and clients that communicate with one another.
NetBackup request service This property specifies the port for the client to use when it sends requests to the
port (BPRD) NetBackup request service (bprd process) on the NetBackup server. The default is
13720.
Note: If you change this port number, remember that it must be the same for all
NetBackup servers and clients that communicate with one another.
Announce DHCP interval This property specifies how many minutes the client waits before it announces that a
different IP address is to be used. The announcement occurs only if the specified time
period has elapsed and the address has changed since the last time the client
announced it.
The Network settings host properties apply to primary servers, media servers,
and clients.
The Network settings page contains properties for Reverse host name lookup
and Use the IP address family.
See “Reverse host name lookup property” on page 160.
See “Use the IP address family property” on page 161.
Property Description
Allowed The Allowed property indicates that the host requires reverse host name lookup to
work to determine that the connection comes from a recognizable server.
By default, the host resolves the IP address of the connecting server to a host name
by performing a reverse lookup.
If the conversion of the IP address to host name fails, the connection fails.
Otherwise, it compares the host name to the list of known server host names. If the
comparison fails, the host rejects the server and the connection fails.
Restricted The Restricted property indicates that the NetBackup host first attempts to perform
reverse host name lookup. If the NetBackup host successfully resolves the IP address
of the connecting server to a host name (reverse lookup is successful), it compares
the host name to the list of known server host names.
If the resolution of the IP address to a host name fails (reverse lookup fails), based on
the Restricted setting, the host converts the host names of the known server list to IP
addresses (using a forward lookup). The host compares the IP address of the connecting
server to the list of known server IP addresses.
If the comparison fails, the host rejects the connection from server and the connection
fails.
Managing host properties 161
Nutanix AHV access hosts
Property Description
Prohibited The Prohibited property indicates that the NetBackup host does not try reverse host
name lookup at all. The host resolves the host names of the known server list to IP
addresses using forward lookups.
The NetBackup host then compares the IP address of the connecting server to the list
of known server IP addresses.
If the comparison fails, the NetBackup host rejects the connection from the server and
the connection fails.
Property Description
Use random port Specifies how the selected computer chooses a port when it communicates with
assignments NetBackup on other computers. Enable this property to let NetBackup randomly select
ports from those that are free in the allowed range. For example, if the range is from
1023 through 5000, it chooses randomly from the numbers in this range.
If this property is not enabled, NetBackup chooses numbers sequentially, not randomly.
NetBackup starts with the highest number that is available in the allowed range. For
example, if the range is from 1023 through 5000, NetBackup chooses 5000. If 5000 is
in use, port 4999 is chosen.
Client port window Select Use OS selected non-reserved port to let the operating system determine
which non-reserved port to use.
Or, select the range of non-reserved ports on the selected computer. NetBackup can
use any available port within this range as the source port when communicating with
NetBackup on another computer.
Server port window This property specifies the range of non-reserved ports on which NetBackup processes
on this computer accept connections from NetBackup when the connection is not to a
well known port. This property primarily applies to bpcd call-back when vnetd is
disabled in the connect options and the local host name is configured for non-reserved
ports.
This property also applies in the situation where a third-party protocol is used, such as
NDMP. It specifies the range of non-reserved ports on which this server accepts
NetBackup connections from other computers. The default range is 1024 through 5000.
Instead of indicating a range of ports, you can enable Use OS selected non-reserved
port to let the operating system determine which non-reserved port to use.
Property Description
Server reserved port This entry specifies the range of local reserved ports on which this computer accepts
window connections from NetBackup when the connection is not to a well known port. This
property primarily applies to bpcd call-back when vnetd is disabled in the connect
options for a local host name.
Instead of indicating a range of ports, you can enable Use OS selected non-reserved
port to let the operating system determine which non-reserved port to use.
Registered ports
These ports are registered with the Internet Assigned Numbers Authority (IANA)
and are permanently assigned to specific NetBackup services. For example, the
port for the NetBackup client daemon (bpcd) is 13782.
The following system configuration file can be used to override the default port
numbers for each service:
On Windows: %systemroot%\system32\drivers\etc\services
On UNIX: /etc/services
Note: It is not recommended to change the port numbers that are associated with
PBX (1556 and 1557).
Dynamically-allocated ports
These ports are assigned as needed, from configurable ranges in the Port ranges
host properties for NetBackup servers and clients.
In addition to the range of numbers, you can specify whether NetBackup selects a
port number at random or starts at the top of the range and uses the first one
available.
Note: The Preferred network setting in NetBackup does not apply to the Granular
Recovery Technology (GRT) and VMware Instant Recovery features. Network
settings that are configured in the operating system are used for these features
during communication.
Preferred network entries are not needed if NetBackup is configured using host
names with IP addresses to which the operating system resolves and then routes
correctly.
When external constraints prevent the environment from being corrected, Preferred
network entries may be useful as follows:
■ Can be used to prevent NetBackup from connecting to specific destination
addresses.
■ Can be used to cause NetBackup to connect only to specific destination
addresses.
■ Can be used to request a subset of local interfaces for source binding when
making outbound connections.
Caution: When used for source binding, the operating system may not honor the
source binding list provided by NetBackup. If the operating system implements the
weak host model, asymmetrical network routing may result. If asymmetrical routing
occurs, the remote host may reject the inbound connection if it implements the
strong host model. Similarly, stateful network devices may also drop asymmetrical
connections. To ensure the use of specific outbound interfaces for specific remote
hosts or networks, make sure that the OS name resolution and routing configurations
are correct; create static host routes if needed. Ensure that all network drivers
properly implement the IP and TCP networking protocols.
The local Preferred network entries do not affect the forwarding profile that the
local host returns to a remote host during initial CORBA connection setup; it contains
all the local plumbed interfaces. However, the End Point Selection algorithm within
the remote process uses its local Preferred network entries to evaluate the profile
when it selects the destination for the subsequent CORBA connection.
With respect to source binding, the Preferred network properties offer more
flexibility than the Use specified network interface property in the Universal
settings properties. The Use specified network interface property can be used
to specify only a single interface for NetBackup to use for outbound calls. The
Managing host properties 165
Preferred network properties
Preferred network properties were introduced so that administrators can give more
elaborate and constrictive instructions that apply to multiple individual networks, or
a range of networks. For example, an administrator can configure a host to use any
network except one. If both properties are specified, Use specified network
interface overrides Preferred network.
Note: Do not inadvertently configure hosts so that they cannot communicate with
any other host. Use the bptestnetconn utility to determine whether the hosts can
communicate as you intend.
See “bptestnetconn utility to display Preferred network information” on page 174.
The Preferred network host properties contain a list of networks and the directive
that has been configured for each.
Property Description
List of network The list of preferred networks contains the following information:
specifications for
■ The Target column lists the networks (or host names or IP addresses) that have been
NetBackup
given specific directives. If a network is not specifically listed as a target, or if a range
communications
of addresses does not include the target, NetBackup considers the target to be available
for selection.
Note that if the same network considerations apply for all of the hosts, the list of directives
can be identical across all hosts in the NetBackup environment. If a directive contains
an address that does not apply to a particular host, that host ignores it. For example,
an IPv4-only host ignores IPv6 directives, and IPv6-only hosts ignore IPv4 directives.
This action lets the administrator use the same Preferred network configurations for
all the hosts in the NetBackup environment.
■ The Specified as column indicates the directive for the network: Match, Prohibited,
or Only.
■ The Source column lists source binding information to use to filter addresses. The
Source property is an optional configuration property.
Ordering arrows Select a network in the list, then click the up or down arrow to change the order of the
network in the list. The order can affect which network NetBackup selects.
See “Order of directive processing in the Preferred network properties” on page 173.
Add Click Add to add a network to the Preferred network properties. Then configure the
directive for the network.
Actions > Edit Locate a network in the list, then click Actions > Edit to change the Preferred network
properties.
Managing host properties 166
Preferred network properties
Property Description
Actions > Delete Locate a network in the list, then click Actions > Delete to remove the network from the
list of preferred networks.
Property Description
Note: Do not use the following malformed entries as wildcards: 0/32, 0/64, or 0/128. The left
side of the slash must be a legitimate IP address. However, 0/0 may be used, as listed.
Property Description
Prohibited Use the Prohibited directive to exclude or prevent the specified network, address, or host name
from being used.
The Target is applied to both the source and the destination addresses. If a Source is specified
and the Prohibited is indicated, it is ignored but the target is still prohibited.
If the matched address is a destination address, evaluation stops. If this was the only potential
destination, the connection is not attempted. If there are additional potential destinations, they
are evaluated starting over with the first entry.
If the matched address is a source address, it is removed from the source binding list.
Caution: On some platforms, prohibiting a local interface may cause unexpected results when
connecting to remote hosts. Prohibiting a local interface does not affect connections that are
internal to the host.
Source Use this property with the Match or the Only directives to identify the local host name, IP
addresses, or networks that may be used for source binding.
If this host has an IP address that matches Source, that IP address will be used as the source
when connecting to the destination. If the Source is not valid for this host, it is ignored.
This topic uses the example of two multihomed servers (Server_A and Server_B)
as shown in Figure 7-1. Server A is considering which addresses it can use to
access Server_B, given the Preferred network directives configured on Server_A.
When Preferred network directives are used to place restrictions on targets, they
are added from the perspective of the server making the connection. The directives
on Server_A affect its preferences as to which Server_B addresses it can use.
Server_A
Directives on Server_A indicate
what interfaces it can use to
access Server_B
Production interface
Backup interface
2001:db8:0:11d::1efc 10.81.73.147
2001:db8:0:1f0::1efc
Figure 7-2 shows a table for Server_B. Server_B has multiple network interfaces,
some of which have multiple IP addresses. In the table, yes indicates that NetBackup
can use the network-IP combination as a source. In this example, no directives
have been created for the host. Since no networks are listed in the Preferred
network properties, any network-IP combinations can be used for communication.
Note: The following topic shows the bptestnetconn output for this example
configuration:
See “bptestnetconn utility to display Preferred network information” on page 174.
Managing host properties 169
Preferred network properties
IP addresses
IPv4 IPv6
2001:0db8:0:1f0::1efc --- Yes
Network interfaces
Figure 7-3 shows a table for the same host (Server_B). Now, the Preferred network
properties are configured so that all IPv4 addresses are excluded from selection
consideration by NetBackup. All NetBackup traffic is to use only IPv6 addresses.
IP addresses
IPv4 IPv6
2001:0db8:0:1f0::1efc --- Yes
Network interfaces
10.80.73.147 No ---
10.96.73.253 No ---
■ See “Configuration that limits the addresses, but allows any interfaces”
on page 178.
Note: The default configuration is for NetBackup to use only IPv4 addresses.
If you have not previously changed the Network settings > Use the IP address
family option to Both IPv4 and IPv6 or IPv6 only, creating a directive that prohibits
all IPv4 addresses renders the server mute.
See “Use the IP address family property” on page 161.
See “Network settings properties” on page 159.
Figure 7-5 uses the Match directive with a wildcard to indicate to NetBackup to
prefer IPv6 addresses. In this case, NetBackup tries to use an IPv6 address, but
may consider IPv4 addresses if necessary.
Figure 7-6 shows another configuration that allows NetBackup to choose from
multiple IPv6 networks.
Given the multihomed example configuration, the directive indicates the following:
■ Four IPv6 networks, from fec0:0:0:fe04 through fec0:0:0:fe07, are described
as targets.
■ For all addresses in these networks, a source binding address that is derived
from the IP addresses of host name host_fred is used.
See “How NetBackup uses the directives to determine which network to use”
on page 167.
Managing host properties 172
Preferred network properties
Figure 7-8 uses the Match directive with a wildcard to indicate to NetBackup to
prefer IPv4 addresses. In this case, NetBackup tries to use an IPv4 address, but
may consider IPv6 addresses if necessary.
If multiple directives have the same length subnet, NetBackup looks at the order in
which the directives are listed.
Use the up or down arrows to the right of the list to change the order of the directives.
NetBackup processes each resolved destination address and each prospective
source address relative to the directives. Directives that contain addresses that do
not apply to either host are ignored.
Host for which lookup List of networks available to Any source is available to
is performed Server_B use for a connection
This directive provides NetBackup with the information to filter the addresses and
choose to communicate with only those that match the :11c, :11d, :11e, and :11f
networks. The addresses that do not match the Only directive are prohibited, as
shown in the bptestnetconn output.
Figure 7-10 shows the bptestnetconn output for Server_B, given this directive.
Figure 7-13 Only network selection with the same source binding address
A host with the Only directive configured considers only those target addresses in
the 192.168.100.0 subnet. Additionally, source binding to the local interface must
be done on the 192.168.100.0 subnet.
Managing host properties 178
Properties setting in host properties
■ Clients that back up their own data (deduplication clients and SAN clients)
■ Granular Recovery Technology (GRT) for Exchange Server or SharePoint Server
■ NetBackup nbfsd process.
NetBackup protects connections only after they are established. If NetBackup cannot
create a connection because of network problems, there is nothing to protect.
Resilient connections apply between clients and NetBackup media servers, which
includes primary servers when they function as media servers. Resilient connections
do not apply to primary servers or media servers if they function as clients and back
up data to a media server.
Resilient connections can apply to all of the clients or to a subset of clients.
Note: If a client is in a subdomain that is different from the server subdomain, add
the fully qualified domain name of the server to the client’s hosts file. For example,
india.veritas.org is a different subdomain than china.veritas.org.
When a backup or restore job for a client starts, NetBackup searches the Resilient
network list from top to bottom looking for the client. If NetBackup finds the client,
NetBackup updates the resilient network setting of the client and the media server
that runs the job. NetBackup then uses a resilient connection.
Property Description
FQDN or IP address The full qualified domain name or IP address of the host. The
address can also be a range of IP addresses so you can
configure more than one client at once. You can mix IPv4
addresses and ranges with IPv6 addresses and subnets.
Use the arrow buttons on the right side of the pane to move
up or move down an item in the list of resilient networks.
Note: The order is significant for the items in the list of resilient networks. If a client
is in the list more than once, the first match determines its resilient connection
status. For example, suppose you add a client and specify the client IP address
and specify On for Resiliency. Suppose also that you add a range of IP addresses
as Off, and the client IP address is within that range. If the client IP address appears
before the address range, the client connection is resilient. Conversely, if the IP
range appears first, the client connection is not resilient.
Other NetBackup properties control the order in which NetBackup uses network
addresses.
The NetBackup resilient connections use the SOCKS protocol version 5.
Resilient connection traffic is not encrypted. It is recommended that you encrypt
your backups. For deduplication backups, use the deduplication-based encryption.
For other backups, use policy-based encryption.
Resilient connections apply to backup connections. Therefore, no additional network
ports or firewall ports must be opened.
Note: If multiple backup streams run concurrently, the Remote Network Transport
Service writes a large amount of information to the log files. In such a scenario, it
is recommended that you set the logging level for the Remote Network Transport
Service to 2 or less. Instructions to configure unified logs are in a different guide.
Note: If the primary server is also either the media server or the client, and it
fails, the job is not resilient.
■ If the client fails for any reason, the resilient job feature is not supported.
■ If the primary server is upgraded while a backup is active, the backup is not
resilient.
■ The media server must be at NetBackup version 10.1.1 or later.
■ Multistreamed backup jobs are not supported.
■ Fiber Transport Media Server (FTMS) environments are not supported.
■ More sockets are open on media servers and clients. Three open sockets are
required rather than one for a non-resilient connection. The increased number
of open sockets may cause issues on busy media servers.
■ More processes run on media servers and clients. Usually, only one more
process per host runs even if multiple connections exist.
■ The processing that is required to maintain a resilient connection may reduce
performance slightly.
4 Click Save.
The settings are propagated to the affected hosts through normal NetBackup
inter-host communication, which can take up to 15 minutes.
6 If you want to begin a backup immediately, restart the NetBackup services on
the primary server.
Note: The Resource limit properties apply only to policies that use automatic
selection of virtual machines (the policy's Query Builder). If you select virtual
machines manually, the Resource limit properties have no effect.
See the respective guide for the workload or agent for details on the available
resource limit properties.
Managing host properties 185
Restore failover properties
Table 7-47
Property Description
Media server Displays the NetBackup media servers that have failover protection for
restores.
Failover restore Displays the servers that provide the failover protection. NetBackup
servers searches from top to bottom in the column until it finds another server
that can perform the restore.
A NetBackup media server can appear only once in the Media server column but
can be a failover server for multiple other media servers. The protected server and
the failover server must both be in the same primary and media server cluster.
The following situations describe examples of when to use the restore failover
capability:
■ Two or more media servers share a robot and each has connected drives. When
a restore is requested, one of the servers is temporarily inaccessible.
■ Two or more media servers have standalone drives of the same type. When a
restore is requested, one of the servers is temporarily inaccessible.
In these instances, inaccessible means that the connection between bprd on the
primary server and bptm on the media server (through bpcd) fails.
Possible reasons for the failure are as follows:
■ The media server is down.
■ The media server is up but bpcd does not respond. (For example, if the
connection is refused or access is denied.)
Managing host properties 186
Retention periods properties
■ The media server is up and bpcd is running, but bptm has problems. (For
example, bptm cannot find the required tape.)
is redefined, some backups that share the same volume may have different retention
periods.
For example, if the retention level 3 is changed from one month to 6 months,
NetBackup stores future level 3 backups on the same volumes. That is, the backups
are placed on the volumes with the level 3 backups that have a retention period of
one month.
No problem exists if the new and the old retention periods are of similar values.
However, before a major change is made to a retention period, suspend the volumes
that were previously used for that retention level.
Note: If a backup or a duplicate job is configured with a retention level greater than
25 and a policy has a storage unit that is managed by a pre-NetBackup 8.0 media
server, the backup jobs that are associated with the policy fail with the following
error message:
Retention level <number> is not valid.
As a workaround, you can either upgrade the media server to NetBackup 8.0 or
later or set the retention level between 0 and 25 in the policy. Note that the retention
period for level 25 is always set to expire immediately and this value cannot be
changed.
Note: For a manual import, if a primary or a media server that runs an earlier version
than NetBackup 8.0 imports a backup image that was created on a NetBackup 8.0
primary server and configured with a retention level greater than 24, the import job
resets the retention level to 9 (infinite). As a workaround, you can import such
backup images from a primary or a media server that runs NetBackup 8.0 or later.
Property Description
Value
Units
Specifies the units of time for the retention period. The list includes hours as the smallest
unit of granularity and the special units, Infinite, and Expires immediately.
Managing host properties 188
Retention periods properties
Property Description
Retention period A list of the current definitions for the possible levels of retention. By default, levels 9
through 100 (except level 25) are set to infinite. Retention level 9 cannot be changed
and the retention period is always set to infinite. Retention level 25 also cannot be
changed and the retention period is always set to expire immediately.
See “Retention Periods with end dates beyond 2038, excluding Infinity” on page 189.
With the default, there is no difference between a retention level of 12 and a retention
level of 20, for example.
If the retention period is changed for a level, it affects all schedules that use that level.
The Changes pending column uses an asterisk (*) to indicate that the period has been
changed and not applied. NetBackup does not change the actual configuration until
the administrator accepts or applies the changes.
Schedule count Lists the number of schedules that use the currently selected retention level.
Changes pending This column displays an asterisk (*) to indicate that the period has been changed and
not applied. NetBackup does not change the actual configuration until the administrator
accepts or applies the changes.
Schedules using this Displays a list of the current policy names and schedule names that use the retention
retention level level.
Impact report Displays a summary of how changes affect existing schedules. The list displays all
schedules in which the retention period is shorter than the frequency period.
January 19, 2038 is automatically set to expire on January 19, 2038. The images
with such expiration times will expire in January 19, 2038 regardless of what the
original intent of the retention levels was.
This issue does not apply to retention levels for which the retention period is set to
Infinity. NetBackup never expires media with a retention set to Infinity unless
instructed to do so by the NetBackup administrator.
Starting with NetBackup version 9.0, retention periods that extend beyond the year
2038 are supported. This retention period support is applicable not only to images
but tape media as well.
Some backup images that are created with earlier versions may have expiration
dates of January 19, 2038 after upgrade. You can correct the date issue with any
of the images during upgrade or the records with end dates of January 19, 2038.
To correct the retention periods of infinity during upgrade, refer to the following
article:
https://www.veritas.com/content/support/en_US/article.100048600
To correct the records with end dates of January 19, 2038, refer to the following
article:
https://www.veritas.com/content/support/en_US/article.100048744
Property Description
Key Management Server If you configured a key management service (KMS) server, the name of the primary
(KMS) name server that sends the request to the KMS server is displayed here.
Metering interval Determines how often NetBackup gathers connection information for reporting purposes.
The value is set in seconds. The default setting is 300 seconds (5 minutes). If this value
is set to zero, metering is disabled.
Total available bandwidth Use this value to specify the speed of your connection to the cloud. The value is
specified in kilobytes per second. The default value is 102400 KB/sec.
Sampling interval The time, in seconds, between measurements of bandwidth usage. The larger this
value, the less often NetBackup checks to determine the bandwidth in use.
Advanced settings Expand Advanced settings to configure additional settings for throttling.
Maximum concurrent jobs The default maximum number of concurrent jobs that the media server can run for the
cloud storage server.
This value applies to the media server, not to the cloud storage server. If you have
more than one media server that can connect to the cloud storage server, each media
server can have a different value. Therefore, to determine the total number of
connections to the cloud storage server, add the values from each media server.
If you configure NetBackup to allow more jobs than the number of connections,
NetBackup fails any jobs that start after the number of maximum connections is reached.
Jobs include both backup and restore jobs.
You can configure job limits per backup policy and per storage unit.
Note: NetBackup must account for many factors when it starts jobs: the number of
concurrent jobs, the number of connections per media server, the number of media
servers, and the job load-balancing logic. Therefore, NetBackup may not fail jobs
exactly at the maximum number of connections. NetBackup may fail a job when the
connection number is slightly less than the maximum, exactly the maximum, or slightly
more than the maximum.
Property Description
Read bandwidth Use this field to specify the percentage of total bandwidth that read
operations can use. Specify a value between 0 and 100. If you
enter an incorrect value, an error is generated.
Property Description
Write bandwidth Use this field to specify the percentage of total bandwidth that write
operations can use. Specify a value between 0 and 100. If you
enter an incorrect value, an error is generated.
Work time Use this field to specify the time interval that is considered work
time for the cloud connection.
Indicate how much bandwidth the cloud connection can use in the
Allocated bandwidth field. This value determines how much of
the available bandwidth is used for cloud operations in this time
window. The value is expressed as a percentage or in kilobytes
per second.
Off time Use this field to specify the time interval that is considered off time
for the cloud connection.
Specify a start time and end time.
Indicate how much bandwidth the cloud connection can use in the
Allocated bandwidth field. This value determines how much of
the available bandwidth is used for cloud operations in this time
window. The value is expressed as a percentage or in kilobytes
per second.
Weekend Specify the start and stop time for the weekend.
Indicate how much bandwidth the cloud connection can use in the
Allocated bandwidth field. This value determines how much of
the available bandwidth is used for cloud operations in this time
window. The value is expressed as a percentage or in kilobytes
per second.
Read Bandwidth This field displays how much of the available bandwidth the cloud
(KB/s) storage server transmits to a NetBackup media server during each
restore job. The value is expressed in kilobytes per second.
Managing host properties 194
Servers properties
Property Description
Write Bandwidth This field displays how much of the available bandwidth the
(KB/s) NetBackup media server transmits to the cloud storage server
during backup jobs. The value is expressed in kilobytes per second.
Servers properties
To access this setting, in the NetBackup web UI select Hosts > Host properties.
Select the server or client. If necessary click Connect, then click Edit primary
server, Edit media server, or Edit client. Click Servers.
The Servers properties display the NetBackup server lists on the selected primary
server, media server, or client. The server lists display the NetBackup servers that
the host recognizes.
The Primary server field contains the name of the primary server for the selected
host. (The name of the selected host appears in the title bar.)
The Servers page contains the following settings.
Tab Description
Additional servers tab This tab lists the additional servers that can access the server that is specified as the
Primary server.
During installation, NetBackup sets the primary server to the name of the system where
the server software is installed. NetBackup uses the primary server value to validate
server access to the client. The primary server value is also used to determine which
server the client must connect to so that files can be listed and restored.
Note: For a Fibre Transport (FT) media server that has multiple network interfaces for
VLANs: Ensure that the FT server’s primary host name appears before any other interface
names for that FT media server host.
For more information, see the NetBackup SAN Client and Fibre Transport Guide.
Media servers tab This tab lists the hosts that are media servers only. Hosts that are listed as media servers
can back up and restore clients, but have limited administrative privileges.
If you add a media server to both the Media servers tab and the Additional servers
tab, this action may introduce unintended consequences. A computer that is defined as
both a primary server and a media server gives the administrator of the media server full
primary server privileges. You may inadvertently give the media server administrator
more privileges than intended.
Managing host properties 195
Servers properties
Tab Description
Trusted primary servers Use this tab to add the remote primary servers that you trust using NetBackup CA-signed
tab certificates or external CA-signed certificates and to view the primary servers that are
already trusted.
If your user account is configured for multifactor authentication on the target host, append
the one-time password to the password.
Note: If you add a media server, run nbemmcmd -addhost to add the media server
to the Enterprise Media Manager (EMM) in the NetBackup database of the primary
server.
Managing host properties 196
Servers properties
Targeted A.I.R. (Auto Image Auto Image Replication in which a primary server is in a
Replication) cluster requires inter-node authentication among the hosts
in that cluster. The NetBackup authentication certificates
provide the means to establish the proper trust relationships.
# bpnbaz -setupat
You will have to restart Netbackup services on this machine after
the command completes successfully.
Do you want to continue(y/n)y
Gathering configuration information.
Please be patient as we wait for 10 sec for the security services
to start their operation.
Generating identity for host 'bit1.remote.example.com'
Setting up security on target host: bit1.remote.example.com
nbatd is successfully configured on Netbackup Primary Server.
Operation completed successfully.
Changing the primary server that performs backups and restores for
a client
Use the Make primary option to change the primary server that performs backups
and restores for a client. This option does not change a host into a primary server.
Note: The client can also change their primary server in the Backup, Archive, and
Restore interface by selecting Actions > Specify NetBackup Machines and
Policy Type. In this dialog, select the primary server to use for backups and restores.
SharePoint properties
To access this setting, in the web UI select Hosts > Host properties. Select the
Windows client. If necessary click Connect, then click Edit client. Click SharePoint.
The SharePoint properties protect SharePoint Server installations and apply to the
currently selected Windows client.
For complete information on these options, see the NetBackup for Microsoft
SharePoint Server Administrator’s Guide.
The SharePoint host properties contain the following settings.
Property Description
Domain\Username Specifies the domain and the user name for the account you
want to use to log on to SharePoint (DOMAIN\user name).
Consistency check before Specifies the consistency checks to perform on the SQL
backup Server databases before NetBackup begins a backup
operation. These checks are performed for both
server-directed and user-directed backups.
Property Description
SharePoint granular restore For any VMware backups that protect Federated SharePoint
proxy host configurations, provide the name of the back-end SQL server.
This server acts as the granular restore proxy host for the
catalog hosts (front-end servers in the farm).
Option Description
Full check, excluding Select this option to exclude indexes from the consistency check. If indexes are not
indexes checked, the consistency check runs significantly faster but is not as thorough. Only
the data pages and clustered index pages for each user table are included in the
consistency check. The consistency of the non-clustered index pages is not checked.
Full check, including Include indexes in the consistency check. Any errors are logged.
indexes
Property Description
Minimum size per duplication job The smallest batch size that can run as a single duplication job. The job does
not run until enough images accumulate to reach this minimum batch size
or until the Force interval for small jobs time is reached. Minimum: 1
kilobyte; no maximum size. Default: 8 gigabytes.
Maximum size per duplication job The largest batch size that can run as a single duplication job. Minimum: 1
kilobyte; no maximum size. Default: 100 gigabytes.
Maximum size per A.I.R. replication The largest batch size that can run as a single job for Auto Image Replication.
job Minimum: 1 kilobyte; no maximum size. Default: 100 gigabytes.
Maximum images per snapshot The largest number of images in a single batch that can run as a single job.
replication job Default: 50 images, with no minimum number or maximum number.
Use this parameter with the Limit I/O streams disk pool option which limits
the number of jobs that can run concurrently to each volume in the disk pool.
Minimum images per A.I.R. Import job The fewest number of images in a single batch that can run as an Auto Image
Replication import job. The job does not run until either the minimum size is
reached or the Force interval for small jobs time is reached. Minimum: 1
image; no maximum number of images. Default: 1 image.
Maximum images per A.I.R. Import The largest number of images in a single batch that can run as an Auto
job Image Replication import job. Minimum: 1 job; no maximum number of
images. Default: 250 images.
Property Description
Force interval for small jobs The age that the oldest image in a batch must reach after which the batch
is submitted as a duplication job. This value prevents many small duplication
jobs from running at one time or running too frequently. It also prevents
NetBackup from waiting too long before it submits a small job. Default: 30
minutes, with no minimum number or maximum number.
Job submission interval Indicates the frequency of the job submission for all operations. No minimum
interval or maximum interval. Default: 5 minutes.
By default, all jobs are processed before more jobs are submitted. Increase
this interval to allow NetBackup to submit more jobs before all jobs are
processed. Set the interval when the list of available images is scanned for
those that can be batched together and jobs submitted. A shorter interval
allows for a better response to changing system workloads at the cost of
increased processing.
Image processing interval The number of minutes between image-processing sessions. Set the interval
when newly created images are recognized and set up for SLP processing.
Default: 5 minutes.
Cleanup interval The time between when a job finishes and before NetBackup removes the
job artifacts for the completed job. No minimum interval or maximum interval.
Default: 24 hours.
Extended image retry interval The amount of time to wait before an unsuccessful operation is added to the
first job that runs after the delay. (This behavior applies to all SLP jobs.) The
extra time gives the administrator additional time to solve a problem that
prevents job completion. No minimum interval or maximum interval. Default:
2 hours.
Property Description
Unused SLP definition version Concerns the deletion of SLP versions where a more recent version exists.
cleanup delay The setting controls how long a version must be inactive before NetBackup
deletes it. Default: 14 days.
Tape resource multiplier Limits the number of concurrently active duplication jobs that can access a
single tape media storage unit to xx times the number of available drives.
Allows tuning to avoid overloading the Resource Broker, yet makes sure that
the devices are not idle. No minimum multiplier or maximum multiplier.
Default: 2 (multiply access to the write drives by two).
Disk resource multiplier Limits the number of concurrently active duplication jobs that can access a
single disk storage unit to xx times the number of available drives. Allows
tuning to avoid overloading the Resource Broker, yet makes sure that the
devices are not idle. No minimum multiplier or maximum multiplier. Default:
2 (multiply access to the write drives by two).
Group images across SLPs If this parameter is set to Yes (default), multiple SLPs of the same priority
can be processed in the same job. If No, batching can occur only within a
single SLP.
Window close buffer time Sets the amount of time before a window closes when NetBackup does not
submit new jobs using that window. Minimum 2 minutes; maximum: 60
minutes. Default: 15 minutes.
Deferred duplication offset time For deferred operations, jobs are submitted x time before the source copy
is due to expire. Default: 4 hours.
Auto create A.I.R. Import SLP Used for Auto Image Replication, indicates whether an SLP (that contains
an Import operation) is created automatically in the target domain if no SLP
is configured there. Default: Yes, an SLP is created in the target domain.
Property Description
How long to retry failed A.I.R. import How long NetBackup retries an Import job before it stops and deletes the
jobs record. After the initial four attempts, the retries become less frequent.
Default: 0 (do not retry after the initial four attempts).
Pending A.I.R import threshold How long NetBackup waits before it generates a notification that an Auto
Image Replication copy is still in import pending state. After an Auto Image
Replication copy has been replicated, NetBackup puts the source copy into
import pending state. If the copy is in import pending state for the time period
that this threshold sets, NetBackup generates a notification. Notifications
are sent to the NetBackup error log and are visible in the Problems report.
Notifications may also be sent to an email address, if specified. Default: 24
hours
Email address to receive notifications The email address that receives pending A.I.R. import notifications. Default:
None.
The following abbreviations can be used where units of time are indicated:
Managing host properties 204
SLP settings properties
nbcl.conf file
Whenever a storage lifecycle policy parameter is changed from the default, the
change creates the nbcl.conf configuration file.
This file is found in the following locations. It is present only if the default of any
parameter has been changed.
■ On Windows:
install_path\NetBackup\var\global\nbcl.conf
■ On UNIX:
/usr/openv/var/global/nbcl.conf
Note: Restart nbstserv after making changes to the underlying storage for any
operation in an SLP.
One objective of the batching logic is to prevent media contention for tape operations,
including virtual tape libraries (VTL).
Batching logic applies to both disk and tape. (Though the method to prevent media
contention for disk is to use disk pools and then to limit I/O streams to disk pools.)
The batching logic requires that for each evaluation cycle, nbstserv consider all
completed source jobs when determining which duplication job to run next. By
default, nbstserv performs the evaluation once every 5 minutes.
nbstserv avoids overloading the Resource Broker (nbrb) queue with jobs. Too
many jobs in the queue make the role of the Resource Broker harder and slows
down system performance.
By default, nbstserv now creates groups based on the Group images across
SLPs parameter in the SLP Parameters host properties. By default, multiple storage
lifecycle policies with the same priority can be batched together.
Managing host properties 205
Throttle bandwidth properties
2 Enter the name of the network or host to which the throttle applies.
4 Click Add.
4 Click Save.
5 Click Save
Timeouts properties
To access this setting, in the web UI select Hosts > Host properties. Select the
server or client. If necessary click Connect, then click Edit primary server, Edit
media server, or Edit client. Click Timeouts.
The Timeouts properties apply to the selected primary server, media server, or
client.
Property Description
Client connect timeout This property applies to the currently selected server.
Specifies the number of seconds the server waits before it times out when it connects
to a client. The default is 300 seconds.
Managing host properties 207
Timeouts properties
Property Description
Backup start notify timeout This property applies to the currently selected server .
Specifies the number of seconds the server waits for the bpstart_notify script on
a client to complete. The default is 300 seconds.
Note: If using the bpstart_notify script: The Client read timeout
(CLIENT_READ_TIMEOUT option) must be equal to or greater than the Backup start
notify timeout (BPSTART_TIMEOUT option). If the Client read timeout is less than
the Backup start notify timeout, the job can time out while the bpstart_notify
script is running.
Media server connect This property applies to the currently selected server .
timeout
Specifies the number of seconds that the primary server waits before it times out when
it connects to a remote media server. The default is 30 seconds.
Client read timeout This property applies to the currently selected server or client.
Specifies the number of seconds that NetBackup waits for a response from a client
before the operation attempt fails. This timeout can apply to a NetBackup primary,
remote media server, or database-extension client (such as NetBackup for Oracle).
The default is 300 seconds.
If the server does not get a response from a client within the Client read timeout
period, the backup or the restore operation can fail.
See the section called “Recommendations for the Client read timeout” on page 208.
The sequence on a database-extension client is as follows:
Backup end notify timeout This property applies to the currently selected server.
Specifies the number of seconds that the server waits for the bpend_notify script
on a client to complete. The default is 300 seconds.
Note: If this timeout is changed, verify that Client read timeout is set to the same or
higher value.
Managing host properties 208
Timeouts properties
Property Description
Use OS dependent timeouts This property applies to the currently selected server or client.
Specifies that the client waits for the timeout period as determined by the operating
system when it lists files, as follows:
Specifies how long the client can wait for a response from the NetBackup primary
server while it lists files. If the limit is exceeded, the user receives a socket read failed
error. The timeout can be exceeded even while the server processes the request.
Note: If it exists, the value in a UNIX client’s $HOME/bp.conf file takes precedence
to the property here.
Media mount timeout This property applies to the currently selected primary server.
Specifies how long NetBackup waits for the requested media to be mounted, positioned,
and ready on backups, restores, and duplications.
Use this timeout to eliminate excessive waiting time during manual media mounts. (For
example, when robotic media is out of the robot or is off-site.)
Property Description
Specifies the number of attempts a client has to restore after a failure. (The default is
0; the client does not attempt to retry a restore. The client can try up to three times.)
Change Restore retries only if problems are encountered.
If a job fails after the maximum number of retries, the job goes into an incomplete state.
The job remains in the incomplete state as determined by the Move restore job from
incomplete state to done state property.
A checkpointed job is retried from the start of the last checkpointed file rather than at
the beginning of the job.
Property Description
Browse timeframe for This setting applies to the selected server and applies to all NetBackup clients.
restores
Specifies the timeframe that NetBackup uses to search for files to restore. By default,
NetBackup includes files from the time of the last-full backup through the latest backup
for the client.
■ Timeframe. Specifies how long ago NetBackup searches for files to restore. For
example, to limit the browse range to one week before the current date, select
Timeframe and specify 7.
■ Last full backup. Indicates whether NetBackup includes all backups since the last
successful full backup in its browse range. This option is enabled by default. If the
client belongs to more than one policy, then the browse starts with the earliest of
the set of last-full backups.
Use specified network This setting applies to the selected server or client.
interface
Specifies the network interface that NetBackup uses to connect to another NetBackup
client or server. A NetBackup client or server can have more than one network interface.
To force NetBackup connections to be made on a specific network interface, use this
entry to specify the network host name of that interface. By default, the operating
system determines the one to use.
Allow server file writes This setting applies to the selected server or client.
Specifies whether a NetBackup server can create or modify files on the NetBackup
client. For example, disable this property to prevent server-directed restores and remote
changes to the client properties.
After the Allow server file writes property is applied, it can be cleared only by modifying
the client configuration. The default is that server writes are allowed.
Property Description
Client administrator’s email Specifies the email address of the administrator on the client. This address is where
NetBackup sends backup status reports for the client. By default, no email is sent. To
enter multiple addresses or email aliases, separate entries with commas.
Property Description
Session idle timeout Logs out the user session if there is no activity for the specified period of time.
See “Configure when idle sessions should time out” on page 442.
Managing host properties 212
VMware access hosts properties
Property Description
Maximum concurrent Limits the number of sessions that a user can have open concurrently.
sessions
See “Configure the maximum of concurrent user sessions” on page 442.
User account lockout Lock out an account after the specified number of failed sign-in attempts.
Sign-in banner You can configure a sign-in banner that displays each time that any user signs in to
configuration the NetBackup web UI. A different banner can be configured for any primary server.
See “Display a banner to users when they sign in” on page 443.
Add Click Add and enter the fully qualified domain name of the backup host.
Remove Locate the backup host in the list and click Remove.
For more information, see the NetBackup for VMware Administrator’s Guide.
Managing host properties 213
Windows client properties
If a single UNIX or Linux system is running as both a client and a server, the bp.conf
file contains options for both the client and the server.
The bp.conf file observes the following syntax:
Managing host properties 214
About using commands to change the configuration options on UNIX or Linux clients and servers
$HOME/bp.conf
The options in personal bp.conf files apply only to user operations. During a user
operation, NetBackup checks the $HOME/bp.conf file before
/usr/openv/netbackup/bp.conf.
Root users do not have personal bp.conf files. NetBackup uses the
/usr/openv/netbackup/bp.conf file for root users.
Stop and restart all NetBackup daemons and utilities on the server after you make
a change to the bp.conf file on a Linux primary server. This action ensures that all
of the NetBackup processes use the new bp.conf values. This action is not required
for changes to bp.conf files on a client or to a $HOME/bp.conf file on the primary
server.
The SERVER option must be present in the /usr/openv/netbackup/bp.conf file on
all NetBackup UNIX or Linux clients and servers. During installation, NetBackup
sets the SERVER option to the name of the primary server where the software is
installed. It is the only required option in the bp.conf files. NetBackup uses internal
software defaults for all options in the bp.conf file, except SERVER.
The SERVER entries must be the same on all servers in a primary and a media server
cluster. It is recommended that all other entries also match on all servers. (The
CLIENT_NAME option is an exception.)
Chapter 8
Managing credentials for
workloads and systems
that NetBackup accesses
This chapter includes the following topics:
3 Click Next.
4 Select Callhome proxy.
5 Provide the credential details that are needed for authentication and click Next.
6 Add a role that you want to have access to the credential.
■ Click Add.
■ Select the role.
■ Select the credential permissions that you want the role to have.
3 Click Next.
4 Select External KMS.
Managing credentials for workloads and systems that NetBackup accesses 218
Adding credentials in NetBackup
7 Click Add.
3 Click Delete.
4 (Conditional) If the credential deleted was a proxy credential, you must remove
the CALLHOME_PROXY_NAME entity. From the primary server, use the following
command to remove the CALLHOME_PROXY_NAME entity.
echo CALLHOME_PROXY_NAME |bpsetconfig.exe
■ Configuration name
■ Description (for example: This configuration is used to access the external
CMS.)
■ External CMS provider
■ Host name
■ Port number: Default port number 443 would be considered (if not provided
by the user).
Note: While configuring the external CMS server for CyberArk server, user
can use the DNS hostname or IPV4 address. However it is recommended to
use the DNS hostname for connecting to the host. CyberArk configuration fails
if IPV6 address is used.
3 Click Next.
4 On the Associate credentials page, Select existing credential or Add a new
credential.
More information is available on how to add a new credential.
See “Add a credential for CyberArk” on page 222.
5 Click Next and follow the prompts to complete the wizard.
4 Click Next.
5 Select CyberArk as the category.
6 Provide the credential details for CyberArk server:
These details are used to authenticate the communication between the
NetBackup primary server and the external CMS server:
■ Certificate - Specify the certificate file contents.
Managing credentials for workloads and systems that NetBackup accesses 223
Add a configuration for an external CMS server
7 Click Next.
8 Add a role that you want to have access to the credential.
■ Click Add.
■ Select the role.
■ Select the credential permissions that you want the role to have.
By default, CRLs are downloaded from the CDP after every 24 hours and updated
in the CRL cache. To change the time interval, set the
ECA_CRL_REFRESH_HOURS configuration option to a different value. To manually
delete the CRL's from the CRL cache, run the nbcertcmd -cleanupCRLCache
command. The NetBackup CRL cache contains only the latest copy of a CRL for
each CA (including root and intermediate CAs). The bpclntcmd -crl_download
service updates the CRL cache during host communication in the following scenarios
irrespective of the time interval set for the ECA_CRL_REFRESH_HOURS options:
■ When CRLs in the CRL cache are expired.
■ If CRLs are available in the CRL source, but they are missing from the CRL
cache.
For details of ECA_CRL_REFRESH_HOURS, refer to
ECA_CRL_REFRESH_HOURS for NetBackup servers and clients section from
Veritas NetBackup™ Security and Encryption Guide.
■ Update host
■ Deployment policies
To delete packages
1 From Hosts > Deployment management, select the packages you want to
delete.
2 Select Delete.
Note: If you delete a parent package, all child packages that are associated with
that parent are removed.
If you delete a server package, the associated client package is also deleted. For
example, if you delete the Windows 8.3 server package, the Windows 8.3 client
package is also removed.
Update host
The Update host option lets you launch immediate jobs to update or upgrade your
NetBackup environment.
After you select Hosts > Host properties and make one or more valid selections,
the Update host option appears in the upper right. Certain restrictions apply to the
use of the Update host option:
■ All computers you select must be of the same type. Select either all client
computers or all media servers. If you select mixed computer types, the Update
host option disappears.
■ Primary servers are not supported. If you select a primary server, the Update
host option disappears.
■ The operating system and versions column must contain data for the Update
host option to appear. If these columns do not contain data, attempt to connect
to the host.
After you specify computers to update, select Update host to launch the update
process. You are prompted for the information shown:
■ Attributes
On this screen, specify: The package you want deployed, the operation type,
any limit on concurrent jobs, and how to handle Java and the JRE.
See “Attributes tab in Deployment management” on page 229.
■ Hosts
Displays the hosts you want to upgrade. From this screen, you can remove
hosts.
See “Hosts tab in Deployment management” on page 230.
■ Security options (if it appears)
Managing deployment 229
Deployment policies
Either accept the default (Use existing certificates when possible) or specify
the appropriate security information for your environment.
See “Security options tab in Deployment management” on page 232.
■ Review
Displays all the options you selected on previous screens.
Select Update to start the deployment job.
Deployment policies
Under Hosts > Deployment management, there is a Deployment policies tab.
Use this tab to add, edit, copy, deactivate, delete, and launch your policies.
To add a new policy
1 Go to Hosts > Deployment management > Deployment policies and select
Add.
2 Enter the required information for deployment policies.
See “Attributes tab in Deployment management” on page 229.
See “Hosts tab in Deployment management” on page 230.
See “Schedules tab in Deployment management” on page 231.
See “Security options tab in Deployment management” on page 232.
3 Select Save.
Similarly, to edit, copy, deactivate, or delete deployment policies, select the policy.
Then select the appropriate action from banner.
To manually initiate policies, select the desired policy and select Deploy now from
the menu.
Setting Description
Media server Specify the media server. This media server is used to connect and
transfer files to the NetBackup hosts that are included in the policy. The
media server must be version NetBackup 8.1.2 or later. Since the
repository resides on the primary server, the primary server is the default
value for the media server field.
Limit simultaneous Select the Limit simultaneous jobs option and specify a value for jobs
jobs to limit the total number of concurrent jobs that can run at one time.
The default value is 3. The minimum value is 1 and the maximum value
is 999.
If you want to set unlimited simultaneous upgrade jobs, you must specify
a value which is equivalent or higher than the count of the number of
hosts that are selected for upgrade.
For example, if you have selected 50 hosts, ensure that the Limit
simultaneous jobs value is set to 50 or more but lower than the
maximum value which is 999.
Java GUI and JRE Specify if you want the NetBackup Administration Console and the JRE
upgraded on the target systems. The three options include:
3 From the list of hosts, select the hosts that you want to add to the deployment
policy.
4 Select Add.
Setting Description
Setting Description
Operation Specify the type of operation that you want to associate with the
schedule.
Stage - Moves the update package to the client, but does not install
it. This operation also performs the precheck operation.
Start date Specify the date and time you want the policy to start in the text
field or with the date and the time spinner. You can also click the
calendar icon and specify a date and time in the resulting window.
You can select a schedule by clicking and dragging over the
three-month calendar that is provided at the bottom of the window.
End date Specify the date and time you want the policy to end as you
specified the start time.
Attribute Description
Use existing This option instructs NetBackup to use the existing NetBackup CA or
certificates when external CA certificates, if available. By default, the Use existing
possible certificates when possible option is selected.
Deselecting the Use existing certificates when possible option lets you
specify the location for external certificate authority information for both
UNIX and Linux computers and Windows computers.
Note: If you specify this option and certificates are not available, your
upgrade fails.
From Windows Specifies that the certificate from the Windows certificate store is used.
certificate store The certificate is searched using the following details that are provided
(Only for Windows) with the Certificate location: Store name, Issuer name, Subject name.
Certificate file Specifies the path to the external certificate of the host.
Trust store Specifies the path to the pem bundle of the Certificate Authorities.
location
Private key file Specifies the path to the private key for the external certificate of the
host.
Passphrase file Specifies the path to the text file where the passphrase for the external
certificate's private key is stored.
CRL check level Specifies the revocation check level for the external certificate. It also
lets you disable the revocation check for the external certificates. Based
on the check level, the status of the certificate is validated against the
Certificate Revocation List (CRL) during host communication. You can
choose to use the CRLs from the directory that is specified in the
NetBackup configuration file or the CRL Distribution Point (CDP).
From certificate Specifies a list of comma-separated clauses where each clause element
file path (for contains a query. The clause is of the form <Store name>\<Issuer
file-based Name>\<Subject Name>. $hostname is a keyword that is replaced
certificates) with the fully qualified domain name of the host. For certificate selection
from the Windows certificate store, NetBackup can pick a certificate
(Only for Windows)
from any of the Local Machine certificate stores on a Windows host.
Deployment policies use a simplified naming scheme for operating system and
hardware values. Use the values as shown for the bpplclients command:
debian x64
redhat x64
suse x64
redhat ppc64le
suse ppc64le
redhat zseries
suse zseries
aix rs6000
solaris sparc
solaris x64
Managing deployment 236
Deployment job status
windows x64
Security certificates are not deployed as part of the VxUpdate upgrade if the Security
level for certificate deployment is set to Very High. This setting is located in the
Global security settings.
See “Select a security level for NetBackup certificate deployment” on page 456.
If you cannot communicate with your clients after you use VxUpdate to upgrade
your clients, please ensure that the proper security certificates were issued during
upgrade. You may need to manually deploy the certificates. Refer to the following
article that is shown for additional details:
https://www.veritas.com/content/support/en_US/article.100039650
Section 4
Configuring storage
Note: If you use Key Management Service (KMS), it must be configured before
you can select the KMS option in the storage server setup. Refer to NetBackup
Security and Encryption Guide for more information.
To ensure that A.I.R. and other storage capabilities are displayed accurately for
the storage servers on the NetBackup web UI, upgrade the media server. You must
upgrade the media server that has NetBackup versions 8.2 or earlier. After you
upgrade the media server then use the command line to update the storage server.
Use the following command to update the storage server:
/usr/openv/netbackup/bin/admincmd/nbdevconfig -updatests
-storage_server <storage server name> -stype PureDisk
■ Create a Media Server Deduplication Pool (MSDP) storage server for image
sharing
Additional notes
Review the following additional information:
■ Currently, AWS S3 and Azure storage API types are supported.
For more information about the storage API types that NetBackup supports,
refer to the topic About the cloud storage vendors for NetBackup in the
NetBackup Cloud Administrator’s Guide.
■ When you enable Server-Side Encryption, you can configure AWS
Customer-Managed keys. These keys cannot be deleted once they are in use
by NetBackup. Each object is encrypted with the key during upload and deleting
the key from AWS causes NetBackup restore failures.
■ For more information on environments and deployment of Veritas Alta Recovery
Vault for NetBackup, refer to the following article:
https://www.veritas.com/docs/100051821
Before you enable the Veritas Alta Recovery Vault Azure and Azure Government
options, review the steps from the Configuring Veritas Alta Recovery Vault Azure
and Azure Government section in the NetBackup Deduplication Guide.
Veritas Alta Recovery Vault supports multiple options. For Veritas Alta Recovery
Vault Azure and Azure Government options in the web UI, you must contact
your Veritas NetBackup account manager for credentials or with any questions.
4 In the Volumes properties, from the Volume list select Add volume.
■ Provide a unique volume name that gives adequate description of the
volume.
■ For the Cloud storage provider, select Microsoft Azure, Amazon, or any
other cloud provider of S3 and Azure types. The click Select.
Note: For details of authentication types like AWS IAM Role Anywhere and
Azure Service Principal, see the NetBackup Deduplication Guide.
9 Click Next.
10 In Replication, click Next.
11 On the Details page, verify that all settings and information are correct. Click
Finish.
The disk pool creation and replication configuration continue in the background if
you close the window. If there is an issue with validating the credentials and
configuration of the replication, you can use the Change option to adjust any
settings.
In the Volumes step, you can now use Retrieve List (list buckets) or create a
bucket depending on what you want to accomplish.
Configuring disk storage 244
Integrating MSDP Cloud and CMS
nbcldutil changes
■ (10.3 and later) Use the parameter cmscredname instead of username. However,
username is still supported for older media servers.
nbdevconfig changes
■ You need to provide lsuCmsCredName in the configuration file for Veritas Alta
Recovery Vault Azure and Veritas Alta Recovery Vault Azure Gov.
■ Instead of using the storage account name for lsuCmsCredName, use the name
of the credentials that are created when you use Credential management.
■ The configuration file for nbdevconfig CLI now uses a new Key cmsCredName
instead of user lsuCloudUser and lsuCloudPassword. The file should look like
the following:
Note: For regular Azure and AWS from this 10.3 and newer: If you use the
createdv option to create a cloud bucket on the primary server or media server
or on an older media server, you see a message that tells you to use nbcldutil.
Note: Some browsers like Firefox may auto-populate the fields to store the
credentials in the CMS with credentials the browser saves. You must to turn off
a setting in Firefox so that the credentials do not auto-populate.
Note: In an image sharing all-in-one setup, the Add button is not available on the
disk pool page if the image sharing server already has an associated disk pool.
See “Share images from an on-premises location to the cloud” on page 253.
6 On the Review page, confirm that all options are correct and click Save.
After you click Save, the credentials you entered are validated. If the credentials
are invalid, click Change and you can correct the issue with the credentials.
7 (Optional) At the top, click Create disk pool.
6 Under Media servers click Add to add the load-balancing media servers.
For more information see the Adding an MSDP load-balancing server topic in
the NetBackup Deduplication Guide.
7 Under Isolated recovery environment, you can configure isolated recovery
environment on the storage server if required.
For more information see the topic Configuring an isolated recovery environment
using the web UI in the NetBackup Deduplication Guide.
Note: When you enable Server-Side Encryption, you can configure AWS
Customer-Managed keys. These keys cannot be deleted once they are in use
by NetBackup. Each object is encrypted with the key during upload and deleting
the key from AWS causes NetBackup restore failures.
Note: Veritas Alta Recovery Vault supports multiple options. For Veritas Alta
Recovery Vault Amazon and Amazon Government options in the web UI, you
must contact your Veritas NetBackup account manager for credentials or with
any questions.
For more information on environments and deployment, refer to Veritas Alta
Recovery Vault.
For more information about Veritas Alta Recovery Vault Azure options, refer
to About Veritas Alta Recovery Vault Azure in the NetBackup Deduplication
Guide.
Enter all the required information based on the selection and click Next.
Configuring disk storage 253
Share images from an on-premises location to the cloud
Note: The image sharing server, which already has a disk pool that is created for
it, is not available while NetBackup creates a new disk pool for image sharing.
4 (MSDP) Under Replication targets, select the Add button to add the replication
targets.
Note: The fast import option is an import operation that is specific to image
sharing. You can import the backed-up images from the cloud storage to the
cloud recovery server that is used for image sharing. After a fast import, you
can restore the images. For AWS cloud provider, you can also convert the VM
image to an AWS AMI. For Azure cloud provider, you can convert the VM
image to VHD.
5 In the Fast import images page, select the backup images that you want to
import and click Import.
6 Verify the activity completion status in the Activity monitor.
To convert the VM images to AWS AMI or VHD in Azure
1 On the left, click Workloads > VMware. Then select the imported VMware
image to convert.
2 On the Recovery point tab, select the recovery date.
3 For the recovery point date, choose the required recovery point. Click Actions
> Convert.
For Veritas Alta Recovery Vault, it may take time to get the disk volume and
the credentials information.
Provide the credentials of Azure general-purpose storage accounts or AWS
account with IAM and EC2 related permissions.
For more information on the permission, see Recover the VM as an AWS EC2
AMI or VHD in Azure topic of the NetBackup Deduplication Guide.
Configuring disk storage 255
Overview of universal shares
Note: The NetBackup Enterprise Media Manager service must be active when a
media server is added, devices and volumes are configured, and clients are backed
up or restored.
Step 1 On the new media server host, attach the devices and install See the vendor’s documentation.
any software that is required to drive the storage devices.
Step 2 On the new media server host, prepare the host’s operating See the NetBackup Device Configuration
system. Guide.
Managing media servers 258
Activate or deactivate a media server
Step 3 On the primary server, add the new media server to the See the Servers properties topic in the
Media servers list of the primary server. Also, add the new NetBackup Administrator's Guide, Volume I.
media server to the Additional servers list of the clients that
the new media server backs up.
Step 4 Install the NetBackup media server software on the new host. See the NetBackup Installation Guide.
Step 5 On the primary server, configure the robots and drives that See the Configuring robots and tape drives
are attached to the media server. by using the wizard topic in the NetBackup
Administrator's Guide, Volume I.
Step 6 On the primary server, configure the volumes. See the About adding volumes topic in the
NetBackup Administrator's Guide, Volume I.
Step 7 On the primary server, add storage units to the media server. See “Create a storage unit” on page 263.
Always specify the media server as the media server for the
storage unit.
Step 8 On the primary server, configure the NetBackup policies and See “Add a policy” on page 355.
schedules to use the storage units that are configured on the
media server.
Step 9 Test the configuration by performing a user backup or a See “Perform manual backups” on page 362.
manual backup that uses a schedule that specifies a storage
unit on the media server.
Caution: NetBackup allows a server group name to be the same as the name of
a media server. To avoid confusion, do not use same name for a server group and
a media server.
Server group name Provide a unique name for the server group. Do not use
the name for an existing media server or other host.
You cannot change the name of an existing server
group.
5 To add a server to the group, click Add, select the server, then click Add.
To remove a server from the group, select the server and click Remove.
6 Click Save.
Drives and
robots
Configuring storage units 263
About configuring BasicDisk storage
See the section called “Create a tape storage unit” on page 264.
3 In the Basic properties, enter all the required information and select the Next
button.
4 In the Storage devices, select the appropriate storage device and select the
Next button.
5 In the Media server, the media servers are listed based on the storage device
that you selected. Choose to allow NetBackup to automatically select the media
server. Or, manually select the media server. Select the Next button.
6 In the Review, verify all the selections. You can also edit the details if any
changes are required and select the Save button.
Note: The image sharing disk pool is not available as NetBackup creates a new
storage unit.
■ Managing robots
ACS Automated Cartridge System 1680 No limit API control. The ACS library
software host determines the
drive limit.
Note: The user interface for NetBackup may show configuration options for the
peripheral devices that are not supported in that release. Those devices may be
supported in an earlier release, and a NetBackup primary server can manage the
hosts that run earlier NetBackup versions. Therefore, the configuration information
for such devices must appear in the user interface. The NetBackup documentation
may also describe the configuration information for such devices. To determine
which versions of NetBackup support which peripheral devices, see the NetBackup
Enterprise Server and Server - Hardware and Cloud Storage Compatibility List.
Note: It is recommended that you use the Device Configuration Wizard to add
and update tape storage devices.
4 Click OK.
The Stop/Restart Media Manager Device Daemon dialog box displays.
5 If you intend to make other changes, click Cancel. You can restart the Device
Manager or the device daemon after you make the final change.
If the device changes are complete, click OK to restart the device daemon.
If you restart the device daemon, any backups, archives, or restores that are
in progress may also be stopped.
Property Description
Robot is controlled Specifies that the host to which the robot is attached controls the robot.
locally by this device
You must configure other options (depending on the robot type and device host type).
host
Robot control is Specifies that a host other than the device host controls the robot.
handled by a remote
You must configure other options (based on the selected robot type and device host platform).
host
ACSLS host Specifies the name of the Sun StorageTek ACSLS host; the ACS library software resides
ACSLS host. On some UNIX server platforms, this host can also be a media server.
The ACS library software component can be any of the following:
Note: If the device host that has drives under ACS robotic control is a Windows server, STK
LibAttach software must also be installed. Obtain the appropriate LibAttach software from
STK.
For compatibility information, see the NetBackup Enterprise Server and Server - Hardware
and Cloud Storage Compatibility List:
NDMP host name Specifies the name of the NDMP host to which the robot is attached.
Robot control host Specifies the host that controls the robot.
The name of the host on which the robot information is defined for TLD robots.
Managing robots and tape drives 272
Managing robots
Property Description
Robot device The following applies to a Windows device host only. Specifies the name of the robot device.
Click Browse and then select a robot from the list that appears in the Devices dialog box.
If the discovery operation fails to discover a robot, click More in the Devices dialog box. Enter
either the Port, Bus, Target, and LUN numbers or the device name in the next dialog box.
If the browse operation fails for any other reason, a dialog box appears that lets you enter
the information.
Use the Windows management tools to find the Port, Bus, Target, and LUN numbers.
If the browse operation does not find attached robots, an error dialog box appears.
Robotic device file UNIX device host only. Specifies the device file that is used for SCSI connections. The device
files are located in the /dev directory tree on the device host.
To specify the robotic device file, click Browse and then select a robotic device file from the
list that appears in the Devices dialog box.
If the browse operation fails to show all of the attached robots, click More. Enter the path of
the device file in the robotic device file field.
If the browse operation fails to show all of the attached robots, click Other Device. Enter the
path of the device file in the next dialog box.
If the browse operation does not find attached robots, an error dialog box appears.
Robot device path NDMP host only. Specifies the name of the robotic device that is attached to the NDMP host.
Port, Bus, Target, Windows hosts only. The Port, Bus, Target, and LUN are the SCSI coordinates for the robotic
LUN device. To specify the SCSI coordinates of the device, enter the Port, Bus, Target, and LUN.
Managing robots
You can perform various tasks to manage your robots.
See “Change the robot control properties of a robot” on page 272.
See “Delete a robot” on page 273.
Delete a robot
Use the following procedure to delete a robot or robots when the media server is
up and running.
Any drives that are configured as residing in a robot that you delete are changed
to standalone drives.
Any media in the deleted robot is also moved to standalone. If the media is no
longer usable or valid, delete it from the NetBackup configuration.
See “Delete a volume” on page 294.
To delete a robot
1 Open the NetBackup web UI.
2 On the left, click Storage > Tape storage. Click the Robots tab.
3 Select the robot or robots you want to delete.
4 Click Delete > Delete.
To configure and use a shared drive, a Shared Storage Option license is required
on each primary server and media server.
To change a drive to a shared drive
1 In the NetBackup Administration Console, expand Media and Device
Management > Devices.
2 Select Drives in the tree pane.
3 Select the drive you want to change in the Drives pane.
4 Click Edit > Change.
5 Click Add.
6 Configure the properties for the hosts and paths that share the drive.
Delete a drive
Use the following procedure to delete a drive or drives when the media server is
up and running.
To delete a drive
1 Open the NetBackup web UI.
2 On the left, select Storage > Tape storage. Select the Device monitor tab.
3 Select the drive.
4 Select Delete.
Note: It may take a few minutes for the web UI to reflect that the drive is deleted.
You are prompted to restart the Media Manager device daemon.
Reset a drive
Resetting a drive changes the state of the drive.
Usually you reset a drive when its state is unknown, which occurs if an application
other than NetBackup uses the drive. When you reset the drive, it returns to a known
state before use with NetBackup. If a SCSI reservation exists on the drive, a reset
operation from the host that owns the reservation can help the SCSI reservation.
If the drive is in use by NetBackup, the reset action fails. If the drive is not in use
by NetBackup, NetBackup tries to unload the drive and set its run-time attributes
to default values.
Note that a drive reset does not perform any SCSI bus or SCSI device resets.
To reset a drive
1 Open the NetBackup web UI.
2 On the left, select Storage > Tape storage. Select the Device monitor tab.
3 Locate the drive that you want to reset. Then select Actions > Reset drive.
4 If the drive is in use by NetBackup and cannot be reset, restart the NetBackup
Job Manager (nbjm) to free up the drive.
5 Determine which job controls the drive (that is, which job writes to or reads
from the drive).
On the left, select Activity monitor. Then on the Jobs tab, cancel the job.
6 In the Activity monitor, restart the NetBackup Job Manager, which cancels
all NetBackup jobs in progress.
Managing robots and tape drives 279
Managing tape drives
■ Managing volumes
The robotic library moves the volumes into and out from the
robotic drives as necessary.
Managing tape media 282
About NetBackup volume pools
Standalone volumes Volumes that are allocated for the drives that are not in a robot.
NetBackup The default pool to which all backup images are written (unless you
specify otherwise).
You can add other volume pools. For example, you can add a volume pool for each
storage application you use. Then, as you add volumes to use with an application,
you assign them to that application’s volume pool. You can also move volumes
between pools.
You also can configure a scratch pool from which NetBackup can transfer volumes
when a volume pool has no volumes available.
The volume pool concept is relevant only for tape storage units and does not apply
to disk storage units.
You can use any of the approved characters for volume pool names.
Managing tape media 283
About NetBackup volume groups
NetBackup writes media in a format that allows the position to be verified before
NetBackup appends new backup images to the media.
Managing tape media 285
About adding volumes
Note: The user interface for NetBackup may show configuration options for the
media types that are not supported in that release. Those types may be supported
in an earlier release, and a NetBackup primary server can manage the hosts that
run earlier NetBackup versions. Therefore, the configuration information for such
types must appear in the user interface. The NetBackup documentation also may
describe the configuration information for such types. To determine which versions
of NetBackup support which media types, see the NetBackup Enterprise Server
and Server - Hardware and Cloud Storage Compatibility List:
http://www.netbackup.com/compatibility
Add volumes
Use this procedure to add a new volume.
Be careful when you specify properties. You cannot change some properties later,
such as the media ID or type. If you specify them incorrectly, you must delete the
volume and add it again.
1 Open the NetBackup web UI.
2 Click Storage > Tape storage.
3 Click the Volumes tab.
4 Click Add volume.
5 Specify the properties for the volumes.
The properties that appear in the dialog box vary.
See “Volume properties” on page 286.
6 Click Save.
If the robot has a barcode reader, NetBackup performs the following actions:
■ Adds the volume to the EMM database using the specified media ID.
■ Reads the barcode of each new volume.
■ Adds the barcodes as attributes in the EMM database.
Volume properties
Volume properties describes the properties for volumes in NetBackup. The properties
depend on whether you add, change, or move volumes.
The properties are arranged alphabetically.
Device host The name of the NetBackup media server to which the robot is attached. Add, move
Managing tape media 287
About adding volumes
Expiration date The following does not apply to cleaning tapes. Change
When the expiration date has passed, NetBackup reads data on the volume but
does not mount and write to the volume. You should exchange it for a new volume.
When you add a new volume, NetBackup does not set an expiration date.
The expiration date is not the same as the retention period for the backup data on
the volume. You specify data retention periods in the backup policies.
First media ID This property appears only if the number of volumes is more than one. Add
The ID of the first volume in the range of volumes. Media IDs need to be exactly
6 characters. Valid only when you add a range of volumes.
Use the same pattern that you chose in the Media ID naming style box. NetBackup
uses the pattern to name the remaining volumes by incrementing the digits.
First slot number The number of the first slot in the robot in which the range of volumes resides. If Add, move
you add or move more than one media, NetBackup assigns the remainder of the
slot numbers sequentially.
Note: You cannot enter slot information for volumes in an API robot. The robot
vendor tracks the slot locations for API robot types.
Maximum The maximum number of times NetBackup should mount the volume or use the Add
cleanings cleaning tape.
To determine the maximum mount limit to use, consult the vendor documentation
for information on the expected life of the volume.
Maximum mounts The following topic does not apply to cleaning tapes. Add, change
The Maximum mounts property specifies the number of times that the selected
volumes can be mounted.
When the limit is reached, NetBackup reads data on the volume but does not mount
and write to the volume.
To help determine the maximum mount limit, consult the vendor documentation
for information on the expected life of the volume.
Media ID This property appears only if the number of volumes is one. Add, change
The ID for the new volume. Media IDs must be exactly 6 characters.
Media IDs for an API robot must match the barcode on the media (for API robots,
NetBackup supports barcodesof 6 characters). Therefore, obtain a list of the
barcodes before you add the volumes. Obtain this information through a robotic
inventory or from the robot vendor’s software.
Media ID naming The style to use to name the range of volumes. Media IDs must be exactly 6 Add
style characters in length. Using the pattern, NetBackup names the remaining volumes
by incrementing the digits.
NetBackup media IDs for an API robot must match the barcode on the media. For
API robots, NetBackup supports barcodes from 1 to 6 characters. Therefore, obtain
a list of the barcodes before you add the volumes. Obtain this information through
a robotic inventory or from the robot vendor’s software.
Media type The media type for the volume to add. Add
Number of The number of volumes to add. For a robotic library, enough slots must exist for Add
volumes the volumes.
Robot The robotic library to add or move the volumes to. Add, move
To add volumes for a different robot, select a robot from the drop-down list. The
list shows robots on the selected host that can contain volumes of the selected
media type.
Volume group If you specified a robot, select from a volume group already configured for that Add, move
robot. Alternatively, enter the name for a volume group; if it does not exist,
NetBackup creates it and adds the volume to it.
If you do not specify a volume group (you leave the volume group blank), the
following occurs:
See “About rules for moving volumes between groups” on page 295.
Managing tape media 289
Managing volumes
Volume pool The pool to which the volume or volumes should be assigned. Add, change
Select a volume pool you created or one of the following standard NetBackup
pools:
■ None.
■ NetBackup is the default pool name for NetBackup.
■ DataStore is the default pool name for DataStore.
■ CatalogBackup is the default pool name used for NetBackup catalog backups
of policy type NBU-Catalog.
When the images on a volume expire, NetBackup returns it to the scratch volume
pool if it was allocated from the scratch pool.
Volumes to move The Volumes to move section of the dialog box shows the media IDs of the Move
volumes that you selected to move.
Managing volumes
The following sections describe the procedures to manage volumes.
See “Edit volumes” on page 290.
See “Move volumes” on page 291.
See “About recycling a volume” on page 291.
See “Delete a volume” on page 294.
See “Changing the media owner of a volume” on page 294.
See “Changing the volume group assignment” on page 295.
See “Rescan and update barcodes” on page 296.
Managing tape media 290
Managing volumes
Edit volumes
You can change some of the properties of a volume, including the volume pool.
To change volume properties
1 Open the NetBackup web UI.
2 Click Storage > Tape storage.
3 Click the Volumes tab.
4 Locate and select the volume. Click Edit.
5 Change the properties for the volume.
See “Volume properties” on page 286.
6 Click Update.
Move volumes
If you move a volume to a robotic library that has a barcode reader, NetBackup
updates the EMM database with the correct barcode.
1 Open the NetBackup web UI.
2 Click Storage > Tape storage.
3 Click the Volumes tab.
4 Select the desired volumes from the list and click Move.
5 Specify the properties for the move.
If you move a single volume, the dialog box entries show the current location
of the volume.
See “Volume properties” on page 286.
6 Click Confirm.
Caution: Recycle a volume only if all NetBackup data on the volume is no longer
needed or if the volume is damaged and unusable. Otherwise, you may encounter
serious operational problems and a possible loss of data.
Step 1 Physically remove the volume from the storage See “Eject volumes” on page 297.
device.
Step 2 If the volume is in a robotic library, move it to See “About moving volumes” on page 290.
standalone.
Step 3 Record the current number of mounts and expiration Go to Storage > Tape storage > Volumes in the
date for the volume. NetBackup web UI).
Step 4 Delete the volume entry. See “Delete a volume” on page 294.
Step 5 Add a new volume entry. See “Add volumes” on page 286.
Step 6 Physically add the volume to the storage device. See “Inject volumes into robots” on page 297.
Step 7 Configure the number of mounts. Set the number of mounts to the value you recorded
earlier by using the following command:
On Windows hosts:
install_path\Volmgr\bin\vmchange -m
media_id -n number_of_mounts
On UNIX hosts:
/usr/openv/volmgr/bin/vmchange -m
media_id -n number_of_mounts
Step 8 Set the expiration date to the value you recorded See “Edit volumes” on page 290.
earlier.
NetBackup does not erase images on expired volumes. You can still use the data
on the volume by importing the images into NetBackup (if the volume has not been
overwritten).
See “About importing backup images” on page 387.
Note: It is not recommended that you deassign NetBackup volumes. If you do, be
certain that the volumes do not contain any important data. If you are uncertain,
copy the images to another volume before you deassign the volume.
Delete a volume
You can delete volumes from the NetBackup configuration. For example, if any of
the following situations apply, you may want to delete the volume:
■ A volume is no longer used and you want to recycle it by relabeling it with a
different media ID.
■ A volume is unusable because of repeated media errors.
■ A volume is past its expiration date or has too many mounts, and you want to
replace it with a new volume.
■ A volume is lost and you want to remove it from the EMM database.
After a volume is deleted, you can discard it or add it back under the same or a
different media ID.
See “About assigning and deassigning volumes” on page 293.
To delete volumes
1 Before you delete and reuse or discard a volume, ensure that it does not have
any important data. You cannot delete NetBackup volumes if they are assigned.
2 Open the NetBackup web UI.
3 Click Storage > Tape storage.
4 Click the Volumes tab.
5 Select the desired volume from the volumes list and click Delete > Delete.
6 Remove the deleted volume or volumes from the storage device.
7 Click Confirm.
■ All volumes in a robotic library must belong to a volume group. If you do not
specify a group, NetBackup generates a new volume group name by using the
robot number and type.
■ More than one volume group can share the same location. For example, a
robotic library can contain volumes from more than one volume group and you
can have more than one standalone volume group.
■ All members of a group must be in the same robotic library or be standalone.
That is, if volume group already exists in another robotic library, you cannot add
it (or part of it) to a robotic library.
See “About NetBackup volume groups” on page 283.
See “About moving volumes” on page 290.
Note: Rescan and update barcodes does not apply to volumes in API robot types.
Note: NetBackup does not use barcode rules if a volume already uses a barcode.
Managing tape media 297
Managing volumes
Eject volumes
You can eject single or multiple volumes.
You cannot eject multiple volumes with one operation if they reside in multiple
robots.
Managing tape media 298
Managing volumes
Operator intervention is only required if the robotic library does not contain a media
access port large enough to eject all of the selected volumes. For these robot types,
NetBackup prompts an operator to remove the media from the media access port
so the eject operation can continue.
See “Media ejection timeout periods” on page 298.
To eject volumes
1 Open the NetBackup web UI.
2 On the left, select Storage > Tape storage. Then select the Volumes tab.
3 Select one or more volumes that you want to eject.
4 Click Eject from robot.
5 Do one of the following actions:
ACS robots Select the media access port to use for the ejection, then
click Eject.
The robotic library may not contain a media access port large enough to eject
all of the selected volumes. For most robot types, you are prompted to remove
the media from the media access port so the eject can continue with the
remaining volumes.
See “NetBackup robot types” on page 268.
Note: If the media is not removed and a timeout condition occurs, the media is
returned to (injected into) the robot. Inventory the robot and eject the media that
was returned to the robot.
Managing tape media 299
Managing volumes
Some robots do not contain media access ports. For these robots, the operator
must remove the volumes from the robot manually.
Note: After you add or remove media manually, use NetBackup to inventory the
robot.
Label a volume
If a volume contains valid NetBackup images, deassign the volume so that it can
be labeled.
If you want to label media and assign specific media IDs (rather than allow
NetBackup to assign IDs), use the bplabel command.
Note: If you label a volume, NetBackup cannot restore or import the data that was
on the media after you label it.
To label a volume
1 Open the NetBackup web UI.
2 On the left, select Storage > Tape storage.
3 Select the Volumes tab.
4 Select a volume that you want to label.
5 Select Label.
6 Specify the following properties for the label operation.
Media server Enter name of the media server that controls the drive
to write the label.
Verify media label before Select this option to verify that the media in the drive is
performing action the expected media.
7 Select Confirm.
Erase a volume
You can erase the data on a volume if the following are true:
■ The volume is not assigned.
Managing tape media 300
Managing volumes
Long erase Rewinds the media and the data is overwritten with a known data
pattern. A SCSI long erase is also called a secure erase because it
erases the recorded data completely.
Note: A long erase is a time-consuming operation and can take as
long as 2 hours to 3 hours. For example, it takes about 45 minutes to
erase a 4-mm tape on a standalone drive.
Quick erase Rewinds the media and an erase gap is recorded on the media. The
format of this gap is drive dependent. It can be an end-of-data (EOD)
mark or a recorded pattern that the drive does not recognize as data.
To erase a volume
1 If a volume contains valid NetBackup images, deassign the volume so
NetBackup can label it.
2 Open the NetBackup web UI.
3 Click Storage > Tape storage.
4 Click the Volumes tab.
5 Select a volume that you want to erase.
6 Click Quick erase or Long erase.
Managing tape media 301
Managing volumes
7 Specify the name of the media server to initiate the erase operation.
To overwrite any existing labels on the media, do not select Verify media label
before performing action.
8 Click Confirm if you are certain you want to start the erase action.
If you selected Verify media label before performing operation and the
actual volume label does not match the expected label, the media is not erased.
Property Description
Catalog backup pool Select this option to use this volume pool for catalog backups. This check box creates
a dedicated catalog backup pool to be used for NBU-Catalog policies. A dedicated
catalog volume pool facilitates quicker catalog restore times.
Property Description
Maximum number of Does not apply to the None pool, catalog backup pools, or scratch volume pools.
partially full media Specifies the number of partially full media to allow in the volume pool for each of the
unique combinations of the following in that pool:
■ Robot
■ Drive type
■ Retention level
The default value is zero, which does not limit the number of full media that are allowed
in the pool.
Prefer span to scratch Specifies how NetBackup should select additional media when tape media operations
span multiple media. When this parameter is set to yes (default) if a job spans to new
media, NetBackup selects media from the scratch pool. NetBackup takes this action
instead of using partially full media from the backup volume pool. When this parameter
is set to no, NetBackup attempts to select partially full media from the backup volume
pool to complete the specified operation. The no setting lets NetBackup use partially
full media in the backup volume pool instead of always spanning to a scratch tape. Set
the maximum number of partially full media option with the vmpool -create or the
vmpool -update command.
Pool name The Pool name is the name for the new volume pool. Volume pool names are
case-sensitive and can be up to 20 characters.
Add sufficient type and quantity of media to the scratch pool to service all scratch media
requests that can occur. NetBackup requests scratch media when media in the existing
volume pools are allocated for use.
Note: After you delete a volume group, it deletes the volumes in the volume groups.
5 You can only specify the properties that apply for the move type.
Property Description
Robot When you move from a robotic library, this value displays the robot
type, robot number, and robot control host.
Destination If you move a volume group to a robotic library, select the Device
host and the Robot.
6 Select Confirm.
7 After you move the volume group logically, physically move the volumes to
their new locations.
Chapter 16
Inventorying robots
This chapter includes the following topics:
Show contents Queries the robot for its contents and displays the media in the selected robotic
library; does not check or change the EMM database.
For the robotic libraries without barcode readers (or that contain media without
barcodes), you can only show the contents of a robot. However, more detailed
information is required to perform automated media management. Use the
vmphyinv physical inventory utility to inventory such robots.
Compare contents with volume Queries the robot for its contents and compares the contents with the contents
configuration of the EMM database. This option does not change the database.
Preview volume configuration Queries the robot for its contents and compares the contents with the contents
changes of the EMM database. If differences exist, it is recommended to change to the
NetBackup volume configuration.
Update volume configuration Queries the robot for its contents; if necessary, updates the database to match
the contents of the robot. If the robot contents are the same as the EMM database,
no changes occur.
To determine the contents of a Use the Show contents option to determine the media in a robot and possibly
robot their barcode numbers.
To determine if volumes were For the robots with barcode readers and the robots that contain media with
moved physically within a robot barcodes, use the Compare contents with volume configuration option.
See “Comparing media in a robot with the volume configuration” on page 312.
To add new volumes to a robot (a For any robot NetBackup supports, use the Update volume configuration option.
new volume is one that does not
The update creates media IDs (based on barcodes or a prefix that you specify).
have a NetBackup media ID)
See “Update the NetBackup volume configuration with a robot's contents”
on page 314.
To determine whether new media Use the Preview volume configuration changes option, which compares the
have barcodes before you add contents of the robot with the NetBackup volume configuration information.
them to NetBackup
After you examine the results, use the Update volume configuration option to
update the volume configuration if necessary.
To insert existing volumes into a If the robot supports barcodes and the volumes have readable barcodes, use the
robot (an existing volume is one Update volume configuration option. NetBackup updates the residence
that already has a NetBackup information to show the new robotic location. NetBackup also updates the robot
media ID) host, robot type, robot number, and slot location. Specify the volume group to which
the volume is assigned.
If the robot does not support barcodes or the volumes do not contain readable
barcodes, move the volumes or use the physical inventory utility.
To move existing volumes If the robotic library supports barcodes and the volumes have readable barcodes,
between robotic and standalone use the Update volume configuration option. NetBackup updates the residence
(an existing volume is one that information to show the new robotic or standalone location.
already has a NetBackup media
See “Update the NetBackup volume configuration with a robot's contents”
ID)
on page 314.
Inventorying robots 310
About showing a robot's contents
To move existing volumes within If the robot supports barcodes and the volumes have readable barcodes, use the
a robot (an existing volume is one Update volume configuration option. NetBackup updates the residence
that already has a NetBackup information to show the new slot location.
media ID)
See “Update the NetBackup volume configuration with a robot's contents”
on page 314.
If the robot does not support barcodes or if the volumes do not contain readable
barcodes, move the volumes or use the physical inventory utility.
To move existing volumes from If the robotic library supports barcodes and the volumes have readable barcodes,
one robot to another (an existing use the Update volume configuration option. NetBackup updates the NetBackup
volume is one that already has a volume configuration information.
NetBackup media ID)
See “Update the NetBackup volume configuration with a robot's contents”
on page 314.
If the robots do not support barcodes or the volumes do not contain readable
barcodes, move the volumes or use the physical inventory utility.
For either operation, perform the following updates:
If you do not perform both updates, NetBackup cannot update the entries and
writes an "Update failed" error.
To remove existing volumes from For any robot NetBackup supports, use the Update volume configuration option
a robot (an existing volume is one to update the NetBackup volume configuration information.
that already has a NetBackup
See “Update the NetBackup volume configuration with a robot's contents”
media ID)
on page 314.
Note: On UNIX: If a volume is mounted in a drive, the inventory report lists the slot
from which the volume was moved to the drive.
Inventorying robots 311
Showing the media in a robot
The robot has a barcode reader and the robot Shows if each slot has media and lists the
contains media with barcodes. barcode for the media.
The robot does not have a barcode reader or Shows if each slot has media.
the robot contains media without barcodes.
The robot can read barcodes The report shows the differences between
the robot and the EMM database
The robot cannot read barcodes The report shows only whether a slot contains
a volume
For API robots The media ID and media type in the EMM
database are compared to the information
that is received from the vendor’s robotic
library software.
If the results show that the EMM database does not match the contents of the
robotic library, perform the following actions:
■ Physically move the volume.
■ Update the EMM database.
See “About updating the NetBackup volume configuration” on page 314.
See “Comparing media in a robot with the volume configuration” on page 312.
Note: If you preview the configuration changes first and then update the EMM
database, the update results may not match the results of the preview operation.
Possible causes may be the changes that occur between the preview and the
update. Changes can be to the state of the robot, to the EMM database, to the
barcode rules, and so on.
Note: If you preview the configuration changes first and then update the EMM
database, the update results may not match the results of the preview operation.
Possible causes may be the changes that occur between the preview and the
update. Changes can be to the state of the robot, to the EMM database, to the
barcode rules, and so on.
Inventorying robots 314
About updating the NetBackup volume configuration
6 To change the default settings and rules that NetBackup uses to name and
assign attributes to new media, click Advanced options.
Note: Advanced options apply to only preview and update volume configuration
and hence enabled only when you select these operation options.
7 To inject any media that is in the media access port before the preview
operation, click Empty media access port prior to update.
8 Click Start to begin the inventory preview.
Note: If you preview the configuration changes first and then update the EMM
database, the update results may not match the results of the preview operation.
Possible causes may be the changes that occur between the preview and the
update. Changes can be to the state of the robot, to the EMM database, to the
barcode rules, and so on.
7 To change the default settings and rules that NetBackup uses to name and
assign attributes to new media, select Advanced options.
8 To inject any media that is in the media access port before the update operation,
click Empty media access port prior to update.
9 Select the Start button to begin the inventory update.
Option Description
Device host The Device host option is the host that controls the robot.
Inventorying robots 316
Robot inventory options
Option Description
Empty media access port prior The Empty media access port prior to update operation is active only for the
to update robots that support that function.
To inject volumes in the robot’s media access port into the robot before you begin
the update, select Empty media access port prior to update.
The volumes to be injected must be in the media access port before the operation
begins. If you select Empty media access port prior to update and the media
access port is empty, you are not prompted to place volumes in the media access
port.
Note: If you use NetBackup to eject volumes from the robot, remove the volumes
from the media access port before you begin an inject operation. Otherwise, if
the inject port and eject port are the same, the ejected volumes may be injected
back into the robotic library.
If you selected a robot in the NetBackup web UI, that robot appears in this field.
Show contents Displays the media in the selected robotic library; does not check or change the
EMM database.
Compare contents with volume Compares the contents of a robotic library with the contents of the EMM database
configuration but does not change the database.
Preview volume configuration Compares the contents of a robotic library with the contents of the EMM database.
changes If differences exist, it is recommended to change to the NetBackup volume
configuration.
Update volume configuration Updates the database to match the contents of the robot. If the robot contents
are the same as the EMM database, no changes occur.
Option Description
Compare contents Displays the comparison between the Robot Contents (Slot, Tape,
and Barcode) and Volume Configuration (Media ID, and Barcode)
with the Mismatch Detected list.
Preview volume Lists the proposed changes to EMM database Volume Configuration).
configuration To update the volume configuration changes.
changes
See “About previewing volume configuration changes” on page 313.
Update Lists the updated changes as well as the actual changes performed,
along with the success message.
Download In the case, the robot inventory result text is large (more than 100K
results) the web UI shows the truncated data with an option to
download the text file.
Option Description
Media settings
Inventorying robots 318
Advanced options for robot inventory settings
Option Description
Existing media Media which have been removed from the robot
should be assigned to the volume group options:
Option Description
Media type
Volume pool
Barcode rules
Media ID generation
Inventorying robots 320
Configure media ID generation rules
Option Description
Note: If you click save on the individual rows does NOT save the rule, only
when the you clicks the dialog's save button are all the changes saved.
Barcode tag A unique string of barcode characters that identifies the type of media.
For example, use DLT as the barcode tag for a barcode rule if the following is true:
Similarly, if you use CLND for DLT cleaning media, use CLND as the barcode tag for
the rule for DLT cleaning media.
The barcode tag can have from 1 to 16 characters but cannot contain spaces.
The following are the special barcode rules that can match special characters in the
barcode tags:
■ NONE
Matches when rules are used and volume has an unreadable barcode or the robot
does not support barcodes.
■ Barcode rule names support only alphabets A-Z, numerics 0-9, special character
Underscore ‘_’ for barcode rule names. Underscore ‘_’ not allowed as first character.
You can change/edit a barcode tag of a barcode rule in the web UI.
Use the Media Settings tab to set up the criteria for a robot update.
Maximum mounts The maximum number of mounts (or cleanings) that are allowed for the volume.
For data volumes, a value of zero means the volume can be mounted an unlimited
number of times.
For cleaning tapes, zero means that the cleaning tape is not used. It is recommended
that you use barcodes for the cleaning media that cannot be confused with barcodes
for data media. The media type to assign to the media.
Media type option If media type selected is a cleaning tape then Volume pool is not selectable and set
to None.
Inventorying robots 323
Media ID generation options
Volume pool The volume pool for the new media. The actions depend on whether you use barcode
rules to assign media attributes.
Select from the following:
■ DEFAULT
If DEFAULT is selected, NetBackup performs the following actions:
■ If you use barcode rules, the barcode rules determine the volume pool to which
new volumes are assigned.
■ If you do not use barcode rules, NetBackup assigns data tapes to the NetBackup
pool but does not assign cleaning tapes to a volume pool.
■ A specific volume pool
This volume pool setting always overrides any barcode rules.
■ Robot number
The number of the robot to which the rule applies.
You cannot change the robot number of a rule. Rather, first delete the rule and
then add a new rule.
a. In the Media which have been removed from the robot should be assigned
to the volume group list, select a volume group for the media that are removed
from the robot.
b. In the Media which have been moved into or within the robot should be
assigned to the volume group list, select a volume group for the media that
are in or are added to the robot.
c. If the robotic library supports barcodes and the volume has readable barcodes,
NetBackup creates media IDs automatically from the barcodes. You do not
need to configure a prefix.
However, if the media in the robotic library has unreadable barcodes or if the
robot does not support barcodes, NetBackup assigns a default media ID prefix.
To use a media ID prefix other than the Default, click Use the following Media
ID prefix field. Then, specify or choose a media ID prefix.
d. To use your barcode rules to assign attributes to new volumes, select Use
barcode rules.
e. To override your barcode rules for the new media in the robotic library, select
a Media type from the list.
f. To override the default volume pool for the new media in the robotic library,
select a Volume pool from the list.
9 Click Save.
You can change the default mappings. Changes apply only to the current volume
configuration update.
You also can add media type mappings.
Note: You can write a barcode rule that contains the media types that are
incompatible with vendor media types. However, the robot inventory update may
assign NetBackup media types that are inconsistent with the vendor media types.
Avoid this problem by grouping barcode rules by media type.
Basic disk staging Basic disk staging consists of two stages. First, data is stored on the initial storage unit
(disk staging storage unit). Then, per a configurable relocation schedule, data is copied
to the final location. Having the images on the final destination storage unit frees the
space on the disk staging storage unit as needed.
The following storage unit types are available for basic disk staging: BasicDisk and
tape.
Staging using the Storage Staged backups that are configured within the Storage lifecycle policies utility also
lifecycle policies utility consist of two stages. Data on the staging storage unit is copied to a final destination.
However, the data is not copied per a specific schedule. Instead, the administrator can
configure the data to remain on the storage unit until either a fixed retention period is
met, or until the disk needs additional space, or until the data is duplicated to the final
location.
Stage Description
Stage I Clients are backed up by a policy. The Policy storage selection in the policy indicates a storage unit that
has a relocation schedule configured. The schedule is configured in the staging schedule settings.
Stage II Images are copied from the Stage I disk staging storage unit to the Stage II storage unit. The relocation
schedule on the disk staging storage unit determines when the images are copied to the final destination.
Having the images on the final destination storage unit frees the space on the disk staging storage unit as
needed.
The image continues to exist on both the disk staging storage unit and the final
destination storage units until the image expires or until space is needed on the
disk staging storage unit.
When the relocation schedule runs, NetBackup creates a data management job.
The job looks for any data that can be copied from the disk staging storage unit to
the final destination. The job details in the Activity monitor identify the job as one
associated with basic disk staging. The jobs list displays Disk Staging in the job’s
Data movement field.
Staging backups 329
Create a BasicDisk storage unit with disk staging
When NetBackup detects a disk staging storage unit that is full, it pauses the backup.
Then, NetBackup finds the oldest images on the storage unit that successfully
copied onto the final destination. NetBackup expires the images on the disk staging
storage unit to create space.
Note: The basic disk staging method does not support backup images that span
disk storage units.
To avoid spanning storage units, do not use Checkpoint restart on a backup policy
that writes to a storage unit group that contains multiple disk staging storage units.
Enter a High water mark value. The high water mark works differently for
the BasicDisk disk type. NetBackup
assigns new jobs to a BasicDisk disk
staging storage unit, even if it is over the
indicated high water mark. For BasicDisk,
the high water mark is used to prompt the
deletion of images that have been
relocated.
Note: The Low water mark setting does
not apply to disk staging storage units.
5 Click Next.
Staging backups 330
Disk staging storage unit size and capacity
6 For the staging schedule, select the option Enable temporary staging area.
7 Below Staging schedule, click Add.
The schedule name defaults to the storage unit name.
Configure the schedule settings.
See “Schedule settings for disk staging” on page 333.
8 Click Save to save the disk staging schedule.
9 Click Next.
10 Select a media server.
11 Browse or specify the absolute path to the directory to be used for storage.
12 Select whether this directory can reside on the root file system or system disk.
13 Click Next.
14 Review the settings for the storage unit and then click Save.
The minimum size must be greater than or equal to the largest combined size of
the backups that are placed on the storage unit between runs of the disk staging
schedule. (In our example, the disk images remain on the disk for one week.)
In this example, the relocation schedule runs nightly, and the largest nightly backup
is 700 MB. It is recommended that you double this value to allow for any problems
that may occur when the relocation schedule runs. To double the value gives the
administrator an extra schedule cycle (one day) to correct any problems.
To determine the minimum size for the storage unit in this example, use the following
formula:
Minimum size = Max data per cycle × (1 cycle + 1 cycle for safety)
For example: 1.4 GB = 700 MB × (1+1)
total size of the images that are eligible for expiration plus the images ready to be
deleted on the volume.
To find the potential free space on a BasicDisk storage unit, use the bpstulist
and the nbdevquery commands as follows:
■ Run bpstulist -label to find the disk pool name.
Note that the name of the storage unit and disk pools are case-sensitive. In the
case of BasicDisk storage units, the name of the disk pool is the same as the
name of the BasicDisk storage unit. In the following example, the name of the
storage unit is NameBasic:
■ Run the nbdevquery command to display the status for the disk pool, including
the potential free space.
Use the following options, where:
flags : 0x6
num_read_mounts : 0
max_read_mounts : 0
num_write_mounts : 1
max_write_mounts : 1
system_tag : <Generic disk volume>
Attribute Description
Name The schedule Name defaults to the name of the storage unit.
Priority of relocation jobs The Priority of relocation jobs started from this schedule field indicates the priority
started from this schedule that NetBackup assigns to relocation jobs for this policy. Range: 0 to 99999 (highest
priority). The default value that is displayed is the value that is set in the Default job
priorities host properties for the Staging job type.
Multiple copies Creates multiple copies of backups. NetBackup can create up to four copies of a backup
simultaneously.
When this setting is enabled, Final destination volume pool and Final destination
media ownership are disabled.
Final destination storage If the schedule is a relocation schedule, a Final destination storage unit must be
unit indicated. (A relocation schedule is created as part of a basic disk staging storage unit
configuration.) A Final destination storage unit is the name of the storage unit where
the images reside after a relocation job copies them.
To copy images to tape, NetBackup uses all of the drives available in the Final
destination storage unit. However, the Maximum concurrent write drives setting
for that storage unit must be set to reflect the number of drives. The setting determines
how many duplication jobs can be launched to handle the relocation job.
NetBackup continues to free space until the Low water mark is reached.
Final destination volume If the schedule is a relocation schedule, a Final destination volume pool must be
pool indicated. (A relocation schedule is created as part of a basic disk staging storage unit
configuration.) A Final destination volume pool is the volume pool where images are
swept from the volume pool on the basic disk staging storage unit.
Attribute Description
Final destination media If the schedule is a relocation schedule, a Final destination media owner must be
owner indicated. (A relocation schedule is created as part of a basic disk staging storage unit
configuration.) A Final destination media owner is the media owner where the images
reside after a relocation job copies them.
Specify one of the following:
■ Any lets NetBackup choose the media owner. NetBackup chooses a media server
or a server group (if one is configured).
■ None specifies that the media server that writes the image to the media owns the
media. No media server is specified explicitly, but you want a media server to own
the media.
Frequency
If the backups that use a disk staging storage unit run more frequently than expected,
compare the retention level 1 setting with the Frequency setting. Internally, NetBackup
uses the retention level 1 setting for scheduling purposes with disk staging storage
units.
Make sure that the frequency period is set to make the backups occur more frequently
than the retention level 1 setting indicates. (The default is two weeks.)
For example, a frequency of one day and a retention level 1 of 2 weeks should work
well. Retention levels are configured in the Retention periods host properties.
Staging backups 335
Schedule settings for disk staging
Attribute Description
Use alternate read server An alternate read server is a server allowed to read a backup image originally written
by a different media server.
The path to the disk or directory must be identical for each media server that is to
access the disk.
If the backup image is on tape, the media servers must share the same tape library or
the operator must find the media.
If the backup image is on a robot that is not shared or a standalone drive, the media
must be moved to the new location. An administrator must move the media, inventory
the media in the new robot, and run bpmedia -oldserver -newserver or assign
a failover media server.
To avoid sending data over the network during duplication, specify an alternate read
server that meets the following conditions:
■ Connected to the storage device that contains the original backups (the source
volumes).
■ Connected to the storage device that contains the final destination storage units.
If the final destination storage unit is not connected to the alternate read server, data
is sent over the network.
Priority of duplication job Indicates the priority that NetBackup assigns to duplication jobs for this policy. Range:
0 to 99999 (highest priority).
Staging backups 336
Schedule settings for disk staging
Attribute Description
Copy # For each copy you want to create, select the copy settings. Copy 1 is the primary copy.
If Copy 1 fails, the first successful copy is the primary copy.
Storage unit
Specify the storage unit where each copy is stored. If a Media Manager storage unit
has multiple drives, it can be used for both the source and the destination.
Volume pool
■ Continue
Continues making the remaining copies.
Note: Note: If Take checkpoints every __ minutes is selected for this policy,
only the last failed copy that contains a checkpoint can be resumed.
■ Fail all copies
Fails the entire job.
Media owner
For tape media, specify who should own the media onto which NetBackup writes the
images.
These settings do not affect any images that reside on disk. One media server does
not own the images that reside on shared disks. Any media server with access to the
shared pool of disk can access the images.
■ Any
NetBackup selects the media owner, either a media server or server group.
■ None
Specifies that the media server that writes to the media owns the media. No media
server is specified explicitly, but you want a media server to own the media.
Chapter 18
Troubleshooting storage
configuration
This chapter includes the following topics:
On UNIX:
/usr/openv/netbackup/bin/admincmd/nbemmcmd -addhost -machinename
hostname -machinetype media -masterserver server_name
-operatingsystem os_type -netbackupversion
level.major_level.minor_level
Note: Ensure that the name you use in NetBackup is the same as the host
name in the TCP/IP configuration.
To reduce the cloud volume size, open the contentrouter.cfg file from
/msdp/etc/puredisk/ and change the values. After changing the values,
restart the MSDP services and then create the cloud volume.
The local MSDP storage does not In the Select long-term retention storage configuration page for protection
display the compression and the plans, the local MSDP storage does not display the compression and the
encryption values correctly. encryption values correctly.
Section 5
Configuring backups
Question Answer
In the web UI’s Protected by The asset is not currently subscribed to a protection plan.
column, what does Classic However, it was subscribed to a protection plan. Or, it
policy only mean? was covered by a classic policy at one time and it has a
Last backup status. There may or may not be an active
classic policy protecting the asset (contact the NetBackup
administrator to find out).
Where can I find the details of a The details of a classic policy are not visible in the web
classic policy? UI, with the exception of a few policy types.
How can I manage a classic Some policy types can be managed in the NetBackup
policy? web UI.
When should I subscribe an asset A protection plan lets you easily add and remove assets
to a protection plan versus from the plan and see which assets are protected. A
protecting the asset with a classic workload administrator can fully control who can view or
policy? manage protection plans and assets.
Can I use both a protection plan Yes. The web UI shows the details of the protection plan
and a classic policy to protect an but not the details of the classic policy. You can contact
asset? the NetBackup administrator for the classic policy details.
What action should I take when You can ask the NetBackup administrator if a classic
an asset is unsubscribed from a policy protects the asset.
protection plan and the web UI
shows Classic policy only for
that asset?
■ Apache Cassandra
■ Cloud
■ Cloud object store
■ Kubernetes
■ Microsoft SQL Server
■ MySQL
■ Nutanix AHV
■ OpenStack
■ Oracle
■ PostgreSQL
■ Red Hat Virtualization (RHV)
■ SaaS
■ VMware
FlashBackup MSDP-Object-Store
FlashBackup-Windows NAS-Data-Protection
Hyper-V NBU-Catalog
Chapter 20
Managing protection plans
This chapter includes the following topics:
Before you create a protection plan, you must configure all storage options.
See “About storage configuration” on page 238.
To create a protection plan
1 On the left, click Protection > Protection plans and then click Add.
2 In Basic properties, enter a Name, Description, and select a Workload from
the drop-down list.
Optional selection:
Managing protection plans 344
Create a protection plan
Note: If you select Automatic for the schedule type, then all schedules for this
protection plan are Automatic. If you select a Full, Differential incremental,
or Cumulative Incremental for the schedule type, then all schedules for this
protection plan must be one of these options.
If you select Automatic for the schedule type, NetBackup automatically sets
the schedule type for you. NetBackup calculates when to do a Full or
Differential incremental based on frequency you specify.
Managing protection plans 345
Create a protection plan
Note: The protection plan creation does not work for the VMware workload
when certain schedule frequencies are set with WORM storage lock duration.
The protection plan creation does not work when: schedule frequencies are
set to less than one week and WORM storage Lock Maximum Duration less
than one week greater than the requested retention period.
If you use a protection plan to protect VMware with WORM capable storage,
set the WORM storage Lock Maximum Duration to greater than one week.
Or, explicitly select the schedule type in the protection plan.
Review the Backup schedule preview window and verify that all schedules
are set correctly.
Managing protection plans 347
Create a protection plan
4 In Storage options, configure the storage type per schedule you configured
in step 3.
The options vary depending on storage options currently setup to work with
NetBackup.
A protection plan can only use the storage that a NetBackup 8.1.2 or newer
media server can access.
Perform snapshot backups Microsoft SQL For instructions on configuring protection plans for Microsoft
Server is SQL Server, see the NetBackup Microsoft SQL Server
required for Administrator's Guide.
this option.
Backup storage OpenStorage Click Edit to select the storage target. Click Use selected
is required for storage after selecting the storage target.
this option.
The NetBackup Accelerator feature allows protection plans
Tape, storage
to run faster than traditional backups, by creating a compact
unit groups,
data stream that uses less network bandwidth. If the storage
and
server on the NetBackup primary server supports NetBackup
Replication
Accelerator, this feature is included in the protection plan.
Director not
For more details on NetBackup Accelerator, contact the
supported.
NetBackup administrator or see the NetBackup
Administrator’s Guide, Volume I or the NetBackup for VMware
Administrator’s Guide.
Replication target The backup Click Edit to select the replication target primary server.
storage must Select a primary server and then select a storage lifecycle
be a source in policy. Click Use selected replication target to return to the
a targeted storage options screen.
A.I.R.
Cloud workloads support the MSDP and MSDP-C storage
environment.
units for replication (A.I.R.).
Long-term retention storage OpenStorage Click Edit to select the cloud storage provider. Click Use
is required for selected storage after selecting the cloud provider target.
this option.
Cloud workloads support the AdvancedDisk, Cloud storage,
Tape, storage
MSDP, and MSDP-C as storage units for duplication.
unit groups,
and
Replication
Director not
supported.
Transaction log options Microsoft SQL If you use the option Select custom storage options, click
Server is Edit to select the backup storage.
required for
this option.
5 In Backup options, configure all options based on your workload type. The
options in this area change depending on workload, schedule, or storage
options selected.
For the Cloud workload:
■ For any of the selected cloud provider options, if you select Enable granular
recovery for files or folders, ensure that you have opted to retain a
snapshot while adding a backup schedule, as granular recovery can be
performed only from a snapshot image.
■ For any of the selected cloud provider option, if you select Exclude selected
disks from backups, then the selected disks would not be backed-up and
hence the VM would not be recovered completely. Any application running
on the excluded disks might not work.
Note: The boot disks cannot be excluded from the backups even if they
have data or tags associated with them.
■ If you have selected the cloud provider as Google Cloud Platform, select
Enable regional snapshot, to enable regional snapshots.
If the regional snapshot option is enabled, the snapshot is created in the
same region in which the asset exists. Otherwise, the snapshot is created
in a multi-regional location.
■ (Microsoft Azure or Azure Stack Hub cloud provider) Select Specify
snapshot destination resource group to associate snapshots to a
particular peer resource group. This resource group is within the same
Managing protection plans 349
Customizing protection plans
Table 20-1 Protection plan settings that can be configured and edited
Storage options X
Backup options X
Advanced options X
Note: You cannot edit these settings in a protection plan: Backup options and
Advanced options. If you want to adjust these settings and additional schedule
settings, you must create a new protection plan and subscribe assets to the new
plan. Or, you can customize the plan for the asset.
See “Customizing protection plans” on page 349.
Note: You cannot edit these settings when you subscribe an asset: Storage options
or Permissions. Changes to Schedules are limited. If you want to adjust these
settings, you must create a new protection plan and subscribe assets to the new
plan. Or, you can customize the plan for the asset.
See “Customizing protection plans” on page 349.
■ Edit full and incremental schedules, to edit the start window for these
schedule types.
■ Edit transaction log schedules, to edit the settings for SQL Server
transaction log schedules.
7 Click Protect.
Note: When you unsubscribe an asset from a protection plan, there is a possibility
that the asset displays Classic policy in the web UI. This situation can happen
when an asset is subscribed to a protection plan and a backup runs for that asset.
Then the asset is unsubscribed from the protection plan while it has a valid backup
image. The web UI displays Classic policy, but there may or may not be an active
policy protecting the asset.
Note: To use Backup now you must have subscribe permissions for at least one
protection plan. You can select only one asset at a time for each Backup now
operation.
Managing protection plans 354
About Backup now
Note: The option of Backup type is only available for Microsoft SQL Server
assets. You can select the type of backup you want to perform using the
drop-down. The drop-down only contains the backup types that are available
in the protection plan.
■ Add a policy
Add a policy
Use the following procedure to create a backup policy in the NetBackup web UI.
Example policies are also available.
See “Example policy - Exchange Server DAG backup” on page 356.
See “Example policy - Sharded MongoDB cluster” on page 357.
For details on policy options, refer to the NetBackup Administrator's Guide, Volume
I and to the appropriate workload or database guides.
Note: You must have the RBAC Administrator role or similar permissions to create
and manage policies.
Managing classic policies 356
Example policy - Exchange Server DAG backup
To add a policy
1 On the left, select Protection > Policies.
2 Click Add.
3 On the Attributes tab, do the following:
■ Select the Policy type that you want to create.
■ Select the Policy storage that you want to use.
■ Select or configure any other policy attributes.
4 On the Schedules tab, configure all the necessary schedules. For example,
Full and incremental schedules.
5 Depending on the policy type that you selected, add the clients, database
instances, or virtual machines that you want to protect. Perform this
configuration on the Clients or the Instances and databases tab.
■ For most policy types you configure a list of clients on the Clients tab.
■ For Oracle and MS-SQL-Server policy types, you select instances or
databases on the Instances and databases tab. Or if you use scripts or
batch files, you select clients on the Clients tab.
6 Depending on the policy type that you selected, add the files, database
instances, or other objects that you want to protect. This configuration is
performed on the Backup selections tab.
7 For the policy types that have additional tabs, review and select the other policy
options that are needed to complete the setup.
8 Click Create.
4 On the Schedules tab, configure all the necessary schedules. For example,
Full and incremental schedules.
7 Click Create.
4 On the Schedules tab, configure all the necessary schedules. For example,
Full and incremental schedules.
5 On the Clients tab, add the client name. Use the format
MongoDBNode-portnumber.
6 On the Backup selections tab, add the application type, the backup hosts,
and manually add the ALL_DATABASES directive.
ALL_DATABASES
7 Click Create.
Number of streams per The number of parallel backup streams that are used for a
backup selection backup selection.
Multiple storage units The option allows backup streams to use multiple storage
units in parallel to speed up the backup and restore
performance.
Note: You must have the RBAC Administrator role or similar permissions to manage
policies.
Edit a policy
You can make changes to policy attributes, schedules, clients, or backup selections.
To edit a policy
1 On the left, select Protection > Policies.
2 Select the policy that you want to change and click Edit.
3 Make the changes that you want, then click Save.
Copy a policy
You can copy a policy to save time creating new policies. This option is especially
useful for the policies that contain many of the same policy attributes, schedules,
clients, or backup selections.
To copy a policy
1 On the left, select Protection > Policies.
2 Select the policy that you want to copy and click Copy policy.
3 Provide a name for the policy and click Copy.
Delete a policy
You can delete a policy if you no longer need it. To maintain protection of the clients
or hosts, add them to another policy before you delete the current policy.
To delete a policy
1 On the left, select Protection > Policies.
2 Select one or more policies and click Delete > Delete.
Deactivate a policy
You can deactivate a policy to temporarily pause any backup requests for that
policy. For example, if you want to perform maintenance on the clients in the policy.
Managing classic policies 362
Perform manual backups
Activate a policy
Activate a policy when you are ready for backup schedules in the policy to run.
To activate a policy
1 On the left, click Protection > Policies.
2 Select the policy, then click Activate.
■ Windows
<installation_directory>\NetBackup\bin\bpstart_notify.epic_file.bat
<installation_directory>\bin\bpend_notify.epic_file.full.bat
For more information about the scripts, see the NetBackup Administrator’s
Guide, Volume II.
Managing classic policies 364
About the Epic-Large-File policy type
■ Catalog backups
Catalog backups
Because the catalog plays an integral part in a NetBackup environment, a special
type of backup protects the catalog and is separate from regular client backups. A
catalog backup policy backs up catalog-specific data as well as produces disaster
recovery information. The catalog can be stored on a variety of media.
The catalog backup is designed for active environments in which continual backup
activity occurs. It includes all the necessary catalog files, the databases (NBDB,
NBAZDB, and BMRDB), and any catalog configuration files. The catalog backup
can be performed while regular backup activity occurs. Incremental backups of a
large catalog can significantly reduce backup times.
Configure a catalog backup before you run any regular backups. NetBackup needs
information from the catalog to determine where the backups of files are located.
Without a catalog, NetBackup cannot restore data.
See “Configuring catalog backups” on page 368.
As additional protection for the catalog, consider archiving the catalog.
See “Archiving the catalog and restoring from the catalog archive” on page 628.
From a catalog backup an administrator can recover either the entire catalog or
pieces of the catalog. (For example, separately recover the databases from the
configuration files.) Details about catalog recovery scenarios and procedures are
available in the NetBackup Troubleshooting Guide.
■ When an online catalog backup is run, it generates three jobs: A parent job,
a child job for NetBackup relational database tables, and a child job for
catalog images and configuration data. The child jobs contain the actual
backed up data. Consider both child jobs to duplicate, verify, or expire the
backup.
Refer to the following topics for information on how to configure a catalog backup:
See “Prerequisites for backing up the NetBackup catalog ” on page 367.
See “Configuring catalog backups” on page 368.
5 On the Schedules tab, configure the schedules you want for the catalog
backup.
See “Concurrently running catalog backups with other backups” on page 370.
See “Catalog policy schedule considerations” on page 370.
6 Click the Disaster recovery tab.
The tab contains information regarding the location of data crucial to disaster
recovery.
Protecting the NetBackup catalog 369
Catalog backups
■ Provide the path where each disaster recovery image file can be saved on
disk. Enter the Network share username and Network share password,
if necessary.
It is recommended that you use a network share or a removable device.
Do not save the disaster recovery information to the local computer.
7 Select Send disaster recovery email and enter one or more email addresses
for NetBackup administrators (separated by commas).
After every catalog backup, NetBackup sends disaster recovery information
to the administrators that are indicated here.
Make sure that email notification is enabled in your environment.
See “Disaster recovery emails and the disaster recovery files” on page 372.
8 Add the policies that back up any critical data to the Critical policies list.
These policies are any that you consider crucial to the recovery of a site in the
event of a disaster. The disaster recovery report includes a list of the media
that is used for backups of critical policies. The report includes media only for
incremental and full backup schedules, so any critical policies should use only
incremental or full backup schedules.
9 Click Create.
■ The least frequent schedule runs if many schedules are due at the same time.
■ One catalog backup policy can contain multiple incremental schedules that are
session-based:
■ If one is cumulative and the others are differential, the cumulative runs when
the backup session ends.
■ If all are cumulative or all are differential, the first schedule that is found runs
when the backup session ends.
■ The queued scheduled catalog backup is skipped if a catalog backup job from
the same policy is running.
Protecting the NetBackup catalog 371
Catalog backups
■ Session end means that no jobs are running. (This calculation does not include
catalog backup jobs.)
■ The Vault catalog backup is run whenever triggered from Vault, regardless of
whether a catalog backup job is running from the same policy.
■ Use only the methods that are described in this chapter to back up the catalogs.
These are the only methods that can track all relevant NetBackup activities and
ensure consistency between the catalog files.
■ Back up the catalogs often. If catalog backup files are lost, the changes that
were made between the last catalog backup and the time of the disk crash are
lost.
■ If you back up your catalogs to disk, always back up to a different disk than
where the catalog files reside. If you back up the catalog to the disk where the
actual catalog resides, both catalog backups are lost if the backup disk fails.
Recovering the catalog is much more difficult. Also, ensure that the disk has
enough space for the catalogs. Backups to a full disk fail.
Note: If a catalog backup is on tape, the tape must be removed when the backup
is finished or regular backups cannot proceed. NetBackup does not mix catalog
and regular backups on the same tape.
Note: If you are not able to receive the disaster recovery packages over emails
even after the disaster recovery email configuration, and then ensure the
following:
Your email exchange server is configured to have the attachment size equal to
or greater than the disaster recovery package size. You can check the size of
the package (.drpkg file size) on the disaster recovery file location that you
have specified in the catalog backup policy.
The firewall and the antivirus software in your environment allows the files with
the .drpkg extension (which is the extension of a disaster recovery package
file).
NetBackup emails the disaster recovery file when the following events occur:
■ The catalog is backed up.
■ A catalog backup is duplicated or replicated.
■ The primary catalog backup or any copy expires automatically or is expired
manually.
On Windows: You can tailor the disaster recovery email process by providing the
mail_dr_info.cmd script in the install_path\Veritas\NetBackup\bin directory.
This script is similar to the nbmail.cmd script. See the comments in the nbmail.cmd
script for use instructions.
Note: By default, the KMS configuration is not backed up during catalog backup.
Set the KMS_CONFIG_IN_CATALOG_BKUP configuration option to 1 to include
the KMS configuration as part of the disaster recovery package during catalog
backup.
Note: You must set a passphrase for the disaster recovery package for the catalog
backups to be successful.
Note: Catalog backups may fail with status code 144 even though the
passphrase is set. This situation occurs because the passphrase may be
corrupted. To resolve this issue, you must reset the passphrase.
Caution: Ensure that the passphrase contains only the supported characters. If
you enter a character that is not supported, you may face problems during disaster
recovery package restore. The passphrase may not be validated and you may not
be able to restore the disaster recovery package.
Protecting the NetBackup catalog 375
Set the passphrase to encrypt disaster recovery packages
■ Only the following characters are supported for the passphrase: White
spaces, uppercase characters (A to Z), lowercase characters (a to z),
numbers (0 to 9), and special characters.
Special characters include: ~ ! @ # $ % ^ & * ( ) _ + - = ` { } [ ] | : ; ' , . / ? <
>"
Caution: If you enter a character that is not supported, you may face
problems during disaster recovery package restore. The passphrase may
not be validated and you may not be able to restore the disaster recovery
package.
Search criteria
The following actions and search criteria are available when you search for catalog
images.
Property Description
Action Specifies the action that was used to create the image: Verify, Duplicate, Import.
Media
Media ID The media ID for the volume. To search on all media, select <All>.
Media host The host name of the media server that produced the originals. To search all hosts, select
All media hosts.
Disk pool The name of the disk pool. Not enabled if the disk type is BasicDisk.
Managing backup images 379
Catalog utility search criteria and backup image details
Property Description
Media server The name of the media server that produced the original images. To search all media
servers, select All media hosts.
Volume The ID of the disk volume in the disk pool. Enabled if the disk type is not BasicDisk.
Path Searches for an image on a disk storage unit, if the path is entered. Or, searches all of
the disk storage on the specified server, if All was selected. Enabled if the disk type is
BasicDisk.
Date/time range The range of dates and times that you want to search. The Global attributes property
Policy update interval determines the default range.
Copies The copy that you want to search. Select either Primary or the copy number.
Policy name The policy under which the selected backups were performed. To search all policies,
select All policies.
Type of backup The type of schedule that created the backup. To search all schedule types, select All
backup types. Enabled if you select a specific Policy type.
Client (host name) The host name of the client that produced the backup. To search all hosts, select All
clients.
Job priority
Override default job The job priority for the catalog action (verify, duplicate, or import).
priority
To change the default, enable Override default priority. Then, select a value for the Job
priority.
If this option is not enabled, the job runs using the default priority as specified in the Default
job priorities host property.
Changes that you make affect the priority for the selected job only.
Job priority The priority of the catalog job. Enabled if you override the default priority.
Property Description
Copy DTE mode Specifies whether the data is transferred over a secure
channel when the current image copy is created.
Copy hierarchy DTE mode Specifies whether the data is transferred over a secure
channel when the current image copy and all its parent
copies in the hierarchy are created.
Image DTE mode Indicates the data-in-transit encryption (DTE) mode for the
backup image.
Yes: The image has only one copy and a hold is set on
the copy.
WORM unlock time Indicates the time at which the image can be altered or
deleted.
NetBackup verifies only one backup at a time and tries to minimize media mounts
and positioning time.
To verify backup images
1 On the left, click Catalog.
2 From the Action list, select Verify.
3 Select the search criteria to find the image you want to verify. Click Search.
Backups that have fragments on another volume are included, as they exist in
part on the specified volume.
See “Catalog utility search criteria and backup image details” on page 378.
4 Select the image that you want to verify. Then click Verify.
5 Click the Activity tab to view the job results.
Promote a backup copy to a primary copy See the section called “Promote a backup copy to a primary
copy” on page 381.
Promote a copy to a primary copy for many backups using See the section called “Promote a copy to a primary copy
the bpchangeprimary command for many backups” on page 382.
3 Select the search criteria to find the image you want to promote. Be sure that
you indicate a copy in the Copies field and not Primary copy.
See “Catalog utility search criteria and backup image details” on page 378.
4 Click Search.
5 Select the image you want to promote. Then click Set primary copy.
After the image is promoted to the primary copy, the Primary copy column
immediately reads Yes.
6 Click the Activity tab to view the job results.
In the next example, the following command promotes copy 2 of all backups
of client_a. The copies must have been created after January 1, 2022:
■ From one storage unit to another. ■ While the backup is created (unless making
■ From one media density to another. multiple copies concurrently).
■ From one server to another. ■ When the backup has expired.
■ From multiplex to nonmultiplex format. ■ By using NetBackup to schedule
■ From multiplex format and retain the duplications automatically (unless you use
multiplex format on the duplicate. The a Vault policy to schedule duplication)
duplicate can contain all or any subset ■ When it is a multiplexed duplicate of the
of the backups that were included in the following type:
original multiplexed group. The duplicate ■ FlashBackup
is created with a single pass of the tape. ■ NDMP backup
(A multiplexed group is a set of backups ■ Backups from disk type storage units
that were multiplexed together during a ■ Backups to disk type storage units
single session.)
■ Nonmultiplexed backups
6 The primary copy is the copy from which restores are done. Normally, the
original backup is the primary copy.
If you want one of the duplicated copies to become the primary copy, select
the copy number from the drop-down, otherwise select Keep current primary
copy.
When the primary expires, a different copy automatically becomes primary.
(The copy that is chosen is the one with the smallest copy number. If the primary
is copy 1, copy 2 becomes primary when it expires. If the primary is copy 5,
copy 1 becomes primary when it expires.)
7 Specify the storage unit where each copy is stored. If a storage unit has multiple
drives, it can be used for both the source and destination.
All storage units must meet the criteria for creating multiple copies.
8 Specify the volume pool where each copy is stored.
The following volume pool selections are based on the policy type setting that
was used for the query.
If the Policy type is set to All policy types Specifies that all volume pools are
(default). included in the drop-down list. Both
catalog and non-catalog volume pools are
included.
If the Policy type is set to NBU-Catalog. Specifies that only catalog volume pools
are included in the drop-down list.
If the Policy type is set to a policy type Specifies that only non-catalog volume
other than NBU-Catalog or All policy pools are included in the drop-down list.
types.
NetBackup does not verify that the media ID selected for the duplicate copy is
different from the media ID that contains the original backup. Because of this
potential deadlock, specify a different volume pool to ensure that a different
volume is used.
9 Select the retention level for the copy, or select No change.
The duplicate copy shares many attributes of the primary copy, including backup
ID. Other attributes apply only to the primary. (For example, elapsed time.)
NetBackup uses the primary copy to satisfy restore requests.
Consider the following items when selecting the retention level:
■ If No change is selected for the retention period, the expiration date is the
same for the duplicate and the source copies. You can use the bpexpdate
command to change the expiration date of the duplicate.
Managing backup images 385
Duplicate backup images
■ If a retention period is indicated, the expiration date for the copy is the
backup date plus the retention period. For example, if a backup was created
on November 14, 2022 and its retention period is one week, the new copy’s
expiration date is November 21, 2022.
10 Specify whether the remaining copies should continue or fail if the specified
copy fails.
11 Specify who should own the media onto which you duplicate images.
Select one of the following:
A server group Specifies that only those media servers in the group
are allowed to write to the media on which backup
images for this policy are written. All of the media
server groups that are configured in your NetBackup
environment appear in the drop-down list.
12 If the selection includes multiplexed backups and the backups are to remain
multiplexed in the duplicate, select Preserve multiplexing. If you do not
duplicate all the backups in a multiplexed group, the duplicate contains a
different layout of fragments. (A multiplexed group is a set of backups that were
multiplexed together during a single session.)
By default, duplication is done serially and attempts to minimize media mounts
and positioning time. Only one backup is processed at a time. If Preserved
multiplexing is enabled, NetBackup first duplicates all backups that cannot
be multiplex duplicated before the multiplexed backups are duplicated.
The Preserve multiplexing setting does not apply when the destination is a
disk storage unit. However, if the source is a tape and the destination is a disk
storage unit, select Preserve multiplexing to ensure that the tape is read in
one pass.
13 Click Yes to start duplicating.
14 Click the Activity tab, then select the duplication job to view the job results.
See “Multiplexed duplication considerations” on page 386.
Managing backup images 386
Expire backup images
Consideration Description
Multiplex settings are ignored When multiplexed backups are duplicated, the multiplex
settings of the destination storage unit and the original
schedule are ignored. However, if multiple multiplexed groups
are duplicated, the grouping within each multiplexed group
is maintained. This means that the duplicated groups have
a multiplexing factor that is no greater than the factor that
was used during the original backup.
NetBackup deletes information about the backup. The files in the backups are
unavailable for restores without first re-importing.
To expire a backup image
1 On the left, click Catalog.
2 Select the search criteria to find the image you want to duplicate.
See “Catalog utility search criteria and backup image details” on page 378.
3 Select the image you want to expire and click Expire > Expire.
Phase Description
Phase I: Initiate NetBackup creates a list of expired catalog entries for the backups on the imported volume. No actual
Import import occurs in Phase I.
Phase II: Images are selected for importing from the list of expired images that was created in Phase I.
Import
See “Import backup images, Phase II” on page 389.
■ If you import a catalog backup, import all the child jobs that were used to create
the catalog backup. All jobs must be imported to import the catalog backup.
■ To import a volume with the same media ID as an existing volume on a server,
use the following example where you want to import a volume with media ID
A00001. (A volume with media ID A00001 already exists on the server.)
■ Duplicate the existing volume on the server to another media ID (for example,
B00001).
■ Remove information about media ID A00001 from the NetBackup catalog
by running the following command:
On Windows:
install_path\NetBackup\bin\admincmd\bpexpdate
-d 0 -m mediaID
On UNIX:
/usr/openv/netbackup/bin/admincmd/bpexpdate -d 0 -m
media_ID
If images are on tape In the Media ID field, enter the Media ID of the volume
that contains the backups to import.
If images are on disk In the Disk type field, select the type of the disk storage
unit on which to search for backup images. The disk types
depend on which NetBackup options are licensed.
6 Click Import to begin reading the catalog information from the source volume.
7 Click on the Activity tab to watch as NetBackup looks at each image on the
tape. NetBackup determines whether or not each image has expired and can
be imported. The job also displays in the Activity monitor as an Image import
type. Select the import job log to view the job results.
The following conditions occur when a client is added in the paused protection list:
■ Automatic and manual replication of the client is paused.
■ If the Automatic pause protection > Pause image expiration option is enabled,
the automatic image cleanup for the client is paused.
■ Chapter 32. Managing the global security settings for the primary server
■ Chapter 33. Using access keys, API keys, and access codes
Activity monitor actions Canceling, suspending, resuming, restarting, or deleting any type of job
creates an audit record.
Alerts and email notifications If an alert cannot be generated or an email notification cannot be sent for
NetBackup configuration settings. For example, SMTP server configuration
and the list of excluded status codes for alerts.
Security events and audit logs 397
About NetBackup auditing
Anomalies When a user reports an anomaly as false positive, the action is audited and
logged for that user.
Malware detection When malware scan is triggered, malware scan status and malware scan
configuration actions are audited.
Asset actions Deleting an asset, such as a vCenter server, as part of the asset cleanup
process is audited and logged.
Authorization failure Authorization failure is audited when you use the NetBackup web UI, or the
NetBackup APIs.
Certificate management Creating, revoking, renewing, and deploying of NetBackup certificates and
specific NetBackup certificate failures.
Certificate Verification Failures (CVFs) Any failed connection attempts that involve SSL handshake errors, revoked
certificates, or host name validation failures.
For certificate verification failures (CVFs) that involve SSL handshakes and
revoked certificates, the timestamp indicates when the audit record is posted
to the primary server. (Rather than when an individual certificate verification
fails.) A CVF audit record represents a group of CVF events over a time
period. The record details provide the start and the end times of the time
period as well as the total number of CVFs that occurred in that period.
Disk pools and Volume pools actions Adding, deleting, or updating disk or volume pools.
Host database NetBackup operations that are related to the host database.
IRE configuration and states Adding, updating, and deleting IRE allowed subnets or schedule. IRE external
network is opened or closed by IRE schedule or by an administrator.
Logon attempts Any successful or any failed logon attempts for the NetBackup web UI or
the NetBackup APIs.
Policies actions Adding, deleting, or updating policy attributes, clients, schedules, and backup
selections lists.
Security events and audit logs 398
About NetBackup auditing
Restore and browse image user actions All the restore and browse image content (bplist) operations that a user
performs are audited with the user identity.
To add all the bplist audit records from the cache into the NetBackup
database, run the following command on the primary server:
Security configuration Information that is related to changes that are made to the security
configuration settings.
Starting a restore job NetBackup does not audit when other types of jobs begin. For example,
NetBackup does not audit when a backup job begins.
Starting and stopping the NetBackup Starting and stopping of the nbaudit manager is always audited, even if
Audit Manager (nbaudit). auditing is disabled.
Storage lifecycle policy actions Attempts to create, modify, or delete a storage lifecycle policy (SLP) are
audited and logged. However, activating and suspending an SLP using the
command nbstlutil are not audited. These operations are audited only
when they are initiated from a NetBackup graphical user interface or API.
Token management Creating, deleting, and cleanup of tokens and specific token issuing failures.
User action that fails to create an audit If auditing is enabled but a user action fails to create an audit record, the
record audit failure is captured in the nbaudit log. NetBackup status code 108 is
returned (Action succeeded but auditing failed). The NetBackup
does not return an exit status code 108 when auditing fails.
Any failed actions. NetBackup logs failed actions in NetBackup error logs. Failed actions do not
display in audit reports because a failed attempt does not bring about a
change in the NetBackup system state.
Security events and audit logs 399
About NetBackup auditing
The effect of a configuration change The results of a change to the NetBackup configuration are not audited. For
example, the creation of a policy is audited, but the jobs that result from its
creation are not.
The completion status of a manually While the act of initiating a restore job is audited, the completion status of
initiated restore job the job is not audited. Nor is the completion status of any other job type,
whether initiated manually or not. The completion status is displayed in the
Activity Monitor.
Internally initiated actions NetBackup-initiated internal actions are not audited. For example, the
scheduled deletion of expired images, scheduled backups, or periodic image
database cleanup is not audited.
Rollback operations Some operations are carried out as multiple steps. For example, creating
an MSDP-based storage server consists of multiple steps. Every successful
step is audited. Failure in any of the steps results in a rollback, or rather, the
successful steps may need to be undone. The audit record does not contain
details about rollback operations.
Host properties actions Changes made with the bpsetconfig or the nbsetconfig commands,
or the equivalent property in host properties, are not audited. Changes that
are made directly to the bp.conf file or to the registry are not audited.
■ For any operations that do not require credentials or require the user to sign in,
operations are logged without a user identity.
Security events and audit logs 400
About NetBackup auditing
The audit report is retained for the value that is specified for the
number_of_days option.
In the following example, the records of user actions are retained for 30 days
and then deleted.
nbseccmd -setsecurityconfig -auditretentionperiod 30
To ensure that audit records are backed up during catalog backups, configure
the catalog backup frequency to be less frequent or equal to the value that you
specify for -auditretentionperiod.
5 To check the current audit retention period, run the following command:
nbseccmd -getsecurityconfig -auditretentionperiod
-sdate The start date and time of the report data you want
to view.
<"MM/DD/YY
[HH:[MM[:SS]]]">
-edate The end date and time of the report data you want
to view.
<"MM/DD/YY
[HH:[MM[:SS]]]">
■ [-order <DTU|DUT|TDU|TUD|UDT|UTD>].
Indicate the order in which the information
appears.
D (Description)
T (Timestamp)
U (User)
The following information only displays if you use the -fmt DETAIL or the -fmt
PARSABLE options.
REASON The reason that the action was performed. A reason displays if a
reason was specified for the operation that created the change.
DETAILS An account of all of the changes, listing the old values and the
new values.
communication. Additionally, the NetBackup web server uses these certificates for
communication between the NetBackup web UI and the NetBackup hosts.
Deployment of external certificates, updating or replacing external certificates, and
CRL management for the external CA are managed outside of NetBackup.
For more information on external certificates, see the NetBackup Security and
Encryption Guide.
You can view and revoke NetBackup certificates and view information about the
NetBackup CA. More detailed information about NetBackup certificate management
and certificate deployment is available in the NetBackup Security and Encryption
Guide.
Note: Do not revoke a certificate of the primary server. If you do, NetBackup
operations may fail.
Managing security certificates 408
Manage NetBackup security certificates
Note: The information here only applies to the security certificates that the
NetBackup certificate authority (CA) issues. External certificates must be managed
outside of NetBackup.
host administrator must use to obtain a new certificate. This reissue token retains
the same host ID as the original certificate. The token can only be used once.
Because it is associated to a specific host, the token cannot be used to request
certificates for other hosts.
To reissue a NetBackup certificate for a host
1 On the left, select Security > Certificates.
2 Select the NetBackup certificates tab.
3 Select the host and select Actions > Generate reissue token.
4 Enter a token name and indicate how long the token should be valid for.
5 Select Create.
6 Select Copy to clipboard and then select Close.
7 Share the authorization token so the host’s administrator can obtain a new
certificate.
Note: The information here only applies to the security certificates that the
NetBackup certificate authority (CA) issues. External certificates must be managed
outside of NetBackup.
Depending on the security level for NetBackup certificate deployment, you may
need an authorization token to issue a new NetBackup certificate to a host. You
can create a token when it is required or find and copy a token if it is needed again.
Tokens can be cleaned up or deleted if they are no longer needed.
To reissue a certificate, a reissue token is required in most cases. A reissue token
is associated with the host ID.
4 Select Create.
Cleanup tokens
Use the Cleanup tokens utility to delete tokens from the token database that are
expired or that have reached the maximum number of uses allowed.
To cleanup tokens
1 On the left, select Security > Tokens.
2 Click Cleanup > Yes.
Delete a token
You can delete a token before it is expired or before the Maximum uses allowed
is reached.
To delete a token
1 On the left, select Security > Tokens.
2 Select the name of the tokens that you want to delete.
3 Select Delete.
Note: Windows certificate store is not supported as certificate source for the
NetBackup web server.
■ If the FIPS mode is enabled on the primary server, you can use only the
PEM-formatted files for the configureWebServerCerts command.
■ install_path/netbackup/bin/nbwmc start
Windows install_path\NetBackup\wmc\bin\install\
Managing security certificates 413
Using external security certificates with NetBackup
UNIX install_path/wmc/bin/install
6 Verify that you can access the NetBackup web user interface using a browser,
without a certificate warning message.
Refer to the NetBackup Commands Reference Guide for more details on the
command-line options.
■ In a clustered primary server setup, run the following command on the
active node to freeze the cluster to avoid a failover:
install_path/netbackup/bin/bpclusterutil -freeze
install_path/netbackup/bin/bpclusterutil -unfreeze
Note: Before you can see external certificate information, you must configure
NetBackup for external certificates. See the NetBackup Security and Encryption
Guide for details.
As you add external certificates to the hosts in the NetBackup domain, use the
External certificates dashboard to track which hosts need attention. To support
an external certificate, a host must be upgraded and enrolled with an external
certificate.
Managing security certificates 415
Using external security certificates with NetBackup
■ Approve or add mappings for a host that has multiple host names
For host name-based certificates for 8.0 and earlier NetBackup hosts, refer to the
respective version of the NetBackup Security and Encryption Guide.
To view NetBackup host information
1 On the left, select Security > Host mappings.
Review the security status and any other host names that are mapped to this
host.
2 For additional details for this host, click the name of the host.
Managing host mappings 417
Approve or add mappings for a host that has multiple host names
Note: You must map all available host names with the associated host ID. When
you deploy a certificate to a host, the host name must map to the associated host
ID. If it does not, NetBackup considers the host to be a different host. NetBackup
then deploys a new certificate to the host and issues it a new host ID.
5 Select the NetBackup hosts that you want to add and select Add to list.
For example, if you entered a cluster name in step 3 select the nodes in the
cluster here.
6 Select Save.
client01.lab04.com client01
client01.lab04.com clustername
client01.lab04.com clustername.lab04.com
client02.lab04.com client02
client02.lab04.com clustername
client02.lab04.com clustername.lab04.com
After you approve all the valid mappings, you see the Mapped host or IP address
settings that are similar to the following entries.
Managing host mappings 420
Example host mappings
Table 27-1 Multiple host name entries for a host in a multi-NIC environment
client01-name.domain.com clientname-host1.domain.com,
osname-host1.domain.com
Managing host mappings 421
Example host mappings
client01-bk.lab04.com clustername-bk.lab04.com
client02-bk.lab04.com clustername-bk.lab04.com
After you approve all the valid mappings, you see the Mapped host or IP address
settings that are similar to the following entries.
client01-bk.lab04.com clustername-bk.lab04.com
client02-bk.lab04.com clustername-bk.lab04.com
Table 27-4 Example mapped host names for SQL Server environments
FCI (cluster with two nodes) Physical name of Node 1 Virtual name of the SQL
Server cluster
Current posture
Current posture comprises the current values of NetBackup security settings. It is
recommended that you enable all security settings to minimize the security
configuration risk.
Minimizing security configuration risk 425
Set the current posture as security baseline
Security baseline
Security baseline is a collection of recommended security settings for your
NetBackup domain. For the first time, you configure the security settings as per the
recommendation, and use this current posture as your security baseline.
By default, security baseline is not configured.
See “Set the current posture as security baseline” on page 425.
The security baseline is managed by the NetBackup Administrator or the Security
Administrator.
For primary servers that are registered with Veritas Alta View server, the security
baseline is managed by the Veritas Alta View Administrator.
Compliance status
If a NetBackup security setting (current posture) does not comply with the security
baseline, it is shown in the compliance status as 'Not compliant with the baseline'.
You should review the compliance status and modify the security settings to minimize
the risk.
2 On the Global security settings > Overview tab, click Use current posture
values as security baseline.
After the security baseline is set, if a NetBackup security setting is modified
and therefore it no longer complies with the security baseline, it is flagged in
the compliance status on the Global security settings > Overview tab.
Chapter 29
Configuring multi-person
authorization
This chapter includes the following topics:
Support information
■ Multi-person authorization is not supported in a domain where NetBackup Access
Control (NBAC) is enabled.
■ Multi-person authorization is not supported for catalog maintenance operations
by certain database agents.
As part of the database catalog synchronization, the database may initiate an
image expiration request through command-line or other interfaces to the
NetBackup catalog, which does not generate multi-person authorization ticket.
To prevent the direct expiration of backup images by database agents see the
'About preventing the direct expiration of backup images' topic in the NetBackup
for Oracle Administrator's Guide.
Terminology
■ Ticket - Ticket is a multi-person authorization request to perform a critical
operation.
■ Requester - A requester is a user who wants to perform a critical operation that
requires multi-person authorization.
■ Approver - An approver is an individual who reviews and allows an operation
that requires multi-person authorization by approving a ticket.
■ Exempted user - An exempted user is not required to go through the multi-person
authorization workflow. This user must only be used to perform critical operations
like image expiration and image hold removal.
For additional security, it is recommended that there are no exempted users.
■ nbdecommission
■ bpimage -deleteCopy
■ nbholdutil -delete
■ nbseccmd -setsecurityconfig
Table 29-1
Step Description
Step Description
Step 7 When the approver approves or rejects the ticket, the requester
is notified. If the ticket is approved, the associated operation is
executed.
Note: For API key operations, the requester needs to execute
the operation using the web UI after the ticket is approved.
Table 29-2
RBAC role Permissions
Table 29-3
Component Description
The following sample flow is for the image expiry operation that requires
multi-person authorization:
2 A ticket is created.
7 The ticket activity log, request, and response details can be viewed
by the approver or the requester using the web UI, on the Ticket
details page.
Component Description
7 If the ticket ages beyond the expiry period, the ticket is moved to
the Expired state.
8 Only the requester can renew such tickets. A new expiry period
is calculated for the renewed ticket based on the configuration
settings multi-person authorization.
2 The approver evaluates the details of the ticket and either approves
or rejects the ticket based on the assessment.
Component Description
Exempted users 1 An exempted user is an individual who does not need multi-person
authorization for operations except the following:
■ To modify multi-person authorization configuration
■ To modify security properties
■ Security
■ Global security settings
■ Encryption key management
■ API keys
■ MSDP WORM
■ WORM retention lock removal
■ WORM configuration change
5 Select Save.
6 Configure the users to exempt from multi-person authorization.
7 Go to Schedules. Then select Edit.
Configuring multi-person authorization 437
View multi-person authorization tickets
8 Specify the settings for when you want to expire and purge the multi-person
authorization tickets.
9 Select Save.
10 Select Configure.
Note: User groups cannot be added to the exempted list. Only individual users can
be exempted.
Configuring multi-person authorization 438
Schedule expiration and purging of multi-person authorization tickets
The exempted users also need to go through the multi-person authorization workflow
for the following operations:
■ Modifying multi-person authorization configuration
■ Modifying global security settings
■ Modifying risk engine-based anomaly detection configuration
An exempted user is generally an automation user or a script that does not require
multi-person authorization. By default, multi-person authorization configuration does
not have exempted users and that is a recommended security setting.
To add exempted users
1 Sign into the NetBackup web UI.
2 On the left pane, select Security > Multi-person authorization.
3 On the top right, select Configure multi-person authorization.
4 In the Exempted users section, select the Add button.
5 Specify the name of the user whom you want to exempt from the multi-person
authorization process.
6 Select Add to list and then Save.
7 Select Save.
You can disable multi-person authorization for a specific operation using the
NetBackup web UI
To disable multi-person authorization for a specific operation
1 On the left pane, click Security > Multi-person authorization.
2 On the top right, click Configure multi-person authorization.
3 In the Operations for multi-person authorization section, click Edit.
4 Clear the check box for the operation for which you want to disable multi-person
authorization.
5 Select Save.
6 Select Save.
This generates a ticket that is shown on the ticket details page with the operation
name as MPA Configuration.
Multi-person authorization will be disabled for the associated operation only
after the approval of the respective ticket.
Chapter 30
Managing user sessions
This chapter includes the following topics:
Note: Changes to a user’s roles are not immediately reflected in the web UI. An
administrator must terminate the active user session before any changes take effect.
Or, the user must sign out and sign in again.
Note: User logins that are based on the following authentication types do not support
multifactor authentication: SAML, smart card, and API keys.
See “Configure multifactor authentication for your user account” on page 446.
Configuring multifactor authentication 446
Configure multifactor authentication for your user account
5 Enter the one-time password that you see in the authenticator application on
your smart device.
6 Select Configure.
At the time of next sign-in, you need to enter the one-time password along with
the username and password.
3 Locate the section Reset multifactor authentication for a user. Then select
Reset.
4 Select the user for whom you want to reset multifactor authentication.
5 Select Reset.
6 At the prompt, enter the one-time password and select Confirm.
Chapter 32
Managing the global
security settings for the
primary server
This chapter includes the following topics:
In case of fresh NetBackup installation, the global DTE mode is set to Preferred
On by default.
In case of NetBackup upgrade, the previous setting is retained.
This setting can be overridden by the NetBackup client setting.
■ Enforced: Specifies that the data-in-transit encryption is enforced if the
NetBackup client setting is either 'Automatic' or 'On'. With this option selected,
jobs fail for the NetBackup clients that have the data-in-transit encryption set to
'Off' and for the hosts earlier than 9.1.
Note: By default, the DTE mode for 9.1 clients is set to Off and for 10.0 and later
clients, it is set to Automatic.
■ Preferred On
■ Enforced
Note: During NetBackup certificate deployment on a NAT client, you must provide
an authorization token irrespective of the certificate deployment security level that
is set on the primary server. This is because, the primary server cannot resolve the
host name to the IP address from which the request is sent.
For more information about NAT support in NetBackup, refer to the NetBackup
Administrator's Guide, Volume I.
Very High An authorization token is required for every new NetBackup The CRL that is present on the host
certificate request. is refreshed every hour.
Managing the global security settings for the primary server 455
About NetBackup certificate deployment security levels
High (default) No authorization token is required if the host is known to The CRL that is present on the host
the primary server. A host is considered to be known to the is refreshed every 4 hours.
primary server if the host can be found in the following
entities:
Medium The certificates are issued without an authorization token The CRL that is present on the host
if the primary server can resolve the host name to the IP is refreshed every 8 hours.
address from which the request was originated.
Managing the global security settings for the primary server 456
Select a security level for NetBackup certificate deployment
High (Default) NetBackup does not require an authorization token if the host is
known to the primary server. Known means that the host appears
in a NetBackup configuration file, the EMM database, a backup
policy, or the host is a legacy client.
4 Select Save.
NetBackup hosts must perform a TLS handshake and verify the peer identity before
NetBackup sends traffic across that connection.
TLS session resumption is an open standards optimization that allows a TLS client
and server to reuse a secure session that is generated during a previous connection.
Reusing a secure session allows NetBackup to use a streamlined handshake
instead of a full handshake. Performing this action reduces both the host CPU and
time that is required to establish the new connection.
TLS version 1.2 reduces forward security for the interval between full handshakes.
To limit this window while still benefitting from session reuse, NetBackup allows
global configuration of the maximum interval between full TLS handshakes.
To use the options for TLS session resumption, navigate to Settings > Global
security > Secure communication. You can use the Perform full handshake
every option to set the security level as follows:
■ Default for current security level – If you use this option, NetBackup defaults
to the security setting as follows:
■ Very high - 10 minutes
■ High - 30 minutes
■ Medium - 60 minutes
■ Custom (overrides the security level settings) - The value of this interval can
be configured at a minute granularity, within the range of 1 minute to 720 minutes.
The TLS 1.3 session ticket lifetime is same as the interval that is mentioned earlier.
However, the TLS 1.3 session ticket is used only once.
Note: This feature currently only applies to NBCA. ECA to be supported in a future
release.
See the information for disaster recovery settings in the NetBackup Security and
Encryption Guide.
To set a passphrase for disaster recovery
1 At the top, click Settings > Global security.
2 Go to the Disaster recovery tab.
3 Enter and confirm a passphrase.
Note: The passphrase should meet any additional constraints that you may
have set. You can verify the additional constraints using the nbseccmd command
or the passphrase-constraints web API.
4 Select Save.
Table 32-2 Determining the certificate authority (CA) to use for a trust
relationship between servers
NetBackup CA NetBackup CA
NetBackup CA NetBackup CA
Which certificate The target primary server may support external CA, NetBackup CA,
authorities (CA) or both.
does the target
See “View the Certificate authority for secure communication”
primary server
on page 451.
support?
The following table lists the CA support scenarios and the certificate to use to
establish trust between the source and the target primary servers.
Can the primary Which CA does the Certificate to use for the trust setup
server use an target primary server
external use?
certificate?
■ Ensure that you have the RBAC System Administrator role or a role with similar
permissions. Or, for appliances with software versions 3.1 and later you must
have permissions for the NetBackup CLI user.
■ For a remote Windows primary server, the user's domain may not be the same
as that of the authentication service. In this case you must add the domain with
LDAP using thevssat addldapdomain command.
■ For a NetBackup CA-signed certificate, the recommended method to authenticate
the server is the option Specify authentication token of the trusted primary
server.
■ If you use the option Specify credentials of the trusted primary server, that
method may present a possible security breach. Only an authentication token
can provide restricted access and allow secure communication between both
the hosts. To establish trust with a 3.1 NetBackup primary appliance, use the
NetBackup CLI credentials.
To add a trusted primary server
1 Open the NetBackup web UI.
2 Identify the NetBackup versions that are installed and the certificate types that
are used on the source and the target servers.
The NetBackup web UI does not support adding a trusted primary that uses
NetBackup version 8.0 or earlier. Both servers must use the same certificate
type.
3 For the servers that use the NetBackup certificate authority (CA), obtain an
authorization token for the remote server.
See “Manage NetBackup certificate authorization tokens” on page 410.
4 For the servers that use the NetBackup certificate authority (CA), obtain the
fingerprint for each server.
See “Manage NetBackup security certificates” on page 407.
5 At the top right, select Settings > Global security.
6 Select the Trusted primary servers tab.
7 Select the Add button.
8 Enter the fully-qualified host name of the remote primary server and
selectValidate Certificate Authority.
9 Follow the prompts in the wizard.
10 Repeat these steps on the remote primary server.
Managing the global security settings for the primary server 462
About trusted primary servers
More information
For more information on using an external CA with NetBackup, see the NetBackup
Security and Encryption Guide.
Note: Any trusted primary servers at NetBackup version 8.0 or earlier must be
removed using the NetBackup Administration Console or the NetBackup CLI.
You can remove a trusted primary server, which removes the trust relationship
between primary servers. Note the following implications:
■ Any replication operations fail that require the trust relationship.
■ A remote primary server is not included in any usage reporting after you remove
the trust relationship.
To remove a trusted primary server, you must perform the following procedure on
both the source and the target server.
To remove a trusted primary server
1 Open the NetBackup web UI.
2 Ensure that all replication jobs to the target primary server are complete.
3 Delete all storage lifecycle policies (SLPs) that use the trusted primary as a
destination. Before deleting an SLP, ensure that there are no backup policies
or protection plans that use the SLP for storage.
4 At the top right, select Settings > Global security.
5 Select the Trusted primary servers tab.
6 Locate the server that you want to remove.
7 Select Actions > Remove.
8 Select Remove trust.
Note: If you use multiple NICs, if you established trust using more that one host
NIC and if you remove the trust relationship with any one host NIC, the trust with
all the other host NICs is broken.
Managing the global security settings for the primary server 463
Configure the audit retention period
■ Access keys
■ API keys
■ Access codes
Access keys
NetBackup access keys provide access the NetBackup interfaces through API keys
and access codes.
See “API keys” on page 464.
See “Access codes” on page 470.
API keys
A NetBackup API key is a pre-authenticated token that identifies a NetBackup user
to NetBackup RESTful APIs. The user can use the API key in an API request header
when a NetBackup API requires authentication. API keys can be created for
authenticated NetBackup users (groups are not supported). A specific API key is
only created one time and cannot be recreated. Each API key has a unique key
value and API key tag. NetBackup audits operations that are performed with that
key with the full identity of the user.
The 'View' RBAC permission is required to create an API key.
The following actions are available for administrators and API key users.
Using access keys, API keys, and access codes 465
API keys
■ Administrators with the applicable role or RBAC permissions can manage API
keys for all users. These roles are the Administrator, the Default Security
Administrator, or a role with RBAC permissions for API keys.
■ An authenticated NetBackup user can add and manage their own API key in
the NetBackup web UI. If a user does not have access to the web UI, they can
use the NetBackup APIs to add or manage a key.
Note: Starting with NetBackup 10.5, if multi-person authorization is enabled for API
key operations, a ticket is generated. After the multi-person authorization ticket is
approved, the user needs to execute the ticket using the Execute ticket option in
the NetBackup web UI and then the required API key operation is executed.
For NetBackup releases earlier than 10.5, if multi-person authorization is enabled,
you cannot perform API key operations.
More information
See “User identity in the audit report” on page 399.
See the NetBackup Security and Encryption Guide for information on using API
keys with the bpnbat command.
5 Indicate how long you want the API key to be valid, from today's date.
NetBackup calculates the expiration date and displays it.
6 Select the Add button.
7 To copy the API key, select Copy and close.
Store this key in a safe place. After you select Copy and close, the key cannot
be retrieved again. If this API key replaces a previous key for your account,
you must update any scripts, etc. to reflect the new API key.
Note: Starting with NetBackup 10.5, if multi-person authorization is enabled for API
key operations, a ticket is generated. After the multi-person authorization ticket is
approved, editing, reissuing, or deleting an API key is performed. For NetBackup
releases earlier than 10.5, if multi-person authorization is enabled, you cannot
perform API key operations.
Note: For SAML users, avoid selecting an expiration date for the API key that occurs
after the SAML session expires. If the date occurs after the session expires, this
action can introduce a security risk with that API key.
Using access keys, API keys, and access codes 467
API keys
You can edit the description of an API key or change the expiration date of an active
API key.
To edit the expiration date or description for an API key
1 On the left, select Security > Access keys > API keys.
2 Select the check box for the API key that you want to edit.
3 Select Actions > Edit.
4 Note the current expiration date for the key and extend the date as wanted.
5 Make any wanted changes to the description.
6 Select Save.
Note: For SAML users, avoid selecting an expiration date for the API key that occurs
after the SAML session expires. If the date occurs after the session expires, this
action can introduce a security risk with that API key.
When an API key expires you can reissue the API key. This action creates a new
API key for the user.
To reissue an API key
1 On the left, select Security > Access keys > API keys.
2 Select the check box for the API key that you want to edit.
3 Select the Actions menu. Then select Reissue > Reissue.
Access codes
To run certain NetBackup administrator commands, for example bperror, you need
to authenticate through the web UI. You need to generate an access code through
the command-line interface, get the access request approved from the administrator,
and then access the command.
With the web UI authentication for CLI access, NetBackup administrators can
delegate the associated privileges to other users. By default, only a root administrator
or an administrator can perform NetBackup operations through the command-line
interface. The web UI authentication support allows non-root users to administer
NetBackup who have CLI access that the Security Administrator has granted. You
can also administer NetBackup with a non-RBAC user role (such as Operating
System Administrator) even though you are not registered as a NetBackup user.
Each time you need to generate a new access code to access CLIs.
■ Troubleshooting SSO
■ To use SSO, you must have a SAML 2.0 compliant identity provider
configured in your environment.
■ Only one AD or LDAP domain is supported for each primary server domain.
This feature is not available for local domain users.
■ Configuration of the IDP requires the NetBackup APIs or the NetBackup
command nbidpcmd.
■ API keys are used to authenticate a user or a group and cannot be used
with SAML-authenticated users or groups.
■ Global logout is not supported.
See “Configure NetBackup for single sign-on (SSO)” on page 480.
4 Select the required AD or LDAP domain from the Select the domain option.
5 Select a Certificate mapping attribute: Common name (CN) or Universal
principal name (UPN).
6 Optionally, enter the OCSP URI.
If you do not provide the OCSP URI, the URI in the user certificate is used.
7 Select Save.
8 To the right of CA certificates, click Add.
9 Browse for or drag and drop the CA certificates and click Add.
Smart card authentication requires a list of trusted root or intermediate CA
certificates. Add the CA certificates that are associated with the user digital
certificates or the user smart cards.
Certificate file types must be .crt, .cer, .der, .pem, or PKCS #7 format and
less than 64KB in size.
10 On the Smart card authentication page, verify the configuration information.
After configuring smart card authentication, you must restart the NetBackup
Web Management Console (nbwmc) service.
11 Before users can use a digital certificate that is not installed on a smart card,
the certificate must be uploaded to the browser’s certificate manager.
See the browser documentation for instructions or contact your certificate
administrator for more information.
12 When users sign in, they now see an option to Sign in with certificate or
smart card.
If you do not want users to have this sign-in option yet, turn off Smart card
authentication. (For example, if all users do not yet have their certificates
configured on their hosts.). The settings that you configured are retained even
if you turn off smart card authentication.
For such users, the domain name and domain type are smart card.
Delete a CA certificate
You can delete a CA certificate if it is no longer used for smart card authentication.
Note that if a user attempts to use the associated digital certificate or smart card
certificate, they are not able to sign in to NetBackup.
To delete a CA certificate
1 At the top right, select Settings > Smart card authentication.
2 Select the CA certificates that you want to delete.
3 Select Delete > Delete.
Network connectivity
Network connectivity
Redirect to primary
Redirect to IDP
No network
connectivity
Browser host
Primary server Identity provider
1. Download the IDP Download and save the IDP metadata XML file from the
metadata XML file IDP.
2. Configure the SAML See “Configure the SAML KeyStore” on page 481.
keystore, and add and
See “Configure the SAML keystore and add and enable
enable the IDP
the IDP configuration” on page 484.
configuration on the
NetBackup primary
server
Configuring authentication options 481
Configure NetBackup for single sign-on (SSO)
3. Download the service The NetBackup primary server is the SP in the NetBackup
provider (SP) environment. You can access the SP metadata XML file
metadata XML file from the NetBackup primary server by entering the following
URL in your browser:
https://primaryserver/netbackup/sso/saml2/metadata
4. Enroll the NetBackup See “Enroll the NetBackup primary server with the IDP”
primary server as a on page 487.
service provider (SP)
with the IDP
5. Add SAML users and SAML users and SAML user groups are available in RBAC
the SAML groups that only if the IDP is configured and enabled on the NetBackup
use SSO to the primary server. For steps on adding RBAC roles, see the
necessary RBAC roles following topic.
After the initial setup, you can choose to enable, update, disable, or delete the IDP
configuration.
See “Manage an IDP configuration” on page 488.
After the initial setup, you can choose to update, renew, or delete the NetBackup
CA SAML keystore . You can also configure and manage the ECA SAML keystore.
Once the NetBackup CA KeyStore is created, ensure that you update the NetBackup
CA KeyStore every time the NetBackup CA certificate is renewed.
To renew the NetBackup CA KeyStore
1 Log on to the NetBackup primary server as root or administrator.
2 Run the following command:
nbidpcmd -rCert -M master_server
3 Download the new SP metadata XML file from the NetBackup primary server
by entering the following URL in your browser:
https://primaryserver/netbackup/sso/saml2/metadata
Where primaryserver is the IP address or host name of the NetBackup primary
server.
4 Upload the new SP metadata XML file to the IDP.
See “Enroll the NetBackup primary server with the IDP” on page 487.
To remove the NetBackup CA KeyStore
1 Log on to the NetBackup primary server as root or administrator.
2 Run the following command
nbidpcmd -dCert -M master_server
Configuring authentication options 483
Configure NetBackup for single sign-on (SSO)
3 Download the new SP metadata XML file from the NetBackup primary server
by entering the following URL in your browser:
https://primaryserver/netbackup/sso/saml2/metadata
Where primaryserver is the IP address or host name of the NetBackup primary
server.
4 Upload the new SP metadata XML file to the IDP.
5 See “Enroll the NetBackup primary server with the IDP” on page 487.
Note: If you are using a combination of an ECA and the NetBackup CA in your
environment, by default, the ECA is considered while establishing trust with the IDP
server. To use the NetBackup CA, you must first remove the ECA KeyStore.
■ Run the following command to use ECA certificate chain and private key
provided by the user:
nbidpcmd -cECACert -certPEM certificate chain file -privKeyPath
private key file [-ksPassPath Keystore Passkey File] [-f] [-M
<master_server>]
■ Certificate chain file specifies the certificate chain file path. The file must
be in PEM format and must be accessible to the primary server on which
the configuration is being performed.
■ Private key file specifies the private key file path. The file must be in PEM
format and must be accessible to the primary server on which the
configuration is being performed.
■ KeyStore passkey file specifies the KeyStore password file path and must
be accessible to the primary server on which the configuration is being
performed.
Configuring authentication options 484
Configure NetBackup for single sign-on (SSO)
Configure the SAML keystore and add and enable the IDP
configuration
Before proceeding with the following steps, ensure that you have downloaded the
IDP metadata XML file and saved it on the NetBackup primary server.
To configure SAML keystore and add and enable an IDP configuration
1 Log on to the primary server as root or administrator.
2 Run the following command.
For IDP and NetBackup CA SAML KeyStore configuration:
nbidpcmd -ac -n IDP configuration name -mxp IDP XML metadata file
[-t SAML2] [-e true | false] [-u IDP user field] [-g IDP user
group field] [-cCert] [-f] [-M primary server]
■ Use ECA certificate chain and private key provided by the user:
Configuring authentication options 485
Configure NetBackup for single sign-on (SSO)
Note: Ensure that the SAML attribute values are returned in the format of
username@domainname for the field mapped to the -u option that defaults
to userPrincipalName. If you include the domain name when returning
group information, it should follow the format "(CN=group name,
DC=domainname)" or "(domainname\groupname).
However, if you return the group name as plain text without domain
information, it should be mapped without the domain name in the SAML
RBAC group.
Table 34-2 IDP-specific steps for enrolling the NetBackup primary server
ADFS https://www.veritas.com/docs/100047744
Okta https://www.veritas.com/docs/100047745
PingFederate https://www.veritas.com/docs/100047746
Azure https://www.veritas.com/docs/100047748
Shibboleth https://www.veritas.com/docs/00047747
Table 34-3
Corresponding AD SAML attribute format
or LDAP attribute
userPrincipalName username@domainname
Note: While adding the IDP configuration to the NetBackup primary server, the
values entered for the user (-u) and user group (-g) options must match the SAML
attribute names that are mapped to the userPrincipalName and the memberOf
attributes in the AD or LDAP.
See “Configure the SAML keystore and add and enable the IDP configuration”
on page 484.
Note: Even though you can configure multiple IDPs on a NetBackup primary server,
only one IDP can be enabled at a time.
■ IDP XML metadata file is the path to the XML metadata file, which
contains the configuration details of the IDP in Base64URL-encoded format.
If you want to update the IDP user or IDP user group values in an IDP configuration,
you must first delete the configuration. The single sign-on (SSO) option is not
available for users until you re-add the configuration with the updated IDP user or
IDP user group values.
To update IDP user or IDP user group in an IDP configuration
1 Log on to the primary server as root or administrator.
2 Delete the IDP configuration.
nbidpcmd -dc -n IDP configuration name
Troubleshooting SSO
This section provides steps for troubleshooting issues related to SSO.
Redirection issues
If you are facing issues with redirection, check the error messages in web services
log files to narrow down the cause of the issue. NetBackup creates logs for the
NetBackup web server and for the web server applications. These logs are written
to the following location:
■ UNIX: /usr/openv/logs/nbwebservice
■ Windows:install_path\NetBackup\logs\nbwebservice
To ensure that the latest configuration details are available to the NetBackup primary
server, download the latest copy of the XML metadata file from the IDP. Use the
IDP XML metadata file to add and enable the latest IDP configuration on the
NetBackup primary server. See “Configure the SAML keystore and add and enable
the IDP configuration” on page 484.
Table 34-4
Web Service log error message Explanation and recommended action
userPrincipalName not found in While adding the IDP configuration to the NetBackup primary
response. server, the value entered for the user (-u) option must match the
SAML attribute name, which is mapped to the
userPrincipalName attribute in AD or LDAP. For more
information, See “Configure the SAML keystore and add and
enable the IDP configuration” on page 484.
Configuring authentication options 492
Troubleshooting SSO
userPrincipalName is not in expected The IDP sends SAML responses to the NetBackup primary server,
format which contains SAML user and SAML user group information. To
enable the IDP to successfully send this information, ensure the
value of userPrincipalName attribute sent by the IDP is defined
in the format of username@domainname.
Authentication issue instant is too This error can occur because of the following reasons:
old or in the future
■ The date and time of IDP server and the NetBackup primary
server is not synchronized.
■ By default, the NetBackup primary server allows a user to
remain authenticated for a period of 24 hours. You might
encounter this error, If an IDP allows a user to remain
authenticated for a period longer than 24 hours. To resolve
this error, you can update the SAML authentication lifetime of
the NetBackup primary server to match that of the IDP.
Specify the new SAML authentication lifetime in the
<installpath>\var\global\wsl\config\web.conf
file on the NetBackup primary server.
For example, If your IDP has an authentication lifetime as 36
hours, update the entry in the web.conf file as follows:
SAML_ASSERTION_LIFETIME_IN_SECS=129600
Response is not success This error can occur because of the following reasons:
Table 34-5
Cause Explanation and recommended action
RBAC roles are not assigned to the After an IDP configuration is added and enabled on the NetBackup primary
SAML users and the SAML groups. server, ensure that necessary RBAC roles are assigned to SAML users and
SAML user groups that use SSO. Note that SAML users and SAML user
groups are available in RBAC only after the IDP configuration is added and
enabled on the NetBackup primary server.
RBAC roles are assigned to SAML users When you add a SAML users or SAML user group in RBAC, the SAML user
and SAML user groups associated with or SAML user group entry is associated with the IDP configuration that is
an IDP configuration that is not currently added and enabled at that time.
added and enabled.
If you add and enable a new IDP configuration, ensure that you also add
another entry for the SAML user or SAML user group. The new entry is
associated with the new IDP configuration.
RBAC roles are assigned to local SAML user or SAML user group records might appear similar to
domain users or Active Directory (AD) corresponding local domain users or AD or LDAP domain users already
or LDAP domain users (instead of SAML added in the RBAC.
users and SAML user groups).
After an IDP configuration is added and enabled on the NetBackup primary
server, ensure that you add SAML users and SAML user groups in RBAC
and assign the necessary permissions. Note that SAML users and SAML
user groups are available in RBAC only after the IDP configuration is added
and enabled on the NetBackup primary server.
For steps on adding SAML users and user groups, See “Add a user to a role
(non-SAML)” on page 498.
Configuring authentication options 494
Troubleshooting SSO
The NetBackup primary server is unable The IDP sends SAML responses to the NetBackup primary server, which
to retrieve user group information from contains SAML user and SAML user group information. To enable the IDP
the IDP to successfully send this information, ensure the following:
■ RBAC features
■ Authorized users
■ Configuring RBAC
■ Role permissions
RBAC features
The NetBackup web user interface provides the ability to apply role-based access
control in your NetBackup environment. Use RBAC to provide access for the users
that do not currently have access to NetBackup. Or, for current NetBackup users
with administrator access you can provide limited access and permissions, based
on their role in your organization.
For information on access control and auditing information for root users and
administrators, refer to the NetBackup Security and Encryption Guide.
Managing role-based access control 496
Authorized users
Feature Description
Roles allow users to perform Add users to one or more default RBAC roles or create custom roles to fit the role
specific tasks of your users. Add a user to the Administrator role to give full NetBackup
permissions to that user.
Users can access NetBackup RBAC users can perform common tasks for their business role, but are restricted
areas and the features that fit their from accessing other NetBackup areas and features. RBAC also controls the
role assets that users can view or manage.
Authorized users
The following users are authorized to sign in to and use the NetBackup web UI.
Table 35-2 Users that are authorized to use the NetBackup web UI
nbasecadmin Appliance user Default Security This role can grant access to other appliance users.
Administrator role
appadmin Flex Appliance user The default admin user for the NetBackup appliance
does not have access to the web UI.
Users that have an RBAC role that Varies See “Configuring RBAC” on page 496.
gives access to the web UI
Configuring RBAC
To configure role-based access control for the NetBackup web UI, perform the
following steps.
Managing role-based access control 497
Configuring RBAC
1 Configure any Active Before you can add domain users, Active Directory or LDAP domains must
Directory or LDAP domains. be authenticated with NetBackup.
2 Determine the permissions Determine the permissions that your users need to perform their daily tasks.
that your users need.
You can use the default RBAC roles or use a default role as a template to
create a new role. Or, you can create a completely custom role to fit your
needs.
3 Add users to the appropriate See “Add a user to a role (non-SAML)” on page 498.
roles.
See “Add a user to a role (SAML)” on page 500.
4 Determine the permissions See “Disable web UI access for operating system (OS) administrators”
that you want for OS on page 514.
administrators
See “Disable command-line (CLI) access for operating system (OS)
administrators” on page 513.
In most cases a Create permission does not give a user View permission. A
Recovery permission does not give a user View permission or other recovery
options like Overwrite.
■ Not all RBAC-controlled operations can be used from the NetBackup web UI.
These types of operations are included in RBAC so a role administrator can
create roles for API users as well as for web UI users.
■ Some tasks require a user to have permissions in multiple RBAC categories.
For example, to establish a trust relationship with a remote primary server, a
user must have permissions for both Remote primary servers and Trusted
primary servers.
groupname admins
DOMAIN\groupname WINDOWS\Admins
groupname@domain admins@unix
Note: The Sign-in type list is available only if there is an IDP configuration
available for NetBackup. The smart card user option in the Sign-in type list is
available when the smart card configuration is done without AD or LDAP domain
mapping.
Administrator The Administrator role has full permissions for NetBackup and can manage all aspects
of NetBackup.
Default AHV Administrator This role has all the permissions that are necessary to manage Nutanix Acropolis
Hypervisor and to back up those assets with protection plans.
Default Apache Cassandra This role has all the permissions that are necessary to manage and protect Apache
Administrator Cassandra assets with protection plans.
Default Cloud Administrator This role has all the permissions that are necessary to manage cloud assets and to
back up those assets with protection plans.
Note that a PaaS administrator requires some additional permissions that you can add
to a custom role.
Cloud administrators also need additional permissions to manage cloud and PaaS
assets using intelligent groups.
See “Add a custom RBAC role for a PaaS administrator” on page 508.
Managing role-based access control 502
Default RBAC roles
Default Cloud Object Store This role has all the permissions to manage the protection for cloud objects using
Administrator classic policies.
Default DB2 Administrator This role provides the ability to view and restore DB2 backups with the nbdb2adutl
command. The administrator can also view and manage DB2 jobs.
Default IRE SLP Manages IRE (Isolated Recovery Environment) SLP (Storage lifecycle policies)
Administrator functionalities.
Default Kubernetes This role has all the permissions that are necessary to manage Kubernetes and to
Administrator back up those assets with protection plans. The permissions for this role give a user
the ability to view and manage jobs for Kubernetes assets. To view all jobs for this
asset type, a user must have the default role for that workload. Or, a similar custom
role must have the following option applied when the role is created: Apply selected
permissions to all existing and future workload assets.
Default Microsoft Sentinel This role has all the permissions necessary to add Microsoft Sentinel credentials in
Administrator NetBackup and to send NetBackup audit events to Microsoft Sentinel.
Default Microsoft SQL Server This role has all the permissions that are necessary to manage SQL Server databases
Administrator and to back up those assets with protection plans. In addition to this role, the NetBackup
user must meet the following requirements:
Default MySQL Administrator This role has all the permissions that are necessary to manage MySQL instances and
databases and to back up those assets with protection plans.
Default NAS Administrator This role has all the permissions that are necessary to perform the backup and restore
of NAS volumes using a NAS-Data-Protection policy. To view all jobs for the backups
and restores of a NAS volume, a user must have this role. Or, the user must have a
custom role with same permissions applied when the role was created.
Default NetBackup Command This role has all the permissions that are necessary to manage NetBackup using the
Line (CLI) Administrator NetBackup command line (CLI). With this role a user can run most of the NetBackup
commands with a non-root account.
Note: A user that has only this role cannot sign into the web UI.
Managing role-based access control 503
Default RBAC roles
Default Oracle Administrator This role has all the permissions that are necessary to manage Oracle databases and
to back up those assets with protection plans.
Default PostgreSQL This role has all the permissions that are necessary to manage PostgreSQL instances
Administrator and databases and to back up those assets with protection plans.
Default Resiliency This role has all the permissions to protect the Veritas Resiliency Platform (VRP) for
Administrator VMware assets.
Default RHV Administrator This role has all the permissions that are necessary to manage Red Hat Virtualization
computers and to back up those assets with protection plans. This role gives a user
the ability to view and manage jobs for RHV assets.
To view all jobs for RHV assets, a user must have this role. Or, the user must have a
similar custom role with following option applied when the role was created: Apply
selected permissions to all existing and future RHV assets.
Default SaaS Administrator This role has all the permissions to view and manage SaaS assets.
Default Security Administrator This role has permissions to manage NetBackup security including role-based access
control (RBAC), certificates, hosts, identity providers and domains, global security
settings, and other permissions. This role can also view settings and assets in most
areas of NetBackup: workloads, storage, licensing, and other areas.
Default Storage Administrator This role has permissions to configure disk-based storage and storage lifecycle policies.
SLP settings are managed with the Administrator role.
Default Universal Share This role has the permissions to manage policies and storage servers. It can also
Administrator manage the assets for Windows and Standard client types and for universal shares.
Default Veritas Alta View This role has all the permissions that are necessary to manage Veritas Alta View
Administrator functionalities.
Default VMware Administrator This role has all the permissions that are necessary to manage VMware virtual machines
and to back up those assets with protection plans. To view all jobs for VMware assets,
a user must have this role. Or, the user must have a similar custom role with following
option applied when the role was created: Apply selected permissions to all existing
and future VMware assets.
NetBackup Read-Only This role provides the read-only permissions to the IT Analytics Operator, Multi-Person
Operator Authorization Approver, and other operators in NetBackup, with no permissions for
security.
Managing role-based access control 504
Add a custom RBAC role
Note: Veritas reserves the right to update the RBAC permissions for default roles
in future releases. Any revised permissions are automatically applied to users of
these roles when NetBackup is upgraded. If you have copies of default roles these
roles are not updated automatically. (Or, if you have any custom roles that are
based on default roles.) If you want these custom roles to include changes to default
roles, you must manually apply the changes or recreate the custom roles.
Note: Veritas reserves the right to update the RBAC permissions for default roles
in future releases. Any revised permissions are automatically applied to users of
these roles when NetBackup is upgraded. Any copies of default roles (or any custom
roles that are based on default roles) are not automatically updated.
Note: When you change permissions for a custom role, the changes affect all users
that are assigned to that role.
Global permissions for the role On the Global permissions tab, click
Edit.
Access definitions for the role Click the Access definitions tab.
5 To add or remove users for the role, click the Users tab.
See “Add a user to a role (non-SAML)” on page 498.
See “Remove a user from a role” on page 501.
6 Permissions for assets, protection plans, and credentials must be edited directly
in the applicable node in the web UI.
Note: When you remove a role, any users that are assigned to that role lose the
permissions that the role provided.
GET /asset-service/workloads/cloud/assets?filter=extendedAttributes/
managedInstanceName eq 'managedInstanceName'
Search for accessControlId field in the response. Note down the value of this
field.
2 To get the role ID, enter the following command:
GET /access-control/roles
Search for the id field in the response. Note down the value of this field.
3 Create an access definition, as follows:
POST /access-control/managed-objects/{objectId}/access-definitions
Managing role-based access control 507
Add a custom RBAC role
Request payload
"data": {
"type": "accessDefinition",
"attributes": {
"propagation": "OBJECT_AND_CHILDREN"
},
"relationships": {
"role": {
"data": {
"id": "<roleId>",
"type": "accessControlRole"
}
},
"operations": {
"data": [
{
"id": "|OPERATIONS|VIEW|",
"type": "accessControlOperation"
}
]
},
"managedObject": {
"data": {
"id": "<objectId>",
"type": "managedObject"
}
}
}
}
}
6 On the Assets tab, under desired policy type / workload section select the
following permissions:
■ Instant access
■ Restore from malware-infected images (Required to restore from malware
infected images)
7 Click Assign.
8 Under Users, click Assign. Then add each user that you want to have access
to this custom role.
9 When you are done configuring the role, click Add role.
Managing role-based access control 509
Role permissions
6 Click Assign.
7 Under Users, click Assign. Then add each user that you want to have access
to this custom role.
8 When you are done configuring the role, click Add role.
Role permissions
Role permissions define the operations that roles users have permission to perform.
For details on individual RBAC permissions and dependencies, refer to the
NetBackup API documentation.
http://sort.veritas.com
Managing role-based access control 510
Manage access permission
Category Description
These operations are only available from the NetBackup APIs. Refer to the
following guides for information on JVM tuning options: NetBackup Installation
Guide, NetBackup Upgrade Guide.
Protection plans Manage how backups are performed with protection plans.
Credentials Manage credentials for assets and for other features of NetBackup.
Caution: Use caution when removing access definitions. This action may remove
critical access to NetBackup for the role’s users.
■ Disable backup anomaly detection and computation of entropy and file attributes
for a client
Note: By default, the anomaly detection algorithm runs on the NetBackup primary
server. If you see any impact on the primary server because of the anomaly detection
process, you can configure a media server to detect anomalies.
The following backup job metadata, attributes, or features are verified during backup
anomaly detection:
Detecting anomalies 517
About backup anomaly detection
Step Description
Step 1 Install or upgrade NetBackup software on the primary server and the media
server.
Step 3 Configure anomaly detection settings using the NetBackup web UI.
Note: This is the default configuration for fresh NetBackup 10.4 installation.
■ Enable - Enables anomaly detection for all policy types except for the ones
that are excluded in the Advanced settings > Disable policy type or
specific features for machine learning.
Detecting anomalies 519
Configure backup anomaly detection settings
4 Click Edit on the right to configure the Anomaly detection > Enable automatic
scan for imported copy setting.
■ On the Enable automatic scan for imported copy pop-up screen, select
the Turn on automatic scan for imported copy check box.
This setting modifies the anomaly configuration file to configure the scan
host pool and the clients that need to be scanned.
■ Click Save.
■ Click Edit on the right to configure the Disable anomaly settings for
clients settings.
See “Disable backup anomaly detection and computation of entropy and
file attributes for a client” on page 522.
Click Save.
■ Click Edit on the right to configure the Disable policy type or specific
features for machine learning settings.
On the pop-up screen, all the policies are listed.
Use the action menus to disable one or all of the following anomaly features
for machine learning for the given policy: Backup files count, Data
transferred, Deduplication ratio, Image size, and Total time.
■ Disable all - Use this option to disable all of the anomaly features for
machine learning for the given policy.
■ Disable specific features - Use this option to select specific anomaly
features that you want to disable for machine learning.
■ Click Save.
■ Click Edit on the right to configure the Suspicious file extension settings.
■ Select the Turn on suspicious file extension detection to enable
NetBackup to detect files with suspicious file extensions.
A malware such as ransomware attacks the data and encrypts it. After
the file encryption, the ransomware renames the files with a specific
extension such as .lockbit. NetBackup detects such known suspicious
file extensions during backups and generates an anomaly.
■ Files with suspicious extensions (in %)
Select the percentage (1 to 50) of files with suspicious extensions from
the Percent drop-down list, which is acceptable in your environment.
When the percentage of the files with suspicious extensions exceeds
this threshold, an anomaly is generated.
■ You can add or remove the suspicious file extensions from the list.
■ Click Save.
Note: Anomaly count of 0 indicates that there are no anomalies generated or that
the anomaly detection services are not running.
■ Impacted number of jobs - The number jobs for which anomalies are
detected
■ Review status - The anomaly status that indicates whether the detected
anomaly is reported as a false positive or an actual anomaly, or it can be
ignored.
■ Last updated - The date and time when the anomaly status is updated
2 Select the job ID to see the job details in the Activity monitor. Expand a parent
job to see the details of each child job.
3 You can perform the following actions on the anomaly record:
■ Select Report as false positive if the anomaly is a false positive. Similar
anomalies are not shown in the future.
The Review status of the anomaly record appears as False positive.
■ Select Confirm as anomaly when you want to take some action on the
anomaly condition.
The Review status of the anomaly record appears as Anomaly.
■ Select Mark as ignore when you can ignore the anomaly condition.
The Review status of the anomaly record appears as Ignore.
6 In the search results, click the Add to list option next to the required client.
7 Select Save.
The selected clients are added in the excluded clients' list.
Note: After the client is excluded or included again, the computation of entropy
and file attributes stops or starts within the next 24 hours with the new backup
jobs.
Select Upload rules to select the rules file that you have downloaded. All the
latest rules are listed in the Rules-based anomaly detection section.
5 Select the rules that you want to enable and for which you want to generate
anomalies.
Select Enable.
NetBackup generates anomalies for the conditions that meet the rule criteria.
See “RBAC roles and permissions for multi-person authorization” on page 430.
See “Configure multifactor authentication for your user account” on page 446.
■ Warning severity: In case no malware found in the backup image but some
of the files were skipped during scan.
This information can be obtained by clicking on Actions > Export unscannable
files list.
Note: The malware scan job in Activity monitor takes few minutes to reflect the
final state of the scan operation running for multiple backup images.
For example, if scan operation runs for 5 backup images in a single request, then
the malware scan job in Activity monitor would take 5 minutes to reflect the final
state which is after completing the last (fifth) backup image scan job.
For more information on best practices for malware scanning, refer to Smart use
of Malware Scanning in NetBackup.
Note: For successful recovery time malware scan operation, the media server
version must be 10.4 or later.
The following steps depict the workflow for malware scanning for MSDP backup
images:
1. After triggering On Demand Scan, primary server will validate backup images
and create scan jobs for each eligible backup image and identify available scan
host for them. Following are few of the criteria's on which the backup images
are validated:
■ Backup image must be supported for malware detection.
■ Backup image must have a valid Instant Access copy.
■ For an on-demand scan, no existing scan must be running for same backup
image. For DNAS the related streams are also considered.
Malware scanning 531
About malware scanning
■ Malware detection does not support media server associated with storage.
■ Unable to get information for backup image from catalog.
2. After the backup images are queued for an on-demand scan, the primary server
identifies the storage server. An instant access mount is created on the storage
server of the configured share type that is specified in scan host pool.
Note: Currently the primary server starts 50 scan threads at a time. After the
thread is available it processes the next job in the queue. Until then the queued
jobs are in the pending state.
For NetBackup version 10.3 and later, large backups are scanned in batches
of 500K files. Each batch is scanned by a separate scan thread.
For recovery time scan, scan in batches feature is not supported.
3. Primary server identifies available and supported MSDP media server and
instructs the media server to initiate the malware scan.
4. MSDP media server deploys the thin client on the scan host over SSH.
5. Thin client mounts the instant access mount on the scan host.
6. Scan is initiated using the malware tool that is configured in the scan host pool.
Media server fetches the progress of scan from scan host and update the
primary server.
7. After the scan is completed, the scan host unmounts the instant access mount
from the scan host.
8. Malware scan status is updated to the media server over SSH. Scan logs are
copied to the media server log directory.
9. Media server updates the scan status and the infected file list along with skipped
file list (if any infected files) to the primary server.
10. Primary server updates the scan results and deletes instant access.
11. Malware scan status notification is generated.
12. Malware scan will timeout in case there is no update on scan. Default timeout
period is 48 hours.
Malware detection performs an automated cleanup of eligible scan jobs that are
older than 30 days.
Note: You can download a malware scanner from the Microsoft Azure Marketplace
and the AWS Marketplace. Follow the instructions on how to install, configure, and
use the malware scanner for AWS and Azure.
Refer to the following for more information:
AWS: AWS Marketplace and NetBackup Marketplace Deployment on AWS Cloud
Microsoft Azure: Microsoft Azure Marketplace and Microsoft Azure Marketplace
The following prerequisites exist for malware scanning of OST and AdvancedDisk:
■ MSDP component for example, SPWS, VPFSD are required for an instant
access mount. Hence for OST and AdvancedDisk storage, any one of the media
servers must be configured as MSDP storage server so that it can serve the
instant access API.
■ Primary servers and media servers must be upgraded to NetBackup version
10.4 or later.
■ Media servers must be accessible to the OST or AdvancedDisk storage server.
■ OST plug-in must be deployed on instant access (host with MSDP components)
hosts. No new version of OST plug-ins is required.
■ Compatible instant access host (RHEL).
Malware scanning 533
About malware scanning
■ The throttling limit on concurrent instant access from OST and AdvancedDisk
STU is same as instant access from MSDP.
The following steps depict the workflow for malware scanning for OST and
AdvancedDisk.
1. Using the On Demand Scan APIs, the backup image is added to the worklist
table on Primary server.
Primary server identifies the available scan host from the specified scan host
pool.
2. As part of processing the work list:
(2.1) Create media server for instant access:
■ From the backup images, it finds out the storage server.
■ From the storage server it finds out the eligible media server.
Media server with instant access capability.
Media server with NetBackup version 10.3 or later.
■ Sends the instant access API request to the selected media server.
■ If multiple media servers are eligible for an instant access mount request,
it selects the media server with minimum number of ongoing instant access
requests. This way it can distribute the instant access requests and achieve
the load balance.
(2.2) Get IM & TIR
■ On the selected media server, in the context of instant access API, it fetches
the IM and TIR information from the primary server. It stores the information
in the same format that the OS requires for mounting the backup image by
VPFSD.
■ After instant access mount, for IO file, VPFSD uses OST API to read backup
image from storage server.
■ Update worklist with images for which instant access was performed with
mountId, exportPath, storageserver, and status.
3. The primary server identifies the available MSDP media server and instructs
the media server to initiate the malware scan.
Note: The media server that is selected for the instant access mount and the
server that is selected for communication with the scan host can be the same
server or a different server.
Malware scanning 534
Configuring a scan host pool
4. When it receives the scan request, the scan manager from the media server
initiates the malware scan on the scan host using thin client (nbmalwareutil)
through remote communication using SSH.
Note: In NetBackup 10.5 or later, the hash values (SHA-256) of infected files
are computed when infected files are found by the NetBackup Malware Scanner.
The values can be viewed when exported through Export infected files list.
5. Depending on the configuration of scan host, from the scan host it mounts the
export using either NFS or SMB from the media server. This media server is
where the backup image is mounted using instant access API.
6. Scan is initiated using the malware tool that is configured in the scan host pool.
Note: VPFSD on the media server, uses STS_XXX APIs to open and read the
backup images from the OST or AdvancedDisk storage server.
7. After the scan is completed, the scan host unmounts the export path from the
media server where backup image is mounted using instant access API.
8. Malware scan status is updated to the media server over SSH. Scan logs are
copied to the media server log directory.
9. Media server updates the scan status and the infected file list (if there are any
infected files) to the primary server.
10. Primary server updates the scan results and deletes instant access request to
the selected media.
11. Malware scan status notification is generated.
■ All the scan host added in the scan host pool must have same malware tool as
that of the scan host pool.
■ All the scan host added in the pool must have same share type as that of scan
host pool.
■ To add scan host in a scan pool, credentials of scan host and RSA key are
required. To get the RSA key of the scan host, See “Managing credentials for
malware scanning” on page 538.
■ Before performing the scan, ensure that the scan hosts are active and available
in scan host pool.
Note: By default three parallel scans are supported per scan host and this limit is
configurable. Having more scan hosts in the scan pool increases the number of
parallel scans.
See “Configure resource limits for malware detection” on page 540.
4 On the Manage malware scanner hosts page, click Add existing to select
pre-existing host.
Note: List includes all scan hosts from all scan host pools.
5 On the Add existing malware scanner host window, select the desired one
or more scan hosts.
6 Click Add.
Note: It is recommended to use backup image with small number of files. For
large backups, IA creation may delay and test scan might fail.
6 Add the details such as the Credential name, Tag, and Description.
7 On the Host credentials tab, add the Host username, Host password, SSH
port, RSA key, and Share type.
■ To validate the SSH connection between the MSDP media server and the
host, run the following command:
ssh username@remote_host_name
■ To verify the RSA key for a remote scan host, run the following command:
ssh-keyscan scan_host_name 2>/dev/null | grep ssh-rsa
■ To obtain the RSA key for the scan host, use the following command. Use
the command from any Linux host with SSH connectivity to the scan host
(this host can be the scan host itself):
ssh-keyscan scan_host_name 2>/dev/null | grep ssh-rsa | awk
'{print $3}' | base64 -d | sha256sum
For example, the output is
33f697637ab3f0911c1d462d4bde8be3eec61a33403e8f6a88daecb415a31eef
- where the RSA key is
33f697637ab3f0911c1d462d4bde8be3eec61a33403e8f6a88daecb415a31eef
Note: Ensure that you remove the - character from the RSA key when you
copy.
The following host key algorithms are used to connect to scan host in the
given order:
rsa-sha2-512, rsa-sha2-256, ssh-rsa
9 Click Save.
Malware scanning 540
Configure resource limits for malware detection
Note: Only SSH credentials are validated by connecting to scan host from the
selected media server. The media server must be a Linux media server with
NetBackup version 10.3 or later.
Note: Resource type scan host: Number of scans per scan host. Default: 3,
Minimum: 1, Maximum: 10
Resource type storage server: Number of scans per storage server. Default:
20, Minimum: 1, Maximum: 50
6 Click Save.
Caution: Setting the Instant Access limit to large value would lead to Storage
server resources (memory, CPU, disk) being used for malware scanning
purpose. It is advised to set the value based on the existing load on storage
server due to backup/duplication operations.
Note: For NetBackup version 10.2 and later, global parallel scans limit configured
through MALWARE_DETECTION_JOBS_PER_SCAN_HOST configuration option
is not applicable. Configure the global parallel scans limit using the Web UI.
For more information on the options for scanning, refer to the following
on-demand scan:
■ See “Backup images” on page 543.
Malware scanning 542
Perform a malware scan
6 For the Start date/time and End date/time verify the date and the time range
or update it.
7 In the Scanner host pool, Select the appropriate host pool name.
8 (Applicable only for the NAS-Data-Protection policy type) In the Volume field,
Select volume backed up for NAS devices.
Volume-level filtering only fetches the top-level directories of the
NAS-Data-Protection volume backup. Volume-level filtering is applicable only
if the top-level directory is a volume. In such a case, you can select individual
backup images with the Backup images option in the Search by option.
9 From the Current status of malware scan, select one of the following:
■ Not scanned
■ Not infected
■ Infected
■ All
■ Not scanned
■ Not infected
■ Infected
■ Failed
Note: When we hover on failed status, the tool tip displays the reason for
failed scan.
The backup images which failed in validation, are ignored. Malware scanning
is supported for the backup images that are stored on storage with instant
access capability for the supported policy type only.
■ Pending
■ In progress
Backup images
This section describes the procedure for scanning policy of client backup images
for malware.
To scan policy of client backup images for malware
1 On left, click Detection and reporting > Malware detection.
2 On the Malware detection page, click Scan for malware.
3 In the Search by option, select Backup images.
4 In the search criteria, review and edit the following:
■ Policy name
Only supported policy types are listed.
■ Client name
Displays the clients that have backup images for a supported policy type.
■ Policy type
■ Type of backup
Any incremental backup images that do not have the NetBackup Accelerator
feature enabled are not supported for the VMware workload.
■ Copies
If the selected copy does not support instant access, then the backup image
is skipped for the malware scan.
(For NAS-Data-Protection policy type) Select the Copies as Copy 2.
Malware scanning 544
Perform a malware scan
■ Disk pool
MSDP (PureDisk), OST (DataDomain) and AdvancedDisk storage type
disk pools are listed.
■ Disk type
MSDP (PureDisk), OST (DataDomain) and AdvancedDisk disk types are
listed.
■ Malware scan status.
■ For the Select the timeframe of backups, verify the date and the time
range or update it.
5 Click Search.
Select the search criteria and ensure that the selected scan host is active and
available.
6 From the Select the backups to scan table select one or more images for
scan.
7 In the Select a malware scanner host pool, Select the appropriate host pool
name.
Note: Scan host from the selected scan host pool must be able to access the
instant access mount created on storage server which is configured with
NFS/SMB share type.
Note: Any backup images that fail validation are ignored. Malware scanning
is supported for the backup images that are stored on storage with instant
access capability and for the supported policy types only.
■ In progress
Malware scanning 545
Perform a malware scan
■ Pending
Note: You can cancel the malware scan for one or more in progress and
pending jobs.
NAS-Data-Protection
Each NAS volume or share is read over NFS or SMB, and backed up using a
configured number of backup streams. The maximum number of streams per volume
determines the number of backup streams that are created to back up each volume.
For example, consider a policy that contains 10 volumes and the maximum number
of streams is 4. The backup of the policy creates 4 backup streams for each volume,
with a total of 40 child backup streams and 10 parent backup streams.
Note: The number of scans depends on the number of batches that were created
to perform the scan. Only the parent stream backup image is visible on the Malware
detection UI.
7 In the Scanner host pool, select the appropriate host pool name.
8 In the Volume field, Select volume backed up for NAS devices.
9 From the Current status of malware scan, select one of the following:
■ Not scanned
■ Not infected
■ Infected
■ All
Warning: Scan is limited to only 100 images. Adjust the date range and try
again.
11 After the scan is initiated, the Malware Scan Progress is displayed. The
following are the status fields:
■ Not scanned
■ Not infected
■ Infected
■ Failed
Note: Hover over the status to view the reason for the failed scan.
Any backup images that fail validation are ignored. Malware scanning is
supported for the backup images that are stored on storage with instant
access capability and for the supported policy types only.
■ Pending
■ In progress
Note: For NAS-Data-Protection any backup images that were created on the
previous version of NetBackup 10.4 media server, you must select the Malware
scan status option as All.
Note: The malware scanner host can initiate a scan of three images at the
same time.
6 After the scan starts, you can see the Malware Scan Progress on Malware
Detection, the following fields are visible:
■ Not scanned
■ Not infected
■ Infected
■ Failed
■ In progress
■ Pending
time scan, the Total files column would only indicate the count of files
selected for recovery.
■ % infected - Provides the percentage of infected files as compared to Total
files.
■ Elapsed time - Represents the time since scan request was accepted (Date
of scan) till the time of completion of scan (End date of Scan). The elapsed
time would consist of idle time, time spent in pending state. For resume of
failed jobs it would include time spent from failure till the time when the
resume operation was triggered.
■ Scanned files - Indicates the number of files that are scanned.
■ Schedule type - The backup type of the associated backup job
■ Date of scan - Date when the scan was performed.
■ Policy type - Type of the policy that was selected for scanning.
■ Policy name - Name of the policy that was used for scanning.
■ Malware scanner - Name of the malware scanner that was used for
scanning.
■ Scanner host pool - Indicates the host pool used for malware scanning.
■ Malware scanner version - Version of the malware scanner that was used
for scanning.
Note: To view additional columns that are not displayed, use the Show or hide
columns pull down menu.
Note: This option is available only for infected scan results and scan type
'Recovery'.
Note: A list of infected files from the selected malware scanning result is
exported in .csv format. The file name is of the following format:
backupid_infected_files_timestamp.csv
Note: A .csv file contains backup time, names, hashes of the infected files
and virus information.
For Microsoft Windows Defender, if real time protection is enabled, then hashes
of the infected files are not created as files are not accessible.
Malware scanning 551
Managing scan tasks
Note: A .csv file contains the list of files that the malware scanner skips due
to issues such as file input or output errors, encrypted (password protected)
files, etc.
Note: The Cancel malware scan is not supported for scan results with scan type
'Recovery'.
To rescan an image
1 On the left, click Detection and reporting > Malware detection.
2 For the wanted scan result, click Actions > Rescan image.
3 Click Rescan to confirm.
4 For a bulk rescan, when you select one or more images with a different or am
empty scanner host pool, you must select a new scanner host pool.
■ Click Rescan image.
■ Select a new scan host pool.
The new scan host pool is applicable for all the selected images for this
rescan.
■ Click Rescan to confirm.
Malware scanning 552
Managing scan tasks
Rescan (and resume) is not supported for scan results with scan type
recovery.
5 For a rescan of failed or canceled jobs, scanning is triggered from the point of
failure (resumed) instead of from a complete scan, under the following
conditions:
■ If the value of Date of scan is more than 48 hours, then the job is not
resumed and the full scan is initiated. This action ensures that the malware
signatures that are used for the scan do not differ significantly.
■ Supported for Standard or MS-Windows policy backup images that have a
large number of files (> 500 KB). For a DNAS policy, it is supported for
more than one stream.
■ Instant Access must have succeeded for the failed job.
■ Resume identifies the first instant access capable copy to scan, which can
be different from the copy that was selected for the initial scan request.
After the job is resumed the existing scan result is moved from the state "failed"
to "pending" and subsequently to an "in-progress" state. The progress update
can continue from the point of failure. For a complete rescan the new scan
result is displayed. If the user needs to perform a complete scan, then it can
be started using the on-demand scan options.
To delete the scan results
1 On the left, click Detection and reporting > Malware detection.
2 Any scan results that are in a "failed" or "canceled" state can be deleted
manually. Click Actions > Delete scan results.
3 Click Yes to confirm the deletion of the selected scan results.
You can select a maximum of 20 scan results to delete.
To view the details of a scan result
1 On the left, click Detection and reporting > Malware detection.
2 Click Actions > View details to view details for the backup images with
individual batch level.
Note: The View details option is available only for the scan results that are in
"failed" or "in progress" state.
3 On the View details page, you can copy information to the Clipboard. Click
Actions > Copy failure details or Actions > Copy the scan results.
4 Click Close.
Malware scanning 553
Managing scan tasks
Destination client The client to which you want to restore the backup.
Policy type The type of policy that is associated with the backup you want to
restore.
Restore type The type of restore that you want to perform. The restore types that
are available depend on the policy type that you choose.
4 Click Next.
5 Select the Start date and End date.
Or, click Backup history to view and select specific images. Click Select to
add the selected images for recovery.
Note: The table displays all the backup image details for selected time frame.
You can filter and sort the images based on the malware scan results, schedule
type, policy type or policy name.
Note: The Allow the selection of images that are malware-affected option
will be disabled if user selects Scan for malware before recovery option.
7 On the left, expand the Source client directory. Select any directories that you
want to restore. Or in the right pane, select any files or directories. Click Next.
Malware scanning 554
Managing scan tasks
Note: To restore from malware-affected recovery points, you must have the
Administrator role or equivalent RBAC permissions.
6 Click Recover and select the type of recovery. Then follow the prompts.
For more details on recovering a VM, see the NetBackup for VMware
Administrator’s Guide.
Malware scanning 555
Managing scan tasks
Note: To restore from malware-affected recovery points, you must have the
Administrator role or equivalent RBAC permissions.
5 Click Recover and select the type of recovery as Restore files and folders.
Then follow the prompts.
Note: NetBackup now provides support for VMware single file restore clean
recovery by selecting the Allow recovery of files infected by malware option
in the Recovery options. This option overrides the default behavior.
For more details on recovering a VM, see the NetBackup for VMware
Administrator’s Guide.
To recover a specific recovery point that is affected by malware, refer to the following
procedure:
Single file restore using recovery flow (with agent)
1 On the left, click Recovery.
2 Under Regular recovery, click Start recovery.
Malware scanning 556
Managing scan tasks
Policy type The type of policy that is associated with the backup you want to
restore.
Source client The client that performed the backup. Under the Virtual machines
search tab, select the virtual machine and click Apply.
Destination client The client to which you want to restore the backup.
Restore type The type of restore that you want to perform. The restore types that
are available depend on the policy type that you choose.
Note: Clean recovery is supported only for normal backups.
4 Click Next.
5 Edit the Date range.
Or, click Use backup history to view and select specific images. Click Apply
to add the selected images for recovery.
Note: The table displays all the backup image details for selected time frame.
You can filter and sort the images based on the malware scan results, schedule
type, policy type or policy name.
■ Reporting is done for all policy types that are used for data protection.
Requirements
NetBackup automatically collects data for the usage reporting, provided the following
requirements are met:
■ The primary servers (or primary servers) are at NetBackup 8.1.2 or later.
■ You use capacity licensing.
■ You use automatic, scheduled reports. If you manually generate capacity license
reports, the data does not display in the usage report in the NetBackup web UI.
■ The following file exists:
UNIX: /usr/openv/var/global/incremental/Capacity_Trend.out
Windows: install_path\var\global\incremental\Capacity_Trend.out
The Usage tab displays an error if the backup data is not available. Or, if the
usage report is not generated (file does not exist).
■ If you want one of your primary servers to gather usage reporting data for other
remote primary servers, additional configuration is required. You must create a
trust relationship between the primary servers. You must also add the local
primary server (where you plan to run nbdeployutil) to the Servers list on
each remote primary server.
See “Add a local primary server” on page 558.
See “Add a trusted primary server” on page 460.
Additional information
■ Details are available on capacity licensing, scheduling, and options for capacity
licensing reports.
See “Scheduling reports for capacity licensing” on page 560.
■ Veritas Usage Insights for NetBackup Getting Started Guide. Details on how to
use Usage Insights to manage your NetBackup deployment and licensing. This
tool provides accurate, near real-time reporting for the total amount of data that
is backed up.
Note: The pop-up may display an Excel file of a newer date and a JSON file
of an earlier date. After the telemetry agent cycle is completed, the latest JSON
file is displayed.
3 Select the report that you want to download and click Download.
In an upgrade scenario, the download reports feature is only available after the next
successful incremental run of the netbackup_deployment_insights utility. If you
try to download any NetBackup 10.4.0.1 or earlier reports, the download may fail.
The older reports are placed in the archive folder. Veritas recommends that you
retain at least 90 days of reporting data. Data can be kept longer than 90 days,
depending on the requirements of your environment. Older reports can help to show
how the capacity usage has changed over time. Delete the reports or the folder
when they are no longer required.
From the NetBackup web UI, you can download the reports that are automatically
generated using the nbdeployutil utility. On the web UI, click Detection and
reporting > Usage > Download reports. For more information, see the NetBackup
Web UI Administrator’s Guide.
The Download reports feature requires that you have sufficient permissions on
the gather directory. For the custom path specified in the PARENTDIR configuration
setting, ensure that the required read permissions are provided for the NetBackup
Web service user. If you delete the default incremental folder and then manually
create it, ensure that the required read permissions are provided for the NetBackup
Web service user.
Use Case I: Using the default values for the licensing report
The nbdeployutilconfig.txt file is not required when you use the default
parameters. nbdeployutil uses the following default values for capacity licensing:
■ FREQUENCY_IN_DAYS=7
■ MASTER_SERVERS=local_server
■ PARENTDIR=folder_name
For Windows: install_path\NetBackup\var\global\incremental
For UNIX: /usr/openv/var/global/incremental
■ PURGE_INTERVAL=120 (number of days)
■ MACHINE_TYPE_REQUERY_INTERVAL = 90 (number of days)
Use Case II: Using custom values for the licensing report
If the file nbdeployutilconfig.txt is not present, create a file using the following
format:
[NBDEPLOYUTIL_INCREMENTAL]
MASTER_SERVERS=<server_names>
FREQUENCY_IN_DAYS=7
PARENTDIR=<folder_name_with_path>
PURGE_INTERVAL=120
MACHINE_TYPE_REQUERY_INTERVAL=90
Usage reporting and capacity licensing 562
Scheduling reports for capacity licensing
Default 7
(recommended)
Minimum 1
For example:
■ MASTER_SERVERS=newserver, oldserver
■ MASTER_SERVERS=newserver, oldserver.domain.com
■ MASTER_SERVERS=myserver1.somedomain.com, newserver.domain.com
5 Edit the PARENTDIR value to include the full path for location where the data is
gathered and reported.
6 Edit the PURGE_INTERVAL to indicate the interval (in days) for how often you
want to delete the report data. Data that is older than 120 days is automatically
purged.
Default 120
Minimum 90
Default 90
Minimum 1
To use the data that was gathered previously to generate a capacity licensing
report
1 Locate the folder that was generated for the gathered data after the previous
run of nbdeployutil and copy it to the following location:
On Windows: install_path\NetBackup\var\global\incremental
On UNIX: /usr/openv/var/global/incremental
2 Create the gather_end.json file inside the copied folder and add the following
text:
{"success":0}
The next incremental run considers the data inside the copied folder to generate
a capacity licensing report.
Note: Delete any other gather folders inside the copied folder to avoid gaps
for the period in which data is gathered. The missing data is automatically
generated during the next incremental run.
Usage reporting and capacity licensing 565
Troubleshooting failures for usage reporting and incremental reporting
To create a custom interval report using existing gathered data for capacity
licensing
◆ To create a report for a time interval that is different than the default interval
of 90 days, run the following command:
On Windows:
On UNIX:
--start="mm/dd/yyyy HH:MM:SS"
--end="mm/dd/yyyy HH:MM:SS"
If the latest gather operation fails to retrieve front-end data size (FEDS) data,
the custom report fails because the required backup information is not available.
Let the next scheduled incremental gather run successfully and then try to
generate the custom report.
■ nbdeployutil fails to gather data and generate the report for your environment.
Refer to the logs to understand when the task failed and the reason for the
failure.
■ nbdeployutil fails with a bpimagelist error with status 37 after you run the utility
manually. Ensure that you added the primary servers to the additional servers
list.
See “Add a local primary server” on page 558.
■ The following error displays because of internal web service communication
failures:
Internal Web API error occurred for primary server SERVER_NAME. Run
nbdeployutil again with the gather option on primary server SERVER_NAME.
■ For VMware or NDMP, when the backup agent fails to post licensing information
to the database, a status code 5930 or 26 displays in the Activity Monitor: For
more information, see the NetBackup Status Codes Reference Guide.
■ nbdeployutil may fail with errors related to loading the Perl modules. In such
a scenario, it is recommended to refer the Perl documentation related to the
reported error.
You can use netbackup_deployment_insights with the same troubleshooting
points.
Section 8
NetBackup workloads and
NetBackup Flex Scale
■ Configuring permissions
Note: If a SaaS asset is deleted from NetBackup SaaS Protection web UI, the
deleted asset is not removed from the NetBackup database immediately. The
deleted asset remains in the NetBackup database for 30 days.
Features Description
Integration with NetBackup The NetBackup web UI provides RBAC roles, which enable
role-based access control its users to view assets in SaaS workload. The user does not
(RBAC) need to be a NetBackup administrator to add a NetBackup
SaaS Protection Hub or view assets in the Hub.
Cross Launch You can cross launch the NetBackup SaaS Protection web
UI.
4 Click Add.
After the credentials are successfully validated, the Hub is added and
autodiscovery runs to discover available assets in the Hub.
See “Configure NetBackup for single sign-on (SSO)” on page 480.
3 Execute the bpsetconfig command and provide the following proxy details.
bpsetconfig> SAAS_PROXY_HOST = X.X.X.X
bpsetconfig> SAAS_PROXY_TUNELLING = 1
SAAS_PROXY_TUNNELING 0 or 1
2 Click the Hubs tab to view details on Hubs, StorSites, and Stors.
You can navigate to the required asset using the left panel. You can perform
the following actions on the Hubs tab:
■ View a list of the Hubs.
■ Search for a Hub in the list.
■ Add new Hubs.
■ Validate the credentials.
■ Sort columns.
■ Click Actions to perform the following:
■ Edit credentials.
■ Delete the Hub.
■ Manually discover assets in the Hub.
For more information, refer to the NetBackup SaaS Protection administrator's guide.
Configuring permissions
Using the NetBackup web UI, you can assign different access privileges to the user
roles on the assets. For example, view, update, delete, and manage access.
See “Manage access permission” on page 510.
NetBackup SaaS Protection 574
Troubleshooting SaaS workload issues
Note: The user with access permission on the SaaS workload in NetBackup, and
no or limited permissions in NetBackup SaaS Protection can still view the NetBackup
SaaS Protection assets on the NetBackup web UI.
■ bpVMUtil
■ Windows: <install path>\Veritas\NetBackup\logs\bpVMutil
■ UNIX: <install path>/openv/netbackup/logs/bpVMutil
■ APIs/nbWebServices
■ Windows: <install path>\Veritas\NetBackup\logs\nbwebservice
■ UNIX: <install path>/openv/logs/nbwebservice
Failed to add a Hub due to incorrect Hub Enter appropriate Hub name and valid
name or invalid user credentials. credentials.
Failed to add a Hub due to issue in credential Check if the credentials are not expired. Also
validation. check if the credentials are valid.
Failed to add a Hub due to limited Assign appropriate permissions to the user
permissions. on the SaaS workload.
Failed to delete a Hub due to limited Assign appropriate permissions to the user
permissions. on the SaaS workload.
Failed to perform discovery on the Hub due Assign appropriate permissions to the user
to limited permissions. on the SaaS workload.
The services are not deleted from NetBackup The services get removed from NetBackup
after deleted the associated Connector from after 30 days from Connector deletion.
NetBackup SaaS Protection.
Connecting to the proxy host X.X.X.X on port Configure proxy settings on the primary
3128 with type SOCKS5 server using the bpsetconfig utility.
Chapter 41
NetBackup Flex Scale
This chapter includes the following topics:
NetBackup Flex Scale web UI To access the NetBackup Flex Scale features, expand
Cluster Management.
https://ManagementServerIPorFQDN/webui
See “Manage NetBackup and the NetBackup Flex Scale
cluster management from the NetBackup Flex Scale web
UI” on page 578.
NetBackup Flex Scale 577
Managing NetBackup Flex Scale
NetBackup Flex Scale infrastructure management console To open NetBackup, click the NetBackup node. This
action launches the NetBackup Flex Scale web UI in the
IPv4: https://ManagementServerIPorFQDN:14161/
same browser tab. To access the NetBackup Flex Scale
IPv6: https://ManagementServerIP:14161/ infrastructure management console again, click Cluster
Management.
To access NetBackup and Flex Scale cluster management from the NetBackup
Flex Scale web UI
1 In a web browser, enter the URL for the NetBackup Flex Scale web UI.
https://ManagementServerIPorFQDN/webui
The ManagementServerIPorFQDN is the host name or IP address of the
NetBackup Flex Scale server that you want to sign in to.
2 Enter the credentials for a user with the Appliance Administrator role and click
Sign in.
The web UI displays the NetBackup functionality and the NetBackup Flex Scale
Cluster management node.
The Institute of Electrical and Electronics Engineers (IEEE) and the International
Electrotechnical Commission (IEC) have adopted standards for these values. See
the following articles for more information:
■ https://standards.ieee.org/standard/1541-2002.html (with a paid IEEE
subscription)
https://en.wikipedia.org/wiki/IEEE_1541-2002
■ https://en.wikipedia.org/wiki/ISO/IEC_80000
Wildcard Use
An asterisk can be used in the backup selection list, the include list, and the exclude list for Windows and
UNIX clients.
For example:
r*.doc refers to all files that begin with r and end with .doc.
/etc/*.conf
? A question mark serves as a wildcard for any single character (A through Z; 0 through 9).
A question mark can be used in the backup selection list, the include list, and the exclude list for Windows
and UNIX clients.
For example:
c:\system\log??_03
Management topics 587
Wildcard use in NetBackup
Wildcard Use
[ ] A pair of square brackets indicates any single character or range of characters that are separated with
a dash.
For example:
{ } Curly brackets can be used in the backup selection list, the include list, and the exclude list for UNIX
clients only.
A pair of curly brackets (or braces) indicates multiple file name patterns. Separate the patterns by commas
only; no spaces are permitted. A match is made for any or all entries.
For example:
To use wildcard characters literally, precede the character with a backslash (\).
A backslash (\) acts as an escape character only when it precedes a special or a
wildcard character. NetBackup normally interprets a backslash literally because a
backslash is a legal character to use in paths.
Assume that the brackets in the following examples are to be used literally:
C:\abc\fun[ny]name
C:\abc\fun\[ny\]name
Management topics 588
Wildcard use in NetBackup
C:\*\xyz\myfile
C:\abc\*\myfile
For UNIX clients, wildcards can appear The following examples are allowed:
anywhere in the path.
/etc/*/abc/myfile
/etc/misc/*/myfile
/etc/misc/abc/*.*
Chapter 44
Managing client backups
and restores
This chapter includes the following topics:
■ About restoring the files that have Access Control Lists (ACLs)
■ About setting the original atime for files during restores on UNIX
■ About the backup and restore of compressed files on VxFS file systems
Restore types in addition to “Normal backups” are available for certain policy types.
/usr/openv/netbackup/bp.conf
Note: On UNIX systems, the redirected restores can incorrectly set UIDs or
GIDs that are too long. The UIDs and GIDs of files that are restored from one
platform to another may be represented with more bits on the source system
than on the destination system. If the UID or the GID name in question is not
common to both systems, the original UID or GID may be invalid on the
destination system. In this case, the UID or GID is replaced with the UID or GID
of the user that performs the restore.
server has no access to write the log files to the requesting server. (A progress log
is an entry in the Task Progress tab of the Backup, Archive, and Restore client
interface.)
Consider the following solutions:
■ To produce a progress log, add the requesting server to the server list.
Log on to the requesting server. In the NetBackup web UI, open the host
properties for the primary server. Then click Servers. Add the restoring server
to the server list.
■ Log on to the restoring server. Go to the Activity monitor to determine the success
of the restore operation.
To restore a UNIX backup that contains soft and hard links, run the Backup,
Archive, and Restore client interface from a UNIX machine.
Unless clients share an IP address, the peer name is equivalent to the client’s host
name. (Clients can share an IP address due to the use of a gateway and token ring
combination, or multiple connections.) When a client connects through a gateway,
the gateway can use its own peer name to make the connection.
The NetBackup client name is normally the client’s short host name, such as client1
rather than a longer form such as client1.null.com.
The client name is found in the following location:
Open the File > Backup, Archive, and Restore interface. Click File > Specify
NetBackup Machines and Policy Type. The client name that is selected as Source
client for restores is the source of the backups to be restored.
The NetBackup client name setting on the requesting client must match the name
of the client for which the backup was created. The peer name of the requesting
client does not need to match the NetBackup client name setting.
Note: The altnames directory can present a breach of security, so use it only under
limited circumstances. Users that are permitted to restore files from other clients
may also have local permission to create the files that are found in the backup.
Caution: For security reasons, it is strongly advised not to use the No.Restrictions
file approach. This approach enables any client to restore backups of other clients
that can be a security threat.
Managing client backups and restores 593
About client-redirected restores
■ On UNIX:
/usr/openv/netbackup/db/altnames/peername
In this case, the requesting client (peername) can access the files that are backed
up by another client. The NetBackup client name setting on peername must match
the name of the other client.
■ On UNIX:
/usr/openv/netbackup/db/altnames/peername
Managing client backups and restores 594
About client-redirected restores
Then, create a peername file inside of the directory where peername is the client
to possess restore privileges. Add to the peername file the names of the client(s)
whose files the requesting client wants to restore.
The requesting client can restore the files that were backed up by another client if:
■ The names of the other clients appear in the peername file, and
■ The NetBackup client name of the requesting client is changed to match the
name of the client whose files the requesting client wants to restore.
Note: Not all file system types on all computers support the same features. Problems
can be encountered when a file is restored from one file system type to another.
For example, the S51K file system on an SCO computer does not support symbolic
links nor does it support names greater than 14 characters long. You may want to
restore a file to a computer that doesn’t support all the features of the computer
from which the restore was performed. In this case, all files may not be recovered.
Note: The information in this topic applies to the restores that are made by using
the command line, not the Backup, Archive, and Restore client interface.
Managing client backups and restores 595
About client-redirected restores
Note: On Windows: You must have the necessary permissions to perform the
following steps.
On UNIX: You must be a root user for any of the steps that must be performed
on the NetBackup server. You may also need to be a root user to make the
changes on the client.
On UNIX:
1 Log on as root on the NetBackup server.
2 Perform one of the following actions:
■ Edit /usr/openv/netbackup/db/altnames/client1 so it includes the
name of client2. Or,
■ Run the touch command on the following file:
/usr/openv/netbackup/db/altnames/No.Restrictions
Note: The No.Restrictions file allows any client to restore files from
client2.
Token TCP
client2 Ring Gateway
client3
In this example, restore requests from client1, client2, and client3 are routed through
the TCP gateway. Because the gateway uses its own peer name rather than the
client host names for connection to the NetBackup server, NetBackup refuses the
requests. Clients cannot restore even their own files.
To correct the situation, do the following
1 Determine the peer name of the gateway:
■ Try a restore from the client in question. In this example, the request fails
with an error message similar to the following:
client is not validated to use the server
■ Examine the NetBackup problems report and identify the peer name that
is used on the request. Entries in the report may be similar to the following:
01/29/12 08:25:03 bpserver - request from invalid server or
client client1.dvlp.null.com
Managing client backups and restores 597
About client-redirected restores
2 On the primary server, stop and restart the NetBackup Request Daemon.
Restart the service to ensure that this service is running in verbose mode and
logs information regarding client requests.
3 On client1 (the requesting client), try the file restore.
Managing client backups and restores 598
About client-redirected restores
4 On the primary server, identify the peer name connection that client1 uses.
5 Examine the debug log for the NetBackup Request Daemon to identify the
failing name combination:
install_path\NetBackup\logs\bprd\mmddyy.log
7 On client1, change the NetBackup client name setting to match what is specified
on client2.
8 Restore the files from client1.
9 Perform the following actions:
■ Delete install_path\NetBackup\logs\bprd and the contents.
■ In the NetBackup web UI, open the host properties for the primary server.
Click Logging. Clear the Keep logs for days setting.
On UNIX:
1 On the NetBackup primary server, add the VERBOSE entry and a logging level
to the bp.conf file. For example:
VERBOSE = 3
2 Create the debug log directory for bprd by running the following command:
mkdir /usr/openv/netbackup/logs/bprd
Managing client backups and restores 599
About client-redirected restores
3 On the NetBackup server, stop the NetBackup Request Daemon, bprd, and
restart it in verbose mode by running:
/usr/openv/netbackup/bin/admincmd/bprdreq -terminate
/usr/openv/netbackup/bin/bprd -verbose
Restart bprd to ensure that bprd logs information regarding client requests.
4 On client1, try the file restore.
5 On the NetBackup server, identify the peer name connection that client1 used.
Examine the bard debug log to identify the failing name combination:
/usr/openv/netbackup/logs/bprd/log.date
This command allows any client access to client2 backups by changing its
NetBackup client name setting to specify the client2.
7 Run the touch command on the following file:
/usr/openv/netbackup/db/altnames/peername
The command allows client1 access to any client2 backups by changing its
NetBackup client name setting to specify client2.
8 Add client2 to the /usr/openv/netbackup/db/altnames/peername file. The
addition to the peername file allows client1 access to the backups that were
created on client2 only.
9 On client1, change the NetBackup client name setting in the user interface to
match what is specified on client2.
10 Restore the files to client1.
11 Do the following:
■ Delete the VERBOSE entry from the /usr/openv/netbackup/bp.conf file
on the primary server.
■ Delete /usr/openv/netbackup/logs/bprd and the contents.
These files can be deleted or can be read and the ACLs regenerated by hand.
Note: The best recovery procedure depends on many hardware and software
variables that pertain to the server and its environment. For a complete Windows
recovery procedure, refer to the Microsoft documentation.
Read the following notes carefully before you restore the System State:
■ The System State should be restored in its entirety. Do not restore selected
files.
■ Do not redirect a System State restore. System State is computer-specific and
to restore it to an alternate computer can result in an unusable system.
Managing client backups and restores 602
Restoring the System State
■ Do not cancel a System State restore operation. To cancel the operation may
leave the system unusable.
■ To restore the System State to a domain controller, the Active Directory must
not be running.
9 The network may contain more than one domain controller. To replicate Active
Directory to other domain controllers, perform an authoritative restore of the
Active Directory after the NetBackup restore job completes.
To perform an authoritative restore of the Active Directory, run the Microsoft
ntdsutil utility after you restored the System State data but before the server
is restarted. An authoritative restore ensures that the data is replicated to all
of the servers.
Additional information about an authoritative restore and the ntdsutil utility
is available.
See the Microsoft documentation.
10 Restart the system before performing subsequent restore operations.
If you booted into Directory Services Restore Mode on a domain controller,
restart into normal mode when the restore is complete.
Upon restore, NetBackup restores the files to a VxFS file system in their compressed
form.
If the restore is to a non-VxFS file system, NetBackup restores the files in an
uncompressed form. The following message displays in the Progress tab of the
Backup, Archive, and Restore client interface:
File ‘file_name’ will not be restored in compressed form. Please
refer to the Release Notes or User Guide.
The message appears only for the first file that cannot be restored in its compressed
form.
Known issue
A known issue exists that includes failures with respect to backups for files having
ReFS based snapshot. At present Microsoft does not support backup of files having
ReFS based snapshot as the API's are not compatible. Microsoft is working on
documenting this behavior and providing support which are tracked with the following
issue ID's:
■ Documentation issue#: 42324557
■ Backup Read issue#: 42295538
Section 10
Disaster recovery and
troubleshooting
■ You can view detailed information alerts and error messages in the Notifications
section.
Term Description
Infrastructure management The component that discovers, monitors, and manages the
server (IMS) asset infrastructure within a data center. The IMS transmits
information about the asset infrastructure to the Resiliency
Manager. The IMS is deployed as a virtual appliance. To
achieve scale, multiple IMSs can be deployed in the same
data center.
Data center The location that contains source data center and a target
data center. Each data center has one or more IMSs.
Automated virtual machines The assets that are a part of a resiliency group and you can
perform actions, such as migrate, recover, and rehearsal.
Term Description
Recovery Point Object Recovery Point Objective is the point in time you can recover
(RPO) to in the event of a disaster.
6 In the Add data center and Infrastructure management server dialog box,
select a data center.
7 In the Infrastructure management server section, select a preferred server.
8 Click Add.
After you add the Resiliency Platform in NetBackup, the NetBackup primary
server will be configured automatically in the Resiliency Platform.
Managing Resiliency Platforms 610
Configuring a Resiliency Platform
Note: If the NetBackup has FIPS mode enabled and you need to fetch the respective
certificates, refer Integrating with NetBackup topic in Resiliency Platform
product documentation. You need to install Resiliency Platform certificates in
FIPS trust store and then add the Resiliency Platform. (Only done when NetBackup
has FIPS mode enabled)
3 Click the Actions menu for the Resiliency Platform that you want to edit and
select Edit.
4 Enter the updated Resiliency Platform API access key and NetBackup API
access key.
5 Click Next.
6 In the Edit data center and Infrastructure management server dialog box,
select the Data center and then select the preferred infrastructure management
server.
7 Click Save.
8 To delete a Resiliency Platform, from the Actions menu, select Delete.
Table 46-1
Tab Column Description
Issue Action
Failed to configure the current NetBackup Check the logs at the following location in
primary server with the Resiliency Platform. Veritas Resiliency Platform’s Resiliency
manager:
■ /var/opt/VRTSitrp/logs/copydata-service.log
■ /var/opt/VRTSitrp/logs/api-service.log
Failed to establish a persistent connection ■ Verify that the logged in user has
between the current NetBackup primary permissions in credentials namespace.
server and the Resiliency Platform. ■ Check the logs at the following location
on the NetBackup primary server:
■ /usr/openv/logs/nbwebservice/ in
NetBackup installation directory
■ C:\Program
Files\Veritas\NetBackup\logs\nbwebservice
in NetBackup windows
Managing Resiliency Platforms 614
Troubleshooting NetBackup and Resiliency Platform issues
Issue Action
Failed to launch the Veritas Resiliency Verify that same authentication domain is
Platform used to configure Veritas Resiliency Platform
and NetBackup.
Chapter 47
Managing Bare Metal
Restore (BMR)
This chapter includes the following topics:
6 For ESXi servers, additional permissions are needed for Host properties.
■ On the Global tab, expand the NetBackup management section.
■ Select the following permissions:
8 Click Assign.
9 Under Workloads, click Assign.
Select the VMware assets that you want the role to have access to.
■ To give the role access to all VMware assets and future assets that you
add, select Apply selected permissions to all existing and future
VMware assets.
■ To select individual assets, deselect Apply selected permissions to all
existing and future VMware assets and click Add.
For example, you can select one or more: datastores, datastore clusters,
ESXi servers, ESXi clusters, resource pools, vApps.
■ If a user doesn't have the correct permissions or access in the NetBackup web
UI
Step 2 Verify that the firewall is open Refer to the following article:
for port 443.
https://www.veritas.com/docs/100042950
Troubleshooting the NetBackup Web UI 619
Tips for accessing the NetBackup web UI
Table 48-1 Solutions when the web user interface does not display
(continued)
Step 4 Verify that the Check the nbwebservice logs for more details.
nbwebservice is up.
Step 5 Verify that the vnetd Verify that the vnetd -http_api_tunnel service is running.
-http_api_tunnel is
For more details, check the vnetd -http_api_tunnel logs with
running.
OID 491.
Step 6 Ensure that the external ■ Use the Java Keytool commands to validate the following file:
certificate for the NetBackup Windows:
web server is accessible and install_path\var\global\wsl\credentials\nbwebservice.jks
has not expired. UNIX: /usr/openv/var/global/wsl/credentials
nbwebservice.jks
■ Check whether the nbwebgroup has a permission to access the
nbwebservice.jks file.
■ Contact Veritas Technical Support.
Databases
The NetBackup databases include the NBDB database and the NetBackup
Authorization database (NBAZDB). If Bare Metal Restore is installed
(optionally-licensed) there is also the BMRDB database.
The databases are located in the following directories:
install_path\NetBackupDB\data
/usr/openv/db/data/
Additional NetBackup catalog information 624
Parts of the NetBackup catalog
\nbdb\ or /nbdb/ (contains both the NBDB and the EMM databases)
Configuration files
Warning: Do not edit the configuration files. NetBackup may not start if you change
these files.
pgbouncer.ini
pg_hba.conf
pg_ident.conf
postgresql.auto.conf
postgresql.conf
userlist.txt
vxdbms.conf
web.conf
/usr/openv/db/data/instance
/usr/openv/var/global/wsl/config
install_path\NetBackup\var\global\wsl\config
The NetBackup Resource Broker queries EMM to allocate storage units, drives
(including drive paths), and media.
EMM contains the following information:
■ Device attributes
■ Robotic library and standalone drive residence attributes
■ NDMP attributes
■ Barcode rule attributes
■ Volume pool attributes
■ Tape attributes
■ Media attributes
■ Storage unit attributes
■ Storage unit group attributes
■ Hosts with assigned tape drives
■ Media and device errors
■ Disk pool and disk volume attributes
■ Storage server attributes
■ Log on credentials for storage servers, disk arrays, and NDMP hosts
■ Fibre Transport attributes
EMM ensures consistency between drives, robotic libraries, storage units, media,
and volume pools across multiple servers. EMM contains information for all media
servers that share devices in a multiple server configuration. The NetBackup
scheduling components use EMM information to select the server, drive path, and
media for jobs.
Image files Files that store only backup set summary information.
Image .f files Used to store the detailed information about each file backup.
db_marker.txt Used to ensure that access to the db directory is valid when the
NetBackup Database Manager starts up. Do not delete this file.
The image database is the largest part of the NetBackup catalog. It consumes about
99% of the total space that is required for the NetBackup catalog. While most of
the subdirectories are relatively small in the NetBackup catalogs, \images (Windows)
or /images (UNIX) can grow to hundreds of gigabytes. The image database on the
primary server can grow too large to fit on a single tape. Image database growth
depends on the number of clients, policy schedules, and the amount of data that
is backed up.
See “Estimating catalog space requirements” on page 639.
If the image catalog becomes too large for the current location, consider moving it
to a file system or disk partition that contains more space.
See “Moving the image catalog” on page 641.
The catalog conversion utility (cat_convert) can be used to convert .f files into a
human-readable format.
Note: You can use intelligent catalog archiving (ICA) to reduce the number of
catalog .f files based on a specified retention period or file size.
See “Enabling intelligent catalog archiving (ICA) to reduce the number of .f files”
on page 631.
ICA applies only to servers running NetBackup 10.5 and later using MSDP or MSDP
Cloud storage.
The file layout determines whether the catalog contains one .f file or many .f files.
NetBackup configures the file layout automatically, based on the size of the binary
catalog. NetBackup uses one of two layouts: single file layout or multiple file layout.
■ Image .f file single file layout
NetBackup stores file information in a single image.f file if the information for
the catalog is less than 100 megabytes.
When the backup file of one catalog backup is less than 100 megabytes,
NetBackup stores the information in a single image.f file. The image.f file is
always greater than or equal to 72 bytes, but less than 100 megabytes.
The following is a UNIX example of an .f file in a single file layout:
■ cloudstore.conf
Additional NetBackup catalog information 628
Archiving the catalog and restoring from the catalog archive
■ libstspiencrypt.conf
■ libstspimetering.conf
■ libstspithrottling.conf
■ libstspicloud_provider_name.conf
All .conf files that are specific to the cloud providers that NetBackup supports
The cloud configuration files that are backed up during the catalog backup process
reside at the following locations:
Windows install_path\Veritas\NetBackup\var\global\wmc\cloud
UNIX /usr/openv/var/global/wmc/cloud
Windows <installed-path>\NetBackup\var\global\cloud
UNIX /usr/openv/var/global/cloud/
Note: The cacert.pem file is not backed up during the NetBackup catalog backup
process.
This cacert.pem file is a cloud provider-specific file. This file is installed as part of
the NetBackup installation. This file includes the well-known public cloud vendor
CA certificates used by NetBackup.
You can also specify a size value so that any catalog .f file that is greater than or
equal to the size value is removed from the catalog disk.
See “Enabling intelligent catalog archiving (ICA) to reduce the number of .f files”
on page 631.
Catalog archiving should not be used as a method to reclaim disk space when a
catalog file system fills up. In that situation, investigate catalog compression or add
disk space to grow the file system.
For additional catalog archiving considerations, see the following topic:
See “Catalog archiving considerations” on page 638.
Additional NetBackup catalog information 630
Archiving the catalog and restoring from the catalog archive
To determine what images have been previously archived and removed from
disk, run the following command.
/usr/openv/netbackup/bin/admincmd/bpcatlist -offline
Note: If catalog archiving has not been previously run, this command should
return: No entity was found.
For example, to display all images for a specific client before January 1, 2017,
run the following command:
bpcatlist -client name -before Jan 1 2017
To display the help for the bpcatlist command run this command.
bpcatlist -help
Once the bpcatlist output correctly lists all the images that are to be archived
or deleted, other commands can be added.
Additional NetBackup catalog information 631
Archiving the catalog and restoring from the catalog archive
A new job appears in the Activity Monitor. The command waits until the backup
completes before it returns the prompt. The command reports an error only if
the catalog archive fails, otherwise the commands return to the prompt.
The File List: section of the Job Details in the Activity Monitor displays a list
of image files that have been processed. When the job completes with a status
0, the bpcatrm command removes the corresponding .f files. If the job fails,
no catalog .f files are removed.
If bpcatlist is piped to bpcatarc but the results are not piped to bpcatrm,
the backup occurs but the .f files are not removed from disk. The same
bpcatlist command can then be rerun and piped to bpcatrm to remove the
.f files.
This command restores all of the catalog archive files before January 1, 2017.
Note: Intelligent catalog archiving (ICA) applies only to servers running NetBackup
10.5 and later using MSDP storage.
Additional NetBackup catalog information 632
Archiving the catalog and restoring from the catalog archive
You can use intelligent catalog archiving (ICA) to reduce the number of catalog .f
files based on a specified retention period or file size. When you enable ICA, any
catalog .f file that is older than the specified retention period value is removed
from the catalog disk. You can also specify a file size value so that any catalog .f
file that is greater than or equal to the size value is removed from the catalog disk.
The main advantage of ICA is that it shortens catalog backup time by reducing the
number of .f files that need to be backed up if they meet the required criteria:
■ The backup image must be older than the configured ICA retention period.
■ The .f file must be larger than or equal to the configured ICA minimum size.
■ At least one copy of the backup image must be on MSDP storage and have 1
or more true image restore (TIR) fragments.
■ Image catalog .f file has not been recalled in the last 24 hours.
■ The backup image must be from a completed SLP or from a backup that is not
managed by an SLP.
■ The backup image is not from a catalog backup.
■ The image catalog is not archived.
When ICA is enabled, you may notice the following behaviors:
■ Initial image cleanup after you enable ICA may take longer than usual.
■ Catalog backups will be faster if any of the .f files that are involved have been
intelligently archived.
■ Browse and Restore functions will take longer if any of the .f files that are
involved have been intelligently archived.
No additional action is needed to restore the catalog .f file. Catalog .f files are
restored from images automatically as follows:
■ When an ICA image is browsed.
■ When an ICA-eligible copy is expired from an ICA image. Restoring catalog .f
files ensures that the remaining copies from that image are accessible and
usable.
■ When an ICA-eligible image is found but its catalog .f file missing.
More information about .f files is available:
See “About NetBackup image .f files” on page 626.
Additional NetBackup catalog information 633
Archiving the catalog and restoring from the catalog archive
To enable intelligent catalog archiving (ICA) and specify retention and file
size values
1 Run the following command on the primary server:
bpconfig -ica_retention seconds
When the seconds value is between 1 and 2147472000, ICA is enabled. Any
image which is older than the value is processed for ICA. The catalog .f file
from the ICA-eligible image is removed from the catalog disk. Setting this value
to 0 (zero) disables ICA. The default value for NetBackup Flex Scale and Cloud
Scale environments is 2592000 (30 days). The default value for all other
NetBackup environments is 0 (disabled).
For Accelerator-enabled backups, specify an ICA retention value that is longer
than full backup schedules so that the number of .f file restores from ICA
images goes down.
For example, to set the ICA retention value to 30 days, enter bpconfig
-ica_retention 2592000.
# bpconfig -U
Admin Mail Address: [email protected]
Job Retry Delay: 10 minutes
Max Simultaneous Jobs/Client: 1
Backup Tries: 1 time(s) in 12 hour(s)
Keep Error/Debug Logs: 3 days
Max drives this master: 0
Keep TrueImageRecovery Info: 24 days
Compress DB Files: (not enabled)
Media Mount Timeout: 30 minutes
Display Reports: 24 hours ago
Preprocess Interval: 0 hours
Image DB Cleanup Interval: 12 hours
Image DB Cleanup Wait Time: 10 minutes
Policy Update Interval: 10 minutes
Intelligent Catalog Archiving: Files file larger than 1024 KB
Intelligent Catalog Archiving: Images older than 30 day(s)
Additional NetBackup catalog information 634
Archiving the catalog and restoring from the catalog archive
2 Note: After you enable ICA, the minimum file size for .f files is set to the default
value 1024 KB. Use this step to change that value.
To specify a minimum file size, run the following command on the primary
server:
bpconfig -ica_min_size size
When the size value is between 0 and 2097151, any catalog .f file that is
larger than or equal to the size value is removed from the catalog disk. The
default value is 1024.
For example to set the ICA minimum file size to 2048 KB, enter bpconfig
-ica_min_size 2048.
# bpconfig -U
Admin Mail Address: [email protected]
Job Retry Delay: 10 minutes
Max Simultaneous Jobs/Client: 1
Backup Tries: 1 time(s) in 12 hour(s)
Keep Error/Debug Logs: 3 days
Max drives this master: 0
Keep TrueImageRecovery Info: 24 days
Compress DB Files: (not enabled)
Media Mount Timeout: 30 minutes
Display Reports: 24 hours ago
Preprocess Interval: 0 hours
Image DB Cleanup Interval: 12 hours
Image DB Cleanup Wait Time: 10 minutes
Policy Update Interval: 10 minutes
Intelligent Catalog Archiving: Files file larger than 2048 KB
Intelligent Catalog Archiving: Images older than 30 day(s)
Additional NetBackup catalog information 635
Archiving the catalog and restoring from the catalog archive
# bpconfig -U
Admin Mail Address: [email protected]
Job Retry Delay: 10 minutes
Max Simultaneous Jobs/Client: 1
Backup Tries: 1 time(s) in 12 hour(s)
Keep Error/Debug Logs: 3 days
Max drives this master: 0
Keep TrueImageRecovery Info: 24 days
Compress DB Files: (not enabled)
Media Mount Timeout: 30 minutes
Display Reports: 24 hours ago
Preprocess Interval: 0 hours
Image DB Cleanup Interval: 12 hours
Image DB Cleanup Wait Time: 10 minutes
Policy Update Interval: 10 minutes
Intelligent Catalog Archiving: (not enabled)
Command Description
bpcatlist The bpcatlist command queries the catalog data. Then, bpcatlist lists the portions of the
catalog that are based on selected parameters. For example, date, client, policy, schedule name,
backup ID, the age of the backup image, or the date range of the backup image. bpcatlist
outputs the formatted image summary information of matched images to standard output.
The other catalog archiving commands, bpcatarc, bpcatrm, and bpcatres, all depend on
input from bpcatlist by a piped command.
For example, to archive (backup and delete) all of the .f files that were created before January
1, 2012, the following would be entered:
■ Backup ID (Backupid)
■ Backup date (Backup Date)
■ Catalog archive ID (catarcid). After one .f file is successfully backed up, a catalog archive
ID is entered into the catarcid field in the image file. This field is zero (0) if the image was
never archived.
■ Archived status (S). Indicates whether the catalog was archived (2) or was not archived (1).
■ Compressed status (C). Indicates whether the catalog was compressed (positive_value) or
was not compressed (0).
■ Catalog file name (Files file)
The following is an example of the bpcatlist output, showing all of the backups for client alpha
since October 23:
bpcatarc The bpcatarc command reads the output from bpcatlist and backs up the selected list of
.f files. After one .f file is successfully backed up, a catalog archive ID is entered into the
catarcid field in the image file. For archiving of the.f files to proceed, a policy by the name of
catarc is required. The policy is based on a User Backup type schedule. The schedule for catarc
must include in its window the time bpcatarc command is run.
Command Description
bpcatrm The bpcatrm command reads the output from bpcatlist or bpcatarc. If the image file has
valid catarcid entries, bpcatrm deletes selected image.f files from the online catalog.
bpcatrm does not remove one .f file unless the file has been previously backed up using the
catarc policy.
bpcatres Use the bpcatres command to restore the catalog. The bpcatres command reads the output
from bpcatlist and restores selected archived.f files to the catalog. For example:
■ There is no simple method to determine to which tape the catalog has been
archived. The bpcatlist -offline command is the only administrative
command to determine what images have been archived. This command does
not list what tape was used for the archive. As a result, exercise caution to
ensure that the tapes used for catalog archiving are available for restoring the
archived catalog images. Either create a separate volume pool to use exclusively
for catalog archives or find a method to label the tape as a catalog archive tape.
Additional NetBackup catalog information 639
Estimating catalog space requirements
4 If you do not want to write more images to the client’s volume pool, change
the volume pool before you run another archiving catalog.
3 Use the information from steps 1 and 2 to calculate the maximum number of
files that exist at any given time.
For example:
Assume that you schedule full backups to occur every seven days. The full
backups have a retention period of four weeks. Differential incremental backups
are scheduled to run daily and have a retention period of one week.
The number of file paths you must allow space for is four times the number of
files in a full backup. Add to that number one week’s worth of incremental
backups.
The following formula expresses the maximum number of files that can exist
for each type of backup (daily or weekly, for example):
Files per Backup × Backups per Retention Period = Max Files
For example:
A daily differential incremental schedule backs up 1200 files and the retention
period for the backup is seven days. Given this information, the maximum
number of files that can exist at one time are the following:
1200 × 7 days = 8400
A weekly full backup schedule backs up 3000 files. The retention period is four
weeks. The maximum number of files that can exist at one time are the
following:
3000 × 4 weeks = 12,000
Obtain the total for a server by adding the maximum files for all the schedules
together. Add the separate totals to get the maximum number of files that can
exist at one time. For example, 20,400.
For the policies that collect true image restore information, an incremental
backup collects catalog information on all files (as if it were a full backup). This
changes the calculation in the example: the incremental changes from 1200
× 7 = 8400 to 3000 × 7 = 21,000. After 12,000 is added for the full backups,
the total for the two schedules is 33,000 rather than 20,400.
4 Obtain the number of bytes by multiplying the number of files by the average
number of bytes per file record.
If you are unsure of the average number of bytes per file record, use 132. The
results from the examples in step 3 yield:
(8400 × 132) + (12,000 × 132) = 2692800 bytes (or about 2630 kilobytes)
Additional NetBackup catalog information 641
Estimating catalog space requirements
5 Create the directory to which you intend to move the image information. For
example:
E:\NetBackup\alternate_db\images\client_name
6 On the first line of the ALTPATH file, specify the path to the directory where you
intend to move the client’s image information. For example:
E:\NetBackup\alternate_db\images\client_name
7 Move all files and directories (except the ALTPATH file) that are in the current
client directory to the new directory.
For example, if the images are currently in
C:\Program Files\Veritas\NetBackup\db\images\mars
then move all files and directories (except the ALTPATH file) to
E:\NetBackup\alternate_db\images\mars
5 Move the image catalog to the new location in the other file system.
6 Create a symbolic link from /usr/openv/netbackup/db/images to the new
location in the other file system.
See “NetBackup file size considerations on UNIX systems” on page 641.
It does not make a difference to NetBackup if the backup session was successful.
The operation occurs while NetBackup expires backups and before it runs the
session_notify script and the backup of the NetBackup catalogs.
The time to perform compression depends on the server speed and the number
and size of the files being compressed. Files are compressed serially, and temporary
working space is required in the same partition.
When numerous compressed image catalog files must be processed, the backup
session is extended until compression is complete. The additional backup time is
especially noticeable the first time you perform the compression. To minimize the
effect of the initial sessions, consider compressing the files in stages. For example,
begin by compressing the records for the backups older than 120 days. Continue
to reduce the number of days over a period of time until you reach a comfortable
setting.
Compressing the image catalog accomplishes the following objectives:
■ Reduces greatly the disk space that is consumed.
■ Reduces the media that is required to back up the catalog.
The amount of space that is reclaimed varies with the types of backups you perform.
Full backups result in a larger percentage of catalog compression than incremental
backups. Normally, more data is duplicated in a catalog file for a full backup. Using
catalog compression, a reduction of 80% is possible.
This reduction in disk space and media requirements is achieved at the expense
of performance when a user lists or restores files. Since the information is
uncompressed at each reference, performance degradation is in direct proportion
to the number and size of compressed files that are referenced. If the restore
requires numerous catalog files to be uncompressed, increase the File browse
timeout value that is associated with list requests. (See the Timeouts host property
for the client.)
Additional NetBackup catalog information 645
Estimating catalog space requirements
After file hash server is configured on the media server, the Media Server
Deduplication Pool cannot be configured on the media server.
The file hash server supports only the security certificates that the NetBackup
certificate authority issues.
The file hash server name must be the same as the NetBackup media server, which
is the NetBackup host name in thebp.conffile.
Additional NetBackup catalog information 648
Configuring the file hash search in NetBackup
2 Run the following command to configure file hash server on the primary server.
/usr/openv/netbackup/bin/goodies/nbfhsmgr -config file hash
hostname
Note: This feature may affect the backup performance depending on the client
configuration such as CPU and memory. If the CPU has SHA extensions, the hash
calculation is faster than the CPU without SHA extensions.
Additional NetBackup catalog information 649
Configuring the file hash search in NetBackup
■ Post-installation tasks
Windows
install_path\Veritas\NetBackupDB
install_path\Veritas\NetBackup\bin
install_path\Veritas\NetBackupDB\data\instance
install_path\Veritas\NetBackupDB\data\nbazdb\
On UNIX
/usr/openv/db
/usr/openv/var/global
/usr/openv/db/data/instance/
/usr/openv/db/data/nbazdb/
/usr/openv/db/data/bmrdb/
Warning: Use these utilities and commands in this directory with caution.
Contains the utilities and binaries for running and administering NetBackup services.
More information can be found in the NetBackup Commands Reference Guide.
For information on using the NetBackup Database Administration utility
(NbDbAdmin.exe or dbadm), see the following topics:
See “Using the NetBackup Database Administration utility on Windows” on page 662.
See “Using the NetBackup Database Administration utility on UNIX” on page 667.
About the NetBackup database 653
About the NetBackup database installation
Directory Description
bin Contains the utilities and commands for administrating the NetBackup database service.
data The default location of the NetBackup databases (NBDB, NBAZDB, and BMRDB) and certain
configuration files.
lib On UNIX: Contains all the shared libraries for the NetBackup Scale-Out Relational Database.
The directory also includes ODBC libraries, used to connect to NBDB and BMRDB.
scripts
Warning: Do not edit the scripts that are located in this directory.
Contains the scripts that are used to create the NetBackup database. It also contains the
scripts that are used to create the EMM and other schemas.
share Contains the PostgreSQL document and module files that are required by the NetBackup
database server.
staging Used as a temporary staging area during catalog backup and recovery.
WIN64 (Windows) Contains .dll files for the NetBackup Scale-Out Relational Database.
The file that contains the configuration information specific to the installation of
the NetBackup database.
See “vxdbms.conf” on page 654.
■ nbdbinfo.dat
A backup of the NetBackup DBA password.
vxdbms.conf
On Windows:
VXDBMS_NB_SERVER = NB_server_name
VXDBMS_NB_DATABASE = NBDB
VXDBMS_BMR_DATABASE = BMRDB
VXDBMS_AZ_DATABASE = NBAZDB
VXDBMS_NB_STAGING = C:\Program Files\Veritas\NetBackupDB\staging
VXDBMS_NB_PORT = 13785
VXDBMS_NB_DATA = C:\Program Files\Veritas\NetBackupDB\data
VXDBMS_NB_PASSWORD = encrypted_password
AZ_DB_PASSWORD = encrypted_password
VXDBMS_POSTGRESQL_POOLER_ODBC_PORT = 13787
On UNIX:
VXDBMS_NB_SERVER = NB_server_name
VXDBMS_NB_PORT = 13785
VXDBMS_NB_DATABASE = NBDB
VXDBMS_AZ_DATABASE = NBAZDB
VXDBMS_BMR_DATABASE = BMRDB
VXDBMS_NB_DATA = /usr/openv/db/data
VXDBMS_NB_STAGING = /usr/openv/db/staging
VXDBMS_NB_PASSWORD = encrypted_password
AZ_DB_PASSWORD = encrypted_password
VXDBMS_POSTGRESQL_POOLER_ODBC_PORT = 13787
The encrypted password that is used to log into the DBA accounts is stored in
vxdbms.conf. These accounts include NBDB, NBAZDB, and BMRDB and other
data accounts.
On Windows:
HKEY_LOCAL_MACHINE\SOFTWARE\Veritas\NetBackup\CurrentVersion\
Config\VXDBMS_NB_DATA
On UNIX: /usr/openv/netbackup/bp.conf
VXDBMS_NB_DATA = /usr/openv/db/data
■ install_path\Veritas\NetBackup\bin\bpup -e vrtsdbsvc_psql
Starts or stops NBDB without shutting down the NetBackup Scale-Out Relational
Database server.
To see whether the database is up, enter nbdb_ping.
■ nbdb_admin [-start | -stop BMRDB]
About the NetBackup database 656
Post-installation tasks
Configuration files:
shared_drive\VERITAS\NetBackupDB\data\instance
UNIX
NetBackup databases:
shared_drive/db/data
Configuration files:
/usr/openv/var/global
shared_drive/db/data/instance
Post-installation tasks
The tasks that are described in the following topics are optional and can be
performed after the initial installation:
■ Change the database password.
See “Changing the NetBackup database password” on page 657.
■ Move the NetBackup databases (possibly to tune performance).
See “Moving a database after installation ” on page 658.
■ Recreate NBDB.
See “Creating the NBDB database manually” on page 660.
About the NetBackup database 657
Post-installation tasks
nbdb_backup
nbdb_restore
nbdb_unload
You can run the nbdb_move command at any time because it does not drop the
database and recreate it. Therefore all the data is preserved.
To move a NetBackup database on Windows
1 Perform a catalog backup.
2 Shut down all NetBackup services by typing the following command:
install_path\Veritas\NetBackup\bin\bpdown
4 Start the NetBackup Database Administration utility and enter the database
logon password. Click OK.
5 From the Database list, select the database that you want to move.
6 Select the Tools tab.
7 Click Move.
8 Select Move data to and browse to the new location.
9 NetBackup does not require that the database directories are world-writable.
Make sure that the new database directories (data_directory) have
appropriate permissions so that the directories are not world-writable.
Note: NetBackup does not require that the database directories are
world-writable. Make sure that the new database directories (data_directory)
have appropriate permissions so that the directories are not world-writable.
Note: If the NBDB database already exists, the create_nbdb command does not
overwrite it. If you want to move the database, move it by using the nbdb_move
command.
About the NetBackup database 661
Post-installation tasks
2 Start the NetBackup Scale-Out Relational Database Manager service with the
following command:
install_path\Veritas\NetBackup\bin\bpup -e vrtsdbsvc_psql
5 The new NBDB database is empty and does not contain the EMM data that is
loaded during a normal installation.
Make sure that you have the most current support for new devices before the
data is repopulated. New devices are added approximately every 2 months.
6 Repopulate the EMM data by running the tpext utility. tpext updates the EMM
database with new versions of device mappings and external attribute files.
install_path\Veritas\Volmgr\bin\tpext.exe
2 Start the NetBackup Scale-Out Relational Database Manager service with the
following command:
/usr/openv/netbackup/bin/nbdbms_start_stop start
5 The new NBDB database is empty and does not contain the EMM data that is
loaded during a normal installation.
Make sure that you have the most current support for new devices before the
data is repopulated. New devices are added approximately every 2 months.
6 Repopulate the EMM data by running the tpext utility. tpext updates the EMM
database with new versions of device mappings and external attribute files.
/usr/openv/volmgr/bin/tpext
■ Drop the existing NBDB database and recreate it in the data directory:
create_nbdb -drop -data data_directory
If the NBDB database was moved from the default location by using nbdb_move,
use this command to recreate it in the same location. Specify
current_data_directory. BMRDB must also be recreated. The BMRDB database
must reside in the same location as the NetBackup database.
Option Description
Reorganize All This option defragments the tablespaces that are fragmented.
Validate This option performs a database validation on all of the database tablespaces in the selected
database.
■ Validates the indexes and keys on all of the tables in the database.
■ Scans each table. For each row, a check is made that it exists in the appropriate indexes.
The number of rows in the table must match the number of entries in the index.
■ Ensures that every row that is referenced in each index exists in the corresponding table.
For foreign key indexes, it also ensures that the corresponding row exists in the primary
table.
After a validation check runs, the Results screen lists each database object. Each error is
listed next to the database object where it was found. The total number of errors are listed
at the end of the list of database objects. If no errors were found, that is indicated.
If any validation errors are reported, perform the following tasks:
If validation errors persist, contact Veritas Technical Support. The administrator may be
asked to rebuild the database using the Rebuild option or the nbdb_unload.exe command
line utility.
Rebuild This option unloads and reloads the database. A new database with all of the same options
is built in its place.
A Database Rebuild may be required if validation errors are reported when you use the
Validate option.
Note: Before you rebuild the database, it is recommended that you create a copy of the
database by performing a backup from the Tools tab.
To rebuild the database temporarily suspends NetBackup operations and can take a long
time depending on the database size.
About the NetBackup database 664
Using the NetBackup Database Administration utility on Windows
About fragmentation
Table fragmentation can impede performance. When rows are not stored
contiguously, or if rows are split into more than one page, performance decreases
because these rows require additional page accesses.
When an update to a row causes it to grow beyond the originally allocated space,
the row is split. The initial row location contains a pointer to another page where
the entire row is stored. As more rows are stored on separate pages, more time is
required to access the additional pages.
Reorganizing may also reduce the total number of pages that are used to store the
table and its indexes. It may reduce the number of levels in an index tree. Note that
the reorganization does not result in a reduction of the total size of the database.
The Rebuild option on the General tab completely rebuilds the database, eliminating
any fragmentation, and free space. This option may result in a reduction of the total
size of the database.
See “Estimating catalog space requirements” on page 639.
3 Enter the new password and confirm the new password. Changing the password
changes it for both NBDB and BMRDB, if a BMR database is present.
4 Enable Create a backup file of your new DBA password to keep track of
the password.
5 Click OK.
The utility warns you that it is important to remember the password. You cannot
recover information within the EMM database if the password is unavailable.
6 Restart the database for the password change to take effect.
Schema and data Unload both the database schema and the data. The data is
unloaded as a set of files in comma-delimited format. One
file is created for each database table.
5 Click OK.
About the NetBackup database 666
Using the NetBackup Database Administration utility on Windows
Before you rebuild the database. See “General tab of the NetBackup Database
Administration utility” on page 663.
Note: Using the NetBackup Database Administration utility to back up and restore
the NetBackup database can potentially break the consistency between the
NetBackup catalog and the database. This loss of consistency can lead to loss of
data. Use the tool to back up and restore the NetBackup catalog only as a
precautionary measure.
The restore overwrites the current database. The database is shut down and
restarted after the restore is completed.
A database restore causes NetBackup activity to be suspended, so do not perform
a database restore while active backups or other restores run.
Note: Using the Database Administration utility to back up and restore the
NetBackup database can potentially break the consistency between the NetBackup
catalog and the database. This loss of consistency can lead to loss of data. Use
the tool to back up and restore the NetBackup database only as a precautionary
measure.
Property Description
Consistency The validation state of the selected database: OK, NOT_OK, or DOWN
The initial screen also displays the following Database Administration main menu:
Option Description
Select/Restart This option displays the menu where you can select a database to start or stop, and to change
Database and Change database passwords.
Password
See “Select/Restart Database and Change Password menu options” on page 669.
Database Space This option displays the menu where you can perform the following actions:
Management
■ Generate a database space utilization report
■ Reorganize fragmented database objects
Database Validation This option displays the menu where you can validate and rebuild the selected database.
Check and Rebuild
See “Database Validation Check and Rebuild menu options” on page 670.
Move Database This option displays the menu where you can change the location of the database tablespaces.
Unload Database This option displays the menu where you can unload either the schema or the schema and
data from the database.
Backup and Restore This option displays the menu where you can choose the backup and restore options for the
Database database.
Refresh Database This option refreshes the Status and Consistency in the main menu.
Status
About the NetBackup database 669
Using the NetBackup Database Administration utility on UNIX
Option Description
NBDB Select NBDB and then view or modify the database using the other dbadm menu options.
BMRDB Select BMRDB and then view or modify the database using the other dbadm menu options.
Change Password Changes the password for the databases. The password is changed for both NBDB and
BMRDB, if applicable. Restart the database for the password change to take effect.
To log into the Database Administration utility, you must know the current DBA password.
To change the password for the first time after installation, use the nbdb_admin command.
The command updates the vxdbms.conf file with the new, encrypted string:
To change a known password to a new password, you can either use the nbdb_admin
command or the NetBackup Database Administration utility.
Option Description
Report on Database The report contains the tablespaces and the physical pathnames of the databases.
Space
For each tablespace, the report displays the name, the amount of free space in KBytes, and
the file size in KBytes. The report also displays the amount of free space that remains on
each of the file systems being used for the database.
About the NetBackup database 670
Using the NetBackup Database Administration utility on UNIX
Option Description
These actions are performed from the Database Reorganize menu as follows:
■ 1) Defragment All
This option automatically determines the tablespaces that are fragmented.
■ 2) Table Level Defragmentation
This option generates a fragmentation report for each database table. For each table, the
report includes the TABLE_NAME, number of ROWS, number of ROW_SEGMENTS,
and SEGS_PER_ROW.
In addition, a * displays in the ! column for an individual table if it will be automatically
selected for reorganization by the Defragment All option.
A row segment is all or part of one row that is contained on one page. A row may have
one or more row segments. The ROW_SEGMENTS value indicates total number of row
segments for the table. The SEGS_PER_ROW value shows the average number of
segments per row, and indicates whether or not a table is fragmented.
A SEGS_PER_ROW value of 1 is ideal, and any value more than 1 indicates a high
degree of fragmentation. For example, a value of 1.5 means that half of the rows are
partitioned.
See “About fragmentation” on page 664.
Option Description
Standard Validation The standard type of validation is not supported. This option performs a full validation.
About the NetBackup database 671
Using the NetBackup Database Administration utility on UNIX
Table 50-7 Database Validation Check and Rebuild menu options (continued)
Option Description
Full Validation This option performs a database validation on all of the database tablespaces in the selected
database.
■ Validates the indexes and keys on all of the tables in the database.
■ Scans each table. For each row, a check is made that it exists in the appropriate indexes.
The number of rows in the table must match the number of entries in the index.
■ Ensures that every row that is referenced in each index exists in the corresponding table.
For foreign key indexes, it also ensures that the corresponding row exists in the primary
table.
Note: To perform a full database validation, shut down NetBackup and start only the database
service.
If validation errors persist, contact Veritas Technical Support. The administrator may be asked
to rebuild the database using the Database Rebuild option or the nbdb_unload.exe
command-line utility.
Database Rebuild This option lets you rebuild the database. A Database Rebuild results in a complete unload
and reload of the database. A new database with all of the same options is built in place. A
Database Rebuild may be required if Database Validation errors are reported using the
Standard or Full Validation options.
When you select this option, a message appears which recommends that you exit and create
a backup using the Backup Database option before you rebuild the database. You then have
the choice of whether to continue or not.
Option Description
Schema Only This option lets you unload only the database schema. For the NBDB database, the schema
is unloaded as a file that is named NBDB.sql in the named directory. For BMRDB the file is
BMRDB.sql.
Data and Schema This option lets you unload both the database schema and the data. The data is unloaded
as a set of files. One file is created for each database table.
Change Directory This option lets you change the directory location for the files that unload options (1) or (2)
create.
Note: Using the NetBackup Database Administration utility to back up and restore
the NetBackup database can potentially break the consistency between the
NetBackup catalog and the database. This loss of consistency can lead to loss of
data. Use the tool to back up and restore the NetBackup database only as a
precautionary measure.
About the NetBackup database 673
Using the NetBackup Database Administration utility on UNIX
Option Description
Online Backup This option lets you make a copy of the databases while the databases are active. Other
NetBackup activity is not suspended during this time.
Restore Backup This option lets you restore from a copy of the databases that was previously made with
either options 1 or 2. The currently running databases are overwritten, and the database is
shut down and restarted after the restore is completed.
Change Directory This option lets you change the directory location for the databases that the backup options
(1) or (2) create. This directory is the source of the databases for the restore option (3).