NetBackup™ Web UI Administrator's Guide

Last Published:
Product(s): NetBackup (8.3.0.1, 8.3)
  1. Introducing the NetBackup web user interface
    1.  
      About the NetBackup web UI
    2.  
      Terminology
    3.  
      First-time sign in to a NetBackup master server from the NetBackup web UI
    4.  
      Sign in to the NetBackup web UI
    5.  
      Sign out of the NetBackup web UI
    6.  
      Authorized users
  2. Section I. Managing security
    1. Monitoring and notifications
      1.  
        The NetBackup dashboard
      2. Monitoring jobs
        1.  
          Jobs: canceling, suspending, restarting, resuming, deleting
        2.  
          Filter jobs in the job list
      3. About notifications
        1.  
          Viewing notifications
        2.  
          How to disable or modify NetBackup event notifications in the web UI
        3.  
          About configuring automatic notification cleanup tasks
      4. Send email notifications for job failures
        1.  
          Status codes that generate alerts
    2. Managing role-based access control
      1.  
        About role-based access control (RBAC) in NetBackup
      2. Configuring RBAC
        1.  
          Upgrading API key users to NetBackup 8.3
        2.  
          Add AD or LDAP domains
        3.  
          Add an RBAC role
        4.  
          Edit or remove a role
        5.  
          View users in RBAC
        6.  
          Add a user to a role
        7.  
          Remove a user from a role
      3. Role permissions
        1. Global > NetBackup management
          1.  
            Access hosts
          2.  
            Email notifications
          3.  
            Data classification
          4.  
            Event logs
          5.  
            NetBackup hosts
          6.  
            Image sharing
          7.  
            NetBackup backup images
          8.  
            Jobs
          9.  
            Licensing
          10.  
            Media server
          11.  
            Remote master server certificate authority
          12.  
            Resiliency
          13.  
            Resource limits
          14.  
            Retention levels
          15.  
            Servers > Trusted master servers
          16.  
            Cloud providers
          17.  
            CloudPoint servers
          18.  
            WebSocket servers
        2.  
          Global > Protection
        3. Global > Security
          1.  
            Access control
          2.  
            Security events
          3.  
            Certificate management
          4.  
            Disaster recovery passphrase
          5.  
            Identity provider configuration
          6.  
            Key Management Services (KMS)
          7.  
            Global security settings
          8.  
            Trust versions
          9.  
            API keys
          10.  
            User certificates
          11.  
            User sessions and authentication
        4. Global > Storage
          1.  
            Cloud storage
          2.  
            Disk pools
          3.  
            Storage Key Management Services
          4.  
            Storage servers
          5.  
            Storage units
          6.  
            Replication-capable target storage servers
        5.  
          Assets
        6.  
          Protection plans
        7.  
          Credentials
      4. Manage access
        1.  
          Manage the permissions for an area of the web UI
        2.  
          View access definitions
      5. Configure an external certificate for the NetBackup web server
        1.  
          Update or renew the external certificate for the web server
        2.  
          Remove the external certificate configured for the web server
    3. Security events and audit logs
      1.  
        View security events and audit logs
      2. About NetBackup auditing
        1.  
          User identity in the audit report
        2.  
          Audit retention period and catalog backups of audit records
        3.  
          Viewing the detailed NetBackup audit report
      3.  
        Send audit events to system logs
    4. Managing security certificates
      1.  
        About security management and certificates in NetBackup
      2.  
        NetBackup host IDs and host ID-based certificates
      3. Managing NetBackup security certificates
        1.  
          Reissue a NetBackup certificate
        2.  
          Managing NetBackup certificate authorization tokens
      4. Using external security certificates with NetBackup
        1.  
          View external certificate information for the NetBackup hosts in the domain
    5. Managing user sessions
      1.  
        Sign out a NetBackup user session
      2.  
        Unlock a NetBackup user
      3.  
        Configure when idle sessions should time out
      4.  
        Configure the maximum of concurrent user sessions
      5.  
        Configure the maximum of failed sign-in attempts
      6.  
        Display a banner to users when they sign in
    6. Managing master server security settings
      1.  
        Certificate authority for secure communication
      2.  
        Disable communication with NetBackup 8.0 and earlier hosts
      3.  
        Disable automatic mapping of NetBackup host names
      4.  
        About NetBackup certificate deployment security levels
      5.  
        Select a security level for NetBackup certificate deployment
      6.  
        Set a passphrase for disaster recovery
      7. About trusted master servers
        1.  
          Add a trusted master server
        2.  
          Remove a trusted master server
    7. Creating and using API keys
      1.  
        About API keys
      2.  
        Manage API keys
      3.  
        Use an API key with NetBackup REST APIs
      4.  
        View API keys
    8. Configuring authentication options
      1.  
        Sign-in options for the NetBackup web UI
      2. Configure user authentication with smart cards or digital certificates
        1.  
          Edit the configuration for smart card authentication
        2.  
          Add or delete a CA certificate that is used for smart card authentication
        3.  
          Disable or temporarily disable smart card authentication
      3.  
        About Single Sign-On (SSO) configuration
      4. Configure NetBackup for Single Sign-On (SSO)
        1.  
          Configure the Java KeyStore
        2.  
          Add and enable the IDP configuration
        3.  
          Enroll the NetBackup master server with the IDP
        4.  
          Manage an IDP configuration
      5. Troubleshooting SSO
        1.  
          Redirection issues
        2.  
          Unable to sign in due to authorization-related issues
    9. Managing hosts
      1.  
        View NetBackup host information
      2.  
        Approve or add mappings for a host that has multiple host names
      3.  
        Remove mappings for a host that has multiple host names
      4.  
        Reset a host's attributes
    10. Troubleshooting the web UI
      1.  
        Tips for accessing the NetBackup web UI
      2.  
        If a user doesn't have the correct permissions or access in the NetBackup web UI
      3. Unable to add AD or LDAP domains with the vssat command
        1.  
          Connection cannot be established with the AD or the LDAP server
        2.  
          User credentials are not valid
        3.  
          An incorrect user base DN or group base DN was provided
        4.  
          Multiple users or groups exist with the same name under user base DN or group base DN
        5.  
          User or group does not exist
      4.  
        Unable to validate the user or group
  3. Section II. Managing storage and backups
    1. Configuring storage
      1.  
        About storage configuration
      2.  
        Create a Media Server Deduplication Pool (MSDP) storage server
      3.  
        Create a Cloud (Cloud Catalyst), OpenStorage, or AdvancedDisk storage server
      4.  
        Create a disk pool
      5.  
        Create a storage unit
      6.  
        Create a universal share
      7.  
        Using image sharing from the NetBackup Web UI
      8.  
        Troubleshooting storage configuration
      9.  
        Troubleshooting universal share configuration issues
    2. Managing protection plans
      1.  
        Create a protection plan
      2.  
        Edit or delete a protection plan
      3.  
        Subscribe an asset or an asset group to a protection plan
      4.  
        Unsubscribe an asset from a protection plan
      5.  
        View protection plan overrides
      6.  
        About Backup Now
      7.  
        About a NetBackup classic policy
      8.  
        About policy management in the NetBackup web UI
    3. Managing protection plans for Microsoft SQL Server
      1.  
        About protecting SQL Server availability groups
      2. Create a protection plan to protect SQL Server assets
        1.  
          Schedules and retention
        2.  
          Performance tuning and configuration options
        3.  
          Using copy-only snapshot backups to affect how differentials are based
        4.  
          Snapshot methods
      3.  
        Protect a SQL Server availability group that crosses NetBackup domains
    4. Usage reporting and capacity licensing
      1.  
        Track backup data size on your master servers
      2.  
        Configure the servers list for usage reporting
      3.  
        Scheduling reports for capacity licensing
      4.  
        Other configuration for incremental reporting
      5.  
        Troubleshooting failures for nbdeployutil and incremental reporting
  4. Section III. Veritas Resiliency Platform
    1. Managing Resiliency Platforms
      1.  
        About Resiliency Platform in NetBackup
      2.  
        Understanding the terms
      3. Configuring a Resiliency Platform
        1.  
          Add a Resiliency Platform
        2.  
          Configuring a third-party CA certificate
        3.  
          Editing or deleting a Resiliency Platform
        4.  
          Viewing the automated or not-automated VMs
      4.  
        Troubleshooting NetBackup and Resiliency Platform issues
  5. Section IV. Managing credentials
    1. Managing external KMS and workload credentials
      1.  
        About credential management in NetBackup
      2.  
        Add a credential in NetBackup
      3.  
        Edit a credential
      4.  
        Delete a credential
      5. Select or add credentials to SQL Server instances or replicas
        1.  
          About Microsoft SQL Server credentials
        2.  
          Configuring the NetBackup services for SQL Server backups and restores
        3.  
          Configuring local security privileges for SQL Server

Approve or add mappings for a host that has multiple host names

A NetBackup host can have multiple host names. For example, both a private and a public name or a short name and a fully qualified domain name (FQDN). A NetBackup host may also share a name with other NetBackup host in the environment. NetBackup also discovers cluster names, including the host name and fully qualified domain name (FQDN) of the virtual name of the cluster.

The NetBackup client name of a host (or the primary name) is automatically mapped to its host ID during certificate deployment. For successful communication between NetBackup hosts, NetBackup also automatically maps all hosts to their other host names.

However, that method is less secure. Instead, you can choose to disable this setting and choose to manually approve the individual host name mappings that NetBackup discovers.

See Disable automatic mapping of NetBackup host names.

See Approve the host mappings that NetBackup discovers.

See Map other host names to a host.

See Map shared or cluster names to multiple NetBackup hosts.

See Examples of auto-discovered mappings for a cluster.

See Example of auto-discovered mappings for a cluster in a multiple NIC environment.

See Examples of auto-discovered mappings for SQL Server environments.

Approve the host mappings that NetBackup discovers

NetBackup automatically discovers many shared names or cluster names that are associated with the NetBackup hosts in your environment. Use the Mappings to approve tab to review and accept the relevant host names. When Automatically map host names to their NetBackup host ID is enabled, the Mappings to approve list shows only the mappings that conflict with other hosts.

Note:

You must map all available host names with the associated host ID. If you deploy a certificate on a host using a host name that is not mapped with the associated host ID, NetBackup deploys a new certificate and issues a new host ID to the host as NetBackup considers it as a different host.

To approve the host names that NetBackup discovers

  1. On the left, select Security > Hosts.
  2. Click the Mappings to approve tab.
  3. Click the name of the host.
  4. Review the mappings for the host and click Approve if you want to use the discovered mapping.

    Click Reject if you do not want to associate the mapping with the host.

    The rejected mappings do not appear in the list until NetBackup discovers them again.

  5. Click Save.
Map other host names to a host

You can manually map the NetBackup host to its host names. This mapping ensures that NetBackup can successfully communicate with the host using the other name.

To map a host name to a host

  1. On the left, select Security > Hosts.
  2. Select the host and click Manage mappings.
  3. Click Add.
  4. Enter the host name or IP address and click Save.
  5. Click Close.
Map shared or cluster names to multiple NetBackup hosts

Add a shared or a cluster name mapping if multiple NetBackup hosts share a host name. For example, a cluster name.

Note the following before you create a shared or a cluster name mapping:

  • NetBackup automatically discovers many shared names or cluster names. Review the Mappings to approve tab.

  • If a mapping is shared between an insecure and a secure host, NetBackup assumes that the mapping name is secure. However, if at run-time the mapping resolves to an insecure host, the connection fails. For example, assume that you have a two-node cluster with a secure host (node 1) and an insecure host (node 2). In this case, the connection fails if node 2 is the active node.

To map shared or cluster names to multiple NetBackup hosts

  1. On the left, select Security > Hosts.
  2. Select the host and click Add shared or cluster mappings.
  3. Enter a Shared host name or cluster name that you want to map to two or more NetBackup hosts.

    For example, enter a cluster name that is associated with NetBackup hosts in your environment.

  4. On the right, click Add.
  5. Select the NetBackup hosts that you want to add and click Add to list.

    For example, if you entered a cluster name in step 3 select the nodes in the cluster here.

  6. Click Save.
Examples of auto-discovered mappings for a cluster

For a cluster with hosts client01.lab04.com and client02.lab04.com, you may see the following entries. For each host, approve the mappings that are valid.

Host

Auto-discovered mapping

client01.lab04.com

client01

client01.lab04.com

clustername

client01.lab04.com

clustername.lab04.com

client02.lab04.com

client02

client02.lab04.com

clustername

client02.lab04.com

clustername.lab04.com

When you have approved all valid mappings, you see the Mapped host or IP address settings that are similar to the following entries.

Host

Mapped Host Names/IP Addresses

client01.lab04.com

client01.lab04.com, client01, clustername, clustername.lab04.com

client02.lab04.com

client02.lab04.com, client02, clustername, clustername.lab04.com

Example of auto-discovered mappings for a cluster in a multiple NIC environment

To perform backups of a cluster in a multi-NIC environment you must map the cluster node names to the virtual name of the cluster on the private network.

Table: Mapping host names for a cluster in a multi-NIC environment

Host

Mapped Host Names

Private name of Node 1

Virtual name of the cluster on the private network

Private name of Node 2

Virtual name of the cluster on the private network

For example, for a cluster in a multi-NIC environment with hosts client01-bk.lab04.com and client02-bk.lab04.com, you may see the following entries. For each host, approve the mappings that are valid.

Host

Auto-discovered Mapping

client01-bk.lab04.com

clustername-bk.lab04.com

client02-bk.lab04.com

clustername-bk.lab04.com

When you have approved all valid mappings, you see the Mapped host or IP address settings that are similar to the following entries.

Host

Mapped Host Names/IP Addresses

client01-bk.lab04.com

clustername-bk.lab04.com

client02-bk.lab04.com

clustername-bk.lab04.com

Examples of auto-discovered mappings for SQL Server environments

In Table: Example mapped host names for SQL Server environments, FCI is a SQL Server failover cluster instance. WSFC is Windows Server Failover Cluster.

Table: Example mapped host names for SQL Server environments

Environment

Host

Mapped Host Names

FCI (cluster with two nodes)

Physical name of Node 1

Virtual name of the SQL Server cluster

Physical name of Node 2

Virtual name of the SQL Server cluster

Basic or advanced availability group (primary and secondary)

Primary name

WSFC name

Secondary name

WSFC name

Basic or advanced availability group, with an FCI (primary FCI and secondary FCI)

Primary FCI name

WSFC name

Secondary FCI name

WSFC name

Physical name of Node 1

Virtual name of the SQL Server cluster

Physical name of Node 2

Virtual name of the SQL Server cluster