NetBackup™ Web UI Kubernetes Administrator's Guide
- Introducing the NetBackup web user interface
- Monitoring NetBackup
- Overview of NetBackup for Kubernetes
- Deploying and configuring the NetBackup Kubernetes operator
- Managing image groups
- Deploying certificates on NetBackup Kubernetes operator
- Managing Kubernetes assets
- Managing Kubernetes intelligent groups
- Protecting Kubernetes assets
- Recovering Kubernetes assets
- Troubleshooting Kubernetes issues
Deploy certificates on the Kubernetes operator
You need to deploy certificates for secure communication between the datamover and the NetBackup media servers.
Note:
You must deploy the certificates before you can perform Backup from Snapshot and Restore from Backup operations.
Datamover facilitates data movement within the NetBackup environment, it communicates with the media servers over Transport Layer Security (TLS). For more details, refer to the About secure communication in NetBackup section in NetBackup™ Security and Encryption Guide. Datamover needs a host-id-based certificate, or an ECA-signed certificate issued by NetBackup primary server for communication. A new custom resource definition BackupServerCert is introduced to enable certificate deployment operation in NBCA (NetBackup Certificate Authority) or ECA (External Certificate Authority) mode.
Note:
In NetBackup 10.0 release, datamover supports only automatic mode for DTE client.
For more details, See Configure settings for NetBackup snapshot operation.
Note:
The certificateType and certificateOperation are case sensitive. For more details, refer https://www.veritas.com/content/support
Custom resource specification looks like this:
apiVersion: netbackup.veritas.com/v1 kind: BackupServerCert metadata: name: backupservercert-sample-nbca namespace: kops-ns spec: clusterName: cluster.sample.com backupServer: primary.server.sample.com certificateOperation: Create | Update | Remove certificateType: NBCA | ECA nbcaAttributes: nbcaCreateOptions: secretName: "Secret name consists of token and fingerprint" nbcaUpdateOptions: secretName: "Secret name consists of token and fingerprint" force: true | false nbcaRemoveOptions: hostID: "hostId of the nbca certificate. You can view on Netbackup UI" ecaAttributes: ecaCreateOptions: ecaSecretName: "Secret name consists of cert, key, passphrase, cacert" copyCertsFromSecret: true | false isKeyEncrypted: true | false ecaUpdateOptions: ecaCrlCheck: DISABLE | LEAF | CHAIN ecaCrlRefreshHours: [0,4380]