NetBackup™ Web UI Kubernetes Administrator's Guide
- Introducing the NetBackup web user interface
- Monitoring NetBackup
- Overview of NetBackup for Kubernetes
- Deploying and configuring the NetBackup Kubernetes operator
- Deploy service package on NetBackup Kubernetes operator
- Port requirements for Kubernetes operator deployment
- Upgrade the NetBackup Kubernetes operator
- Delete the NetBackup Kubernetes operator
- Configure NetBackup Kubernetes datamover
- Configure settings for NetBackup snapshot operation
- Troubleshooting NetBackup servers with short names
- Managing image groups
- Deploying certificates on NetBackup Kubernetes operator
- Managing Kubernetes assets
- Managing Kubernetes intelligent groups
- Protecting Kubernetes assets
- Recovering Kubernetes assets
- Troubleshooting Kubernetes issues
- Error during certificate deployment on the Kubernetes operator
- Error during the primary server upgrade: NBCheck fails
- Error during an old image restore: Operation fails
- Error during persistent volume recovery API
- Error during restore: Final job status shows partial failure
- Error during restore on the same namespace
- Datamover pods exceed the Kubernetes resource limit
- Error during restore: Job fails on the highly loaded cluster
- Custom Kubernetes role created for specific clusters cannot view the jobs
Custom Kubernetes role created for specific clusters cannot view the jobs
When a custom RBAC role is created for Kubernetes workload with specific Kubernetes clusters then the system administrator must explicitly provide the permissions to view Kubernetes jobs, else all the Kubernetes specific jobs will not be visible.
If the system administrator does not provide the permission to view the Kubernetes jobs, then the user may view the following jobs:
Only restore jobs in the hierarchy view.
Only snapshot and restore jobs in the list view.
If a custom based Kubernetes role created is not able to view the jobs for specific Kubernetes clusters. Then perform the following steps to provide view permissions.
To provide view permissions
- On the left click Kubernetes under Workload.
- On the right click Kubernetes setting > Manage permissions.
- Click the vertical ellipse next to the corresponding role and select Edit.
- In the Edit permissions, select Edit, and View jobs permissions for the role and then, click Save.
Kubernetes custom role user will be able to view backup, snapshot, restore and backup form snapshot jobs both in the hierarchical and list view.
Assumptions:
If the setup is upgraded, then the user may view the following:
Only restore jobs in the hierarchy view from the existing jobs.
Only snapshot and restore jobs in the list view from the existing jobs.
If a custom role for Kubernetes is created with permission to the selected Kubernetes clusters, then user can cancel and restart operations only on the snapshot jobs.