NetBackup™ Troubleshooting Guide
- Introduction
- Troubleshooting procedures- About troubleshooting procedures
- Troubleshooting NetBackup problems
- Troubleshooting installation problems
- Troubleshooting configuration problems
- Device configuration problem resolution
- Testing the master server and clients
- Testing the media server and clients
- Resolving network communication problems with UNIX clients
- Resolving network communication problems with Windows clients
- Troubleshooting vnetd proxy connections- vnetd proxy connection requirements
- Where to begin to troubleshoot vnetd proxy connections
- Verify that the vnetd process and proxies are active
- Verify that the host connections are proxied
- Test the vnetd proxy connections
- Examine the log files of the connecting and accepting processes
- Viewing the vnetd proxy log files
 
- Troubleshooting security certificate revocation- Troubleshooting cloud provider's revoked SSL certificate issues
- Troubleshooting cloud provider's CRL download issues
- How a host's CRL affects certificate revocation troubleshooting
- NetBackup job fails because of revoked certificate or unavailability of CRLs
- NetBackup job fails because of apparent network error
- NetBackup job fails because of unavailable resource
- Master server security certificate is revoked
- Determining a NetBackup host's certificate state
- Troubleshooting issues with external CA-signed certificate revocation
 
- About troubleshooting networks and host names
- Verifying host name and service entries in NetBackup- Example of host name and service entries on UNIX master server and client
- Example of host name and service entries on UNIX master server and media server
- Example of host name and service entries on UNIX PC clients
- Example of host name and service entries on UNIX server that connects to multiple networks
 
- About the bpclntcmd utility
- Using the Host Properties window to access configuration settings
- Resolving full disk problems
- Frozen media troubleshooting considerations
- Troubleshooting problems with the NetBackup web services
- Troubleshooting problems with the NetBackup web server certificate
- Resolving PBX problems
- Troubleshooting problems with validation of the remote host
- Troubleshooting Auto Image Replication
- Troubleshooting network interface card performance
- About SERVER entries in the bp.conf file
- About unavailable storage unit problems
- Resolving a NetBackup Administration operations failure on Windows
- Resolving garbled text displayed in NetBackup Administration Console on a UNIX computer
- Troubleshooting error messages in the NetBackup Administration Console
- Extra disk space required for logs and temporary files for the NetBackup Administration Console
- Unable to logon to the NetBackup Administration Console after external CA configuration
- Troubleshooting file-based external certificate issues
- Troubleshooting Windows certificate store issues
- Troubleshooting backup failures
- Troubleshooting backup failure issues with NAT clients or NAT servers
- Troubleshooting issues with the NetBackup Messaging Broker (or nbmqbroker) service
- Issues with email notifications for Windows systems
- Issues with KMS configuration
- Issues with initiating the NetBackup CA migration because of large key size
- Issues with the non-privileged user (service user) account
- Issues with group name format in the auth.conf file
- Troubleshooting the VxUpdate add package process
- Issues with FIPS mode
- Issues with malware scanning
- Issues with NetBackup jobs that are enabled for data-in-transit encryption
- Issues with Unstructured Data Instant Access
 
- Using NetBackup utilities- About NetBackup troubleshooting utilities
- About the analysis utilities for NetBackup debug logs
- About the Logging Assistant
- About network troubleshooting utilities
- About the NetBackup support utility (nbsu)
- About the NetBackup consistency check utility (NBCC)
- About the NetBackup consistency check repair (NBCCR) utility
- About the nbcplogs utility
- About the robotic test utilities
- About the NetBackup Smart Diagnosis (nbsmartdiag) utility
 
- Disaster recovery- About disaster recovery
- About disaster recovery requirements
- Disaster recovery packages
- About disaster recovery settings
- Recommended backup practices
- About disk recovery procedures for UNIX and Linux
- About clustered NetBackup server recovery for UNIX and Linux
- About disk recovery procedures for Windows
- About clustered NetBackup server recovery for Windows
- Generating a certificate on a clustered master server after disaster recovery installation
- About restoring disaster recovery package
- About the DR_PKG_MARKER_FILE environment variable
- Restoring disaster recovery package on Windows
- Restoring disaster recovery package on UNIX
- About recovering the NetBackup catalog- About NetBackup catalog recovery on Windows computers
- About NetBackup catalog recovery from disk devices
- About NetBackup catalog recovery and symbolic links
- About NetBackup catalog recovery
- NetBackup disaster recovery email example
- About recovering the entire NetBackup catalog
- Establishing a connection with NAT media server before catalog recovery
- About recovering the NetBackup catalog image files
- About recovering the NetBackup relational database
- Recovering the NetBackup catalog when NetBackup Access Control is configured
- Recovering the NetBackup catalog from a nonprimary copy of a catalog backup
- Recovering the NetBackup catalog without the disaster recovery file
- Recovering a NetBackup user-directed online catalog backup from the command line
- Restoring files from a NetBackup online catalog backup
- Unfreezing the NetBackup online catalog recovery media
- Steps to carry out when you see exit status 5988 during catalog recovery
 
 
- Index
Troubleshooting Windows certificate store issues
The web service certificate is issued by an unknown certificate authority when using Windows certificate store
The web service certificate cannot be trusted while enrolling the host certificate.
Cause
This issue is caused by one of the following:
- The web service certificate that is used for communication is not configured properly. 
- The root certificate in the certificate chain of web service certificate is not present in the Trusted Root Certification Authorities of the Windows certificate store. 
To resolve the issue, review the following causes and run the following command to determine the current state of the problem.
Install_Path/bin/ nbcertcmd -enrollCertificate -preCheck -server server_name
Install_Path refers to the following:
On Windows: VERITAS\NetBackup\bin
On Unix: /usr/openv/netbackup/bin
Check if web server is configured with valid certificate along with its CA certificates.
- Run the following command to list the certificates that are configured for the web server. - Install_Path/nbcertcmd -listallcertificates -jks - On Windows: C:\Program Files\ VERITAS\NetBackup\bin\nbcertcmd -listallcertificates -jks - On Unix: /usr/openv/netbackup/bin/netbackup/bin/nbcertcmd -listallcertificates -jks 
- Ensure that all the certificates in the chain (except the root CA certificate) are present in the jks. - Check the following parameters in the nbcertcmd -listallcertificates -jks output. - Alias name: eca 
- Entry type: PrivateKeyEntry 
 - If they are not present, add the CA chain in the end of the entity certificate file that is the web service certificate file. The web service certificate should be at the top, its issuer CA certificate is below that, issuer of that CA certificate is below that, and so on. - If the certificate chain has only two certificates ( root certificate and web service certificate), the certificate file has only one certificate that is the web service certificate. - Run the configureWebServerCerts command. 
- Run the certlm.msc command. - In the certificate management window, open the store named Trusted Root Certificate Authorities. - The Trusted Root Certificate Authorities store contains all the self-signed certificates that are trusted by that machine. - In case certlm.msc does not work, you can access the Windows certificate store by running the mmc.exe command. 
- File > Add Remove Snap in. 
- Select the certificates from the left side. 
- Click Add. 
- Select the Computer account. 
- Click Next > Finish > OK. 
- Click Trusted Root Certification Authorities > Certificates. 
- Check if the root CA certificate in the certificate chain used to configure the web service is present in the Trusted Root Certificate Authorities store. 
 
- If the root CA certificate is not present, click All Actions > Import, select .PEM / .CRT / .CER file of the certificate and click Import. - All the certificates should be imported in the local machine store and not in the current user store. - You can verify the current store in the certificate management window. 
Certificate's public key algorithm is not supported.
The public key algorithm is not supported by NetBackup. Currently only the RSA algorithm is supported.
The certificate with given path exists in windows cert store but its signature algorithm is not supported.
You need to use the certificate with public key algorithm that is supported by NetBackup.
For more details on enrollment of external certificates in NetBackup, refer to the NetBackup Security and Encryption Guide.
Private key for the given certificate is not available.
The certificate in specified by the path does not have a corresponding private key imported in Windows certificate store.
This is typically caused by importing a .crt, .cer, or .pem certificate manually in the Windows certificate store instead of .pfx.
Ensure that the certificate has its private key imported.
- Run the certlm.msc command. - In case certlm.msc does not work, you can access the Windows certificate store by running the mmc.exe command. - File > Add Remove Snap in 
- Navigate to your certificate. 
- Open your certificate by double-clicking it. - The certificate with the private key should have a message stating that you have a private key corresponding to this certificate. 
- If certificate is to be manually enrolled, import a .pfx file and not just the .cer or .crt file. 
For more details on enrollment of external certificates in NetBackup, refer to the NetBackup Security and Encryption Guide.
Certificate with the given subject name is not found
Could not find the certificate when a special keyword $hostname is used in ECA_CERT_PATH
The certificate does not exist in the local machine store for the given ECA_CERT_PATH.
One of the attributes from store name, issuer name, or subject name does not match the one in the local machine store.
- Check if the certificate exists in the local machines store. Do the following: - Run the certlm.msc command. - In case certlm.msc does not work, you can access the Windows certificate store by running the mmc.exe command. - File > Add Remove Snap in. 
- Check if the certificate exist 
 
- Verify that the following criteria are satisfied: - Certificate location is a path or comma separated paths where each path is specified using store name, issuer name and subject name separated by (\) slash. 
- Store name must exactly match the store your certificate is in. 
- Issuer name and subject name should always be part of ECA_CERT_PATH. If nothing is specified for issuer name, it means any issuer can be considered. 
- $hostname is special keyword and can be used in subject name. When finding the certificate $hostname is replaced with actual FQDN of the host. 
- When using $hostname, the certificate must have FQDN as a part of CN. 
- Double quotes to be used in case the backward slash (\) is present in the actual Store name, Issuer name or Subject name. 
- Though the subject name is always part of ECA_CERT_PATH, CN=example CN is not allowed. - The subject in ECA_CERT_PATH should be any sub-string of actual CN, OU, O, L, S, C and so on. 
 
For more details on enrollment of external certificates in NetBackup, refer to the NetBackup Security and Encryption Guide.