NetBackup™ Web UI RHV Administrator's Guide

Last Published:
Product(s): NetBackup (8.2)
  1. Introducing the NetBackup web user interface
    1.  
      About the NetBackup web user interface
    2.  
      Terminology
    3.  
      Sign in to the NetBackup web UI
  2. Managing RHV servers
    1.  
      Quick configuration checklist to protect Red Hat Virtualization virtual machines
    2. Configuring secure communication between the Red Hat Virtualization server and NetBackup host
      1.  
        ECA_TRUST_STORE_PATH for NetBackup servers and clients
      2.  
        ECA_CRL_PATH for NetBackup servers and clients
      3.  
        VIRTUALIZATION_HOSTS_SECURE_CONNECT_ENABLED for servers and clients
      4.  
        VIRTUALIZATION_CRL_CHECK for NetBackup servers and clients
    3.  
      About the ports that NetBackup uses to communicate with RHV
    4. Add or browse an RHV manager
      1.  
        Adding a backup host to the NetBackup master server
      2.  
        Remove an RHV manager
    5.  
      Create an intelligent VM group
    6.  
      Remove an intelligent VM group
    7.  
      Setting global limits on the use of RHV resources
  3. Protecting RHV virtual machines
    1.  
      Things to know before you protect RHV virtual machines
    2.  
      Protect RHV VMs or intelligent VM groups
    3.  
      Remove protection from VMs or intelligent VM groups
    4.  
      View the protection status of VMs or intelligent VM groups
  4. Recovering RHV virtual machines
    1.  
      Things to consider before you recover the RHV virtual machines
    2.  
      About the pre-recovery check
    3.  
      Recover an RHV virtual machine
    4.  
      About the supported virtual disk formats and disk provisioning during VM recovery
  5. Troubleshooting RHV VM protection and recovery
    1.  
      Troubleshooting tips for NetBackup for RHV
    2.  
      Error run into during the RHV virtual machines discovery phase
    3.  
      Error run into while backing up RHV virtual machines
    4.  
      Error run into while restoring RHV virtual machines
  6. API and command line options for RHV
    1. Using APIs and command line options to manage, protect, or recover RHV virtual machines
      1.  
        Additional information about the rename file
    2. Additional NetBackup options for RHV configuration
      1.  
        OVIRT_IMAGEIO_INACTIVITY_TIMEOUT option for NetBackup servers
      2.  
        RHV_CREATEDISK_TIMEOUT option for NetBackup servers
      3.  
        RHV_AUTODISCOVERY_INTERVAL option for NetBackup servers

Things to know before you protect RHV virtual machines

  • You cannot backup the same RHV VM concurrently.

  • The VMs without virtual disks cannot be protected.

  • Ensure to use the same backup host to backup all template-based VMs (dependent clone).

    For example, VMs VMRedHat1, VMRedHat2 are created from template RedHat7_Template as dependent clone and VMs VMWin1, VMWin2 are created from template Windows2016_Template as dependent clone.

    While protecting these VMs, use the same backup host for all VMs based on template RedHat7_Template or Windows2016_Template. Ensure that VMRedHat1 and VMRedHat2 share the same backup host. Ensure that VMWin1 and VMWin2 share the same backup host.VMRedHat1, VMRedHat2, VMWin1 and VMWin2 can share the same backup host, but it is optional.

  • The following QCOW2 image attributes are not supported:

    • Compressed cluster

    • Encrypted disks

    • Virtual disks with internal snapshots

  • If the VM virtual disks are locked when the NetBackup services shutdown or crash during a backup, use RHV's unlock_entity command to unlock the disks. If the disks are not unlocked, the subsequent backups might fail.

    See Error run into while backing up RHV virtual machines.

  • On a file storage (NFS), a QCOW2 disk gets restored as raw disk (thin provision) because of an RHV limitation.

  • A thin dependent cloned VM is restored as an independent cloned VM.

  • If you want to use a storage that is not available through the NetBackup Web UI like a tape or basic disk based storage unit, you can use APIs or command line options to protect the VMs.