cancel
Showing results for 
Search instead for 
Did you mean: 

NetBackup 9.1—A breakthrough in Telemetry and Usage Insights Visualisation

Pankaj_Kumar1
Level 5
Employee CPEP

It has never been quicker or easier to gain visibility into the protected workloads that are critical to your business. Automated visualization of your capacity usage and entitlements enables you to forecast and manage your infrastructure growth with predictive trendlines. NetBackup Usage Insights helps customers identify growth spikes immediately while enabling administrators to share deployment data with management and compliance teams effortlessly.

Administrators are no longer burdened with periodic tasks to manually upload deployment data files into a collection portal to manage their license utilization versus their entitlements. NetBackup Proxy Server support for Usage Insights makes the upload process easy and secure. It’s yet another example of the NetBackup Product Improvement Program delivering simplicity with efficiency.

Create your Server Configuration in 5 minutes or less

In just a few easy steps, configure NetBackup to use a proxy server for sharing Usage Insights data securely with Veritas. Watch this short video as I walk you through the configuration steps: YouTube | Brightcove.

How to configure Call Home Proxy support using the command-line interface (CLI)

PKPicture1.png

  1. Execute the command line tool nbcallhomeproxyconfig and execute For UNIX systems, you can find this in the NetBackup directory at /usr/openv/netbackup/bin/admincmd. For Windows, this will be an executable called nbcallhomeproxyconfig.exe located at <installpath> \NetBackup\bin\admincmd

  2. Choose to add an authenticated or unauthenticated proxy configuration.
    • An Authenticated proxy configuration requires proxy server username and password. You will also need to provide a logical name for this resource in NetBackup, the proxy server's name, supporting protocol, and proxy port number.
    • For a proxy server with HTTPS protocol, you will also need to provide the path to the CA certificate.

  3. Use the menu option to Validate proxy settings and confirm the connection parameters are valid.


How to configure a Call Home Proxy support using Credential Management within the WebUI

  1. Launch the NetBackup WebUI and select Credential Management.

  2. Add a proxy configuration credential starting with the Credential Name example myproxy. This is a mandatory field, and we recommend you note the Credential Name as it will be referenced later in step 6 to configure the key.
    • Follow the prompts to add remaining inputs, including Tag and Description.

      PKPicture2.png

       

  3. Like the CLI configuration, select whether this will be an authenticated proxy server or unauthenticated. Again, username and password are required for an authenticated proxy server configuration. Set the role-based permission if applicable

    • An Authenticated proxy configuration requires a proxy server username and password. You will also need to provide a logical name for this resource in NetBackup, the proxy server's name, supporting protocol, and proxy port number.
    • For a proxy server with HTTPS protocol, you will also need to provide the path to the CA certificate.
  4. Review inputs, then click Finish to complete the process for adding the credential.

  5. Add a key to the NetBackup configuration mapping by adding the proxy name using bpsetconfig command.

    UNIX # echo “CALLHOME_PROXY_NAME = myproxy” /usr/openv/netbackup/bin/admincmd/bpsetconfigWIN # echo CALLHOME_PROXY_NAME = myproxy |  <installpath>\NetBackup\bin\admincmd\bpsetconfig

    As a reminder, this is the same credential name created in step 2.

  6. Finally, verify that you have entered the credentials successfully by running the nbcallhomeproxyconfig tool from a terminal window.

Need to modify or delete a configuration? You can easily do this using Credential Management (CMS) in the WebUI.

  • Any edits to your configuration will require that you re-enter those values.
  • Deleting a proxy configuration is a 2-step process: First, delete the configuration from the CMS, then delete the key from the bpsetconfig file.

We have seen the prominent toll that ransomware takes on an organization and its employees. Having a data management solution that you can trust is vital to protect and secure your data ecosystem. Optimizing your backup environment and costs is essential to maintaining a healthy relationship with protecting your data in the event of a ransomware attack or malware. NetBackup, trusted by 87 percent of the Fortune Global 500, was fundamentally designed to give you the data management and enterprise-grade resiliency you require.

Be sure to join the NetBackup conversation in the NetBackup VOX user group: https://vox.veritas.com/t5/NetBackup-9-Group/gh-p/NetBackup9Group.