<

Veeam: Create Linux user for Private Key Login Credentials

Published on
4,907 Points
1,407 Views
Last Modified:
Luciano Patrão
VCP6.5-DCV, vSAN Specialist, vExpert last 3*, Veeam Vanguard. Expertises VMware, Virtual Backups and Storage design and a active Blogger.
For Backups Guest OS files and indexing(and application awareness), Veeam needs Admin rights in Guest OS(Windows and Linux). In Windows a Domain Administrator account, and in Linux root access to perform this type of Backups and also Restore.
In this article we will only focus Linux root account.
Since for security reasons most companies will not provide root access to Backup tool, we can do this by creating a non root account with a Linux Private Key that will elevated to root account.
First we will create the user and the Private Key in Linux.
Note: We will create a Private Key, but also a Passphare for security reasons.
1. Linux Create User:
Create Private Key: ssh-keygen -C "Key for Veeam Linux user Backup" -O no-x11-forwarding -O no-port-forwarding -O no-agent-forwarding
Note: Use a Passphare password(if you leave blank, will not use a Passphare ) to use in the Veeam Section.
Local user to be configured:
  • user name: veeam-linux
  • user id: 90
  • home: /var/lib/veeam-linux
  • SSH key file: /var/lib/veeam-linux/.ssh/authorized_keys
Linux command to create local user and key:
adduser -b /var/lib/ -c "Veeam Linux user Backup" -g users -m -u 90 veeam-linux
passwd -l veeam-linux # Prevent login via password
su - veeam-linux
mkdir .ssh
chmod 700 .ssh/
vi .ssh/authorized_keys
-> enter Public key:
ssh-rsa (public key)== Key for Veeam backup user
visudo
-> veeam-linux ALL=NOPASSWD: ALL
After the user is created and also the Public Key to your authorized_keys in your Linux OS, you should use the RSA_key.ppk(name that we used) file with the Private Key in Veeam.
Note: After we test this user and add the Public Key, if is working for Linux Backup jobs, we will use Linux Puppet to spread the User vs Public Key to all our Linux VMs and all be able to use the same Key in authorized_keys.
Depending on your environment, you can also copy the corresponding Public Key to all  your Linux Guests.
2. Veeam Linux user Configuration:

Next we will create new Linux credentials to use in our Backups.
Open your Veeam Backup & Replication Console and in the upper left corner we can open "Manage Credentials".
Screen Shot 03-29-16 at 09.55 PM 001Now click add and choose to add a Linux Private Key
Veeam02Next add the user and use the information from the Linux User and Private Key create in the Linux section.
VeeamLinuxUSerOption 1: Add the user create in the Linux Guest OS
Option 2: Add the Passphare used in ssh-keygen.
Option 3: Use the RSA file extracted from the Linux Private Key.
Option 4: Since the account will only be elevated to root(not a root account) just enable this option.
After these tasks we have a Linux user that will use a Private Key and will be elevated to root in the VMs Linux Backups.
After this we will create a job to test(Linux Backup) the Credentials and our Private Key.
Screen Shot 03-29-16 at 11.51 PMIn the "Guest Processing" screen we can test our User / Private Key to see if it works when we start the job.
VeeamLinuxUSerIn "Guest OS Credentials" choose the user that we have created above. Then click the option "Test Now"
As we can see in the next image, the user was able to connect to the Guest OS and have the right permissions. All tests are green.
Screen Shot 03-29-16 at 11.52 PM 001After this we can use this user(with the Private Key) to Backup and Restore all our Linux VMs.
In this job example, we had only one VM to test this user, but if you have a job only for Linux VMs, if you choose this user will set and will use for all VMs automatically.
But in case you have some mix OS Guest jobs(like we have) you should set the user for the Linux VMs.
Just edit your Backup Job and again go to the "Guest Processing" screen. Here click in "Credentials" options.
UserChooseChoose the VMs that should use the Linux User and click "Set User" and then "Linux credentials".
Next just click "Add" and choose the Linux user.
Screen Shot 03-29-16 at 11.59 PMAfter this all Linux VMs will use that user to Backup and Restore.
After all this you now have a Linux OS Guest user with a Private Key.
Hope this can help you how to configure this option. If you have any doubts, or need extra help, don't hesitate to contact me, or just reply to this post.
For extra information, please check Veeam Help for this subject HEREFinal Note: Will like to thank you my Linux colleague Philipp van Huellen for helping in the part of the Linux Private Key testing and also to provide the right security configuration in the Linux side using Puppet.

Hope this help you improve your Veeam Backup Infrastructure and provide more security and spread Backup Linux user/key to all your Linux VMs.

This is the part of my "TIP Articles". So, please vote "Helpful" on this Article. And I encourage your comments and feedback.
0
Comment
0 Comments

Join & Write a Comment

Advanced tutorial on how to run the esxtop command to capture a batch file in csv format in order to export the file and use it for performance analysis. He demonstrates how to download the file using a vSphere web client (or vSphere client) and exp…
This Micro Tutorial steps you through the configuration steps to configure your ESXi host Management Network settings and test the management network, ensure the host is recognized by the DNS Server, configure a new password, and the troubleshooting…

Keep in touch with Experts Exchange

Tech news and trends delivered to your inbox every month