Protecting buckets

HYCU for Google Cloud enables you to protect your data in buckets with fast and reliable backup and restore operations. After you optionally configure bucket backup options and back up the bucket, you can choose to restore one or more individual files or folders inside the bucket.

Prerequisites

  • The HYCU Managed Service Account (HMSA) must have the following roles granted on the projects with the buckets that you plan to protect:

    • Compute Admin (roles/compute.admin)

    • Service Account User (roles/iam.serviceAccountUser)
    • Storage Admin (roles/storage.admin)

    For instructions on how to grant permissions to service accounts, see Google Cloud documentation.

  • Cloud Resource Manager API, Compute Engine API, Cloud Identity and Access Management API, Cloud Billing API, and Cloud Storage API must be enabled on the Google Cloud projects that contain the buckets that you want to protect. For instructions on how to enable APIs, see Google Cloud documentation.

Limitation

Bucket data (backup data, copies of backup data, and data archives) can be stored only to manually created targets, and not to automatically created targets or as a snapshot. For instructions on how to add a bucket to HYCU for Google Cloud as a target, see “Adding a bucket to HYCU for Google Cloud as a target”.

Considerations

  • Keep in mind that the role you have assigned determines what kind of actions you can perform. For details on roles, see “Managing roles”.

  • HYCU for Google Cloud uses an external IP address to access Google Cloud APIs if Private Google Access is disabled on subnets. If your data protection environment requires the use of an internal IP address, make sure Private Google Access is enabled on subnets. For details, see Google Cloud documentation.

For details on how to protect bucket data efficiently, see the following topics: