diff --git a/docs/cloud/manage/backups/backups-to-own-cloud/_category_.yml b/docs/cloud/manage/backups/backups-to-own-cloud/_category_.yml
new file mode 100644
index 00000000000..eefb36aab1d
--- /dev/null
+++ b/docs/cloud/manage/backups/backups-to-own-cloud/_category_.yml
@@ -0,0 +1,3 @@
+label: 'Export Backups to your Own Cloud Account'
+collapsible: true
+collapsed: true
diff --git a/docs/cloud/manage/backups/backups-to-own-cloud/backup_restore_from_ui.md b/docs/cloud/manage/backups/backups-to-own-cloud/backup_restore_from_ui.md
new file mode 100644
index 00000000000..79c8c9b1e65
--- /dev/null
+++ b/docs/cloud/manage/backups/backups-to-own-cloud/backup_restore_from_ui.md
@@ -0,0 +1,361 @@
+---
+sidebar_label: 'Backup or restore from UI'
+slug: /cloud/manage/backups/backup-restore-via-ui
+title: 'Take a backup or restore a backup from the UI'
+description: 'Page describing how to take a backup or restore a backup from the UI with your own bucket'
+sidebar_position: 2
+---
+
+import Image from '@theme/IdealImage'
+import arn from '@site/static/images/cloud/manage/backups/arn.png'
+import change_external_backup from '@site/static/images/cloud/manage/backups/change_external_backup.png'
+import configure_arn_s3_details from '@site/static/images/cloud/manage/backups/configure_arn_s3_details.png'
+import view_backups from '@site/static/images/cloud/manage/backups/view_backups.png'
+import backup_command from '@site/static/images/cloud/manage/backups/backup_command.png'
+import gcp_configure from '@site/static/images/cloud/manage/backups/gcp_configure.png'
+import gcp_stored_backups from '@site/static/images/cloud/manage/backups/gcp_stored_backups.png'
+import gcp_restore_command from '@site/static/images/cloud/manage/backups/gcp_restore_command.png'
+import azure_connection_details from '@site/static/images/cloud/manage/backups/azure_connection_details.png'
+import view_backups_azure from '@site/static/images/cloud/manage/backups/view_backups_azure.png'
+
+# Take a backup or restore a backup from the UI {#ui-experience}
+
+## AWS {#AWS}
+
+### Taking backups to AWS {#taking-backups-to-aws}
+
+#### Steps to follow in AWS {#aws-steps}
+
+Follow the steps below on your AWS account:
+
+
+
+##### Create an S3 bucket {#create-s3-bucket}
+
+Create an AWS S3 bucket in your account where you want to export backups.
+
+##### Create an IAM role {#create-iam-role}
+
+Create an IAM role that ClickHouse Cloud service will be able to assume into,
+to write to this bucket - for role-based authentication:
+
+* a. For this role, you will need to update the IAM role trust policy to include
+ the following statement:
+
+ ```json
+ "Statement": [
+ {
+ "Effect": "Allow",
+ "Principal": {
+ "AWS": "arn:aws:iam::463754717262:role/CH-S3-bordeaux-ar-90-ue2-29-Role"
+ },
+ "Action": "sts:AssumeRole"
+ },
+ ```
+* b. The ARN in this case is obtained from the ClickHouse Cloud service settings
+ page which looks similar to this:
+
+
+
+##### Update permissions for role {#update-permissions-for-role}
+
+You will also need to update the permissions for this role so this ClickHouse
+Cloud service can write to the S3 bucket. This is done by including a JSON similar
+to this one in the role permissions:
+
+```json
+{
+ "Version": "2012-10-17",
+ "Statement": [
+ {
+ "Action": [
+ "s3:GetBucketLocation",
+ "s3:ListBucket"
+ ],
+ "Resource": [
+ "arn:aws:s3:::testchbackups"
+ ],
+ "Effect": "Allow"
+ },
+ {
+ "Action": [
+ "s3:Get*",
+ "s3:List*",
+ "s3:PutObject",
+ "s3:DeleteObject"
+ ],
+ "Resource": [
+ "arn:aws:s3:::testchbackups/*"
+ ],
+ "Effect": "Allow"
+ }
+ ]
+}
+```
+
+
+
+#### Steps to follow in ClickHouse Cloud {#cloud-steps}
+
+Follow the steps below in the ClickHouse Cloud console to configure the external bucket:
+
+
+
+##### Change external backup {#configure-external-bucket}
+
+On the “Settings” page, click on `Change external backup`
+
+
+
+##### Configure AWS IAM Role ARN and S3 bucket details {#configure-aws-iam-role-arn-and-s3-bucket-details}
+
+On the next screen provide the AWS IAM Role ARN and S3 bucket details:
+
+
+
+##### Save changes {#save-changes}
+
+Click on “Save External Bucket” to save the settings
+
+##### Changing the backup schedule from the default schedule {#changing-the-backup-schedule}
+
+External Backups will now happen in your bucket on the default schedule.
+Alternatively, you can configure the backup schedule from the “Settings” page.
+If configured differently, the custom schedule is used to write backups to your
+bucket and the default schedule (backups every 24 hours) is used for backups in
+the ClickHouse cloud owned bucket.
+
+##### View backups stored in your bucket {#view-backups-stored-in-your-bucket}
+
+The Backups page should display these backups in your bucket in a separate table
+as shown below:
+
+
+
+
+
+### Restoring backups from AWS {#restoring-backups-from-aws}
+
+Follow the steps below to restore backups from AWS:
+
+
+
+##### Create a new service to restore to {#create-new-service-to-restore-to}
+
+Create a new service to restore the backup to. Currently, we only support
+restoring a backup into a new service.
+
+##### Add service ARN {#add-service-arn}
+
+Add the newly created service’s ARN (from the service settings page in Clickhouse
+Cloud console) to the trust policy for the IAM role. This is the same as the
+[second step](#create-iam-role) in the AWS Steps section above. This is required
+so the new service can access the S3 bucket.
+
+##### Get SQL command used to restore backup {#obtain-sql-command-to-restore-backup}
+
+Click on the “access or restore a backup” link above the list of backups in the
+UI to get the SQL command to restore the backup. The command should look like
+the one shown below, and you can pick the appropriate backup from the dropdown
+to get the restore command for that specific backup:
+
+
+
+##### Run the restore command {#run-the-restore-command}
+
+Run the restore command from the SQL console in the newly created service to
+restore the backup.
+
+
+
+## GCP {#gcp}
+
+### Taking backups to GCP {#taking-backups-to-gcp}
+
+Follow the steps below to take backups to GCP:
+
+#### Steps to follow in GCP {#gcp-steps-to-follow}
+
+
+
+##### Create a GCP storage bucket {#create-a-gcp-storage-bucket}
+
+Create a storage bucket in your GCP account to export backups.
+
+##### Generate an HMAC Key and Secret {#generate-an-hmac-key-and-secret}
+
+Generate an HMAC Key and Secret, which is required for password-based authentication. Follow the steps below to generate the keys:
+
+* a. Create a service account
+ * I. Navigate to the IAM & Admin section in the Google Cloud Console and select Service Accounts.
+ * II. Click Create Service Account, provide a name and ID, and click Create and Continue.
+ * III. Grant the necessary roles for Cloud Storage access (e.g., Storage Object Admin or more granular roles like
+ Storage Object Creator and Storage Object Viewer) to this service account.
+ * IV. Click Done to finalize the service account creation.
+
+* b. Generate the HMAC key
+ * I. Go to Cloud Storage in the Google Cloud Console, and select `Settings`
+ * II Go to the Interoperability tab.
+ * III. In the `Service account HMAC` section, click Create a key for a service account.
+ * IV. Choose the service account you created in the previous step from the dropdown menu.
+ * V. Click Create key.
+
+* c. Securely store the credentials:
+ * I. The system will display the Access ID (your HMAC key) and the Secret (your HMAC secret). Save these values, as
+ the secret will not be displayed again after you close this window.
+
+
+
+#### Steps to follow in ClickHouse Cloud {#gcp-cloud-steps}
+
+Follow the steps below in the ClickHouse Cloud console to configure the external bucket:
+
+
+
+##### Change external backup {#gcp-configure-external-bucket}
+
+On the “Settings” page, click on “Change external backup”
+
+
+
+##### Configure GCP HMAC Key and Secret {#gcp-configure-gcp-hmac-key-and-secret}
+
+On the next screen provide the GCP bucket path, HMAC key and Secret
+created in the previous section.
+
+
+
+##### Save external bucket {#gcp-save-external-bucket}
+
+Click on `Save External Bucket` to save the settings.
+
+##### Changing the backup schedule from the default schedule {#gcp-changing-the-backup-schedule}
+
+External Backups will now happen in your bucket on the default schedule.
+Alternatively, you can configure the backup schedule from the `Settings` page.
+If configured differently, the custom schedule is used to write backups to your
+bucket and the default schedule (backups every 24 hours) is used for backups in
+ClickHouse cloud owned bucket.
+
+##### View backups stored in your bucket {#gcp-view-backups-stored-in-your-bucket}
+
+The Backups page should display these backups in your bucket in a separate table as shown below
+
+
+
+
+
+### Restoring backups from GCP {#gcp-restoring-backups-from-gcp}
+
+Follow the steps below to restore backups from GCP:
+
+
+
+##### Create a new service to restore to {#gcp-create-new-service-to-restore-to}
+
+Create a new service to restore the backup to. Currently, we only support restoring a backup into a new service.
+
+##### Get SQL command used to restore backup {#gcp-obtain-sql-command-to-restore-backup}
+
+Click on the `access or restore a backup` link above the list of backups in the
+UI to get the SQL command to restore the backup. The command should look like this,
+and you can pick the appropriate backup from the dropdown to get the restore
+command for that specific backup. You will need to add your secret access key
+to the command.
+
+
+
+##### Run SQL command to restore backup {#gcp-run-sql-command-to-restore-backup}
+
+Run the restore command from the SQL console in the newly created service to
+restore the backup.
+
+
+
+## Azure {#azure}
+
+### Taking backups to Azure {#taking-backups-to-azure}
+
+Follow the steps below to take backups to Azure:
+
+#### Steps to follow in Azure {#steps-to-follow-in-azure}
+
+
+
+##### Create a storage account {#azure-create-a-storage-account}
+
+Create a storage account or select an existing storage account in the Azure
+portal where you want to store your backups.
+
+##### Get connection string {#azure-get-connection-string}
+
+* a. In your storage account overview, look for the section called `Security + networking` and click on `Access keys`.
+* b. Here, you will see `key1` and `key2`. Under each key, you’ll find a `Connection string` field.
+* c. Click `Show` to reveal the connection string. Copy the connection string to set up on ClickHouse Cloud.
+
+
+
+#### Steps to follow in ClickHouse Cloud {#azure-cloud-steps}
+
+Follow the steps below in the ClickHouse Cloud console to configure the external bucket:
+
+
+
+##### Change external backup {#azure-configure-external-bucket}
+
+On the `Settings` page, click on `Change external backup`
+
+
+
+##### Provide connection string and container name for your Azure storage account {#azure-provide-connection-string-and-container-name-azure}
+
+On the next screen provide the Connection String and Container Name for your
+Azure storage account created in the previous section:
+
+
+
+##### Save external bucket {#azure-save-external-bucket}
+
+Click on `Save External Bucket` to save the settings
+
+##### Changing the backup schedule from the default schedule {#azure-changing-the-backup-schedule}
+
+External Backups will now happen in your bucket on the default schedule. Alternatively,
+you can configure the backup schedule from the “Settings” page. If configured differently,
+the custom schedule is used to write backups to your bucket and the default schedule
+(backups every 24 hours) is used for backups in ClickHouse cloud owned bucket.
+
+##### View backups stored in your bucket {#azure-view-backups-stored-in-your-bucket}
+
+The Backups page should display these backups in your bucket in a separate table
+as shown below:
+
+
+
+
+
+### Restoring backups from Azure {#azure-restore-steps}
+
+To restore backups from Azure, follow the steps below:
+
+
+
+##### Create a new service to restore to {#azure-create-new-service-to-restore-to}
+
+Create a new service to restore the backup to. Currently, we only support
+restoring a backup into a new service.
+
+##### Get SQL command used to restore backup {#azure-obtain-sql-command-to-restore-backup}
+
+Click on the `access or restore a backup` link above the list of backups in the
+UI to obtain the SQL command to restore the backup. The command should look like
+this, and you can pick the appropriate backup from the dropdown to get the
+restore command for that specific backup. You will need to add your Azure
+storage account connection string to the command.
+
+##### Run SQL command to restore backup {#azure-run-sql-command-to-restore-backup}
+
+Run the restore command from the SQL console in the newly created service to
+restore the backup.
+
+
diff --git a/docs/cloud/manage/backups/backups-to-own-cloud/backup_restore_using_commands.md b/docs/cloud/manage/backups/backups-to-own-cloud/backup_restore_using_commands.md
new file mode 100644
index 00000000000..0fb6132096a
--- /dev/null
+++ b/docs/cloud/manage/backups/backups-to-own-cloud/backup_restore_using_commands.md
@@ -0,0 +1,174 @@
+---
+sidebar_label: 'Backup or restore using commands'
+slug: /cloud/manage/backups/backup-restore-via-commands
+title: 'Take a backup or restore a backup using commands'
+description: 'Page describing how to take a backup or restore a backup with your own bucket using commands'
+sidebar_position: 3
+---
+
+import Tabs from '@theme/Tabs';
+import TabItem from '@theme/TabItem';
+
+# Take a backup or restore a backup using commands {#commands-experience}
+
+## Requirements {#requirements}
+
+You will need the following details to export/restore backups to your own CSP storage bucket:
+
+
+
+ 1. AWS S3 endpoint, in the format: `s3://.s3.amazonaws.com/`
+ For example: `s3://testchbackups.s3.amazonaws.com/backups/
+ Where:
+ * `testchbackups` is the name of the S3 bucket to export backups to.
+ * `backups` is an optional subdirectory.
+ 2. AWS access key and secret. (for key/secret-based authentication. We also
+ support role based authentication which is covered in the UI experience above)
+
+
+
+ 1. GCS endpoint, in the format: `https://storage.googleapis.com//`
+ 2. Access HMAC key and HMAC secret.
+
+
+
+ 1. Azure storage connection string.
+ 2. Azure container name in the storage account.
+ 3. Azure Blob within the container.
+
+
+
+
+## Backup / Restore to AWS S3 Bucket {#aws-s3-bucket}
+
+### Full Backup {#aws-full-backup}
+
+```sql
+BACKUP TABLE system.users,
+TABLE system.roles,
+TABLE system.settings_profiles,
+TABLE system.row_policies,
+TABLE system.quotas,
+TABLE system.functions,
+ALL EXCEPT DATABASES INFORMATION_SCHEMA, information_schema, system
+TO S3('https://testchbackups.s3.amazonaws.com/backups/', '', '')
+```
+
+Where `uuid` is a unique identifier, used to differentiate a set of backups.
+
+:::note
+You will need to use a different UUID for each new backup in this subdirectory, otherwise you will get a `BACKUP_ALREADY_EXISTS` error. For example, if you are taking daily backups, you will need to use a new UUID each day.
+:::
+
+### Incremental Backup {#aws-incremental-backup}
+
+```sql
+BACKUP TABLE system.users,
+TABLE system.roles,
+TABLE system.settings_profiles,
+TABLE system.row_policies,
+TABLE system.quotas, TABLE system.functions,
+ALL EXCEPT DATABASES INFORMATION_SCHEMA, information_schema, system
+TO S3('https://testchbackups.s3.amazonaws.com/backups/', '', '')
+SETTINGS base_backup = S3('https://testchbackups.s3.amazonaws.com/backups/', '', '')
+```
+
+### Restore from a backup {#aws-restore-backup}
+
+Create a new service and run the command below:
+
+```sql
+RESTORE ALL
+FROM S3('https://testchbackups.s3.amazonaws.com/backups/',
+ extra_credentials(
+ role_arn = 'arn:aws:iam::651674194215:role/test-byob-ui-role'
+ )
+)
+```
+
+See: [Configuring BACKUP/RESTORE to use an S3 Endpoint](/operations/backup#configuring-backuprestore-to-use-an-s3-endpoint) for more details.
+
+## Backup / Restore to Azure Blob Storage {#azure-blob-storage}
+
+### Full Backup {#azure-full-backup}
+
+```sql
+BACKUP TABLE system.users,
+TABLE system.roles,
+TABLE system.settings_profiles,
+TABLE system.row_policies,
+TABLE system.quotas,
+TABLE system.functions,
+ALL EXCEPT DATABASES INFORMATION_SCHEMA, information_schema, system
+TO AzureBlobStorage('', '', '/');
+```
+
+Where `uuid` is a unique identifier, used to differentiate a set of backups.
+
+### Incremental Backup {#azure-incremental-backup}
+
+```sql
+BACKUP TABLE system.users,
+TABLE system.roles,
+TABLE system.settings_profiles,
+TABLE system.row_policies,
+TABLE system.quotas,
+TABLE system.functions,
+ALL EXCEPT DATABASES INFORMATION_SCHEMA, information_schema, system
+TO AzureBlobStorage('', '', '//my_incremental')
+SETTINGS base_backup = AzureBlobStorage('', '', '')
+```
+
+### Restore from a backup {#azure-restore-backup}
+
+Create a new service and run the command below. You will need to provide the connection string, container name, and uuid:
+
+```sql
+RESTORE ALL
+FROM AzureBlobStorage(
+ '< AzureBlobStorage endpoint connection string >',
+ '',
+ ''
+)
+```
+
+## Backup / Restore to Google Cloud Storage (GCS) {#google-cloud-storage}
+
+### Full Backup {#gcs-full-backup}
+
+```sql
+BACKUP TABLE system.users,
+TABLE system.roles,
+TABLE system.settings_profiles,
+TABLE system.row_policies,
+TABLE system.quotas,
+TABLE system.functions,
+ALL EXCEPT DATABASES INFORMATION_SCHEMA, information_schema, system
+TO S3('https://storage.googleapis.com//', '', '')
+```
+
+Where `uuid` is a unique identifier, used to differentiate a set of backups.
+
+### Incremental Backup {#gcs-incremental-backup}
+
+```sql
+BACKUP TABLE system.users,
+TABLE system.roles,
+TABLE system.settings_profiles,
+TABLE system.row_policies,
+TABLE system.quotas,
+TABLE system.functions,
+ALL EXCEPT DATABASES INFORMATION_SCHEMA, information_schema, system
+TO S3('https://storage.googleapis.com/test_gcs_backups//my_incremental', '', '')
+SETTINGS base_backup = S3('https://storage.googleapis.com/test_gcs_backups/', '', '')
+```
+
+### Restore from a backup {#gcs-restore-backup}
+
+```sql
+RESTORE ALL
+FROM S3('https://storage.googleapis.com/testbyob/',
+ '',
+ ''
+)
+```
diff --git a/docs/cloud/manage/backups/backups-to-own-cloud/export-backups-to-own-cloud-account.md b/docs/cloud/manage/backups/backups-to-own-cloud/export-backups-to-own-cloud-account.md
new file mode 100644
index 00000000000..72fb562af93
--- /dev/null
+++ b/docs/cloud/manage/backups/backups-to-own-cloud/export-backups-to-own-cloud-account.md
@@ -0,0 +1,46 @@
+---
+sidebar_label: 'Overview'
+slug: /cloud/manage/backups/export-backups-to-own-cloud-account
+title: 'Export Backups to your Own Cloud Account'
+description: 'Describes how to export backups to your own Cloud account'
+sidebar_position: 1
+---
+
+import EnterprisePlanFeatureBadge from '@theme/badges/EnterprisePlanFeatureBadge'
+
+
+
+ClickHouse Cloud allows exporting backups to your own cloud service provider
+(CSP) account storage (AWS S3, Google Cloud Storage, or Azure Blob Storage).
+For details of how ClickHouse Cloud backups work, including "full" vs. "incremental"
+backups, see the [backups](/cloud/manage/backups/overview) docs.
+
+Here we walk through how you can export backups to your AWS, GCP, Azure object
+storage as well as how to restore from these backups in your account to a new
+ClickHouse Cloud service.
+
+:::note
+Users should be aware that any usage where backups are being exported to a
+different region in the same cloud provider will incur [data transfer](/cloud/manage/network-data-transfer)
+charges. Currently, we do not support cross-cloud backups.
+:::
+
+To export backups to your own cloud account, you have two options:
+- You can leverage the [UI capability](/cloud/manage/backups/backup-restore-via-ui) from the cloud console. This also
+ allows you to also set backups to happen on a specific schedule by using [configurable backups](/cloud/manage/backups/configurable-backups).
+- You can use [SQL commands](/cloud/manage/backups/backup-restore-via-commands) to export backups to your bucket.
+
+:::note
+If you configure backups to your own bucket, ClickHouse Cloud will still take
+daily backups to its own bucket. This is to ensure that we have at least one
+copy of the data to restore from in case the backups in your own bucket get
+corrupted.
+:::
+
+:::warning
+ClickHouse Cloud will not manage the lifecycle of backups in your bucket, as we
+do not have delete permissions for this data. You are responsible for ensuring
+that backups in your bucket are managed appropriately, for compliance reasons as
+well as to manage cost. If the backups are corrupted and / or moved to another
+location, restoring the backups will not work.
+:::
diff --git a/docs/cloud/manage/backups/export-backups-to-own-cloud-account.md b/docs/cloud/manage/backups/export-backups-to-own-cloud-account.md
deleted file mode 100644
index 4cd5ea78b62..00000000000
--- a/docs/cloud/manage/backups/export-backups-to-own-cloud-account.md
+++ /dev/null
@@ -1,158 +0,0 @@
----
-sidebar_label: 'Export Backups to your Own Cloud Account'
-slug: /cloud/manage/backups/export-backups-to-own-cloud-account
-title: 'Export Backups to your Own Cloud Account'
-description: 'Describes how to export backups to your own Cloud account'
----
-
-import EnterprisePlanFeatureBadge from '@theme/badges/EnterprisePlanFeatureBadge'
-
-
-
-ClickHouse Cloud supports taking backups to your own cloud service provider (CSP) account (AWS S3, Google Cloud Storage, or Azure Blob Storage).
-For details of how ClickHouse Cloud backups work, including "full" vs. "incremental" backups, see the [backups](overview.md) docs.
-
-Here we show examples of how to take full and incremental backups to AWS, GCP, Azure object storage as well as how to restore from the backups.
-
-:::note
-Users should be aware that any usage where backups are being exported to a different region in the same cloud provider, will incur [data transfer](../network-data-transfer.mdx) charges. Currently we do not support cross cloud backups.
-:::
-
-## Requirements {#requirements}
-
-You will need the following details to export/restore backups to your own CSP storage bucket.
-
-### AWS {#aws}
-
-1. AWS S3 endpoint, in the format:
-
- ```text
- s3://.s3.amazonaws.com/
- ```
-
- For example:
- ```text
- s3://testchbackups.s3.amazonaws.com/backups/
- ```
- Where:
- - `testchbackups` is the name of the S3 bucket to export backups to.
- - `backups` is an optional subdirectory.
-
-2. AWS access key and secret. AWS role based authentication is also supported and can be used in place of AWS access key and secret.
-
-:::note
-In order to use role based authentication, please follow the Secure s3 [setup](https://clickhouse.com/docs/cloud/security/secure-s3). In addition, you will need to add `s3:PutObject`, and `s3:DeleteObject` permissions to the IAM policy described [here.](https://clickhouse.com/docs/cloud/security/secure-s3#option-2-manually-create-iam-role)
-:::
-
-### Azure {#azure}
-
-1. Azure storage connection string.
-2. Azure container name in the storage account.
-3. Azure Blob within the container.
-
-### Google Cloud Storage (GCS) {#google-cloud-storage-gcs}
-
-1. GCS endpoint, in the format:
-
- ```text
- https://storage.googleapis.com//
- ```
-2. Access HMAC key and HMAC secret.
-
-
-# Backup / Restore
-
-## Backup / Restore to AWS S3 Bucket {#backup--restore-to-aws-s3-bucket}
-
-### Take a DB backup {#take-a-db-backup}
-
-**Full Backup**
-
-```sql
-BACKUP DATABASE test_backups
-TO S3('https://testchbackups.s3.amazonaws.com/backups/', '', '')
-```
-
-Where `uuid` is a unique identifier, used to differentiate a set of backups.
-
-:::note
-You will need to use a different UUID for each new backup in this subdirectory, otherwise you will get a `BACKUP_ALREADY_EXISTS` error.
-For example, if you are taking daily backups, you will need to use a new UUID each day.
-:::
-
-**Incremental Backup**
-
-```sql
-BACKUP DATABASE test_backups
-TO S3('https://testchbackups.s3.amazonaws.com/backups/', '', '')
-SETTINGS base_backup = S3('https://testchbackups.s3.amazonaws.com/backups/', '', '')
-```
-
-### Restore from a backup {#restore-from-a-backup}
-
-```sql
-RESTORE DATABASE test_backups
-AS test_backups_restored
-FROM S3('https://testchbackups.s3.amazonaws.com/backups/', '', '')
-```
-
-See: [Configuring BACKUP/RESTORE to use an S3 Endpoint](/operations/backup#configuring-backuprestore-to-use-an-s3-endpoint) for more details.
-
-## Backup / Restore to Azure Blob Storage {#backup--restore-to-azure-blob-storage}
-
-### Take a DB backup {#take-a-db-backup-1}
-
-**Full Backup**
-
-```sql
-BACKUP DATABASE test_backups
-TO AzureBlobStorage('', '', '/');
-```
-
-Where `uuid` is a unique identifier, used to differentiate a set of backups.
-
-**Incremental Backup**
-
-```sql
-BACKUP DATABASE test_backups
-TO AzureBlobStorage('', '', '//my_incremental')
-SETTINGS base_backup = AzureBlobStorage('', '', '/')
-```
-
-### Restore from a backup {#restore-from-a-backup-1}
-
-```sql
-RESTORE DATABASE test_backups
-AS test_backups_restored_azure
-FROM AzureBlobStorage('', '', '/')
-```
-
-See: [Configuring BACKUP/RESTORE to use an S3 Endpoint](/operations/backup#configuring-backuprestore-to-use-an-azureblobstorage-endpoint) for more details.
-
-## Backup / Restore to Google Cloud Storage (GCS) {#backup--restore-to-google-cloud-storage-gcs}
-
-### Take a DB backup {#take-a-db-backup-2}
-
-**Full Backup**
-
-```sql
-BACKUP DATABASE test_backups
-TO S3('https://storage.googleapis.com//', ', )
-```
-Where `uuid` is a unique identifier, used to differentiate a set of backups.
-
-**Incremental Backup**
-
-```sql
-BACKUP DATABASE test_backups
-TO S3('https://storage.googleapis.com/test_gcs_backups//my_incremental', 'key', 'secret')
-SETTINGS base_backup = S3('https://storage.googleapis.com/test_gcs_backups/', 'key', 'secret')
-```
-
-### Restore from a backup {#restore-from-a-backup-2}
-
-```sql
-RESTORE DATABASE test_backups
-AS test_backups_restored_gcs
-FROM S3('https://storage.googleapis.com/test_gcs_backups/', 'key', 'secret')
-```
diff --git a/docs/cloud/manage/backups/index.md b/docs/cloud/manage/backups/index.md
index d42ed0ef899..aede839aa15 100644
--- a/docs/cloud/manage/backups/index.md
+++ b/docs/cloud/manage/backups/index.md
@@ -5,8 +5,8 @@ description: 'Table of contents page for backups.'
keywords: ['backups', 'configurable backups', 'export backups to own cloud']
---
-| Page | Description |
-|--------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------|
-| [Overview](./overview.md) | Overview page for backups. |
-| [Configurable Backups](./configurable-backups.md) | Learn about how Scale and Enterprise tier users can customize their backup schedules according to their specific business needs |
-| [Export Backups to your Own Cloud Account](./export-backups-to-own-cloud-account.md) | Learn about an Enterprise tier feature that gives you the ability to export backups to your own cloud account. |
+| Page | Description |
+|-----------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------|
+| [Overview](./overview.md) | Overview page for backups. |
+| [Configurable Backups](./configurable-backups.md) | Learn about how Scale and Enterprise tier users can customize their backup schedules according to their specific business needs |
+| [Export Backups to your Own Cloud Account](./backups-to-own-cloud/export-backups-to-own-cloud-account.md) | Learn about an Enterprise tier feature that gives you the ability to export backups to your own cloud account. |
diff --git a/docs/cloud/manage/backups/overview.md b/docs/cloud/manage/backups/overview.md
index 30124414b2a..f4d449f632e 100644
--- a/docs/cloud/manage/backups/overview.md
+++ b/docs/cloud/manage/backups/overview.md
@@ -175,4 +175,4 @@ If you want to set up a backups schedule different from the default backup sched
## Export backups to your own cloud account {#export-backups-to-your-own-cloud-account}
-For users wanting to export backups to their own cloud account, see [here](./export-backups-to-own-cloud-account.md).
+For users wanting to export backups to their own cloud account, see [here](./backups-to-own-cloud/export-backups-to-own-cloud-account.md).
diff --git a/scripts/aspell-dict-file.txt b/scripts/aspell-dict-file.txt
index 9064e1c8d20..71b05870a05 100644
--- a/scripts/aspell-dict-file.txt
+++ b/scripts/aspell-dict-file.txt
@@ -1089,3 +1089,5 @@ processlist
Chainlit's
--docs/use-cases/AI_ML/MCP/index.md--
MCP's
+--docs/cloud/manage/backups/backups-to-own-cloud/backup_restore_using_commands.md--
+testchbackups
diff --git a/src/css/custom.scss b/src/css/custom.scss
index 9161e8722e0..d3d2231d3f9 100644
--- a/src/css/custom.scss
+++ b/src/css/custom.scss
@@ -1137,14 +1137,28 @@ button.DocSearch {
display: block;
}
+.theme-admonition-warning {
+ .alert-icon {
+ background: var(--click-color-warning-text) !important;
+ }
+
+ .alert-content {
+ background: var(--click-color-warning-background) !important;
+ }
+}
+
+[data-theme='dark'] .theme-admonition-warning {
+ color: black !important;
+}
+
.theme-admonition-tip {
&.alert--warning {
.alert-icon {
- background: var(--click-color-warning-text);
+ background: var(--click-color-warning-text) !important;
}
.alert-content {
- background: var(--click-color-warning-background);
+ background: var(--click-color-warning-background) !important;
}
}
diff --git a/src/theme/Admonition/styles.module.css b/src/theme/Admonition/styles.module.css
index a8949bfd83d..ad2690ed08c 100644
--- a/src/theme/Admonition/styles.module.css
+++ b/src/theme/Admonition/styles.module.css
@@ -33,6 +33,7 @@
width: 1.6em;
fill: white;
}
+
.admonitionContent {
padding: 1rem;
background: var(--click-color-note-background);
diff --git a/static/images/cloud/manage/backups/arn.png b/static/images/cloud/manage/backups/arn.png
new file mode 100644
index 00000000000..3bc54d27a98
Binary files /dev/null and b/static/images/cloud/manage/backups/arn.png differ
diff --git a/static/images/cloud/manage/backups/azure_connection_details.png b/static/images/cloud/manage/backups/azure_connection_details.png
new file mode 100644
index 00000000000..217ec7956ea
Binary files /dev/null and b/static/images/cloud/manage/backups/azure_connection_details.png differ
diff --git a/static/images/cloud/manage/backups/backup_command.png b/static/images/cloud/manage/backups/backup_command.png
new file mode 100644
index 00000000000..b2a169012a2
Binary files /dev/null and b/static/images/cloud/manage/backups/backup_command.png differ
diff --git a/static/images/cloud/manage/backups/change_external_backup.png b/static/images/cloud/manage/backups/change_external_backup.png
new file mode 100644
index 00000000000..6137f731e17
Binary files /dev/null and b/static/images/cloud/manage/backups/change_external_backup.png differ
diff --git a/static/images/cloud/manage/backups/configure_arn_s3_details.png b/static/images/cloud/manage/backups/configure_arn_s3_details.png
new file mode 100644
index 00000000000..c77af50c3e1
Binary files /dev/null and b/static/images/cloud/manage/backups/configure_arn_s3_details.png differ
diff --git a/static/images/cloud/manage/backups/gcp_configure.png b/static/images/cloud/manage/backups/gcp_configure.png
new file mode 100644
index 00000000000..2779f16187a
Binary files /dev/null and b/static/images/cloud/manage/backups/gcp_configure.png differ
diff --git a/static/images/cloud/manage/backups/gcp_restore_command.png b/static/images/cloud/manage/backups/gcp_restore_command.png
new file mode 100644
index 00000000000..f96f8d8016d
Binary files /dev/null and b/static/images/cloud/manage/backups/gcp_restore_command.png differ
diff --git a/static/images/cloud/manage/backups/gcp_stored_backups.png b/static/images/cloud/manage/backups/gcp_stored_backups.png
new file mode 100644
index 00000000000..169f2a46d11
Binary files /dev/null and b/static/images/cloud/manage/backups/gcp_stored_backups.png differ
diff --git a/static/images/cloud/manage/backups/view_backups.png b/static/images/cloud/manage/backups/view_backups.png
new file mode 100644
index 00000000000..169f2a46d11
Binary files /dev/null and b/static/images/cloud/manage/backups/view_backups.png differ
diff --git a/static/images/cloud/manage/backups/view_backups_azure.png b/static/images/cloud/manage/backups/view_backups_azure.png
new file mode 100644
index 00000000000..169f2a46d11
Binary files /dev/null and b/static/images/cloud/manage/backups/view_backups_azure.png differ