Skip to content

Commit 00c42e6

Browse files
author
vrvkrajesh
committed
Updated re-register image and pr comments
1 parent abbcbf9 commit 00c42e6

File tree

4 files changed

+41
-34
lines changed

4 files changed

+41
-34
lines changed

articles/backup/backup-sql-server-azure-troubleshoot.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -15,20 +15,20 @@ For more information about the backup process and limitations, see [About SQL Se
1515

1616
To configure protection for a SQL Server database on a virtual machine, you must install the **AzureBackupWindowsWorkload** extension on that virtual machine. If you get the error **UserErrorSQLNoSysadminMembership**, it means your SQL Server instance doesn't have the required backup permissions. To fix this error, follow the steps in [Set VM permissions](backup-azure-sql-database.md#set-vm-permissions).
1717

18-
## Troubleshooting Discover and Configure issues
18+
## Troubleshoot discover and configure issues
1919
After creating and configuring a Recovery Services vault, discovering databases and configuring backup is a two-step process.<br>
2020

2121
![sql](./media/backup-azure-sql-database/sql.png)
2222

2323
During the backup configuration, if the SQL VM and its instances are not visible in the **Discovery DBs in VMs** and **Configure Backup** (refer to above image) ensure that:
2424

25-
**Step 1: Discovery DBs in VMs**
26-
<br>
27-
- If the VM is not listed in the discovered VM list and also not registered for SQL backup in another vault, then follow the [Discovery SQL Server backup](https://docs.microsoft.com/azure/backup/backup-sql-server-database-azure-vms#discover-sql-server-databases) steps.<br>
25+
### Step 1: Discovery DBs in VMs
2826

29-
**Step 2: Configure Backup**
30-
<br>
31-
- If the vault in which the SQL VM is registered in the same vault used to protect the databases, then follow the [Configure Backup](https://docs.microsoft.com/azure/backup/backup-sql-server-database-azure-vms#configure-backup) steps.<br>
27+
- If the VM is not listed in the discovered VM list and also not registered for SQL backup in another vault, then follow the [Discovery SQL Server backup](https://docs.microsoft.com/azure/backup/backup-sql-server-database-azure-vms#discover-sql-server-databases) steps.
28+
29+
### Step 2: Configure Backup
30+
31+
- If the vault in which the SQL VM is registered in the same vault used to protect the databases, then follow the [Configure Backup](https://docs.microsoft.com/azure/backup/backup-sql-server-database-azure-vms#configure-backup) steps.
3232

3333
If the SQL VM needs to be registered in the new vault, then it must be unregistered from the old vault. Unregistration of a SQL VM from the vault requires all the protected data sources to be stop protected and then you can delete the backed up data. Deleting backed up data is a destructive operation. After you have reviewed and taken all the precautions to unregister the SQL VM, then register this same VM with a new vault and retry the backup operation.
3434

@@ -153,11 +153,13 @@ Check for one or more of the following symptoms before you trigger the re-regist
153153
* All operations (such as backup, restore, and configure backup) are failing on the VM with one of the following error codes: **WorkloadExtensionNotReachable**, **UserErrorWorkloadExtensionNotInstalled**, **WorkloadExtensionNotPresent**, **WorkloadExtensionDidntDequeueMsg**.
154154
* The **Backup Status** area for the backup item is showing **Not reachable**. Rule out all the other causes that might result in the same status:
155155

156-
* Lack of permission to perform backup-related operations on the VM.<br>
157-
* Shutdown of the VM, so backups can’t take place.<br>
158-
* Network issues.<br><br>
156+
* Lack of permission to perform backup-related operations on the VM.
157+
* Shutdown of the VM, so backups can’t take place.
158+
* Network issues.
159+
160+
!["Not reachable" status in re-registering a VM](./media/backup-azure-sql-database/re-register-vm.png/)
161+
159162

160-
!["Not reachable" status in re-registering a VM](./media/backup-azure-sql-database/re-register-vm.png)
161163

162164
* In the case of an Always On availability group, the backups started failing after you changed the backup preference or after a failover.
163165

articles/backup/backup-sql-server-database-azure-vms.md

Lines changed: 28 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -37,42 +37,47 @@ For all operations, a SQL Server VM requires connectivity to Azure public IP add
3737

3838
Establish connectivity by using one of the following options:
3939

40-
#### **Allow the Azure datacenter IP ranges**.
40+
#### Allow the Azure datacenter IP ranges
41+
4142
This option allows the [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the downloaded file. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If your safe recipients list only includes region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication.
4243

43-
#### **Allow access using NSG tags**.
44+
#### Allow access using NSG tags
45+
4446
If you use NSG to restrict connectivity, then you should use AzureBackup service tag to allows outbound access to Azure Backup. In addition, you should also allow connectivity for authentication and data transfer by using [rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for Azure AD and Azure Storage. This can be done from the Azure portal or via PowerShell.
4547

4648
To create a rule using the portal:
4749

48-
* In **All Services**, go to **Network security groups** and select the network security group.
49-
* Select **Outbound security rules** under **Settings**.
50-
* Select **Add**. Enter all the required details for creating a new rule as described in [security rule settings](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group#security-rule-settings). Ensure the option **Destination** is set to **Service Tag** and **Destination service tag** is set to **AzureBackup**.
51-
* Click **Add**, to save the newly created outbound security rule.
50+
1. In **All Services**, go to **Network security groups** and select the network security group.
51+
2. Select **Outbound security rules** under **Settings**.
52+
3. Select **Add**. Enter all the required details for creating a new rule as described in [security rule settings](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group#security-rule-settings). Ensure the option **Destination** is set to **Service Tag** and **Destination service tag** is set to **AzureBackup**.
53+
4. Click **Add**, to save the newly created outbound security rule.
54+
55+
To create a rule using PowerShell:
56+
57+
1. Add Azure account credentials and update the national clouds<br/>
58+
`Add-AzureRmAccount`<br/>
59+
60+
2. Select the NSG subscription<br/>
61+
`Select-AzureRmSubscription "<Subscription Id>"`
5262

53-
To create a rule using Powershell:<br>
54-
- Add Azure account credentials and update the national clouds<br/>
55-
``Add-AzureRmAccount``<br/>
56-
- Select the NSG subscription<br/>
57-
```Select-AzureRmSubscription "<Subscription Id>"```
63+
3. Select the NSG<br/>
64+
`$nsg = Get-AzureRmNetworkSecurityGroup -Name "<NSG name>" -ResourceGroupName "<NSG resource group name>"`
5865

59-
- Select the NSG<br/>
60-
```$nsg = Get-AzureRmNetworkSecurityGroup -Name "<NSG name>" -ResourceGroupName "<NSG resource group name>"```
66+
4. Add allow outbound rule for Azure Backup service tag<br/>
67+
`Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureBackupAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureBackup" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"`
6168

62-
- Add allow outbound rule for Azure Backup service tag<br/>
63-
```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureBackupAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureBackup" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"```
69+
5. Add allow outbound rule for Storage service tag<br/>
70+
`Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "StorageAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "Storage" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"`
6471

65-
- Add allow outbound rule for Storage service tag<br/>
66-
```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "StorageAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "Storage" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"```
72+
6. Add allow outbound rule for AzureActiveDirectory service tag<br/>
73+
`Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureActiveDirectoryAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureActiveDirectory" -DestinationPortRange 443 -Description "Allow outbound traffic to AzureActiveDirectory service"`
6774

68-
- Add allow outbound rule for AzureActiveDirectory service tag<br/>
69-
```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureActiveDirectoryAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureActiveDirectory" -DestinationPortRange 443 -Description "Allow outbound traffic to AzureActiveDirectory service"```
75+
7. Save the NSG<br/>
76+
`Set-AzureRmNetworkSecurityGroup -NetworkSecurityGroup $nsg`
7077

71-
- Save the NSG<br/>
72-
```Set-AzureRmNetworkSecurityGroup -NetworkSecurityGroup $nsg```
78+
**Allow access by using Azure Firewall tags**. If you're using Azure Firewall, create an application rule by using the AzureBackup [FQDN tag](https://docs.microsoft.com/azure/firewall/fqdn-tags). This allows outbound access to Azure Backup.
7379

74-
* **Allow access by using Azure Firewall tags**. If you're using Azure Firewall, create an application rule by using the AzureBackup [FQDN tag](https://docs.microsoft.com/azure/firewall/fqdn-tags). This allows outbound access to Azure Backup.
75-
* **Deploy an HTTP proxy server to route traffic**. When you back up a SQL Server database on an Azure VM, the backup extension on the VM uses the HTTPS APIs to send management commands to Azure Backup and data to Azure Storage. The backup extension also uses Azure AD for authentication. Route the backup extension traffic for these three services through the HTTP proxy. The extensions are the only component that's configured for access to the public internet.
80+
**Deploy an HTTP proxy server to route traffic**. When you back up a SQL Server database on an Azure VM, the backup extension on the VM uses the HTTPS APIs to send management commands to Azure Backup and data to Azure Storage. The backup extension also uses Azure AD for authentication. Route the backup extension traffic for these three services through the HTTP proxy. The extensions are the only component that's configured for access to the public internet.
7681

7782
Connectivity options include the following advantages and disadvantages:
7883

-54.9 KB
Loading
-7.85 KB
Loading

0 commit comments

Comments
 (0)