You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-deploy-multi-region.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -164,7 +164,7 @@ This section provides considerations for multi-region deployments when the API M
164
164
* Configure each regional network independently. The [connectivity requirements](virtual-network-reference.md) such as required network security group rules for a virtual network in an added region are generally the same as those for a network in the primary region.
165
165
* Virtual networks in the different regions don't need to be peered.
166
166
> [!IMPORTANT]
167
-
> When configured in internal VNet mode, each regional gateway must also have outbound connectivity on port 1443 to the Azure SQL database configured for your API Management instance, which is only in the *primary* region. Ensure that you allow connectivity to the FQDN or IP address of this Azure SQL database in any routes or firewall rules you configure for networks in your secondary regions; the Azure SQL service tag can't be used in this scenario. To find the Azure SQL database name in the primary region, go to the **Network** > **Network status** page of your API Management instance in the portal.
167
+
> When configured in internal VNet mode, each regional gateway must also have outbound connectivity on port 1433 to the Azure SQL database configured for your API Management instance, which is only in the *primary* region. Ensure that you allow connectivity to the FQDN or IP address of this Azure SQL database in any routes or firewall rules you configure for networks in your secondary regions; the Azure SQL service tag can't be used in this scenario. To find the Azure SQL database name in the primary region, go to the **Network** > **Network status** page of your API Management instance in the portal.
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/search-jobs.md
+9-4Lines changed: 9 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,18 +2,23 @@
2
2
title: Run search jobs in Azure Monitor
3
3
description: Search jobs are asynchronous log queries in Azure Monitor that make results available as a table for further analytics.
4
4
ms.topic: conceptual
5
-
ms.date: 10/01/2022
6
-
ms.custom: references_regions
5
+
ms.date: 05/30/2024
6
+
ms.custom: references_regions
7
+
author: guywi-ms
8
+
ms.author: guywild
9
+
ms.reviewer: adi.biran
7
10
# Customer intent: As a data scientist or workspace administrator, I want an efficient way to search through large volumes of data in a table, including archived and basic logs.
8
11
---
9
12
10
13
# Run search jobs in Azure Monitor
11
14
12
15
Search jobs are asynchronous queries that fetch records into a new search table within your workspace for further analytics. The search job uses parallel processing and can run for hours across large datasets. This article describes how to create a search job and how to query its resulting data.
13
16
14
-
## Permissions
17
+
## Permissions required
15
18
16
-
To run a search job, you need `Microsoft.OperationalInsights/workspaces/tables/write` and `Microsoft.OperationalInsights/workspaces/searchJobs/write` permissions to the Log Analytics workspace, for example, as provided by the [Log Analytics Contributor built-in role](../logs/manage-access.md#built-in-roles).
19
+
| Action | Permissions required |
20
+
|:-------|:---------------------|
21
+
|Run a search job|`Microsoft.OperationalInsights/workspaces/tables/write` and `Microsoft.OperationalInsights/workspaces/searchJobs/write` permissions to the Log Analytics workspace, for example, as provided by the [Log Analytics Contributor built-in role](../logs/manage-access.md#built-in-roles).|
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/workspace-design.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,7 @@
2
2
title: Design a Log Analytics workspace architecture
3
3
description: The article describes the considerations and recommendations for customers preparing to deploy a workspace in Azure Monitor.
4
4
ms.topic: conceptual
5
-
ms.date: 04/05/2023
6
-
5
+
ms.date: 05/30/2024
7
6
---
8
7
9
8
# Design a Log Analytics workspace architecture
@@ -15,7 +14,7 @@ A single [Log Analytics workspace](log-analytics-workspace-overview.md) might be
15
14
16
15
Here's a video about the fundamentals of Azure Monitor Logs and best practices and design considerations for designing your Azure Monitor Logs deployment:
Your design should always start with a single workspace to reduce the complexity of managing multiple workspaces and in querying data from them. There are no performance limitations from the amount of data in your workspace. Multiple services and data sources can send data to the same workspace. As you identify criteria to create more workspaces, your design should use the fewest number that will match your requirements.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-dataprotection-use-rest-api-backup-blobs.md
+92-25Lines changed: 92 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
1
---
2
2
title: Back up blobs in a storage account using Azure Data Protection REST API.
3
3
description: In this article, learn how to configure, initiate, and manage backup operations of blobs using REST API.
4
-
ms.topic: conceptual
5
-
ms.date: 10/31/2022
4
+
ms.topic: how-to
5
+
ms.date: 05/30/2024
6
6
ms.assetid: 7c244b94-d736-40a8-b94d-c72077080bbe
7
7
ms.service: backup
8
8
ms.custom: engagement-fy23
@@ -12,52 +12,47 @@ ms.author: v-abhmallick
12
12
13
13
# Back up blobs in a storage account using Azure Data Protection via REST API
14
14
15
-
Azure Backup enables you to easily configure operational backup for protecting block blobs in your storage accounts.
15
+
Azure Backup enables you to easily configure backup for protecting block blobs in your storage accounts.
16
16
17
-
This article describes how to configure backups for blobs in a storage account via REST API. Backup of blobs is configured at the storage account level. So, all blobs in the storage account are protected with operational backup.
18
-
19
-
In this article, you'll learn about:
20
-
21
-
> [!div class="checklist"]
22
-
> - Prerequisites
23
-
> - Configure backup
17
+
This article describes how to configure backups for blobs in a storage account via REST API. Backup of blobs is configured at the storage account level. You can now perform [operational](blob-backup-overview.md?tabs=operational-backup) and [vaulted](blob-backup-overview.md?tabs=vaulted-backup) backups to protect block blobs in your storage accounts using Azure Backup.
24
18
25
19
For information on the Azure blob region availability, supported scenarios and limitations, see the [support matrix](blob-backup-support-matrix.md).
26
20
27
21
## Prerequisites
28
22
23
+
Before you back up blobs in a storage account using REST API, ensure that you:
24
+
29
25
-[Create a Backup vault](backup-azure-dataprotection-use-rest-api-create-update-backup-vault.md)
30
26
-[Create a blob backup policy](backup-azure-dataprotection-use-rest-api-create-update-blob-policy.md)
31
27
32
28
## Configure backup
33
29
34
30
Once you create the vault and policy, you need to consider two critical points to protect all Azure Blobs within a storage account.
35
31
36
-
### Key entities
37
-
38
-
#### Storage account that contains the blobs for protection
32
+
- Key entities
33
+
- Permissions
39
34
40
-
Fetch the Azure Resource Manager ID of the storage account which contains the blobs to be protected. This serves as the identifier of the storage account.
35
+
### Key entities
41
36
42
-
For example, we'll use a storage account named *msblobbackup*, under the resource group *RG-BlobBackup*, in a different subscription and in *west US*.
37
+
-**Storage account containing the blobs to be protected**: Fetch the Azure Resource Manager ID of the storage account which contains the blobs to be protected. This serves as the identifier of the storage account.
The Backup vault requires permissions on the storage account to enable backups on blobs present within the storage account. The system-assigned managed identity of the vault is used for assigning the permissions.
45
+
-**Backup vault**: The Backup vault requires permissions on the storage account to enable backups on blobs present within the storage account. The system-assigned managed identity of the vault is used for assigning the permissions.
51
46
52
-
For example, we'll use a backup vault called *testBkpVault* in *West US* region under *TestBkpVaultRG* resource group.
47
+
For example, we'll use a backup vault called *testBkpVault* in *West US* region under *TestBkpVaultRG* resource group.
53
48
54
49
### Assign permissions
55
50
56
-
You need to assign a few permissions via Azure role-based access control (Azure RBAC) to vault (represented by vault Managed Service Identity) and the relevant storage account. You can do these via Azure portal, PowerShell, or REST API. Learn more about all [related permissions](blob-backup-configure-manage.md#grant-permissions-to-the-backup-vault-on-storage-accounts).
51
+
You need to assign a few permissions via Azure role-based access control (Azure RBAC) to the created vault (represented by vault Managed Service Identity) and the relevant storage account. You can do these via Azure portal, PowerShell, or REST API. Learn more about all [related permissions](blob-backup-configure-manage.md#grant-permissions-to-the-backup-vault-on-storage-accounts).
57
52
58
-
### Prepare the request to configure backup
53
+
### Prepare the request to configure blob backup
59
54
60
-
Once you set the relevant permissions to the vault and storage account, and configure the vault and policy, prepare the request to configure backup.
55
+
Once the relevant permissions to the vault and storage account are set, and the vault and policy configuration are done, prepare the request to configure backup.
61
56
62
57
The following is the request body to configure backup for all blobs within a storage account. The Azure Resource Manager ID (ARM ID) of the storage account and its details are mentioned in the *datasourceinfo* section and the policy information is present in the *policyinfo* section.
63
58
@@ -80,6 +75,44 @@ The following is the request body to configure backup for all blobs within a sto
80
75
}
81
76
}
82
77
```
78
+
To configure backup with vaulted backup (preview) enabled, refer the below request body.
79
+
80
+
```json
81
+
{backupInstanceDataSourceType is Microsoft.Storage/storageAccounts/blobServices
82
+
backupInstanceResourceType is Microsoft.Storage/storageAccounts
@@ -97,7 +130,7 @@ For example, this translates to:
97
130
POST https://management.azure.com/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxx/resourceGroups/TestBkpVaultRG/providers/Microsoft.DataProtection/backupVaults/testBkpVault/validateForBackup?api-version=2021-01-01
98
131
```
99
132
100
-
The [request body](#prepare-the-request-to-configure-backup) that you prepared earlier is used to give the details of the storage account to be protected.
133
+
The [request body](#prepare-the-request-to-configure-blob-backup) that you prepared earlier is used to give the details of the storage account to be protected.
101
134
102
135
#### Example request body
103
136
@@ -120,6 +153,40 @@ The [request body](#prepare-the-request-to-configure-backup) that you prepared e
120
153
}
121
154
}
122
155
```
156
+
#### Example request body for vaulted backup (preview)
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-dataprotection-use-rest-api-create-update-blob-policy.md
+90-2Lines changed: 90 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Create Azure Backup policies for blobs using data protection REST API
3
3
description: In this article, you'll learn how to create and manage backup policies for blobs using REST API.
4
4
ms.topic: how-to
5
-
ms.date: 10/28/2022
5
+
ms.date: 05/30/2024
6
6
ms.assetid: 472d6a4f-7914-454b-b8e4-062e8b556de3
7
7
ms.service: backup
8
8
ms.custom: engagement-fy23
@@ -12,6 +12,8 @@ ms.author: v-abhmallick
12
12
13
13
# Create Azure Data Protection backup policies for blobs using REST API
14
14
15
+
This article describes how to create Azure Data Protection backup policies for Azure Blobs using REST API.
16
+
15
17
Azure Backup policy typically governs the retention and schedule of your backups. As operational backup for blobs is continuous in nature, you don't need a schedule to perform backups. The policy is essentially needed to specify the retention period. You can reuse the backup policy to configure backup for multiple storage accounts to a vault.
16
18
17
19
> [!IMPORTANT]
@@ -60,7 +62,7 @@ The following request body defines a backup policy for blob backups.
60
62
The policy says:
61
63
62
64
- Retention period is 30 days.
63
-
- Datastore is 'operational store' since the backups are local and no data is stored in the Backup vault.
65
+
- Datastore is 'operational store'.
64
66
65
67
```json
66
68
{
@@ -92,6 +94,92 @@ The policy says:
92
94
}
93
95
```
94
96
97
+
To configure a backup policy with the vaulted backup (preview), use the following JSON script:
0 commit comments