You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/postgresql/concepts-single-to-flexible.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,7 @@ Follow the steps provided in this section before you get started with the single
98
98
99
99
-**Target Server Creation** - You need to create the target PostgreSQL flexible server before using the migration feature. Use the creation [QuickStart guide](./flexible-server/quickstart-create-server-portal.md) to create one.
100
100
101
-
-**Source Server pre-requisites** - You must [enable logical replication](./concepts-logical.md#pre-requisites-for-logical-replication-and-logical-decoding) on the source server.
101
+
-**Source Server pre-requisites** - You must [enable logical replication](./concepts-logical.md) on the source server.
102
102
103
103
:::image type="content" source="./media/concepts-single-to-flex/logical-replication-support.png" alt-text="Logical replication from Azure Portal" lightbox="./media/concepts-single-to-flex/logical-replication-support.png":::
Copy file name to clipboardExpand all lines: articles/postgresql/how-to-setup-aad-app-portal.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,11 +11,11 @@ ms.date: 05/09/2022
11
11
12
12
# Setup AAD app to use with Single to Flexible server Migration
13
13
14
-
This quick start article shows you how to setup Azure Active Directory (AAD) app to use with Single to Flexible server migration. It is an important component of this migration feature. See [Azure Active Directory app](../active-directory/develop/howto-create-service-principal-portal.md) for details. AAD App helps with role-based access control (RBAC) as the migration infrastructure requires access to both the source and target servers, and is restricted by the roles assigned to the Azure Active Directory App. The AAD app instance once created, can be used to manage multiple migrations. To get started, create a new Azure Active Directory Enterprise App by doing the following steps:
14
+
This quick start article shows you how to setup Azure Active Directory (AAD) app to use with Single to Flexible server migration. It's an important component of the Single to Flexible migration feature. See [Azure Active Directory app](../active-directory/develop/howto-create-service-principal-portal.md) for details. AAD App helps with role-based access control (RBAC) as the migration infrastructure requires access to both the source and target servers, and is restricted by the roles assigned to the Azure Active Directory App. The AAD app instance once created, can be used to manage multiple migrations. To get started, create a new Azure Active Directory Enterprise App by doing the following steps:
15
15
16
16
## Create AAD App
17
17
18
-
1. If you are new to Microsoft Azure, [create an account](https://azure.microsoft.com/free/) to evaluate our offerings. New customers get $200 in free credits to run, test and deploy workloads.
18
+
1. If you're new to Microsoft Azure, [create an account](https://azure.microsoft.com/free/) to evaluate our offerings. New customers get $200 in free credits to run, test and deploy workloads.
19
19
2. Search for Azure Active Directory in the search bar on the top in the portal.
20
20
3. Within the Azure Active Directory portal, under **Manage** on the left, choose **App Registrations**.
21
21
4. Click on **New Registration**
@@ -30,27 +30,29 @@ This quick start article shows you how to setup Azure Active Directory (AAD) app
30
30
7. In the next screen, click on **New client secret**.
8. In the fan-out blade that opens, add a description, and select the drop-down to pick the life span of your Azure Active Directory App. Once all the migrations are complete, the Azure Active Directory App which was created for Role Based Access Control can be deleted. The default option is six months. If you do not need Azure Active Directory App for six months, choose three months and click **Add**.
33
+
8. In the fan-out blade that opens, add a description, and select the drop-down to pick the life span of your Azure Active Directory App. Once all the migrations are complete, the Azure Active Directory App that was created for Role Based Access Control can be deleted. The default option is six months. If you don't need Azure Active Directory App for six months, choose three months and click **Add**.
9. In the next screen, copy the **Value** column which has the details of the Azure Active Directory App secret. This can be copied only while creation. If you miss copying this secret, you will need to delete this secret and create another one for future tries.
36
+
9. In the next screen, copy the **Value** column that has the details of the Azure Active Directory App secret. This can be copied only while creation. If you miss copying the secret, you will need to delete the secret and create another one for future tries.
10. Once Azure Active Directory App is created, you will need to add contributor privileges for this Azure Active Directory app to the following resources:
40
40
41
41
| Resource | Type | Description |
42
42
| ---- | ---- | ---- |
43
-
| Single Server | Required | Source single server you are migrating from. |
44
-
| Flexible Server | Required | Target flexible server you are migrating into. |
45
-
| Azure Resource Group | Required | Resource group for the migration. By default, this is the target flexible server resource group. If you are using a temporary resource group to create the migration infrastructure, the Azure Active Directory App will require contributor privileges to this resource group. |
46
-
| VNET | Required (if used) | If the source or the target happens to have private access, then the Azure Active Directory App will require contributor privileges to corresponding VNet. If you are using public access, you can skip this . |
43
+
| Single Server | Required | Source single server you're migrating from. |
44
+
| Flexible Server | Required | Target flexible server you're migrating into. |
45
+
| Azure Resource Group | Required | Resource group for the migration. By default, this is the target flexible server resource group. If you're using a temporary resource group to create the migration infrastructure, the Azure Active Directory App will require contributor privileges to this resource group. |
46
+
| VNET | Required (if used) | If the source or the target happens to have private access, then the Azure Active Directory App will require contributor privileges to corresponding VNet. If you're using public access, you can skip this step. |
47
47
48
48
49
49
## Add contributor privileges to an Azure resource
50
50
51
-
Repeat the following for source single server, target flexible server, resource group and Vnet (if used).
51
+
Repeat the steps listed below for source single server, target flexible server, resource group and Vnet (if used).
52
52
53
-
1. For the target flexible server, do the following: - Select the target flexible server in the Azure portal. - Click on Access Control (IAM) on the top left
53
+
1. For the target flexible server,
54
+
1.1 Select the target flexible server in the Azure portal.
55
+
1.2 Click on Access Control (IAM) on the top left.
54
56
:::image type="content" source="./media/concepts-single-to-flex/aad-iam-screen.png" alt-text="Access Control IAM screen" lightbox="./media/concepts-single-to-flex/aad-iam-screen.png":::
55
57
56
58
2. Click **Add** and choose **Add role assignment**.
0 commit comments