Skip to content

Commit 3a40483

Browse files
authored
Merge pull request #115818 from dcurwin/network-connectivity-sql-saphana-may2020
Network connectivity for SQL and SAP HANA
2 parents 75773ad + b32dade commit 3a40483

File tree

2 files changed

+65
-85
lines changed

2 files changed

+65
-85
lines changed

articles/backup/backup-azure-sap-hana-database.md

Lines changed: 33 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -27,66 +27,61 @@ In this article, you will learn how to:
2727

2828
Refer to the [prerequisites](tutorial-backup-sap-hana-db.md#prerequisites) and the [What the pre-registration script does](tutorial-backup-sap-hana-db.md#what-the-pre-registration-script-does) sections to set up the database for backup.
2929

30-
### Set up network connectivity
30+
### Establish network connectivity
3131

32-
For all operations, the SAP HANA VM requires connectivity to Azure public IP addresses. VM operations (database discovery, configure backups, schedule backups, restore recovery points, and so on) fail without connectivity to Azure public IP addresses.
32+
For all operations, an SAP HANA database running on an Azure VM requires connectivity to the Azure Backup service, Azure Storage, and Azure Active Directory. This can be achieved by using private endpoints or by allowing access to the required public IP addresses or FQDNs. Not allowing proper connectivity to the required Azure services may lead to failure in operations like database discovery, configuring backup, performing backups, and restoring data.
3333

34-
Establish connectivity by using one of the following options:
34+
The following table lists the various alternatives you can use for establishing connectivity:
3535

36-
#### Allow the Azure datacenter IP ranges
36+
| **Option** | **Advantages** | **Disadvantages** |
37+
| --------------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------ |
38+
| Private endpoints | Allow backups over private IPs inside the virtual network <br><br> Provide granular control on the network and vault side | Incurs standard private endpoint [costs](https://azure.microsoft.com/pricing/details/private-link/) |
39+
| NSG service tags | Easier to manage as range changes are automatically merged <br><br> No additional costs | Can be used with NSGs only <br><br> Provides access to the entire service |
40+
| Azure Firewall FQDN tags | Easier to manage since the required FQDNs are automatically managed | Can be used with Azure Firewall only |
41+
| Allow access to service FQDNs/IPs | No additional costs <br><br> Works with all network security appliances and firewalls | A broad set of IPs or FQDNs may be required to be accessed |
42+
| Use an HTTP proxy | Single point of internet access to VMs | Additional costs to run a VM with the proxy software |
3743

38-
This option allows the [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the downloaded file. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If your safe recipients list only includes region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication.
44+
More details around using these options are shared below:
3945

40-
#### Allow access using NSG tags
46+
#### Private endpoints
4147

42-
If you use NSG to restrict connectivity, then you should use AzureBackup service tag to allows outbound access to Azure Backup. In addition, you should also allow connectivity for authentication and data transfer by using [rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for Azure AD and Azure Storage. This can be done from the Azure portal or via PowerShell.
48+
Private endpoints allow you to connect securely from servers inside a virtual network to your Recovery Services vault. The private endpoint uses an IP from the VNET address space for your vault. The network traffic between your resources inside the virtual network and the vault travels over your virtual network and a private link on the Microsoft backbone network. This eliminates exposure from the public internet. Read more on private endpoints for Azure Backup [here](https://docs.microsoft.com/azure/backup/private-endpoints).
4349

44-
To create a rule using the portal:
50+
#### NSG tags
4551

46-
1. In **All Services**, go to **Network security groups** and select the network security group.
47-
2. Select **Outbound security rules** under **Settings**.
48-
3. Select **Add**. Enter all the required details for creating a new rule as described in [security rule settings](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group#security-rule-settings). Ensure the option **Destination** is set to **Service Tag** and **Destination service tag** is set to **AzureBackup**.
49-
4. Click **Add**, to save the newly created outbound security rule.
52+
If you use Network Security Groups (NSG), use the *AzureBackup* service tag to allow outbound access to Azure Backup. In addition to the Azure Backup tag, you also need to allow connectivity for authentication and data transfer by creating similar [NSG rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for *Azure AD* and *Azure Storage*. The following steps describe the process to create a rule for the Azure Backup tag:
5053

51-
To create a rule using PowerShell:
54+
1. In **All Services**, go to **Network security groups** and select the network security group.
5255

53-
1. Add Azure account credentials and update the national clouds<br/>
54-
`Add-AzureRmAccount`<br/>
56+
1. Select **Outbound security rules** under **Settings**.
5557

56-
2. Select the NSG subscription<br/>
57-
`Select-AzureRmSubscription "<Subscription Id>"`
58+
1. Select **Add**. Enter all the required details for creating a new rule as described in [security rule settings](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group#security-rule-settings). Ensure the option **Destination** is set to *Service Tag* and **Destination service tag** is set to *AzureBackup*.
5859

59-
3. Select the NSG<br/>
60-
`$nsg = Get-AzureRmNetworkSecurityGroup -Name "<NSG name>" -ResourceGroupName "<NSG resource group name>"`
60+
1. Click **Add** to save the newly created outbound security rule.
6161

62-
4. Add allow outbound rule for Azure Backup service tag<br/>
63-
`Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureBackupAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureBackup" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"`
62+
You can similarly create NSG outbound security rules for Azure Storage and Azure AD.
6463

65-
5. Add allow outbound rule for Storage service tag<br/>
66-
`Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "StorageAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "Storage" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"`
64+
#### Azure Firewall tags
6765

68-
6. Add allow outbound rule for AzureActiveDirectory service tag<br/>
69-
`Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureActiveDirectoryAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureActiveDirectory" -DestinationPortRange 443 -Description "Allow outbound traffic to AzureActiveDirectory service"`
66+
If you're using Azure Firewall, create an application rule by using the *AzureBackup* [Azure Firewall FQDN tag](https://docs.microsoft.com/azure/firewall/fqdn-tags). This allows all outbound access to Azure Backup.
7067

71-
7. Save the NSG<br/>
72-
`Set-AzureRmNetworkSecurityGroup -NetworkSecurityGroup $nsg`
68+
#### Allow access to service IP ranges
7369

74-
**Allow access by using Azure Firewall tags**. If you're using Azure Firewall, create an application rule by using the AzureBackup [FQDN tag](https://docs.microsoft.com/azure/firewall/fqdn-tags). This allows outbound access to Azure Backup.
70+
If you choose to allow access service IPs, refer to the IP ranges in the JSON file available [here](https://www.microsoft.com/download/confirmation.aspx?id=56519). You'll need to allow access to IPs corresponding to Azure Backup, Azure Storage, and Azure Active Directory.
7571

76-
**Deploy an HTTP proxy server to route traffic**. When you back up an SAP HANA database on an Azure VM, the backup extension on the VM uses the HTTPS APIs to send management commands to Azure Backup and data to Azure Storage. The backup extension also uses Azure AD for authentication. Route the backup extension traffic for these three services through the HTTP proxy. The extensions are the only component that's configured for access to the public internet.
72+
#### Allow access to service FQDNs
7773

78-
Connectivity options include the following advantages and disadvantages:
74+
You can also use the following FQDNs to allow access to the required services from your servers:
7975

80-
**Option** | **Advantages** | **Disadvantages**
81-
--- | --- | ---
82-
Allow IP ranges | No additional costs | Complex to manage because the IP address ranges change over time <br/><br/> Provides access to the whole of Azure, not just Azure Storage
83-
Use NSG service tags | Easier to manage as range changes are automatically merged <br/><br/> No additional costs <br/><br/> | Can be used with NSGs only <br/><br/> Provides access to the entire service
84-
Use Azure Firewall FQDN tags | Easier to manage as the required FQDNs are automatically managed | Can be used with Azure Firewall only
85-
Use an HTTP proxy | Granular control in the proxy over the storage URLs is allowed <br/><br/> Single point of internet access to VMs <br/><br/> Not subject to Azure IP address changes | Additional costs to run a VM with the proxy software
76+
| Service | Domain names to be accessed |
77+
| -------------- | ------------------------------------------------------------ |
78+
| Azure Backup | `*.backup.windowsazure.com` |
79+
| Azure Storage | `*.blob.core.windows.net` <br><br> `*.queue.core.windows.net` |
80+
| Azure AD | Allow access to FQDNs under sections 56 and 59 according to [this article](https://docs.microsoft.com/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online) |
8681

87-
#### Private Endpoints
82+
#### Use an HTTP proxy server to route traffic
8883

89-
[!INCLUDE [Private Endpoints](../../includes/backup-private-endpoints.md)]
84+
When you back up an SAP HANA database running on an Azure VM, the backup extension on the VM uses the HTTPS APIs to send management commands to Azure Backup and data to Azure Storage. The backup extension also uses Azure AD for authentication. Route the backup extension traffic for these three services through the HTTP proxy. Use the list of IPs and FQDNs mentioned above for allowing access to the required services. Authenticated proxy servers aren't supported.
9085

9186
[!INCLUDE [How to create a Recovery Services vault](../../includes/backup-create-rs-vault.md)]
9287

0 commit comments

Comments
 (0)