|
1 | 1 | ---
|
2 |
| -title: Back up SQL Server databases in Azure VMs |
| 2 | +title: Back up SQL Server databases in Azure VMs |
3 | 3 | description: In this article, learn how to back up SQL Server databases on Azure virtual machines with Azure Backup.
|
4 | 4 | ms.reviewer: vijayts
|
5 | 5 | ms.topic: conceptual
|
@@ -37,32 +37,47 @@ For all operations, a SQL Server VM requires connectivity to Azure public IP add
|
37 | 37 |
|
38 | 38 | Establish connectivity by using one of the following options:
|
39 | 39 |
|
40 |
| -* **Allow the Azure datacenter IP ranges**. This option allows [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the download. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If you're safe recipients list only region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication. |
| 40 | +#### Allow the Azure datacenter IP ranges |
41 | 41 |
|
42 |
| -* **Allow access using NSG tags**. If you use NSG to restrict connectivity, then you should use AzureBackup service tag to allows outbound access to Azure Backup. In addition, you should also allow connectivity for authentication and data transfer by using [rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for Azure AD and Azure Storage. This can be done from portal or PowerShell. |
| 42 | +This option allows the [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the downloaded file. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If your safe recipients list only includes region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication. |
43 | 43 |
|
44 |
| - To create a rule using the portal: |
| 44 | +#### Allow access using NSG tags |
45 | 45 |
|
46 |
| - * In **All Services**, go to **Network security groups** and select the network security group. |
47 |
| - * Select **Outbound security rules** under **Settings**. |
48 |
| - * Select **Add**. Enter all the required details for creating a new rule as described in [security rule settings](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group#security-rule-settings). Ensure the option **Destination** is set to **Service Tag** and **Destination service tag** is set to **AzureBackup**. |
49 |
| - * Click **Add**, to save the newly created outbound security rule. |
| 46 | +If you use NSG to restrict connectivity, then you should use AzureBackup service tag to allows outbound access to Azure Backup. In addition, you should also allow connectivity for authentication and data transfer by using [rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for Azure AD and Azure Storage. This can be done from the Azure portal or via PowerShell. |
50 | 47 |
|
51 |
| - To create a rule using Powershell: |
| 48 | +To create a rule using the portal: |
52 | 49 |
|
53 |
| - * Add Azure account credentials and update the national clouds<br/> |
54 |
| - ``Add-AzureRmAccount`` |
55 |
| - * Select the NSG subscription<br/> |
56 |
| - ``Select-AzureRmSubscription "<Subscription Id>"`` |
57 |
| - * Select the NSG<br/> |
58 |
| - ```$nsg = Get-AzureRmNetworkSecurityGroup -Name "<NSG name>" -ResourceGroupName "<NSG resource group name>"``` |
59 |
| - * Add allow outbound rule for Azure Backup service tag<br/> |
60 |
| - ```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureBackupAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureBackup" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"``` |
61 |
| - * Save the NSG<br/> |
62 |
| - ```Set-AzureRmNetworkSecurityGroup -NetworkSecurityGroup $nsg``` |
| 50 | + 1. In **All Services**, go to **Network security groups** and select the network security group. |
| 51 | + 2. Select **Outbound security rules** under **Settings**. |
| 52 | + 3. Select **Add**. Enter all the required details for creating a new rule as described in [security rule settings](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group#security-rule-settings). Ensure the option **Destination** is set to **Service Tag** and **Destination service tag** is set to **AzureBackup**. |
| 53 | + 4. Click **Add**, to save the newly created outbound security rule. |
63 | 54 |
|
64 |
| -* **Allow access by using Azure Firewall tags**. If you're using Azure Firewall, create an application rule by using the AzureBackup [FQDN tag](https://docs.microsoft.com/azure/firewall/fqdn-tags). This allows outbound access to Azure Backup. |
65 |
| -* **Deploy an HTTP proxy server to route traffic**. When you back up a SQL Server database on an Azure VM, the backup extension on the VM uses the HTTPS APIs to send management commands to Azure Backup and data to Azure Storage. The backup extension also uses Azure AD for authentication. Route the backup extension traffic for these three services through the HTTP proxy. The extensions are the only component that's configured for access to the public internet. |
| 55 | +To create a rule using PowerShell: |
| 56 | + |
| 57 | + 1. Add Azure account credentials and update the national clouds<br/> |
| 58 | + `Add-AzureRmAccount`<br/> |
| 59 | + |
| 60 | + 2. Select the NSG subscription<br/> |
| 61 | + `Select-AzureRmSubscription "<Subscription Id>"` |
| 62 | + |
| 63 | + 3. Select the NSG<br/> |
| 64 | + `$nsg = Get-AzureRmNetworkSecurityGroup -Name "<NSG name>" -ResourceGroupName "<NSG resource group name>"` |
| 65 | + |
| 66 | + 4. Add allow outbound rule for Azure Backup service tag<br/> |
| 67 | + `Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureBackupAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureBackup" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"` |
| 68 | + |
| 69 | + 5. Add allow outbound rule for Storage service tag<br/> |
| 70 | + `Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "StorageAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "Storage" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"` |
| 71 | + |
| 72 | + 6. Add allow outbound rule for AzureActiveDirectory service tag<br/> |
| 73 | + `Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureActiveDirectoryAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureActiveDirectory" -DestinationPortRange 443 -Description "Allow outbound traffic to AzureActiveDirectory service"` |
| 74 | + |
| 75 | + 7. Save the NSG<br/> |
| 76 | + `Set-AzureRmNetworkSecurityGroup -NetworkSecurityGroup $nsg` |
| 77 | + |
| 78 | +**Allow access by using Azure Firewall tags**. If you're using Azure Firewall, create an application rule by using the AzureBackup [FQDN tag](https://docs.microsoft.com/azure/firewall/fqdn-tags). This allows outbound access to Azure Backup. |
| 79 | + |
| 80 | +**Deploy an HTTP proxy server to route traffic**. When you back up a SQL Server database on an Azure VM, the backup extension on the VM uses the HTTPS APIs to send management commands to Azure Backup and data to Azure Storage. The backup extension also uses Azure AD for authentication. Route the backup extension traffic for these three services through the HTTP proxy. The extensions are the only component that's configured for access to the public internet. |
66 | 81 |
|
67 | 82 | Connectivity options include the following advantages and disadvantages:
|
68 | 83 |
|
|
0 commit comments