Skip to content

Commit 4249fbf

Browse files
author
vrvkrajesh
committed
updated
1 parent 4ddb9e9 commit 4249fbf

File tree

4 files changed

+49
-20
lines changed

4 files changed

+49
-20
lines changed

articles/backup/backup-azure-file-folder-backup-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -159,8 +159,8 @@ The Azure Backup agent requires a passphrase (that you provided during registrat
159159

160160
Consider the following conditions:
161161
- If you uninstall & re-register the agent on the same original machine with
162-
- *Same passphrase*, then you will be able to restore your backed up data.<br>
163-
- *Different passphrase*, then you will not be able to restore your backed up data.
162+
- *Same passphrase*, then you will be able to restore your backed up data.<br>
163+
- *Different passphrase*, then you will not be able to restore your backed up data.
164164
- If you install the agent on a *different machine* with<br>
165165
- the same passphrase (used in the original machine), then you will be able to restore your backed up data.<br>
166166
- a different passphrase, you will not be able to restore your backed up data.<br>

articles/backup/backup-sql-server-azure-troubleshoot.md

Lines changed: 24 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Troubleshoot SQL Server database backup
2+
title: Troubleshoot SQL Server database backup
33
description: Troubleshooting information for backing up SQL Server databases running on Azure VMs with Azure Backup.
44
ms.topic: troubleshooting
55
ms.date: 06/18/2019
@@ -15,6 +15,18 @@ For more information about the backup process and limitations, see [About SQL Se
1515

1616
To configure protection for a SQL Server database on a virtual machine, you must install the **AzureBackupWindowsWorkload** extension on that virtual machine. If you get the error **UserErrorSQLNoSysadminMembership**, it means your SQL Server instance doesn't have the required backup permissions. To fix this error, follow the steps in [Set VM permissions](backup-azure-sql-database.md#set-vm-permissions).
1717

18+
## Troubleshooting Discover and Configure issues
19+
After creating and configuring a Recovery Services vault. Discovering databases and configuring backup is a two-step process.<br>
20+
21+
![sql](./media/backup-azure-sql-database/sql.png)
22+
23+
The SQL VM and its instances will be not visible in **Step 1: Discovery DBs in VMs** and **Step 2: Configure Backup** for backup configuration because the VM might have already been registered/discovered (**Step 1: Discovery DBs in VMs**) in another other vault and you are trying to configure backup of that SQL VM's instances/database (**Step 2: Configure Backup**) to another different vault.<br>
24+
- Ensure the VM is not listed in the discovered VM list, then ensure the VM is not already registered for SQL backup in another vault.<br>
25+
- Ensure vault in which the SQL VM is registered is the same vault used to protect the databases using **Step 2: Configure Backup**.<br>
26+
27+
If the SQL VM needs to be registered in the new vault, then it must be unregistered from the old vault. Unregistration of a SQL VM from a vault requires all the protected data sources to be stop protected and then delete backed up data. Deleting backed up data is a destructive operation. After you have reviewed and taken all the precautions to proceed further to unregister the SQL VM, then register this same VM with a new vault and retry backup operation.
28+
29+
1830
## Error messages
1931

2032
### Backup type unsupported
@@ -120,18 +132,25 @@ Operation is blocked as you have reached the limit on number of operations permi
120132
|---|---|---|
121133
Operation is blocked as the vault has reached its maximum limit for such operations permitted in a span of 24 hours. | When you have reached the maximum permissible limit for an operation in a span of 24 hours, this error comes. This error usually comes when there are at-scale operations such as modify policy or auto-protection. Unlike in the case of CloudDosAbsoluteLimitReached, there is not much you can do to resolve this state, in fact, Azure Backup service will retry the operations internally for all the items in question.<br> For example: If you have a large number of datasources protected with a policy and you try to modify that policy, it will trigger configure protection jobs for each of the protected items and sometimes may hit the maximum limit permissible for such operations per day.| Azure Backup service will automatically retry this operation after 24 hours.
122134

135+
### UserErrorVMInternetConnectivityIssue
136+
137+
| Error message | Possible causes | Recommended action |
138+
|---|---|---|
139+
VM is not able to contact Azure Backup service due to internet connectivity issues. | VM needs outbound connectivity to Azure Backup Service, Azure Storage or Azure Active Directory services.| - If you use NSG to restrict connectivity, then you should use the AzureBackup service tag to allows outbound access to Azure Backup to Azure Backup Service, Azure Storage or Azure Active Directory services. Follow these [steps](https://aka.ms/nsgrulesforsqlbackup) to grant access.<br>- Ensure DNS is resolving Azure endpoints.<br>- Check if VM is behind a Load balancer blocking Internet access. By assigning public IP to the VMs, discovery will work.<br>- Verify there is no firewall/antivirus/proxy that is blocking calls to the above three target services.
140+
141+
123142
## Re-registration failures
124143

125144
Check for one or more of the following symptoms before you trigger the re-register operation:
126145

127146
* All operations (such as backup, restore, and configure backup) are failing on the VM with one of the following error codes: **WorkloadExtensionNotReachable**, **UserErrorWorkloadExtensionNotInstalled**, **WorkloadExtensionNotPresent**, **WorkloadExtensionDidntDequeueMsg**.
128147
* The **Backup Status** area for the backup item is showing **Not reachable**. Rule out all the other causes that might result in the same status:
129148

130-
* Lack of permission to perform backup-related operations on the VM
131-
* Shutdown of the VM, so backups can’t take place
132-
* Network issues
149+
* Lack of permission to perform backup-related operations on the VM.<br>
150+
* Shutdown of the VM, so backups can’t take place.<br>
151+
* Network issues.<br><br>
133152

134-
!["Not reachable" status in re-registering a VM](./media/backup-azure-sql-database/re-register-vm.png)
153+
!["Not reachable" status in re-registering a VM](./media/backup-azure-sql-database/re-register-vm.png)
135154

136155
* In the case of an Always On availability group, the backups started failing after you changed the backup preference or after a failover.
137156

articles/backup/backup-sql-server-database-azure-vms.md

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Back up SQL Server databases in Azure VMs
2+
title: Back up SQL Server databases in Azure VMs
33
description: In this article, learn how to back up SQL Server databases on Azure virtual machines with Azure Backup.
44
ms.reviewer: vijayts
55
ms.topic: conceptual
@@ -37,28 +37,38 @@ For all operations, a SQL Server VM requires connectivity to Azure public IP add
3737

3838
Establish connectivity by using one of the following options:
3939

40-
* **Allow the Azure datacenter IP ranges**. This option allows [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the download. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If you're safe recipients list only region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication.
40+
#### **Allow the Azure datacenter IP ranges**.
41+
This option allows [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the download. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If you're safe recipients list only region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication.
4142

42-
* **Allow access using NSG tags**. If you use NSG to restrict connectivity, then you should use AzureBackup service tag to allows outbound access to Azure Backup. In addition, you should also allow connectivity for authentication and data transfer by using [rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for Azure AD and Azure Storage. This can be done from portal or PowerShell.
43+
#### **Allow access using NSG tags**.
44+
If you use NSG to restrict connectivity, then you should use AzureBackup service tag to allows outbound access to Azure Backup. In addition, you should also allow connectivity for authentication and data transfer by using [rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for Azure AD and Azure Storage. This can be done from portal or PowerShell.
4345

44-
To create a rule using the portal:
46+
To create a rule using the portal:
4547

4648
* In **All Services**, go to **Network security groups** and select the network security group.
4749
* Select **Outbound security rules** under **Settings**.
4850
* Select **Add**. Enter all the required details for creating a new rule as described in [security rule settings](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group#security-rule-settings). Ensure the option **Destination** is set to **Service Tag** and **Destination service tag** is set to **AzureBackup**.
4951
* Click **Add**, to save the newly created outbound security rule.
5052

51-
To create a rule using Powershell:
53+
To create a rule using Powershell:<br>
54+
- Add Azure account credentials and update the national clouds<br/>
55+
``Add-AzureRmAccount``<br/>
56+
- Select the NSG subscription<br/>
57+
```Select-AzureRmSubscription "<Subscription Id>"```
5258

53-
* Add Azure account credentials and update the national clouds<br/>
54-
``Add-AzureRmAccount``
55-
* Select the NSG subscription<br/>
56-
``Select-AzureRmSubscription "<Subscription Id>"``
57-
* Select the NSG<br/>
59+
- Select the NSG<br/>
5860
```$nsg = Get-AzureRmNetworkSecurityGroup -Name "<NSG name>" -ResourceGroupName "<NSG resource group name>"```
59-
* Add allow outbound rule for Azure Backup service tag<br/>
60-
```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureBackupAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureBackup" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"```
61-
* Save the NSG<br/>
61+
62+
- Add allow outbound rule for Azure Backup service tag<br/>
63+
```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureBackupAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureBackup" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"```
64+
65+
- Add allow outbound rule for Storage service tag<br/>
66+
```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "StorageAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "Storage" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"```
67+
68+
- Add allow outbound rule for AzureActiveDirectory service tag<br/>
69+
```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureActiveDirectoryAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureActiveDirectory" -DestinationPortRange 443 -Description "Allow outbound traffic to AzureActiveDirectory service"```
70+
71+
- Save the NSG<br/>
6272
```Set-AzureRmNetworkSecurityGroup -NetworkSecurityGroup $nsg```
6373

6474
* **Allow access by using Azure Firewall tags**. If you're using Azure Firewall, create an application rule by using the AzureBackup [FQDN tag](https://docs.microsoft.com/azure/firewall/fqdn-tags). This allows outbound access to Azure Backup.
28.7 KB
Loading

0 commit comments

Comments
 (0)