You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-database-postgresql-flex-support-matrix.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Azure Database for PostgreSQL- Flexible server support matrix
3
3
description: Provides a summary of support settings and limitations of Azure Database for PostgreSQL- Flexible server backup.
4
4
ms.topic: reference
5
-
ms.date: 05/02/2025
5
+
ms.date: 04/30/2025
6
6
ms.custom: references_regions, ignite-2024
7
7
ms.service: azure-backup
8
8
author: jyothisuri
@@ -54,7 +54,7 @@ Azure Database for PostgreSQL – Flexible Server backups include the following
54
54
-`ERROR: Only roles with the ADMIN option on role "pg_use_reserved_connections" may grant this role. permission denied to grant role "pg_use_reserved_connections"`
55
55
-`ERROR: permission denied to grant role "pg_use_reserved_connections" SQL state: 42501 Detail: Only roles with the ADMIN option on role "pg_use_reserved_connections" may grant this role.`
56
56
57
-
- In PostgreSQL **community version 16**, the requirement for superuser privileges to set the Bypass RLS attribute was removed. So, in versions 16 and higher, you can grant the Bypass RLS to azure_pg_admin allowing others to perform this. For versions lower than 16, the bypassrls attribute is granted only to the server admin and no other non-superuser roles.
57
+
- In PostgreSQL **community version 16**, the requirement for superuser privileges to set the Bypass Row -level security (RLS) attribute was removed. So, in versions 16 and higher, you can grant the Bypass RLS to azure_pg_admin allowing others to set the RLS. For versions lower than 16, the bypasses attribute is granted only to the server admin and no other nonsuperuser roles.
58
58
- If you're using Entra Admins after restoration, you might encounter the **Owner Change Issue** : As a workaround, use the **grant** option to provide ownership.
Copy file name to clipboardExpand all lines: articles/backup/restore-azure-database-postgresql-flex.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Restore Azure PostgreSQL-Flexible server as Files using Azure portal
3
3
description: Learn about how to restore Azure PostgreSQL-Flexible server as Files.
4
4
ms.topic: how-to
5
-
ms.date: 05/02/2025
5
+
ms.date: 04/30/2025
6
6
ms.service: azure-backup
7
7
ms.custom:
8
8
- ignite-2024
@@ -56,7 +56,7 @@ To restore Azure PostgreSQL-Flexible database, Follow these steps:
56
56
After the restore job is completed successfully, go to the storage account container to view the restored databases as files (`.sql` files) from your PostgreSQL – Flexible server. Azure Backup also generates the following backup files:
57
57
58
58
-`Database.sql file` per database: Contains data and schema information for a particular database.
59
-
-`Roles.sql files` for entire instance: Contains all role information that exists at server level (will include azure_su(superuser) azure_pg_admin, replication, local admin, Entra admins and any other custom roles on the server).
59
+
-`Roles.sql files` for entire instance: Contains all role information ((azure_su(superuser) azure_pg_admin, replication, local admin, Microsoft Entra admins and any other custom roles on the server)) that exists at server level.
60
60
-`Tablespace.sql file`: Tablespace file.
61
61
-`Schema.sql file`: Contains schema information for all the databases on the server.
62
62
@@ -71,7 +71,7 @@ To restore the backup files from storage container to a new or existing PostgreS
71
71
72
72
1. Ensure that all required [extensions are enabled](/azure/postgresql/extensions/how-to-allow-extensions?tabs=allow-extensions-portal) on the new target Flexible server.
73
73
1.[Match the server parameter](/azure/postgresql/flexible-server/how-to-server-parameters-list-all?tabs=portal-list) values from the source PostgreSQL database to the Azure Database for PostgreSQL by accessing the **Server parameters** section in the Azure portal and manually updating the values accordingly. Save the parameter changes, and then restart the Azure Database for PostgreSQL - Flexible server to apply the new configuration.
74
-
1. If **Microsoft Entra Authentication** is required on the new server, enable it and create the relevant entra admins.
74
+
1. If **Microsoft Entra Authentication** is required on the new server, enable it and create the relevant Microsoft Entra admins.
75
75
1. Create a new database for restoration.
76
76
77
77
>[!Note]
@@ -80,7 +80,7 @@ To restore the backup files from storage container to a new or existing PostgreS
80
80
>To create the database, use the `CREATE DATABASE Database_name` command.
81
81
82
82
1. Restore the database using the `database.sql file` as the target admin user.
83
-
1.After the target database is created, restore the data in this database from the dump file using the following command from an azure storage account:
83
+
1.After the target database is created, restore the data in this database (from the dump file) from an Azure storage account by running the following command:
@@ -96,31 +96,31 @@ To restore the backup files from storage container to a new or existing PostgreS
96
96
97
97
Alternatively, you can download the backup file and run the restore directly.
98
98
99
-
1. Restore only the required roles and privileges, and ignore the [common errors](backup-azure-database-postgresql-flex-support-matrix.md#restore-limitations). Skip this step if you are performing the restoration for compliance requirements and data retrieval, as a local admin.
99
+
1. Restore only the required roles and privileges, and ignore the [common errors](backup-azure-database-postgresql-flex-support-matrix.md#restore-limitations). Skip this step if you're performing the restoration for compliance requirements and data retrieval, as a local admin.
100
100
101
101
## Restore roles and users for the restored databases
102
102
103
-
Vaulted backups are primarily restored for compliance needs such as, testing and audits. You can sign in as a local admin and restore using the `database.sql` file; no additional roles are needed for data retrieval.
103
+
Vaulted backups are primarily restored for compliance needs such as, testing and audits. You can sign in as a local admin and restore using the `database.sql` file; no other roles are needed for data retrieval.
104
104
105
105
For other uses like accidental deletion protection or disaster recovery, ensure necessary roles are created as per your organization needs. Avoid duplications between `roles.sql` and `database.sql`.
106
106
107
107
-**Restore the same Flexible server**: Role restoration might not be necessary.
108
108
-**Restore to a different Flexible server**: Use the `roles.sql` file to recreate the required roles.
109
109
110
-
When restoring from `roles.sql`, some roles or attributes might not be valid for the new target server.
110
+
When you restore from `roles.sql`, some roles or attributes might not be valid for the new target server.
111
111
112
-
For environments with superuser access (on-premises or VMs), you can run all commands seamlessly.
112
+
For environments with superuser access (on-premises or VMs), you can run all commands seamlessly.
113
113
114
114
### Key considerations for the Flexible server scenario
115
115
116
116
Here are the key considerations:
117
117
118
-
-**Remove Superuser-Only Attributes**: On Flexible server there's no superuser privileges. So, remove attributes such as,`NOSUPERUSER` and `NOBYPASSRLS` from the roles dump.
119
-
-**Exclude Service-Specific Users**: Exclude users specific to Flexible Server services (` azure_su`, `azure_pg_admin`, `replication`, `localadmin`, `Entra Admin`). These are specific service roles, and are automatically recreated when administrators are added to the new Flexible server.
118
+
-**Remove Superuser-Only Attributes**: On Flexible server, there's no superuser privileges. So, remove attributes, such as `NOSUPERUSER` and `NOBYPASSRLS` from the roles dump.
119
+
-**Exclude Service-Specific Users**: Exclude users specific to Flexible Server services (` azure_su`, `azure_pg_admin`, `replication`, `localadmin`, `Entra Admin`). These specific service roles are automatically recreated when administrators are added to the new Flexible server.
120
120
121
-
Before you restore the database objects, ensure that you have properly dumped and cleaned up the roles. To do this, download the `roles.sql`script from your storage container and create all required logins.
121
+
Before you restore the database objects, ensure that you properly dump and clean up the roles. To perform this action, download the `roles.sql`script from your storage container and create all required logins.
122
122
-**Create Non-Entra Roles**: Use a local admin account to run the role creation scripts.
123
-
-**Create Microsoft Entra Roles**: If you need to create roles for Entra users, use a Microsoft Entra administrator account to run the necessary scripts.
123
+
-**Create Microsoft Entra Roles**: If you need to create roles for Microsoft Entra users, use a Microsoft Entra administrator account to run the necessary scripts.
0 commit comments