Skip to content

Commit 7270054

Browse files
author
AbhishekMallick01
committed
addressed Acro suggestions
1 parent 08a759c commit 7270054

File tree

2 files changed

+14
-14
lines changed

2 files changed

+14
-14
lines changed

articles/backup/backup-azure-database-postgresql-flex-support-matrix.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Azure Database for PostgreSQL- Flexible server support matrix
33
description: Provides a summary of support settings and limitations of Azure Database for PostgreSQL- Flexible server backup.
44
ms.topic: reference
5-
ms.date: 05/02/2025
5+
ms.date: 04/30/2025
66
ms.custom: references_regions, ignite-2024
77
ms.service: azure-backup
88
author: jyothisuri
@@ -54,7 +54,7 @@ Azure Database for PostgreSQL – Flexible Server backups include the following
5454
- `ERROR: Only roles with the ADMIN option on role "pg_use_reserved_connections" may grant this role. permission denied to grant role "pg_use_reserved_connections"`
5555
- `ERROR: permission denied to grant role "pg_use_reserved_connections" SQL state: 42501 Detail: Only roles with the ADMIN option on role "pg_use_reserved_connections" may grant this role.`
5656

57-
- In PostgreSQL **community version 16**, the requirement for superuser privileges to set the Bypass RLS attribute was removed. So, in versions 16 and higher, you can grant the Bypass RLS to azure_pg_admin allowing others to perform this. For versions lower than 16, the bypassrls attribute is granted only to the server admin and no other non-superuser roles.
57+
- In PostgreSQL **community version 16**, the requirement for superuser privileges to set the Bypass Row -level security (RLS) attribute was removed. So, in versions 16 and higher, you can grant the Bypass RLS to azure_pg_admin allowing others to set the RLS. For versions lower than 16, the bypasses attribute is granted only to the server admin and no other nonsuperuser roles.
5858
- If you're using Entra Admins after restoration, you might encounter the **Owner Change Issue** : As a workaround, use the **grant** option to provide ownership.
5959

6060

articles/backup/restore-azure-database-postgresql-flex.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Restore Azure PostgreSQL-Flexible server as Files using Azure portal
33
description: Learn about how to restore Azure PostgreSQL-Flexible server as Files.
44
ms.topic: how-to
5-
ms.date: 05/02/2025
5+
ms.date: 04/30/2025
66
ms.service: azure-backup
77
ms.custom:
88
- ignite-2024
@@ -56,7 +56,7 @@ To restore Azure PostgreSQL-Flexible database, Follow these steps:
5656
After the restore job is completed successfully, go to the storage account container to view the restored databases as files (`.sql` files) from your PostgreSQL – Flexible server. Azure Backup also generates the following backup files:
5757

5858
- `Database.sql file` per database: Contains data and schema information for a particular database.
59-
- `Roles.sql files` for entire instance: Contains all role information that exists at server level (will include azure_su(superuser) azure_pg_admin, replication, local admin, Entra admins and any other custom roles on the server).
59+
- `Roles.sql files` for entire instance: Contains all role information ((azure_su(superuser) azure_pg_admin, replication, local admin, Microsoft Entra admins and any other custom roles on the server)) that exists at server level.
6060
- `Tablespace.sql file`: Tablespace file.
6161
- `Schema.sql file`: Contains schema information for all the databases on the server.
6262

@@ -71,7 +71,7 @@ To restore the backup files from storage container to a new or existing PostgreS
7171

7272
1. Ensure that all required [extensions are enabled](/azure/postgresql/extensions/how-to-allow-extensions?tabs=allow-extensions-portal) on the new target Flexible server.
7373
1. [Match the server parameter](/azure/postgresql/flexible-server/how-to-server-parameters-list-all?tabs=portal-list) values from the source PostgreSQL database to the Azure Database for PostgreSQL by accessing the **Server parameters** section in the Azure portal and manually updating the values accordingly. Save the parameter changes, and then restart the Azure Database for PostgreSQL - Flexible server to apply the new configuration.
74-
1. If **Microsoft Entra Authentication** is required on the new server, enable it and create the relevant entra admins.
74+
1. If **Microsoft Entra Authentication** is required on the new server, enable it and create the relevant Microsoft Entra admins.
7575
1. Create a new database for restoration.
7676

7777
>[!Note]
@@ -80,7 +80,7 @@ To restore the backup files from storage container to a new or existing PostgreS
8080
>To create the database, use the `CREATE DATABASE Database_name` command.
8181
8282
1. Restore the database using the `database.sql file` as the target admin user.
83-
1.After the target database is created, restore the data in this database from the dump file using the following command from an azure storage account:
83+
1.After the target database is created, restore the data in this database (from the dump file) from an Azure storage account by running the following command:
8484

8585
```azurecli-interactive
8686
az storage blob download --container-name <container-name> --name <blob-name> --account-name <storage-account-name> --account-key <storage-account-key> --file - | pg_restore -h <postgres-server-url> -p <port> -U <username> -d <database-name> --no-owner -v –
@@ -96,31 +96,31 @@ To restore the backup files from storage container to a new or existing PostgreS
9696

9797
Alternatively, you can download the backup file and run the restore directly.
9898

99-
1. Restore only the required roles and privileges, and ignore the [common errors](backup-azure-database-postgresql-flex-support-matrix.md#restore-limitations). Skip this step if you are performing the restoration for compliance requirements and data retrieval, as a local admin.
99+
1. Restore only the required roles and privileges, and ignore the [common errors](backup-azure-database-postgresql-flex-support-matrix.md#restore-limitations). Skip this step if you're performing the restoration for compliance requirements and data retrieval, as a local admin.
100100

101101
## Restore roles and users for the restored databases
102102

103-
Vaulted backups are primarily restored for compliance needs such as, testing and audits. You can sign in as a local admin and restore using the `database.sql` file; no additional roles are needed for data retrieval.
103+
Vaulted backups are primarily restored for compliance needs such as, testing and audits. You can sign in as a local admin and restore using the `database.sql` file; no other roles are needed for data retrieval.
104104

105105
For other uses like accidental deletion protection or disaster recovery, ensure necessary roles are created as per your organization needs. Avoid duplications between `roles.sql` and `database.sql`.
106106

107107
- **Restore the same Flexible server**: Role restoration might not be necessary.
108108
- **Restore to a different Flexible server**: Use the `roles.sql` file to recreate the required roles.
109109

110-
When restoring from `roles.sql`, some roles or attributes might not be valid for the new target server.
110+
When you restore from `roles.sql`, some roles or attributes might not be valid for the new target server.
111111

112-
For environments with superuser access ( on-premises or VMs), you can run all commands seamlessly.
112+
For environments with superuser access (on-premises or VMs), you can run all commands seamlessly.
113113

114114
### Key considerations for the Flexible server scenario
115115

116116
Here are the key considerations:
117117

118-
- **Remove Superuser-Only Attributes**: On Flexible server there's no superuser privileges. So, remove attributes such as, `NOSUPERUSER` and `NOBYPASSRLS` from the roles dump.
119-
- **Exclude Service-Specific Users**: Exclude users specific to Flexible Server services (` azure_su`, `azure_pg_admin`, `replication`, `localadmin`, `Entra Admin`). These are specific service roles, and are automatically recreated when administrators are added to the new Flexible server.
118+
- **Remove Superuser-Only Attributes**: On Flexible server, there's no superuser privileges. So, remove attributes, such as `NOSUPERUSER` and `NOBYPASSRLS` from the roles dump.
119+
- **Exclude Service-Specific Users**: Exclude users specific to Flexible Server services (` azure_su`, `azure_pg_admin`, `replication`, `localadmin`, `Entra Admin`). These specific service roles are automatically recreated when administrators are added to the new Flexible server.
120120

121-
Before you restore the database objects, ensure that you have properly dumped and cleaned up the roles. To do this, download the `roles.sql`script from your storage container and create all required logins.
121+
Before you restore the database objects, ensure that you properly dump and clean up the roles. To perform this action, download the `roles.sql`script from your storage container and create all required logins.
122122
- **Create Non-Entra Roles**: Use a local admin account to run the role creation scripts.
123-
- **Create Microsoft Entra Roles**: If you need to create roles for Entra users, use a Microsoft Entra administrator account to run the necessary scripts.
123+
- **Create Microsoft Entra Roles**: If you need to create roles for Microsoft Entra users, use a Microsoft Entra administrator account to run the necessary scripts.
124124

125125
## Next steps
126126

0 commit comments

Comments
 (0)