Skip to content

Commit 79eee0c

Browse files
authored
Merge pull request #80632 from ThalathBhagya/master
updated SQL Server 2008 and SQL Server 2008 R2 section
2 parents 1d30ea8 + 026c37f commit 79eee0c

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/backup/backup-azure-sql-database.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Azure Backup has recently announced support for [EOS SQL Severs](https://docs.mi
5555
2. .NET Framework 4.5.2 and above needs to be installed on the VM
5656
3. Backup for FCI and mirrored databases isn’t supported
5757

58-
All of the other [feature considerations and limitations](#feature-consideration-and-limitations) apply to these versions as well. The customer won’t be charged for this feature till the time it is generally available.
58+
Users will not be charged for this feature till the time it is generally available. All of the other [feature considerations and limitations](#feature-consideration-and-limitations) apply to these versions as well. Kindly refer to the [prerequisites](backup-sql-server-database-azure-vms.md#prerequisites) before you configure protection on SQL Servers 2008 and 2008 R2 which include setting the [registry key](backup-sql-server-database-azure-vms.md#add-registry-key-to-enable-registration) (this step would not be required when the feature is generally available).
5959

6060

6161
## Feature consideration and limitations
@@ -189,13 +189,13 @@ Add **NT AUTHORITY\SYSTEM** and **NT Service\AzureWLBackupPluginSvc** logins to
189189
8. Repeat the same sequence of steps (1-7 above) to add NT Service\AzureWLBackupPluginSvc login to the SQL Server instance. If the login already exists, make sure it has the sysadmin server role and under Status it has Grant the Permission to connect to database engine and Login as Enabled.
190190
9. After granting permission, **Re-discover DBs** in the portal: Vault **->** Backup Infrastructure **->** Workload in Azure VM:
191191

192-
![Rediscover DBs in Azure Portal](media/backup-azure-sql-database/sql-rediscover-dbs.png)
192+
![Rediscover DBs in Azure portal](media/backup-azure-sql-database/sql-rediscover-dbs.png)
193193

194194
Alternatively, you can automate giving the permissions by running the following PowerShell commands in admin mode. The instance name is set to MSSQLSERVER by default. Change the instance name argument in script if need be:
195195

196196
```powershell
197197
param(
198-
[Parameter(Mandatory=$false)]
198+
[Parameter(Mandatory=$false)]
199199
[string] $InstanceName = "MSSQLSERVER"
200200
)
201201
if ($InstanceName -eq "MSSQLSERVER")
@@ -207,7 +207,7 @@ else
207207
$fullInstance = $env:COMPUTERNAME + "\" + $InstanceName # In case of named instance
208208
}
209209
try
210-
{
210+
{
211211
sqlcmd.exe -S $fullInstance -Q "sp_addsrvrolemember 'NT Service\AzureWLBackupPluginSvc', 'sysadmin'" # Adds login with sysadmin permission if already not available
212212
}
213213
catch
@@ -216,7 +216,7 @@ catch
216216
Write-Host $_.Exception|format-list -force
217217
}
218218
try
219-
{
219+
{
220220
sqlcmd.exe -S $fullInstance -Q "sp_addsrvrolemember 'NT AUTHORITY\SYSTEM', 'sysadmin'" # Adds login with sysadmin permission if already not available
221221
}
222222
catch

0 commit comments

Comments
 (0)