Skip to content

Commit 84627e8

Browse files
authored
Merge pull request #184978 from v-amallick/Jan-13-2021-Security
VNet setup doc updates
2 parents 5dc80f5 + d054cfa commit 84627e8

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

articles/backup/backup-sql-server-database-azure-vms.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Back up multiple SQL Server VMs from the vault
33
description: In this article, learn how to back up SQL Server databases on Azure virtual machines with Azure Backup from the Recovery Services vault
44
ms.topic: conceptual
5-
ms.date: 11/02/2021
5+
ms.date: 01/14/2022
66
author: v-amallick
77
ms.service: backup
88
ms.author: v-amallick
@@ -89,6 +89,10 @@ You can also use the following FQDNs to allow access to the required services fr
8989
| Azure Storage | `*.blob.core.windows.net` <br><br> `*.queue.core.windows.net` <br><br> `*.blob.storage.azure.net` | 443
9090
| Azure AD | Allow access to FQDNs under sections 56 and 59 according to [this article](/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online) | As applicable
9191

92+
#### Allow connectivity for servers behind internal load balancers
93+
94+
When using an internal load balancer, you need to allow the outbound connectivity from virtual machines behind the internal load balancer to perform backups. To do so, you can use a combination of internal and external standard load balancers to create an outbound connectivity. [Learn more](/azure/load-balancer/egress-only) about the configuration to create an _egress only_ setup for VMs in the backend pool of the internal load balancer.
95+
9296
#### Use an HTTP proxy server to route traffic
9397

9498
When you back up a SQL Server database on an Azure VM, the backup extension on the VM uses the HTTPS APIs to send management commands to Azure Backup and data to Azure Storage. The backup extension also uses Azure AD for authentication. Route the backup extension traffic for these three services through the HTTP proxy. Use the list of IPs and FQDNs mentioned above for allowing access to the required services. Authenticated proxy servers aren't supported.
@@ -110,7 +114,7 @@ When you back up a SQL Server database on an Azure VM, the backup extension on t
110114

111115
- Multiple databases on the same SQL instance with casing difference aren't supported.
112116

113-
- Changing the casing of a SQL database isn't supported after configuring protection.
117+
- Changing the casing of an SQL database isn't supported after configuring protection.
114118

115119
>[!NOTE]
116120
>The **Configure Protection** operation for databases with special characters, such as '+' or '&', in their name isn't supported. You can change the database name or enable **Auto Protection**, which can successfully protect these databases.
@@ -144,7 +148,7 @@ How to discover databases running on a VM:
144148
1. Azure Backup discovers all SQL Server databases on the VM. During discovery, the following elements occur in the background:
145149

146150
* Azure Backup registers the VM with the vault for workload backup. All databases on the registered VM can be backed up to this vault only.
147-
* Azure Backup installs the AzureBackupWindowsWorkload extension on the VM. No agent is installed on a SQL database.
151+
* Azure Backup installs the AzureBackupWindowsWorkload extension on the VM. No agent is installed on an SQL database.
148152
* Azure Backup creates the service account NT Service\AzureWLBackupPluginSvc on the VM.
149153
* All backup and restore operations use the service account.
150154
* NT Service\AzureWLBackupPluginSvc requires SQL sysadmin permissions. All SQL Server VMs created in the Marketplace come with the SqlIaaSExtension installed. The AzureBackupWindowsWorkload extension uses the SQLIaaSExtension to automatically get the required permissions.

0 commit comments

Comments
 (0)