You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Azure AD | Allow access to FQDNs under sections 56 and 59 according to [this article](/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online) | As applicable
91
91
92
+
#### Allow connectivity for servers behind internal load balancers
93
+
94
+
When using an internal load balancer, you need to allow the outbound connectivity from virtual machines behind the internal load balancer to perform backups. To do so, you can use a combination of internal and external standard load balancers to create an outbound connectivity. [Learn more](/azure/load-balancer/egress-only) about the configuration to create an _egress only_ setup for VMs in the backend pool of the internal load balancer.
95
+
92
96
#### Use an HTTP proxy server to route traffic
93
97
94
98
When you back up a SQL Server database on an Azure VM, the backup extension on the VM uses the HTTPS APIs to send management commands to Azure Backup and data to Azure Storage. The backup extension also uses Azure AD for authentication. Route the backup extension traffic for these three services through the HTTP proxy. Use the list of IPs and FQDNs mentioned above for allowing access to the required services. Authenticated proxy servers aren't supported.
@@ -110,7 +114,7 @@ When you back up a SQL Server database on an Azure VM, the backup extension on t
110
114
111
115
- Multiple databases on the same SQL instance with casing difference aren't supported.
112
116
113
-
- Changing the casing of a SQL database isn't supported after configuring protection.
117
+
- Changing the casing of an SQL database isn't supported after configuring protection.
114
118
115
119
>[!NOTE]
116
120
>The **Configure Protection** operation for databases with special characters, such as '+' or '&', in their name isn't supported. You can change the database name or enable **Auto Protection**, which can successfully protect these databases.
@@ -144,7 +148,7 @@ How to discover databases running on a VM:
144
148
1. Azure Backup discovers all SQL Server databases on the VM. During discovery, the following elements occur in the background:
145
149
146
150
* Azure Backup registers the VM with the vault for workload backup. All databases on the registered VM can be backed up to this vault only.
147
-
* Azure Backup installs the AzureBackupWindowsWorkload extension on the VM. No agent is installed on a SQL database.
151
+
* Azure Backup installs the AzureBackupWindowsWorkload extension on the VM. No agent is installed on an SQL database.
148
152
* Azure Backup creates the service account NT Service\AzureWLBackupPluginSvc on the VM.
149
153
* All backup and restore operations use the service account.
150
154
* NT Service\AzureWLBackupPluginSvc requires SQL sysadmin permissions. All SQL Server VMs created in the Marketplace come with the SqlIaaSExtension installed. The AzureBackupWindowsWorkload extension uses the SQLIaaSExtension to automatically get the required permissions.
0 commit comments