You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Description (Json)<br>Description (XML) |`d`| This output is in the [tm] response element of Azure Maps. |
73
-
| End (Json)<br>EndTimeUTC (XML) |`ed`| This output is in the [tm] response element of Azure Maps. The date is described in the ISO8601 format and includes time in UTC. |
74
-
| eventList (Json)<br>EventList (XML) | Not supported ||
75
-
| icon (Json)<br>Icon (XML) |`ic`| This output is in the [tm] response element of Azure Maps. See [IconCategory] (`ic`) for more info. |
76
-
| incidentId (Json)<br>IncidentId (XML) |`id`| This output is in the [tm] response element of Azure Maps. |
77
-
| isEndTimeBackfilled (Json)<br>IsEndTimeBackfilled (XML) | Not supported ||
78
-
| isJamcident (Json)<br>IsJamcident (XML) | Not supported |
79
-
| lastModified (Json)<br>LastModifiedUTC (XML) | Not supported ||
80
-
| point (Json)<br>Point (XML) |`p`| This output is in the [tm] response element of Azure Maps. See [point] (`p`) for more info. |
81
-
| roadClosed (Json)<br>RoadClosed (XML) | See description | The [IconCategory] output of the [tm] response element of Azure Maps can be used to indicate a road closure. |
82
-
| severity (Json)<br>Severity (XML) |`ty`| This output is in the [tm] response element. See [DelayMagnitude]: (`ty`) for more info. |
83
-
| severityScore (Json)<br>SeverityScore (XML) | Not supported ||
84
-
| Start (Json)<br>StartTimeUTC (XML) |`sd`| This output is in the [tm] response element of Azure Maps. The date is described in the ISO8601 format and includes time in UTC. |
85
-
| title (Json)<br>Title (XML) | See description | The `f` output in the [tm] response element of Azure Maps provides the name of the intersection or location where the traffic caused by the the incident starts and can serve as an alternative to the Bing Maps `title` output. |
86
-
| toPoint (Json)<br>ToPoint (XML) | See description | The `t` output in the [tm] response element of Azure Maps provides the name of the intersection or location where the traffic due to the incident ends and can serve as an alternative to the Bing Maps `toPoint` output. |
87
-
| type (Json)<br>Type (XML) |`c`| The `c` output in the [tm] response element of Azure Maps provides the cause of the incident, if available. |
72
+
| Description (JSON)<br>Description (XML) |`d`| This output is in the [tm] response element of Azure Maps. |
73
+
| End (JSON)<br>EndTimeUTC (XML) |`ed`| This output is in the [tm] response element of Azure Maps. The date is described in the ISO8601 format and includes time in UTC. |
74
+
| eventList (JSON)<br>EventList (XML) | Not supported ||
75
+
| icon (JSON)<br>Icon (XML) |`ic`| This output is in the [tm] response element of Azure Maps. See [IconCategory] (`ic`) for more info. |
76
+
| incidentId (JSON)<br>IncidentId (XML) |`id`| This output is in the [tm] response element of Azure Maps. |
77
+
| isEndTimeBackfilled (JSON)<br>IsEndTimeBackfilled (XML) | Not supported ||
78
+
| isJamcident (JSON)<br>IsJamcident (XML) | Not supported |
79
+
| lastModified (JSON)<br>LastModifiedUTC (XML) | Not supported ||
80
+
| point (JSON)<br>Point (XML) |`p`| This output is in the [tm] response element of Azure Maps. See [point] (`p`) for more info. |
81
+
| roadClosed (JSON)<br>RoadClosed (XML) | See description | The [IconCategory] output of the [tm] response element of Azure Maps can be used to indicate a road closure. |
82
+
| severity (JSON)<br>Severity (XML) |`ty`| This output is in the [tm] response element. See [DelayMagnitude]: (`ty`) for more info. |
83
+
| severityScore (JSON)<br>SeverityScore (XML) | Not supported ||
84
+
| Start (JSON)<br>StartTimeUTC (XML) |`sd`| This output is in the [tm] response element of Azure Maps. The date is described in the ISO8601 format and includes time in UTC. |
85
+
| title (JSON)<br>Title (XML) | See description | The `f` output in the [tm] response element of Azure Maps provides the name of the intersection or location where the traffic caused by the the incident starts and can serve as an alternative to the Bing Maps `title` output. |
86
+
| toPoint (JSON)<br>ToPoint (XML) | See description | The `t` output in the [tm] response element of Azure Maps provides the name of the intersection or location where the traffic due to the incident ends and can serve as an alternative to the Bing Maps `toPoint` output. |
87
+
| type (JSON)<br>Type (XML) |`c`| The `c` output in the [tm] response element of Azure Maps provides the cause of the incident, if available. |
88
88
89
89
For more information about the Azure Maps Get Traffic Incident Detail API response fields, see [Responses].
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-backup-server-vmware.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -435,7 +435,7 @@ You can modify the number of jobs by using the registry key as shown below (not
435
435
The value should be the number (decimal) of virtual machines that you select for parallel backup.
436
436
437
437
> [!NOTE]
438
-
> You can modify the number of jobs to a higher value. If you set the jobs number to 1, replication jobs run serially. To increase the number to a higher value, you must consider the VMware performance. Consider the number of resources in use and additional usage required on VMWare vSphere Server, and determine the number of delta replication jobs to run in parallel. Also, this change will affect only the newly created protection groups. For existing protection groups you must temporarily add another VM to the protection group. This should update the protection group configuration accordingly. You can remove this VM from the protection group after the procedure is completed.
438
+
> You can modify the number of jobs to a higher value. If you set the jobs number to 1, replication jobs run serially. To increase the number to a higher value, you must consider the VMware performance. Consider the number of resources in use and additional usage required on VMware vSphere Server, and determine the number of delta replication jobs to run in parallel. Also, this change will affect only the newly created protection groups. For existing protection groups you must temporarily add another VM to the protection group. This should update the protection group configuration accordingly. You can remove this VM from the protection group after the procedure is completed.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-data-protection-use-rest-api-create-update-postgresql-policy.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ The `{policyName}` and `{vaultName}` are provided in the URI. Additional, inform
65
65
66
66
## Create the request body
67
67
68
-
For example, to create a policy for POstgreSQL backup, the request body needs the following components:
68
+
For example, to create a policy for PostgreSQL backup, the request body needs the following components:
69
69
70
70
|Name |Required |Type |Description |
71
71
|---------|---------|---------|---------|
@@ -368,7 +368,7 @@ After including all changes, the policy JSON will appear as follows:
368
368
369
369
```
370
370
371
-
For more details about policy creation, see the [PostGreSQL database Backup policy](backup-azure-database-postgresql.md#create-backup-policy) document.
371
+
For more details about policy creation, see the [PostgreSQL database Backup policy](backup-azure-database-postgresql.md#create-backup-policy) document.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-database-postgresql-flex-use-rest-api-create-update-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -322,7 +322,7 @@ After including all changes, the policy JSON will appear as follows:
322
322
323
323
```
324
324
325
-
For more details about policy creation, see the [PostGreSQL database Backup policy document](backup-azure-database-postgresql.md#create-backup-policy).
325
+
For more details about policy creation, see the [PostgreSQL database Backup policy document](backup-azure-database-postgresql.md#create-backup-policy).
Copy file name to clipboardExpand all lines: articles/backup/backup-postgresql-cli.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ After the vault is created, let's create a Backup policy to protect Azure Postgr
56
56
57
57
## Create a Backup policy
58
58
59
-
### Understanding PostGreSQL backup policy
59
+
### Understanding PostgreSQL backup policy
60
60
61
61
While disk backup offers multiple backups per day and blob backup is a _continuous_ backup with no trigger, PostgreSQL backup offers Archive protection. The backup data that's first sent to the vault can be then moved to the _archive_ tier as per a defined rule or a _lifecycle_. In this context, let's understand the backup policy object for PostgreSQL.
62
62
@@ -268,7 +268,7 @@ Once the vault and policy are created, there are three critical points that you
268
268
269
269
### Key entities involved
270
270
271
-
#### PostGreSQL database to be protected
271
+
#### PostgreSQL database to be protected
272
272
273
273
Fetch the Azure Resource Manager ID (ARM ID) of PostgreSQL to be protected. This serves as the identifier of the database. We'll use an example of a database named **empdb11** under a PostgreSQL server **testposgresql**, which is present in the resource group **ossrg** under a different subscription.
|| Storage account backup contributor | Storage account containing the blob | In addition, the backup vault MSI should be given [these permissions](./blob-backup-configure-manage.md#grant-permissions-to-the-backup-vault-on-storage-accounts)|
136
136
137
-
### Minimum role requirements for Azure database for PostGreSQL server backup
137
+
### Minimum role requirements for Azure database for PostgreSQL server backup
138
138
139
139
| Management Operation | Minimum Azure role required | Scope Required | Alternative |
|| Contributor | Azure PostGreSQL server | Alternatively, instead of a built-in-role, you can consider a custom role which has the following permissions: Microsoft.DBforPostgreSQL/servers/write Microsoft.DBforPostgreSQL/servers/read In addition, the backup vault MSI should be given [these permissions](./backup-azure-database-postgresql-overview.md#set-of-permissions-needed-for-azure-postgresql-database-backup)|
145
-
| On demand backup of PostGreSQL server | Backup Operator | Backup vault ||
144
+
|| Contributor | Azure PostgreSQL server | Alternatively, instead of a built-in-role, you can consider a custom role which has the following permissions: Microsoft.DBforPostgreSQL/servers/write Microsoft.DBforPostgreSQL/servers/read In addition, the backup vault MSI should be given [these permissions](./backup-azure-database-postgresql-overview.md#set-of-permissions-needed-for-azure-postgresql-database-backup)|
145
+
| On demand backup of PostgreSQL server | Backup Operator | Backup vault ||
146
146
| Validate before restoring a server | Backup Operator | Backup vault ||
147
-
| | Contributor | Target Azure PostGreSQL server | Alternatively, instead of a built-in-role, you can consider a custom role which has the following permissions: Microsoft.DBforPostgreSQL/servers/write Microsoft.DBforPostgreSQL/servers/read
147
+
| | Contributor | Target Azure PostgreSQL server | Alternatively, instead of a built-in-role, you can consider a custom role which has the following permissions: Microsoft.DBforPostgreSQL/servers/write Microsoft.DBforPostgreSQL/servers/read
148
148
| Restoring a server | Backup Operator | Backup vault ||
149
-
|| Contributor | Target Azure PostGreSQL server | Alternatively, instead of a built-in-role, you can consider a custom role which has the following permissions: Microsoft.DBforPostgreSQL/servers/write Microsoft.DBforPostgreSQL/servers/read In addition, the backup vault MSI should be given [these permissions](./backup-azure-database-postgresql-overview.md#set-of-permissions-needed-for-azure-postgresql-database-restore)|
149
+
|| Contributor | Target Azure PostgreSQL server | Alternatively, instead of a built-in-role, you can consider a custom role which has the following permissions: Microsoft.DBforPostgreSQL/servers/write Microsoft.DBforPostgreSQL/servers/read In addition, the backup vault MSI should be given [these permissions](./backup-azure-database-postgresql-overview.md#set-of-permissions-needed-for-azure-postgresql-database-restore)|
Copy file name to clipboardExpand all lines: articles/backup/manage-backup-vault.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -154,7 +154,7 @@ The Cross Region Restore option allows you to restore data in a secondary Azur
154
154
:::image type="content" source="./media/backup-vault-overview/monitor-postgresql-restore-to-secondary-region.png" alt-text="Screenshot shows how to monitor the postgresql restore to the secondary region." lightbox="./media/backup-vault-overview/monitor-postgresql-restore-to-secondary-region.png":::
155
155
156
156
> [!NOTE]
157
-
> Cross Region Restore is currently only available for PostGreSQL servers.
157
+
> Cross Region Restore is currently only available for PostgreSQL servers.
Copy file name to clipboardExpand all lines: articles/backup/restore-azure-database-postgresql-flex.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ Before you restore from Azure Database for PostgreSQL Flexible server backups, r
28
28
29
29
Follow these steps:
30
30
31
-
1. Go to **Backup vault** > **Backup Instances**. Select the PostgreSQL-Flex server to be restored and select **Restore**.
31
+
1. Go to **Backup vault** > **Backup Instances**. Select the PostgreSQL - Flexible server to be restored and select **Restore**.
32
32
33
33
:::image type="content" source="./media/restore-azure-database-postgresql-flex/restore.png" alt-text="Screenshot showing how to restore a database.":::
34
34
@@ -43,7 +43,7 @@ Follow these steps:
43
43
1. Once the validation is successful, select **Review + restore**.
44
44
:::image type="content" source="./media/restore-azure-database-postgresql-flex/review-restore.png" alt-text="Screenshot showing the restore parameter process.":::
45
45
46
-
1. After final review of the parameters, select **Restore** to restore the selected PostgreSQL-Flex server backup in target storage account.
46
+
1. After final review of the parameters, select **Restore** to restore the selected PostgreSQL - Flexible server backup in target storage account.
47
47
:::image type="content" source="./media/restore-azure-database-postgresql-flex/review.png" alt-text="Screenshot showing the review process page.":::
48
48
49
49
1. Submit the Restore operation and track the triggered job under **Backup jobs**.
0 commit comments