Skip to content

Commit abbcbf9

Browse files
author
vrvkrajesh
committed
updated as per PR comments
1 parent b217212 commit abbcbf9

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

articles/backup/backup-azure-file-folder-backup-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ Consider the following conditions:
161161
- If you uninstall & re-register the agent on the same original machine with
162162
- *Same passphrase*, then you will be able to restore your backed up data.<br>
163163
- *Different passphrase*, then you will not be able to restore your backed up data.
164-
- If you install the agent on a *different machine* with,<br>
164+
- If you install the agent on a *different machine* with<br>
165165
- the same passphrase (used in the original machine), then you will be able to restore your backed up data.<br>
166166
- a different passphrase, you will not be able to restore your backed up data.<br>
167167
- Additionally, if your original machine is corrupted (preventing you from regenerating the passphrase through the MARS console); but you are able to restore/access the original scratch folder used by the MARS agent, then you might be able to restore (if you forgot the password). For more assistance, contact Customer Support.
@@ -172,7 +172,7 @@ If you have the same passphrase (that you provided during registration) of the o
172172

173173
| Original Machine | Passphrase | Available Options |
174174
| --- | --- | --- |
175-
| Lost |Available |You can install and register the MARS agent on another machine with the same passphrase that you provided during registration of the original machine. Choose **Recovery Option** > **Another location** to perform your restore. For more information, refer this [article](https://docs.microsoft.com/azure/backup/backup-azure-restore-windows-server#use-instant-restore-to-restore-data-to-an-alternate-machine).
175+
| Lost |Available |You can install and register the MARS agent on another machine with the same passphrase that you provided during registration of the original machine. Choose **Recovery Option** > **Another location** to perform your restore. For more information, refer to this [article](https://docs.microsoft.com/azure/backup/backup-azure-restore-windows-server#use-instant-restore-to-restore-data-to-an-alternate-machine).
176176
| Lost |Lost |Not possible to recover the data or data is not available |
177177

178178

articles/backup/backup-sql-server-azure-troubleshoot.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ After creating and configuring a Recovery Services vault, discovering databases
2020

2121
![sql](./media/backup-azure-sql-database/sql.png)
2222

23-
During the backup configuration, if the SQL VM and its instances are not visible in the **Discovery DBs in VMs** and **Configure Backup** (refer to above image) because of the following steps.
23+
During the backup configuration, if the SQL VM and its instances are not visible in the **Discovery DBs in VMs** and **Configure Backup** (refer to above image) ensure that:
2424

2525
**Step 1: Discovery DBs in VMs**
2626
<br>
@@ -30,7 +30,7 @@ During the backup configuration, if the SQL VM and its instances are not visible
3030
<br>
3131
- If the vault in which the SQL VM is registered in the same vault used to protect the databases, then follow the [Configure Backup](https://docs.microsoft.com/azure/backup/backup-sql-server-database-azure-vms#configure-backup) steps.<br>
3232

33-
If the SQL VM needs to be registered in the new vault, then it must be unregistered from the old vault. Unregistration of a SQL VM from a vault requires all the protected data sources to be stop protected and then delete backed up data. Deleting backed up data is a destructive operation. After you have reviewed and taken all the precautions to proceed further to unregister the SQL VM, then register this same VM with a new vault and retry the backup operation.
33+
If the SQL VM needs to be registered in the new vault, then it must be unregistered from the old vault. Unregistration of a SQL VM from the vault requires all the protected data sources to be stop protected and then you can delete the backed up data. Deleting backed up data is a destructive operation. After you have reviewed and taken all the precautions to unregister the SQL VM, then register this same VM with a new vault and retry the backup operation.
3434

3535

3636

@@ -143,7 +143,7 @@ Operation is blocked as the vault has reached its maximum limit for such operati
143143

144144
| Error message | Possible causes | Recommended action |
145145
|---|---|---|
146-
The VM is not able to contact Azure Backup service due to internet connectivity issues. | The VM needs outbound connectivity to Azure Backup Service, Azure Storage or Azure Active Directory services.| - If you use NSG to restrict connectivity, then you should use the AzureBackup service tag to allows outbound access to Azure Backup to Azure Backup Service, Azure Storage or Azure Active Directory services. Follow these [steps](https://aka.ms/nsgrulesforsqlbackup) to grant access.<br>- Ensure DNS is resolving Azure endpoints.<br>- Check if the VM is behind a Load balancer blocking Internet access. By assigning public IP to the VMs, discovery will work.<br>- Verify there is no firewall/antivirus/proxy that is blocking calls to the above three target services.
146+
The VM is not able to contact Azure Backup service due to internet connectivity issues. | The VM needs outbound connectivity to Azure Backup Service, Azure Storage or Azure Active Directory services.| - If you use NSG to restrict connectivity, then you should use the AzureBackup service tag to allows outbound access to Azure Backup to Azure Backup Service, Azure Storage or Azure Active Directory services. Follow these [steps](https://aka.ms/nsgrulesforsqlbackup) to grant access.<br>- Ensure DNS is resolving Azure endpoints.<br>- Check if the VM is behind a load balancer blocking internet access. By assigning public IP to the VMs, discovery will work.<br>- Verify there is no firewall/antivirus/proxy that is blocking calls to the above three target services.
147147

148148

149149
## Re-registration failures

articles/backup/backup-sql-server-database-azure-vms.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ For all operations, a SQL Server VM requires connectivity to Azure public IP add
3838
Establish connectivity by using one of the following options:
3939

4040
#### **Allow the Azure datacenter IP ranges**.
41-
This option allows the [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the downloaded file. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If your safe recipient's list only includes region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication.
41+
This option allows the [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the downloaded file. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If your safe recipients list only includes region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication.
4242

4343
#### **Allow access using NSG tags**.
4444
If you use NSG to restrict connectivity, then you should use AzureBackup service tag to allows outbound access to Azure Backup. In addition, you should also allow connectivity for authentication and data transfer by using [rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for Azure AD and Azure Storage. This can be done from the Azure portal or via PowerShell.

0 commit comments

Comments
 (0)