Skip to content

Commit b4b6bdc

Browse files
Merge pull request #304104 from AbhishekMallick-MS/Aug-12-2025-PrivatePR
Addressed fixes needed in PR #303223
2 parents a636b93 + 9cf56d3 commit b4b6bdc

File tree

1 file changed

+12
-3
lines changed

1 file changed

+12
-3
lines changed

articles/backup/azure-kubernetes-service-cluster-backup-concept.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: overview
55
ms.service: azure-backup
66
ms.custom:
77
- ignite-2023
8-
ms.date: 01/30/2025
8+
ms.date: 08/12/2025
99
author: AbhishekMallick-MS
1010
ms.author: v-mallicka
1111
# Customer intent: As a cloud administrator, I want to understand the prerequisites for backing up Azure Kubernetes Service clusters, so that I can successfully implement backup and restore operations using Azure Backup and ensure data protection for my containerized workloads.
@@ -36,7 +36,16 @@ Azure Backup now allows you to back up AKS clusters (cluster resources and persi
3636
>[!Note]
3737
>Both of these core components are deployed with aggressive hard limits on CPU and memory, with CPU *less than 0.5% of a core* and memory limit ranging from *50-200 MB*. So, the *COGS impact* of these components is very low. Because they are core platform components, there is no workaround available to remove them once installed in the cluster.
3838
39-
- If Storage Account, to be provided as input for Extension installation, is under Virtual Network/Firewall, then BackupVault needs to be added as trusted access in Storage Account Network Settings. [Learn how to grant access to trusted Azure service](../storage/common/storage-network-security.md?tabs=azure-portal#grant-access-to-trusted-azure-services), which helps to store backups in the Vault datastore
39+
- If the storage account you provide as an input for the extension installation uses any network restrictions (private endpoints or the Azure Storage firewall), then grant the backup vault specific access to the storage account by following these steps:
40+
41+
1. [Grant access to a resource instance](../storage/common/storage-network-security-resource-instances.md). Use these settings:
42+
43+
- **Resource type**: `Microsoft.DataProtection/BackupVaults`
44+
- **Instance name**: Instance name of managed identity.
45+
46+
1. Enable *Allow Azure services on the trusted service list to access this storage account.*
47+
48+
For more information about Azure Storage network security, see [Azure Storage firewall rules](../storage/common/storage-network-security.md).
4049

4150
- The blob container provided in input during extension installation should not contain any files unrelated to backup.
4251

@@ -77,7 +86,7 @@ To enable backup for an AKS cluster, see the following prerequisites: .
7786

7887
- If you have any previous installation of *Velero* in the AKS cluster, you need to delete it before installing Backup Extension.
7988

80-
[!NOTE]
89+
>[!NOTE]
8190
>
8291
>The Velero CRDs installed in the cluster are shared between AKS Backup and the customer’s own Velero installation. However, the versions used by each installation may differ, potentially leading to failures due to contractmismatches.
8392
>

0 commit comments

Comments
 (0)