Skip to content

Commit b5ee89e

Browse files
committed
edit pass: azure-database-for-postgresql-backup
1 parent 9c9d17f commit b5ee89e

4 files changed

+14
-14
lines changed

articles/backup/backup-azure-data-protection-use-rest-api-backup-postgresql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The following example uses Bash. Note the secret identifier of the relevant key.
4848

4949
A backup vault has to connect to the PostgreSQL server and then access the database via the keys present in the key vault. So, it requires access to the PostgreSQL server and the key vault. Access is granted to the backup vault's managed identity.
5050

51-
You need to grant permissions to the backup vault's managed identity on the PostgreSQL server and the key vault that stores the keys to the database. [Learn more](./backup-azure-database-postgresql-overview.md#set-of-permissions-needed-for-azure-postgresql-database-backup).
51+
You need to grant permissions to the backup vault's managed identity on the PostgreSQL server and the key vault that stores the keys to the database. [Learn more](./backup-azure-database-postgresql-overview.md#permissions-needed-for-postgresql-database-backup).
5252

5353
### Prepare the request
5454

articles/backup/backup-azure-database-postgresql-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ However, your existing PostgreSQL single-server database backups are retained in
3939
As of March 31, 2025, you're no longer charged the Protected Instance (PI) fee for protecting your PostgreSQL single-server databases. But the fee for storing your backups still applies. To avoid the storage fee, delete all restore points from the Azure Business Continuity Center.
4040

4141
> [!NOTE]
42-
> Azure Backup retains the last restore point even after the expiration of its retention period. This feature ensures that you have access to the last restore point for future use. You can only delete the last restore point manually. If you want to delete the last restore point and avoid the storage fee, [stop the database protection](manage-azure-database-postgresql.md#stop-protection).
42+
> Azure Backup retains the last restore point even after the expiration of its retention period. This feature ensures that you have access to the last restore point for future use. You can only delete the last restore point manually. If you want to delete the last restore point and avoid the storage fee, [stop the database protection](manage-azure-database-postgresql.md#stop-backup).
4343
4444
### Changes in restore
4545

@@ -89,11 +89,11 @@ The workload admin is responsible for managing and rotating credentials. Azure B
8989
1. Set the database user's backup privileges on the database.
9090

9191
> [!NOTE]
92-
> You can grant these permissions within the [configure backup](backup-azure-database-postgresql.md##configure-a-backup-on-azure-postgresql-databases) flow with a single click if you, as the backup admin, have write access on the intended resources. If you don't have the required permissions (when multiple personas are involved), use an Azure Resource Manager template.
92+
> You can grant these permissions within the [configure backup](backup-azure-database-postgresql.md#configure-a-backup-on-postgresql-databases) flow with a single click if you, as the backup admin, have write access on the intended resources. If you don't have the required permissions (when multiple personas are involved), use an Azure Resource Manager template.
9393
9494
#### Permissions needed for PostgreSQL database restore
9595

96-
Permissions for restore are similar to the ones that you need for backup. You need to [manually grant the permissions on the target Azure Database for PostgreSQL server and the corresponding key vault](#steps-for-manually-granting-access-on-the-azure-database-for-postgresql-server-and-on-key-vault). Unlike in the [configure backup](backup-azure-database-postgresql.md##configure-a-backup-on-azure-postgresql-databases) flow, the experience to grant these permissions inline is currently not available.
96+
Permissions for restore are similar to the ones that you need for backup. You need to [manually grant the permissions on the target Azure Database for PostgreSQL server and the corresponding key vault](#steps-for-manually-granting-access-on-the-azure-database-for-postgresql-server-and-on-key-vault). Unlike in the [configure backup](backup-azure-database-postgresql.md#configure-a-backup-on-postgresql-databases) flow, the experience to grant these permissions inline is currently not available.
9797

9898
Ensure that the database user (corresponding to the credentials stored in the key vault) has the following restore privileges on the database:
9999

articles/backup/restore-postgresql-database-cli.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ To restore the recovery point as files to a storage account, the [backup vault's
2929

3030
### Fetch the relevant recovery point
3131

32-
To list all backup instances within a vault, use the [az dataprotection backup-instance list](/cli/azure/dataprotection/backup-instance#az-dataprotection-backup-instance-list) command. Then fetch the relevant instance by using the [az dataprotection backup-instance show](/cli/azure/dataprotection/backup-instance#az-dataprotection-backup-instance-show) command.
32+
To list all backup instances within a vault, use the [`az dataprotection backup-instance list`](/cli/azure/dataprotection/backup-instance#az-dataprotection-backup-instance-list) command. Then fetch the relevant instance by using the [`az dataprotection backup-instance show`](/cli/azure/dataprotection/backup-instance#az-dataprotection-backup-instance-show) command.
3333

34-
Alternatively, for *at-scale* scenarios, you can list backup instances across vaults and subscriptions by using the [az dataprotection backup-instance list-from-resourcegraph](/cli/azure/dataprotection/backup-instance#az-dataprotection-backup-instance-list-from-resourcegraph) command:
34+
Alternatively, for *at-scale* scenarios, you can list backup instances across vaults and subscriptions by using the [`az dataprotection backup-instance list-from-resourcegraph`](/cli/azure/dataprotection/backup-instance#az-dataprotection-backup-instance-list-from-resourcegraph) command:
3535

3636
```azurecli
3737
az dataprotection backup-instance list-from-resourcegraph --datasource-type AzureDatabaseForPostgreSQL -subscriptions "xxxxxxxx-xxxx-xxxx-xxxx"
@@ -111,7 +111,7 @@ az dataprotection backup-instance list-from-resourcegraph --datasource-type Azur
111111
.
112112
```
113113

114-
After you identify the instance, fetch the relevant recovery point by using the [az dataprotection recovery-point list](/cli/azure/dataprotection/recovery-point#az-dataprotection-recovery-point-list) command:
114+
After you identify the instance, fetch the relevant recovery point by using the [`az dataprotection recovery-point list`](/cli/azure/dataprotection/recovery-point#az-dataprotection-recovery-point-list) command:
115115

116116
```azurecli
117117
az dataprotection recovery-point list --backup-instance-name testpostgresql-empdb11-aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e -g testBkpVaultRG --vault-name TestBkpVault
@@ -163,7 +163,7 @@ Construct the Azure Resource Manager ID of the new PostgreSQL database by using
163163
$targetOssId = "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx/resourceGroups/targetrg/providers/providers/Microsoft.DBforPostgreSQL/servers/targetossserver/databases/emprestored21"
164164
```
165165

166-
Use the [az dataprotection backup-instance restore initialize-for-data-recovery](/cli/azure/dataprotection/backup-instance/restore#az-dataprotection-backup-instance-restore-initialize-for-data-recovery) command to prepare the restore request with all relevant details:
166+
Use the [`az dataprotection backup-instance restore initialize-for-data-recovery`](/cli/azure/dataprotection/backup-instance/restore#az-dataprotection-backup-instance-restore-initialize-for-data-recovery) command to prepare the restore request with all relevant details:
167167

168168
```azurecli
169169
az dataprotection backup-instance restore initialize-for-data-recovery --datasource-type AzureDatabaseForPostgreSQL --restore-location {location} --source-datastore VaultStore --target-resource-id $targetOssId --recovery-point-id 9da55e757af94261afa009b43cd3222a --secret-store-type AzureKeyVault --secret-store-uri "https://restoreoss-test.vault.azure.net/secrets/dbauth3" > OssRestoreReq.JSON
@@ -191,7 +191,7 @@ Fetch the URI of the container within the storage account [to which you assigned
191191
$contURI = "https://testossstorageaccount.blob.core.windows.net/testcontainerrestore"
192192
```
193193

194-
Use the [az dataprotection backup-instance restore initialize-for-data-recovery-as-files](/cli/azure/dataprotection/backup-instance/restore#az-dataprotection-backup-instance-restore-initialize-for-data-recovery-as-files) command to prepare the restore request with all relevant details:
194+
Use the [`az dataprotection backup-instance restore initialize-for-data-recovery-as-files`](/cli/azure/dataprotection/backup-instance/restore#az-dataprotection-backup-instance-restore-initialize-for-data-recovery-as-files) command to prepare the restore request with all relevant details:
195195

196196
```azurecli
197197
az dataprotection backup-instance restore initialize-for-data-recovery-as-files --datasource-type AzureDatabaseForPostgreSQL --restore-location {location} --source-datastore VaultStore -target-blob-container-url $contURI --target-file-name "empdb11_postgresql-westus_1628853549768" --recovery-point-id 9da55e757af94261afa009b43cd3222a > OssRestoreAsFilesReq.JSON
@@ -206,21 +206,21 @@ For the archive-based recovery point, in the following script:
206206
az dataprotection backup-instance restore initialize-for-data-recovery-as-files --datasource-type AzureDatabaseForPostgreSQL --restore-location {location} --source-datastore ArchiveStore -target-blob-container-url $contURI --target-file-name "empdb11_postgresql-westus_1628853549768" --recovery-point-id 9da55e757af94261afa009b43cd3222a --rehydration-priority Standard --rehydration-duration 12 > OssRestoreAsFilesReq.JSON
207207
```
208208

209-
To validate if the JSON file will succeed in creating new resources, use the [az dataprotection backup-instance validate-for-restore](/cli/azure/dataprotection/backup-instance#az-dataprotection-backup-instance-validate-for-restore) command.
209+
To validate if the JSON file will succeed in creating new resources, use the [`az dataprotection backup-instance validate-for-restore`](/cli/azure/dataprotection/backup-instance#az-dataprotection-backup-instance-validate-for-restore) command.
210210

211211
### Trigger the restore
212212

213-
Use the [az dataprotection backup-instance restore trigger](/cli/azure/dataprotection/backup-instance/restore#az-dataprotection-backup-instance-restore-trigger) command to trigger the restore operation with the previously prepared request:
213+
Use the [`az dataprotection backup-instance restore trigger`](/cli/azure/dataprotection/backup-instance/restore#az-dataprotection-backup-instance-restore-trigger) command to trigger the restore operation with the previously prepared request:
214214

215215
```azurecli-interactive
216216
az dataprotection backup-instance restore trigger -g testBkpVaultRG --vault-name TestBkpVault --backup-instance-name testpostgresql-empdb11-aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e --restore-request-object OssRestoreReq.JSON
217217
```
218218

219219
## Track jobs
220220

221-
Track jobs by using the [az dataprotection job list](/cli/azure/dataprotection/job#az-dataprotection-job-list) command. You can list all jobs and fetch a particular job detail.
221+
Track jobs by using the [`az dataprotection job list`](/cli/azure/dataprotection/job#az-dataprotection-job-list) command. You can list all jobs and fetch a particular job detail.
222222

223-
You can also use `Az.ResourceGraph` to track jobs across all backup vaults. Use the [az dataprotection job list-from-resourcegraph](/cli/azure/dataprotection/job#az-dataprotection-job-list-from-resourcegraph) command to get the relevant job that's across all backup vaults:
223+
You can also use `Az.ResourceGraph` to track jobs across all backup vaults. Use the [`az dataprotection job list-from-resourcegraph`](/cli/azure/dataprotection/job#az-dataprotection-job-list-from-resourcegraph) command to get the relevant job that's across all backup vaults:
224224

225225
```azurecli
226226
az dataprotection job list-from-resourcegraph --datasource-type AzureDatabaseForPostgreSQL --operation Restore

articles/backup/restore-postgresql-database-use-rest-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ For an archive-based recovery point, modify the source datastore. Add the rehydr
272272

273273
#### Validate the restore request
274274

275-
After you prepare the request body, validate it by using the [Validate For Restore API](/rest/api/dataprotection/backup-instances/validate-for-restore). Like the Validate For Backup API, this is a `POST` operation.
275+
After you prepare the request body, validate it by using the [Validate For Restore API](/rest/api/dataprotection/backup-instances/validate-for-restore). Like the Validate For Backup API, this API is a `POST` operation.
276276

277277
```http
278278
POST https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DataProtection/backupVaults/{vaultName}/backupInstances/{backupInstanceName}/validateRestore?api-version=2021-07-01

0 commit comments

Comments
 (0)