You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-arm-restore-vms.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Restore VMs by using the Azure portal using Azure Backup
3
3
description: Restore an Azure virtual machine from a recovery point by using the Azure portal, including the Cross Region Restore feature.
4
4
ms.reviewer: nikhilsarode
5
5
ms.topic: how-to
6
-
ms.date: 04/14/2025
6
+
ms.date: 05/26/2025
7
7
ms.service: azure-backup
8
8
author: jyothisuri
9
9
ms.author: jsuri
@@ -20,7 +20,7 @@ Azure Backup provides several ways to restore a VM.
20
20
--- | ---
21
21
**Create a new VM** | Quickly creates and gets a basic VM up and running from a restore point.<br/><br/> You can specify a name for the VM and select the resource group and virtual network (VNet) in which it will be placed. The new VM must be created in the same region as the source VM.<br><br>If a VM restore fails because an Azure VM SKU wasn't available in the specified region of Azure, or because of any other issues, Azure Backup still restores the disks in the specified resource group.
22
22
**Restore disk** | Restores a VM disk, which can then be used to create a new VM.<br/><br/> Azure Backup provides a template to help you customize and create a VM. <br/><br> The restore job generates a template that you can download and use to specify custom VM settings, and create a VM.<br/><br/> The disks are copied to the Resource Group you specify.<br/><br/> Alternatively, you can attach the disk to an existing VM, or create a new VM using PowerShell.<br/><br/> This option is useful if you want to customize the VM, add configuration settings that weren't there at the time of backup, or add settings that must be configured using the template or PowerShell.
23
-
**Replace existing** | You can restore a disk, and use it to replace a disk on the existing VM.<br/><br/> The current VM must exist. If it's been deleted, this option can't be used.<br/><br/> Azure Backup takes a snapshot of the existing VM before replacing the disk. The snapshot is copied to the vault and retained in accordance with the retention policy. <br/><br/> When you choose a Vault-Standard recovery point, a VHD file with the content of the chosen recovery point is also created in the staging location you specify. Existing disks connected to the VM are replaced with the selected restore point. <br/><br/> After the disk replacement operation is complete, the original disk is retained in the resource group. You can choose to manually delete the original disks if they aren't needed. <br/><br/>Replace existing is supported for unencrypted managed VMs, including VMs [created using custom images](https://azure.microsoft.com/resources/videos/create-a-custom-virtual-machine-image-in-azure-resource-manager-with-powershell/). It's unsupported for classic VMs, unmanaged VMs, and [generalized VMs](/azure/virtual-machines/windows/upload-generalized-managed).<br/><br/> If the restore point has more or less disks than the current VM, then the number of disks in the restore point will only reflect the VM configuration.<br><br> Replace existing is also supported for VMs with linked resources, like [user-assigned managed-identity](../active-directory/managed-identities-azure-resources/overview.md) or [Key Vault](/azure/key-vault/general/overview).
23
+
**Replace existing** | You can restore a disk, and use it to replace a disk on the existing VM.<br/><br/> The current VM must exist. If it's been deleted, this option can't be used.<br/><br/> Azure Backup takes a snapshot of the existing VM before replacing the disk. The snapshot is copied to the vault and retained in accordance with the retention policy. <br/><br/> When you choose a Vault-Standard recovery point, a VHD file with the content of the chosen recovery point is also created in the staging location you specify. Existing disks connected to the VM are replaced with the selected restore point. <br/><br/> After the disk replacement operation is complete, the original disk is retained in the resource group. You can choose to manually delete the original disks if they aren't needed. <br/><br/>Replace existing is supported for unencrypted managed VMs, including VMs [created using custom images](/azure/virtual-machines/windows/tutorial-custom-images). It's unsupported for classic VMs, unmanaged VMs, and [generalized VMs](/azure/virtual-machines/windows/upload-generalized-managed).<br/><br/> If the restore point has more or less disks than the current VM, then the number of disks in the restore point will only reflect the VM configuration.<br><br> Replace existing is also supported for VMs with linked resources, like [user-assigned managed-identity](../active-directory/managed-identities-azure-resources/overview.md) or [Key Vault](/azure/key-vault/general/overview).
24
24
**Cross Region (secondary region)** | Cross Region restore can be used to restore Azure VMs in the secondary region, which is an [Azure paired region](../availability-zones/cross-region-replication-azure.md).<br><br> You can restore all the Azure VMs for the selected recovery point if the backup is done in the secondary region.<br><br> During the backup, snapshots aren't replicated to the secondary region. Only the data stored in the vault is replicated. So secondary region restores are only [vault tier](about-azure-vm-restore.md#concepts) restores. The restore time for the secondary region will be almost the same as the vault tier restore time for the primary region. <br><br> This feature is available for the options below:<br><br> - [Create a VM](#create-a-vm) <br> - [Restore Disks](#restore-disks) <br><br> If the source machine has more than 16 disks, VHD's won't be created in Cross Region Restore. <br><br> We don't currently support the [Replace existing disks](#replace-existing-disks) option.<br><br> Permissions<br> The restore operation on secondary region can be performed by Backup Admins and App admins.
25
25
**Cross Subscription Restore** | Allows you to restore Azure Virtual Machines or disks to a different subscription within the same tenant as the source subscription (as per the Azure RBAC capabilities) from restore points. <br><br> Allowed only if the [Cross Subscription Restore property](backup-azure-arm-restore-vms.md#cross-subscription-restore-for-azure-vm) is enabled for your Recovery Services vault. <br><br> Works with [Cross Region Restore](backup-azure-arm-restore-vms.md#cross-region-restore) and [Cross Zonal Restore](backup-azure-arm-restore-vms.md#create-a-vm). <br><br> You can trigger Cross Subscription Restore for managed virtual machines only. <br><br> Cross Subscription Restore is supported for [Restore with Managed System Identities (MSI)](backup-azure-arm-restore-vms.md#restore-vms-with-managed-identities). <br><br> It's unsupported for [snapshots tier](backup-azure-vms-introduction.md#snapshot-creation) recovery points. <br><br> It's unsupported for [unmanaged VMs](#restoring-unmanaged-vms-and-disks-as-managed) and [ADE encrypted VMs](backup-azure-vms-encryption.md#encryption-support-using-ade).
26
26
**Cross Zonal Restore** | Allows you to restore Azure Virtual Machines or disks pinned to any zone to different available zones (as per the Azure RBAC capabilities) from restore points. Note that when you select a zone to restore, it selects the [logical zone](../reliability/availability-zones-overview.md#zonal-and-zone-redundant-services) (and not the physical zone) as per the Azure subscription you will use to restore to. <br><br> You can trigger Cross Zonal Restore for managed virtual machines only. <br><br> Cross Zonal Restore is supported for [Restore with Managed System Identities (MSI)](#restore-vms-with-managed-identities). <br><br> Cross Zonal Restore supports restore of an Azure zone pinned/non-zone pinned VM from a vault with Zonal-redundant storage (ZRS) enabled. Learn [how to set Storage Redundancy](backup-create-rs-vault.md#set-storage-redundancy). <br><br> It's supported to restore an Azure zone pinned VM only from a [vault with Cross Region Restore (CRR)](backup-create-rs-vault.md#set-storage-redundancy) (if the secondary region supports zones) or Zone Redundant Storage (ZRS) enabled. <br><br> Cross Zonal Restore is supported from [secondary regions](#restore-in-secondary-region). <br><br> It's unsupported from [snapshots](backup-azure-vms-introduction.md#snapshot-creation) restore point. <br><br> It's unsupported for [Encrypted Azure VMs](backup-azure-vms-introduction.md#encryption-of-azure-vm-backups).
@@ -39,7 +39,7 @@ Some details about storage accounts:
39
39
-**Restore disk**: The VM restore job generates a template, which you can download and use to specify custom VM settings. VHD files are also copied when restoring managed disks **< 4 TB** or VMs containing **< 16 disks** from a Vault-Standard recovery point, or when restoring unmanaged disks. These files are then moved to Managed storage. To prevent extra charges, delete VHDs from the Staging Storage Account.
40
40
-**Replace disk**: When replacing a managed disk from a Vault-Standard recovery point that's **< 4 TB** or a VM containing **< 16 disks**, a VHD file is created in the specified storage account. After replacement, source VM disks remain in the designated Resource Group, and VHDs stay in the storage account; you can delete or retain the source disk and the VHDs as needed.
41
41
-**Storage account location**: The storage account must be in the same region as the vault. Only these accounts are displayed. If there are no storage accounts in the location, you need to create one.
42
-
-**Storage type**: Blob storage isn't supported.
42
+
-**Storage type**: Blob Storage account isn't supported because the Premium Storage account it requires is excluded for cost optimization.
43
43
-**Premium storage**:
44
44
- When you restore non-premium VMs, premium storage accounts aren't supported.
45
45
- When you restore managed VMs, premium storage accounts configured with network rules aren't supported.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-enhanced-soft-delete-configure-manage.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Configure and manage enhanced soft delete for Azure Backup
3
3
description: This article describes about how to configure and manage enhanced soft delete for Azure Backup.
4
4
ms.topic: how-to
5
-
ms.date: 03/27/2025
5
+
ms.date: 05/26/2025
6
6
ms.service: azure-backup
7
7
author: jyothisuri
8
8
ms.author: jsuri
@@ -195,7 +195,7 @@ Here are some points to note:
195
195
196
196
- Unregistering a container while its backup items are soft deleted (not permanently deleted) will change the state of the container to Soft deleted.
197
197
198
-
- You can re-register containers that are in soft deleted state to another vault. However, in such scenarios, the existing backups (that is soft deleted) will continue to be in the original vault and will be permanently deleted when the soft delete retention period expires.
198
+
-You can reregister containers in a soft deleted state to a different vault. However, their existing backups stay in the original vault and get permanently deleted after the soft delete retention period ends. This process doesn’t work with Immutable vaults because the **Delete** operation isn't allowed, and you can’t access items in the Soft Delete state. Learn about [restricted operations for Immutable vault](backup-azure-immutable-vault-concept.md?tabs=recovery-services-vault#restricted-operations).
199
199
200
200
- You can also *undelete* the container. Once undeleted, it's re-registered to the original vault.
201
201
@@ -263,4 +263,4 @@ For implementing other security measures on the vaults, see the following articl
263
263
-[Immutable vault for Azure Backup](backup-azure-immutable-vault-concept.md).
264
264
-[Private endpoints (v1 experience) for Azure Backup](private-endpoints-overview.md).
265
265
-[Private endpoints (v2 experience) for Azure Backup](backup-azure-private-endpoints-concept.md).
266
-
-[Secure by Default with Azure Backup (Preview)](secure-by-default.md).
266
+
-[Secure by Default with Azure Backup (Preview)](secure-by-default.md).
description: This article explains about the concept of private endpoints for Azure Backup that helps to perform backups while maintaining the security of your resources.
4
4
ms.topic: overview
5
5
ms.service: azure-backup
6
-
ms.date: 04/04/2025
6
+
ms.date: 05/26/2025
7
7
author: jyothisuri
8
8
ms.author: jsuri
9
9
---
@@ -31,7 +31,8 @@ This article describes how the [enhanced capabilities of private endpoints](#key
31
31
- You can create private endpoints for new Recovery Services vaults that don't have any items registered/protected to the vault, only. However, private endpoints are currently not supported for Backup vaults.
32
32
33
33
>[!Note]
34
-
>Private endpoints with static IPs are unsupported in the V2 experience due to dynamic IP expansion. While creation succeeds, registration might fail for vaults with existing protected items.
34
+
>- Private endpoints with static IPs are unsupported in the V2 experience due to dynamic IP expansion. While creation succeeds, registration might fail for vaults with existing protected items.
35
+
>- Creation of multiple private endpoints with the same name under Recovery Services Vaults is unsupported.
35
36
36
37
- You can't upgrade vaults (that contains private endpoints) created using the classic experience to the new experience. You can delete all existing private endpoints, and then create new private endpoints with the v2 experience.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-private-endpoints-configure-manage.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: How to create and manage private endpoints (with v2 experience) for Azure
3
3
description: This article explains how to configure and manage private endpoints for Azure Backup.
4
4
ms.topic: how-to
5
5
ms.service: azure-backup
6
-
ms.date: 04/04/2025
6
+
ms.date: 05/26/2025
7
7
author: jyothisuri
8
8
ms.author: jsuri
9
9
---
@@ -35,7 +35,8 @@ Follow these steps:
35
35
:::image type="content" source="./media/backup-azure-private-endpoints/deny-public-network.png" alt-text="Screenshot showing how to select the Deny option.":::
36
36
37
37
>[!Note]
38
-
>Once you deny access, you can still access the vault, but you can't move data to/from networks that don't contain private endpoints. For more information, see [Create private endpoints for Azure Backup](#create-private-endpoints-for-azure-backup).
38
+
>- When you deny access, you can still access the vault, but you can't move data to/from networks that don't contain private endpoints. For more information, see [Create private endpoints for Azure Backup](#create-private-endpoints-for-azure-backup).
39
+
>- Denial of public access is currently not supported for [vaults that have cross-regions restore](backup-create-rs-vault.md#set-cross-region-restore) enabled.
@@ -586,6 +586,10 @@ If you don't follow the steps in the article and you proceed to protect items, t
586
586
587
587
Using CMK encryption for Backup doesn't incur any additional costs. But you might continue to incur costs for using your key vault where your key is stored.
588
588
589
+
### What happens to data encrypted with a CMK after its expiration?
590
+
591
+
When a Customer Managed Key (CMK) expires, it can still unwrap keys, allowing backup and restore operations to succeed. However, it cannot encrypt new vaults. To ensure continuity, enable key rotation to automatically generate a new version upon expiration. Learn about [Key types, algorithms, and operations](/azure/key-vault/keys/about-keys-details).
592
+
589
593
## Next steps
590
594
591
595
[Overview of security features in Azure Backup](security-overview.md)
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-federation-patterns.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -146,7 +146,7 @@ discussed above will help you to skip events that were already handled and resum
146
146
147
147
The merge pattern has one or more replication tasks pointing to one target, possibly concurrently with regular producers also sending events to the same target.
148
148
149
-
Variations of these patters are:
149
+
Variations of these patterns are:
150
150
151
151
- Two or more replication functions concurrently acquiring events from separate sources and sending them to the same target.
152
152
- One more replication function acquiring events from a source while the target is also used directly by producers.
Copy file name to clipboardExpand all lines: articles/migrate/how-to-discover-applications.md
+11-1Lines changed: 11 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,6 +79,16 @@ The sign-in used to connect to a source SQL Server instance requires sysadmin ro
79
79
80
80
Once connected, the appliance gathers configuration and performance data of SQL Server instances and databases. The SQL Server configuration data is updated once every 24 hours, and the performance data is captured every 30 seconds. Hence, any change to the properties of the SQL Server instance and databases such as database status, compatibility level, etc. can take up to 24 hours to update on the portal.
81
81
82
+
## Discover MySQL Server instances and databases (preview)
83
+
84
+
- Software inventory also identifies the MySQL Server instances running in your VMware, Microsoft Hyper-V, and Physical/ Bare-metal environments as well as IaaS services of other public cloud.
85
+
- If you haven't provided Windows or Linux authentication and MySQL Server authentication credentials on the appliance configuration manager, then add the credentials so that the appliance can use them to connect to respective MySQL Server instances.
86
+
87
+
> [!NOTE]
88
+
> Appliance can connect to only those MySQL Server instances to which it has network line of sight, whereas software inventory by itself may not need network line of sight.
89
+
90
+
Once connected, the appliance gathers configuration and performance data of MySQL Server instances and databases. The MySQL Server configuration data is updated once every 24 hours, and the performance data is captured every 30 seconds. Hence, any change to the properties of the MySQL Server instance and databases such as database status, compatibility level, etc. can take up to 24 hours to update on the portal.
91
+
82
92
## Discover ASP.NET web apps
83
93
84
94
- Software inventory identifies web server role existing on discovered servers. If a server has web server role enabled, Azure Migrate performs web apps discovery on the server.
@@ -107,4 +117,4 @@ Once connected, the appliance gathers configuration and performance data of SQL
107
117
108
118
-[Create an assessment](how-to-create-assessment.md) for discovered servers.
109
119
-[Assess web apps](how-to-create-azure-app-service-assessment.md) for migration to Azure App Service.
110
-
-[Assess Spring Boot apps](how-to-create-azure-spring-apps-assessment.md) for migration to Azure Spring Apps.
120
+
-[Assess Spring Boot apps](how-to-create-azure-spring-apps-assessment.md) for migration to Azure Spring Apps.
0 commit comments