You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -319,6 +319,14 @@ You can create a continuous backup account by using the Azure CLI or an Azure Re
319
319
320
320
Currently, only user-assigned managed identity is supported for creating continuous backup accounts.
321
321
322
+
Once the account has been created, user can update the identity to system-assigned managed identity using these instructions [Configure customer-managed keys for your Azure Cosmos DB account](./how-to-setup-customer-managed-keys.md#to-use-a-system-assigned-managed-identity).
323
+
324
+
> [!NOTE]
325
+
> System-assigned identity and continuous backup mode is currently under Public Preview and may change in the future.
326
+
327
+
Alternatively, user can also create a system identity with periodic backup mode first, then migrate the account to Continuous backup mode using these instructions [Migrate an Azure Cosmos DB account from periodic to continuous backup mode](./migrate-continuous-backup.md)
328
+
329
+
322
330
### To create a continuous backup account by using the Azure CLI
323
331
324
332
```azurecli
@@ -358,13 +366,47 @@ When you create a new Azure Cosmos DB account through an Azure Resource Manager
### To restore a continuous account that is configured with managed identity using CLI
377
+
378
+
#### Restore source account with system-assigned identity
379
+
380
+
> [!NOTE]
381
+
> This feature is currently under Public Preview and requires Cosmos DB CLI Extension version 0.20.0 or higher.
382
+
383
+
System Identity is tied to one specific account and cannot be reused in another account. So, a new user-assigned identity is required during the restore process. This newly created user assigned identity is only needed during the restore and can be cleaned up once the restore has completed.
384
+
385
+
386
+
1. Create a new user-assigned identity (or use an existing one) for the restore process.
387
+
388
+
1. Create the new access policy in your Azure Key Vault account as described above, use the Object ID of the managed identity from step 1.
1. Once the restore has completed, the target (restored) account will have the user-assigned identity. If desired, user can update the account to use System-Assigned managed identity.
403
+
404
+
#### Restore source account with user-assigned identity
405
+
406
+
By default, when user trigger a restore for an account with user-assigned managed identity, the user-assigned identity will be passed to the target account automatically.
407
+
408
+
If desired, the user can also trigger a restore using a different user-assigned identity than the source account by specifying it in the restore parameters. Please follow the steps in [Restore source account with system-assigned identity](./how-to-setup-customer-managed-keys.md#restore-source-account-with-system-assigned-identity)
409
+
368
410
## Customer-managed keys and double encryption
369
411
370
412
The data you store in your Azure Cosmos DB account when using customer-managed keys ends up being encrypted twice:
Copy file name to clipboardExpand all lines: articles/cosmos-db/restore-account-continuous-backup.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -192,6 +192,9 @@ Restore-AzCosmosDBAccount `
192
192
-TablesToRestore $tablesToRestore
193
193
-Location "West US"
194
194
```
195
+
### To restore a continuous account that is configured with managed identity using CLI
196
+
197
+
To restore Customer Managed Key (CMK) continuous account please refer to the steps provided [here](./how-to-setup-customer-managed-keys.md#to-restore-a-continuous-account-that-is-configured-with-managed-identity-using-cli)
195
198
196
199
### <aid="get-the-restore-details-powershell"></a>Get the restore details from the restored account
0 commit comments