- Article
- 9 minutes to read
Azure Backup allows you to securely back up and restore your data from your Recovery Services vaults using private endpoints. Private endpoints use one or more private IP addresses from your Azure Virtual Network (VNet), effectively bringing the service into your VNet.
This article will help you understand how private endpoints for Azure Backup work and the scenarios where using private endpoints helps maintain the security of your resources.
Before you start
- Private endpoints can be created for new Recovery Services vaults only (that don't have any items registered to the vault). So private endpoints must be created before you attempt to protect any items to the vault.
- One virtual network can contain private endpoints for multiple Recovery Services vaults. Also, one Recovery Services vault can have private endpoints for it in multiple virtual networks. However, the maximum number of private endpoints that can be created for a vault is 12.
- Once a private endpoint is created for a vault, the vault will be locked down. It won't be accessible (for backups and restores) from networks apart from ones that contain a private endpoint for the vault. If all private endpoints for the vault are removed, the vault will be accessible from all networks.
- A private endpoint connection for Backup uses a total of 11 private IPs in your subnet, including those used by Azure Backup for storage. This number may be higher for certain Azure regions. So we suggest that you have enough private IPs (/26) available when you attempt to create private endpoints for Backup.
- While a Recovery Services vault is used by (both) Azure Backup and Azure Site Recovery, this article discusses use of private endpoints for Azure Backup only.
- Private endpoints for Backup don’t include access to Azure Active Directory (Azure AD) and the same needs to be ensured separately. So, IPs and FQDNs required for Azure AD to work in a region will need outbound access to be allowed from the secured network when performing backup of databases in Azure VMs and backup using the MARS agent. You can also use NSG tags and Azure Firewall tags for allowing access to Azure AD, as applicable.
- Virtual networks with Network Policies aren't supported for Private Endpoints. You'll need to disable Network Polices before continuing.
- You need to re-register the Recovery Services resource provider with the subscription if you registered it before May 1 2020. To re-register the provider, go to your subscription in the Azure portal, navigate to Resource provider on the left navigation bar, then select Microsoft.RecoveryServices and select Re-register.
- Cross-region restore for SQL and SAP HANA database backups aren't supported if the vault has private endpoints enabled.
- When you move a Recovery Services vault already using private endpoints to a new tenant, you'll need to update the Recovery Services vault to recreate and reconfigure the vault’s managed identity and create new private endpoints as needed (which should be in the new tenant). If this isn't done, the backup and restore operations will start failing. Also, any Azure role-based access control (Azure RBAC) permissions set up within the subscription will need to be reconfigured.
Recommended and supported scenarios
While private endpoints are enabled for the vault, they're used for backup and restore of SQL and SAP HANA workloads in an Azure VM, MARS agent backup and DPM only. You can use the vault for backup of other workloads as well (they won't require private endpoints though). In addition to backup of SQL and SAP HANA workloads and backup using the MARS agent, private endpoints are also used to perform file recovery for Azure VM backup. For more information, see the following table:
Scenarios | Recommendations |
---|---|
Backup of workloads in Azure VM (SQL, SAP HANA), Backup using MARS Agent, DPM server. | Use of private endpoints is recommended to allow backup and restore without needing to add to an allowlist any IPs/FQDNs for Azure Backup or Azure Storage from your virtual networks. In that scenario, ensure that VMs that host SQL databases can reach Azure AD IPs or FQDNs. |
Azure VM backup | VM backup doesn't require you to allow access to any IPs or FQDNs. So, it doesn't require private endpoints for backup and restore of disks. However, file recovery from a vault containing private endpoints would be restricted to virtual networks that contain a private endpoint for the vault. When using ACL’ed unmanaged disks, ensure the storage account containing the disks allows access to trusted Microsoft services if it's ACL’ed. |
Azure Files backup | Azure Files backups are stored in the local storage account. So it doesn't require private endpoints for backup and restore. |
Note
- Private endpoints are supported with only DPM server 2022 and later.
- Private endpoints are not yet supported with MABS.
Difference in network connections due to private endpoints
As mentioned above, private endpoints are especially useful for backup of workloads (SQL, SAP HANA) in Azure VMs and MARS agent backups.In all the scenarios (with or without private endpoints), both the workload extensions (for backup of SQL and SAP HANA instances running inside Azure VMs) and the MARS agent make connection calls to AAD (to FQDNs mentioned under sections 56 and 59 in Microsoft 365 Common and Office Online).
In addition to these connections when the workload extension or MARS agent is installed for recovery services vault without private endpoints, connectivity to the following domains are also required:
Service | Domain names |
---|---|
Azure Backup | *.backup.windowsazure.com |
Azure Storage | *.blob.core.windows.net *.queue.core.windows.net *.blob.storage.azure.net |
When the workload extension or MARS agent is installed for Recovery Services vault with private endpoint, the following endpoints are hit:
Service | Domain names |
---|---|
Azure Backup | *.privatelink.<geo>.backup.windowsazure.com |
Azure Storage | *.blob.core.windows.net *.queue.core.windows.net *.blob.storage.azure.net |
Note
In the above text, <geo>
refers to the region code (for example, eus for East US and ne for North Europe). Refer to the following lists for regions codes:
- All public clouds
- China
- Germany
- US Gov
The storage FQDNs hit in both the scenarios are same. However, for a Recovery Services vault with private endpoint setup, the name resolution for these should return a private IP address. This can be achieved by using private DNS zones, by creating DNS entries for storage account in host files, or by using conditional forwarders to custom DNS with the respective DNS entries. The private IP mappings for the storage account are listed in the private endpoint blade for the storage account ion the portal.
The private endpoints for blobs and queues follow a standard naming pattern, they start with <the name of the private endpoint>_ecs or <the name of the private endpoint>_prot, and are suffixed with _blob and _queue respectively.
The endpoints for the Azure Backup service are modified for private endpoint enabled vaults.
If you have configured a DNS proxy server, using third-party proxy servers and firewalls, the above domain names must be allowed and redirected to a custom DNS (with private IP addresses mappings) or to 168.63.129.16 with a virtual network link to a private DNS zone with these private IP addresses mappings.
The following example shows Azure firewall used as DNS proxy to redirect the domain name queries for Recovery Services vault, blob, queues and AAD to 168.63.129.16.
For more information, see Creating and using private endpoints.
Network connectivity setup for vault with private endpoints
The private endpoint for recovery services is associated with a network interface (NIC) that has a private IP. For private endpoint connections to work (routing all the traffic to the service via Azure backbone and restricting service access to clients within your VNet), it’s required that all the communication traffic for the service is redirected to that network interface. This can be achieved by using DNS linked to the VNet or host file entries on the machine where extension/agent is running.
The workload backup extension and MARS agent run on Azure VM in a VNet or on-premises VM peered with VNet. When registered to a Recovery Services vault with a private endpoint joined with this VNet, the service URL of the Azure Backup cloud services for the extension and agent change from <azure_backup_svc >.<geo>.backup.windowsazure.com
to <vault_id>.<azure_backup_svc>.privatelink.<geo>.backup
.windowsazure.com**.
Note
In the above text, <geo>
refers to the region code (for example, eus for East US and ne for North Europe). Refer to the following lists for regions codes:
- All public clouds
- China
- Germany
- US Gov
The modified URLs are specific for a vault. See <vault_id>
in the URL name. Only extensions and agents registered to this vault can communicate with Azure Backup via these endpoints. This restricts the access to the clients within this VNet. The extension/agent will communicate via *.privatelink.<geo>.backup.windowsazure.com
that needs to resolve the corresponding private IP in the NIC.
When the private endpoint for Recovery Services vaults is created via Azure portal with the integrate with private DNS zone option, the required DNS entries for private IP addresses for Azure Backup services (*.privatelink.<geo>backup.windowsazure.com
) are created automatically whenever the resource is allocated. Otherwise, you need to create the DNS entries manually for these FQDNs in the custom DNS or in the host files.
For the manual management of DNS records after the VM discovery for communication channel - blob/queue, see DNS records for blobs and queues (only for custom DNS servers/host files) after the first registration. For the manual management of DNS records after the first backup for backup storage account blob, see DNS records for blobs (only for custom DNS servers/host files) after the first backup.
The private IP addresses for the FQDNs can be found in the private endpoint blade for the private endpoint created for the Recovery Services vault.
(Video) Azure Service Endpoint and Private Endpoint Overview and Configuration
The following diagram shows how the resolution works when using a private DNS zone to resolve these modified service FQDNs.
In addition to the connection to Azure Backup cloud services, the workload extension and agent require connection to Azure storage accounts and Azure Active Directory. The workload extension running on Azure VM requires connection to a minimum of two storage accounts - the first one is used as communication channel (via queue messages) and second one for storing backup data. The MARS agent requires access to one storage account used for storing backup data.
For a private endpoint enabled vault, Azure Backup creates private endpoint for these storage accounts that is routing the traffic for communication channel and backup data via the Azure backbone network. This prevents any network traffic related to Azure Backup from leaving the virtual network.
As a pre-requisite, Recovery Services vault requires permissions for creating additional private endpoints in the same Resource Group. We also recommend providing the Recovery Services vault the permissions to create DNS entries in the private DNS zones (privatelink.blob.core.windows.net, privatelink.queue.core.windows.net). Recovery Services vault searches for private DNS zones in the Resource Groups where VNet and private endpoint are created. If it has the permissions to add DNS entries in these zones, they’ll be created by the vault, otherwise you must create them manually by the user in their custom DNS or in private DNS zone linked with the VNet.
The private IP mappings are available in the private endpoint blade for the blobs and queues on the portal.
The following diagram shows how the name resolution works for storage accounts using a private DNS zone.
Next steps
- Create and use private endpoints.
FAQs
How do I find my Azure portal backup history? ›
Sign in to the Azure portal. Open the vault dashboard. On the Backup Items tile, select Azure Virtual Machine. On the Backup Items pane, you can view the list of protected VMs and last backup status with latest restore points time.
Can I use DPM to back up apps in Azure stack? ›Can I use DPM to back up apps in Azure Stack? No. You can use Azure Backup to protect Azure Stack, Azure Backup doesn't support using DPM to back up apps in Azure Stack.
How do I access Azure storage Private endpoint? ›Select the Networking tab or select Next: Advanced then Next: Networking. In the Networking tab, under Network connectivity select Disable public access and use private access. In Private endpoint, select + Add private endpoint. Select your Azure subscription.
What is private endpoint in Azure storage? ›A private endpoint is a special network interface for an Azure service in your Virtual Network (VNet). When you create a private endpoint for your storage account, it provides secure connectivity between clients on your VNet and your storage.
How do I view backup history? ›You can use your File History backup to restore it. Go to Settings > Update & Security > Backup and click the More options link. Scroll down to the bottom of the File History window and click Restore files from a current backup. Windows displays all the folders that have been backed up by File History.
Where are Azure database backups stored? ›Azure SQL Server automatically creates full backups every week, differential backups every 12 hours, and transaction log backups every 5-10 minutes. The backups are stored in RA-GRS storage blobs that are replicated to a paired data center for protection against a data center outage.
What is the difference between DPM and MABS? ›About DPM/MABS
System Center DPM is an enterprise solution that configures, facilitates, and manages backup and recovery of enterprise machines and data. It's part of the System Center suite of products. MABS is a server product that can be used to back up on-premises physical servers, VMs, and apps running on them.
For on-premises DPM, Azure Backup provides an alternative to long-term deployment to tape. For DPM running on an Azure VM, Azure Backup allows you to offload storage from the Azure disk. Storing older data in a Backup vault allows you to scale up your business by storing new data to disk.
Which Azure storage option is better for Azure Backup and Restore? ›Geo-redundant storage (GRS) is the default and recommended replication option. GRS replicates your data to a secondary region (hundreds of miles away from the primary location of the source data). GRS costs more than LRS, but GRS provides a higher level of durability for your data, even if there's a regional outage.
What is the difference between Azure storage Service endpoint and private endpoint? ›A Service Endpoint remains a publicly routable IP address. A Private Endpoint is a private IP in the address space of the virtual network where the private endpoint is configured.
What is the difference between Azure private link and private endpoint? ›
The private endpoint must be deployed in the same region and subscription as the virtual network. The private-link resource can be deployed in a different region than the one for the virtual network and private endpoint.
How do I use private endpoints? ›- In the search box at the top of the portal, enter Private endpoint. ...
- Select + Create in Private endpoints.
- In the Basics tab of Create a private endpoint, enter or select the following information. ...
- Select Next: Resource.
- In the Resource pane, enter or select the following information.
Azure Virtual Machine backup policy supports a minimum retention range from seven days up to 9999 days. Any modification to an existing VM backup policy with less than seven days will require an update to meet the minimum retention range of seven days.
How do I restore my Azure portal backup? ›- Navigate to Backup center in the Azure portal and click Restore from the Overview tab.
- Select Azure Virtual machines as the Datasource type, and then select a Backup instance.
- Select a VM and click Continue.
- In the next screen that appears, select a restore point to use for the recovery.
To view activity log insights at the resource level: In the Azure portal, go to your resource and select Workbooks. In the Activity Logs Insights section, select Activity Logs Insights.