Private endpoints overview - Azure Backup (2023)

  • Article
  • 9 minutes to read

Azure Backup allows you to securely back up and restore your data from your Recovery Services vaults using private endpoints. Private endpoints use one or more private IP addresses from your Azure Virtual Network (VNet), effectively bringing the service into your VNet.

This article will help you understand how private endpoints for Azure Backup work and the scenarios where using private endpoints helps maintain the security of your resources.

Before you start

  • Private endpoints can be created for new Recovery Services vaults only (that don't have any items registered to the vault). So private endpoints must be created before you attempt to protect any items to the vault.
  • One virtual network can contain private endpoints for multiple Recovery Services vaults. Also, one Recovery Services vault can have private endpoints for it in multiple virtual networks. However, the maximum number of private endpoints that can be created for a vault is 12.
  • Once a private endpoint is created for a vault, the vault will be locked down. It won't be accessible (for backups and restores) from networks apart from ones that contain a private endpoint for the vault. If all private endpoints for the vault are removed, the vault will be accessible from all networks.
  • A private endpoint connection for Backup uses a total of 11 private IPs in your subnet, including those used by Azure Backup for storage. This number may be higher for certain Azure regions. So we suggest that you have enough private IPs (/26) available when you attempt to create private endpoints for Backup.
  • While a Recovery Services vault is used by (both) Azure Backup and Azure Site Recovery, this article discusses use of private endpoints for Azure Backup only.
  • Private endpoints for Backup don’t include access to Azure Active Directory (Azure AD) and the same needs to be ensured separately. So, IPs and FQDNs required for Azure AD to work in a region will need outbound access to be allowed from the secured network when performing backup of databases in Azure VMs and backup using the MARS agent. You can also use NSG tags and Azure Firewall tags for allowing access to Azure AD, as applicable.
  • Virtual networks with Network Policies aren't supported for Private Endpoints. You'll need to disable Network Polices before continuing.
  • You need to re-register the Recovery Services resource provider with the subscription if you registered it before May 1 2020. To re-register the provider, go to your subscription in the Azure portal, navigate to Resource provider on the left navigation bar, then select Microsoft.RecoveryServices and select Re-register.
  • Cross-region restore for SQL and SAP HANA database backups aren't supported if the vault has private endpoints enabled.
  • When you move a Recovery Services vault already using private endpoints to a new tenant, you'll need to update the Recovery Services vault to recreate and reconfigure the vault’s managed identity and create new private endpoints as needed (which should be in the new tenant). If this isn't done, the backup and restore operations will start failing. Also, any Azure role-based access control (Azure RBAC) permissions set up within the subscription will need to be reconfigured.

Recommended and supported scenarios

While private endpoints are enabled for the vault, they're used for backup and restore of SQL and SAP HANA workloads in an Azure VM, MARS agent backup and DPM only. You can use the vault for backup of other workloads as well (they won't require private endpoints though). In addition to backup of SQL and SAP HANA workloads and backup using the MARS agent, private endpoints are also used to perform file recovery for Azure VM backup. For more information, see the following table:

ScenariosRecommendations
Backup of workloads in Azure VM (SQL, SAP HANA), Backup using MARS Agent, DPM server.Use of private endpoints is recommended to allow backup and restore without needing to add to an allowlist any IPs/FQDNs for Azure Backup or Azure Storage from your virtual networks. In that scenario, ensure that VMs that host SQL databases can reach Azure AD IPs or FQDNs.
Azure VM backupVM backup doesn't require you to allow access to any IPs or FQDNs. So, it doesn't require private endpoints for backup and restore of disks.

However, file recovery from a vault containing private endpoints would be restricted to virtual networks that contain a private endpoint for the vault.

When using ACL’ed unmanaged disks, ensure the storage account containing the disks allows access to trusted Microsoft services if it's ACL’ed.

Azure Files backupAzure Files backups are stored in the local storage account. So it doesn't require private endpoints for backup and restore.

Note

(Video) What is Private Endpoint in Azure? | Intro to Private Endpoints

  • Private endpoints are supported with only DPM server 2022 and later.
  • Private endpoints are not yet supported with MABS.

Difference in network connections due to private endpoints

As mentioned above, private endpoints are especially useful for backup of workloads (SQL, SAP HANA) in Azure VMs and MARS agent backups.In all the scenarios (with or without private endpoints), both the workload extensions (for backup of SQL and SAP HANA instances running inside Azure VMs) and the MARS agent make connection calls to AAD (to FQDNs mentioned under sections 56 and 59 in Microsoft 365 Common and Office Online).

In addition to these connections when the workload extension or MARS agent is installed for recovery services vault without private endpoints, connectivity to the following domains are also required:

ServiceDomain names
Azure Backup*.backup.windowsazure.com
Azure Storage*.blob.core.windows.net
*.queue.core.windows.net
*.blob.storage.azure.net

When the workload extension or MARS agent is installed for Recovery Services vault with private endpoint, the following endpoints are hit:

ServiceDomain names
Azure Backup*.privatelink.<geo>.backup.windowsazure.com
Azure Storage*.blob.core.windows.net
*.queue.core.windows.net
*.blob.storage.azure.net

Note

In the above text, <geo> refers to the region code (for example, eus for East US and ne for North Europe). Refer to the following lists for regions codes:

  • All public clouds
  • China
  • Germany
  • US Gov

The storage FQDNs hit in both the scenarios are same. However, for a Recovery Services vault with private endpoint setup, the name resolution for these should return a private IP address. This can be achieved by using private DNS zones, by creating DNS entries for storage account in host files, or by using conditional forwarders to custom DNS with the respective DNS entries. The private IP mappings for the storage account are listed in the private endpoint blade for the storage account ion the portal.

(Video) Azure Private Endpoint & Private Link explained in plain English with a story & demo in 5 minutes

The private endpoints for blobs and queues follow a standard naming pattern, they start with <the name of the private endpoint>_ecs or <the name of the private endpoint>_prot, and are suffixed with _blob and _queue respectively.

The endpoints for the Azure Backup service are modified for private endpoint enabled vaults.
If you have configured a DNS proxy server, using third-party proxy servers and firewalls, the above domain names must be allowed and redirected to a custom DNS (with private IP addresses mappings) or to 168.63.129.16 with a virtual network link to a private DNS zone with these private IP addresses mappings.

The following example shows Azure firewall used as DNS proxy to redirect the domain name queries for Recovery Services vault, blob, queues and AAD to 168.63.129.16.

For more information, see Creating and using private endpoints.

Network connectivity setup for vault with private endpoints

The private endpoint for recovery services is associated with a network interface (NIC) that has a private IP. For private endpoint connections to work (routing all the traffic to the service via Azure backbone and restricting service access to clients within your VNet), it’s required that all the communication traffic for the service is redirected to that network interface. This can be achieved by using DNS linked to the VNet or host file entries on the machine where extension/agent is running.

The workload backup extension and MARS agent run on Azure VM in a VNet or on-premises VM peered with VNet. When registered to a Recovery Services vault with a private endpoint joined with this VNet, the service URL of the Azure Backup cloud services for the extension and agent change from <azure_backup_svc >.<geo>.backup.windowsazure.com to <vault_id>.<azure_backup_svc>.privatelink.<geo>.backup.windowsazure.com**.

(Video) Azure Backup 01, Overview and Implementation

Note

In the above text, <geo> refers to the region code (for example, eus for East US and ne for North Europe). Refer to the following lists for regions codes:

  • All public clouds
  • China
  • Germany
  • US Gov

The modified URLs are specific for a vault. See <vault_id> in the URL name. Only extensions and agents registered to this vault can communicate with Azure Backup via these endpoints. This restricts the access to the clients within this VNet. The extension/agent will communicate via *.privatelink.<geo>.backup.windowsazure.com that needs to resolve the corresponding private IP in the NIC.

When the private endpoint for Recovery Services vaults is created via Azure portal with the integrate with private DNS zone option, the required DNS entries for private IP addresses for Azure Backup services (*.privatelink.<geo>backup.windowsazure.com) are created automatically whenever the resource is allocated. Otherwise, you need to create the DNS entries manually for these FQDNs in the custom DNS or in the host files.

For the manual management of DNS records after the VM discovery for communication channel - blob/queue, see DNS records for blobs and queues (only for custom DNS servers/host files) after the first registration. For the manual management of DNS records after the first backup for backup storage account blob, see DNS records for blobs (only for custom DNS servers/host files) after the first backup.

The private IP addresses for the FQDNs can be found in the private endpoint blade for the private endpoint created for the Recovery Services vault.

(Video) Azure Service Endpoint and Private Endpoint Overview and Configuration

The following diagram shows how the resolution works when using a private DNS zone to resolve these modified service FQDNs.

In addition to the connection to Azure Backup cloud services, the workload extension and agent require connection to Azure storage accounts and Azure Active Directory. The workload extension running on Azure VM requires connection to a minimum of two storage accounts - the first one is used as communication channel (via queue messages) and second one for storing backup data. The MARS agent requires access to one storage account used for storing backup data.

For a private endpoint enabled vault, Azure Backup creates private endpoint for these storage accounts that is routing the traffic for communication channel and backup data via the Azure backbone network. This prevents any network traffic related to Azure Backup from leaving the virtual network.

As a pre-requisite, Recovery Services vault requires permissions for creating additional private endpoints in the same Resource Group. We also recommend providing the Recovery Services vault the permissions to create DNS entries in the private DNS zones (privatelink.blob.core.windows.net, privatelink.queue.core.windows.net). Recovery Services vault searches for private DNS zones in the Resource Groups where VNet and private endpoint are created. If it has the permissions to add DNS entries in these zones, they’ll be created by the vault, otherwise you must create them manually by the user in their custom DNS or in private DNS zone linked with the VNet.

The private IP mappings are available in the private endpoint blade for the blobs and queues on the portal.

The following diagram shows how the name resolution works for storage accounts using a private DNS zone.

(Video) Backup Explorer in Azure now in preview & Azure Key Vault private endpoints in Azure Private Link

Next steps

  • Create and use private endpoints.

FAQs

How do I find my Azure portal backup history? ›

Sign in to the Azure portal. Open the vault dashboard. On the Backup Items tile, select Azure Virtual Machine. On the Backup Items pane, you can view the list of protected VMs and last backup status with latest restore points time.

Can I use DPM to back up apps in Azure stack? ›

Can I use DPM to back up apps in Azure Stack? No. You can use Azure Backup to protect Azure Stack, Azure Backup doesn't support using DPM to back up apps in Azure Stack.

How do I access Azure storage Private endpoint? ›

Select the Networking tab or select Next: Advanced then Next: Networking. In the Networking tab, under Network connectivity select Disable public access and use private access. In Private endpoint, select + Add private endpoint. Select your Azure subscription.

What is private endpoint in Azure storage? ›

A private endpoint is a special network interface for an Azure service in your Virtual Network (VNet). When you create a private endpoint for your storage account, it provides secure connectivity between clients on your VNet and your storage.

How do I view backup history? ›

You can use your File History backup to restore it. Go to Settings > Update & Security > Backup and click the More options link. Scroll down to the bottom of the File History window and click Restore files from a current backup. Windows displays all the folders that have been backed up by File History.

Where are Azure database backups stored? ›

Azure SQL Server automatically creates full backups every week, differential backups every 12 hours, and transaction log backups every 5-10 minutes. The backups are stored in RA-GRS storage blobs that are replicated to a paired data center for protection against a data center outage.

What is the difference between DPM and MABS? ›

About DPM/MABS

System Center DPM is an enterprise solution that configures, facilitates, and manages backup and recovery of enterprise machines and data. It's part of the System Center suite of products. MABS is a server product that can be used to back up on-premises physical servers, VMs, and apps running on them.

What is DPM backup Azure? ›

For on-premises DPM, Azure Backup provides an alternative to long-term deployment to tape. For DPM running on an Azure VM, Azure Backup allows you to offload storage from the Azure disk. Storing older data in a Backup vault allows you to scale up your business by storing new data to disk.

Which Azure storage option is better for Azure Backup and Restore? ›

Geo-redundant storage (GRS) is the default and recommended replication option. GRS replicates your data to a secondary region (hundreds of miles away from the primary location of the source data). GRS costs more than LRS, but GRS provides a higher level of durability for your data, even if there's a regional outage.

What is the difference between Azure storage Service endpoint and private endpoint? ›

A Service Endpoint remains a publicly routable IP address. A Private Endpoint is a private IP in the address space of the virtual network where the private endpoint is configured.

What is the difference between Azure private link and private endpoint? ›

The private endpoint must be deployed in the same region and subscription as the virtual network. The private-link resource can be deployed in a different region than the one for the virtual network and private endpoint.

How do I use private endpoints? ›

Create a private endpoint
  1. In the search box at the top of the portal, enter Private endpoint. ...
  2. Select + Create in Private endpoints.
  3. In the Basics tab of Create a private endpoint, enter or select the following information. ...
  4. Select Next: Resource.
  5. In the Resource pane, enter or select the following information.
Dec 20, 2022

How long are Azure backups kept? ›

Azure Virtual Machine backup policy supports a minimum retention range from seven days up to 9999 days. Any modification to an existing VM backup policy with less than seven days will require an update to meet the minimum retention range of seven days.

How do I restore my Azure portal backup? ›

Select a restore point
  1. Navigate to Backup center in the Azure portal and click Restore from the Overview tab.
  2. Select Azure Virtual machines as the Datasource type, and then select a Backup instance.
  3. Select a VM and click Continue.
  4. In the next screen that appears, select a restore point to use for the recovery.
Dec 6, 2022

How do I see my activity in Azure portal? ›

To view activity log insights at the resource level: In the Azure portal, go to your resource and select Workbooks. In the Activity Logs Insights section, select Activity Logs Insights.

Videos

1. AZ-900 Certification Course - Describe Public and Private Endpoints - May 2022 New
(John Savill's Technical Training)
2. Creating an Azure Private Endpoint Connection with Azure Storage Accounts
(HarvestingClouds)
3. Azure Private Link and Azure Private Endpoint: What's so private about it?
(MC2MC)
4. Azure Private Endpoints (Private Link) with services like App Services, SQL, and Storage Accounts
(Atmosera)
5. AzUpdate S02E22: Azure Migrate Private Endpoint, Azure Backup, Policy Compliance update and more
(IT Ops Talk)
6. Azure Recovery Services Vault for Azure Backup Explained with DEMO
(Paddy Maddy)
Top Articles
Latest Posts
Article information

Author: Carlyn Walter

Last Updated: 04/11/2023

Views: 5722

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Carlyn Walter

Birthday: 1996-01-03

Address: Suite 452 40815 Denyse Extensions, Sengermouth, OR 42374

Phone: +8501809515404

Job: Manufacturing Technician

Hobby: Table tennis, Archery, Vacation, Metal detecting, Yo-yoing, Crocheting, Creative writing

Introduction: My name is Carlyn Walter, I am a lively, glamorous, healthy, clean, powerful, calm, combative person who loves writing and wants to share my knowledge and understanding with you.