You must add the SQL instance that you want to protect to a SQL server.
Before You Begin
The password for the Azure SQL Server administrator must not contain special characters, such as double quotes (") and back slashes (\).
Procedure
-
From the navigation pane, go to Protect > Databases.
The Instances page appears.
-
Click the Add instance button, and then select Cloud db service.
The Add Cloud DB instance dialog box appears.
-
From the Select vendor list, select Microsoft Azure.
-
From the Database service list, select SQL server.
-
From the Cloud account list, select the Azure cloud account.
You can select an existing Azure account for the instance, or define a new Azure account.
To create a new Azure account, complete the following steps:
-
Click +.
The Add cloud account page appears.
-
In the Name box, type a name for the new cloud account.
-
In the Subscription ID box, enter the subscription ID for the Azure cloud account.
For instructions about accessing this information from the Azure portal, see SQL Server Azure Cloud Connection Properties.
-
To connect to the Azure account without using managed identities, move the Connect using managed identities for Azure resources toggle key to the left, from the Credentials list, select the credential for the Azure cloud account.
For information about connecting the Azure account using managed identities, see Setting up Managed Identities for Azure Resources.
-
From the Access nodes list, select the proxy servers.
The operating system of the access node can be either Windows or Red Hat Enterprise Linux. You can add multiple proxy servers to the app. The Commvault software uses the first proxy server in the list for instance and database discovery.
-
To specify the connection information for the Azure cloud, under Connection details, do the following:
-
If the access node has Commvault software that is deployed using Feature Release 28 or a more recent version, Commvault recommends that by default you enter the staging path available on the access node in the Staging path used for import/export box. This allows you to import and export an Azure SQL database to a BACPAC file, even if it is larger than 200 GB. For more information about the staging path, see Using the Staging Path Export Method for a Secure Transfer of Data.
-
From the SQL server authentication list, select the credential for the SQL server account.
The user account is the server administrator for the Azure SQL database instances that you are adding.
Tip
To create a new credential, beside the SQL server authentication list, click Create new.
-
-
Click Save.
-
-
From the Plan list, select the server plan to use for the managed instance.
-
From the Instance name list, select the SQL instance.
-
To specify the connection information for Azure cloud instance, under Connection details, specify the connection string for Azure storage account and credential for the SQL server account.
Note
-
To use an Active Directory (AD) account for the backup, install the Microsoft Active Directory Authentication Library for Microsoft SQL Server on the access node and configure an Active Directory admin for that instance on the Azure portal. The AD account must be the Azure AD administrator or a member of the AD group assigned to the Azure SQL instance. To provide the AD account credentials, edit the SQL cloud configuration setting in the Configuration tab for the SQL instance and provide the AD account credentials in the SQL server authentication box.
-
Active Directory authentication does not work for Azure SQL databases that are protected using a Linux access node.
-
-
Click Add.
Related Topics
Setting up Managed Identity Authentication for Azure Resource Manager