After you configure the app for Amazon RDS, add a SQL server for each Amazon RDS instance that is part of the account.
Procedure
-
From the navigation pane, go to Protect > Databases.
The Instances page appears.
-
Click Add Instance, and then click Cloud DB.
The Add Cloud DB instance page appears.
-
From the Select vendor list, select Amazon.
-
From the Database service list, select RDS.
-
For Backup Method, select Export.
-
From the Database engine list, select SQL Server.
-
In the Cloud Account list, assign an Amazon RDS cloud account.
To define a new cloud account, complete the following steps:
-
Click Add.
The Add cloud account page appears.
-
In the Name box, type the a name for the pseudo client.
-
In the Regions box, type the region where the Amazon RDS instance is located.
-
Enter the host or account authentication information:
-
IAM role: To authenticate the Amazon RDS cloud account, select this option.
-
Access and secret key: To authenticate the Amazon RDS cloud account using an access key and a secret key, select this option, from the Credentials list, select the credential for the Amazon RDS cloud account.
-
STS assume role with IAM policy: To authenticate the Amazon RDS cloud account using a security token service (STS) assume role, select this option, from the Credentials list, select the credential for the Amazon RDS cloud account.
To apply an IAM policy for the hypervisor when you use this authentication method, you can attach an IAM policy with sts:AssumeRole to the access node in the AWS Console. For more information about STS role authentication, see Configuring STS Role Authentication .
-
-
From the Access node list, select the access nodes to use for the instance.
-
Under Connection details, enter the following:
-
In the S3 bucket name box, enter the S3 bucket name for the Amazon S3 cloud account.
-
From the SQL server authentication list, select the credential for the SQL server.
Note
To use an Active Directory (AD) account for the backup, configure an Active Directory admin for that instance on the Amazon AWS portal. The AD account must be a local administrator on the access node and along with all permissions for a non-master user must have a “Create any database” securable permission on the RDS SQL instance. You must enter the user details in user_name@domain_name format. You can provide the AD account credentials in the SQL Agent Authentication tab at the agent level or in the Accounts tab at the instance level. The AD account credentials are honored only when the server admin is not set at both the agent and instance levels.
-
-
Click Save.
-
-
From the Plan list, select the server plan that you want to use for the backup operations.
-
From the Instance name list, select the SQL Server instance that you want to protect.
-
Under Connection details, enter the following:
-
In the S3 bucket name box, enter the S3 bucket name for the Amazon RDS instance.
Use a pre-created S3 bucket on the RDS instance.
-
From the SQL server authentication list, select the credential for the SQL server account.
Tip
To create a new credential, beside the SQL server authentication list, click Create new.
-
-
Click Add.