The Databases guided setup guides you through creating a backup plan and adding a Azure Database for PostgreSQL.
To complete the guided setup, you need the following information:
-
The server name
-
The host name
-
The credentials that you use to access the server
-
The packages that you want to install, such as Oracle
Note
If you are configuring a database that uses a pseudoclient, you must manually install the packages on the physical servers before you use the guided setup. For more information, see Adding a New Server.
Procedure
-
From the navigation pane, go to Guided setup.
The Welcome page appears.
-
In the Databases tile, click Configure.
-
On the Configure Database Server page, select Database running in the cloud (PaaS).
-
Select Microsoft Azure, and then click Next.
-
On the Configure Azure Database page, select PostgreSQL, and then click Next.
-
On the Configure Azure Database - PostgreSQL page, select a backup plan to use for the instance, and then click Next.
-
From the Cloud account list, select an existing cloud account or add a new cloud account, and then click Next.
Steps to add new cloud account
-
Beside the Cloud account list, click +.
-
In the Name box, type the name for the account.
-
Enter the information about the subscription:
-
For the traditional authentication method of deployment, enter the following information:
-
Subscription ID: Enter the subscription ID for the Azure account.
-
Credential: select a saved credential or add a new credential.
-
-
For the managed identity authentication method of deployment, configure the following settings:
-
Connect using managed identities for Azure resources: Move the toggle key to the right.
-
Subscription ID: Enter the subscription ID for the Azure account.
-
-
-
From the Access node list, select access nodes that have both the Virtual Server and Cloud Apps packages installed.
Note: If you configure this cloud account to use managed identity authentication, select only Azure access nodes that use managed identity authentication to ensure that backup and restore operations succeed. The access node must be an Azure virtual machine in the same subscription as the Cosmos DB account that you want to back up.
-
Click SAVE.
-
-
Click Next.
-
On Backup Content page, you can either configure rule criteria to automatically discover instances to back up or manually select an instance.
-
If you proceed with Rule based discovery, do the following:
-
From the Access node list, select an access node which runs the discovery job.
Note
All the access nodes must have VSA package installed for PostgreSQL and cloud applications.
-
Click Add.
The Add rule group dialog box appears.
-
To specify the type of Match rule, select all or any. The rules for the match are as follows:
-
all: All rules that you configure for the rule group must be satisfied for a database instance to be discovered.
-
any: Any rule that you define that is satisfied will result in the matching database being discovered.
-
-
From the list of rule types, select the type of rule to create, and then specify the rule:
-
Instance name: Select instances based on their names. For example, to select instances that have a name that includes "east", enter Instance name | Contains | east.
-
Tag name: Select instances based on the names of tags that are assigned to them. Enter the tag name in the regiontag_name format. For example, to select instances in the eastern US Region that are for a department, enter Tag name | Equals | us-east-1department.
-
Tag value: Select instances based on the values of tags that are assigned to them. Enter the tag value in the regiontag_nametag_value format. For example, to select instances in the eastern US Region for the human resources department, enter Tag value | Equals | us-east-1departmentHR.
-
-
Click Save.
-
Click Preview to see the instances that you selected for the group.
-
From the SQL Server Authentication Type list, select a SQL Server authentication type.
-
From the Credential list, you can either select a saved credential or add a new credential.
Steps to add a new credential
-
Beside Credential, click +.
The Add Credential dialog box appears.
-
From the Credential Vault list, select a credential vault to store credentials for different types of accounts.
-
In the Credential name box, enter a name for the credential.
-
Under the Azure AD/AWS IAM Authentication section, enter the following details:
-
In the Username box, enter the user name to access the Azure Database for PostgreSQL application.
-
In the Password box, enter the password to access the Azure Database for PostgreSQL application.
Note
If you move the Azure AD/AWS IAM Authentication toggle to right, you only need to enter the user name detail.
-
-
The SSL certificate toggle key is unselected by default. if you move the toggle key to right, you can perform the following actions:
-
In the SSL CA file field, provide the SSL CA file path on the proxy computer.
-
In the SSL Cert file field, provide the SSL certificate file path on the proxy computer.
-
In the SSL Key file field, provide the SSL key file path on the proxy computer.
-
-
In the Description box, enter the details of the credential.
-
Click Save.
-
-
-
If you proceed without rule based discovery, do the following:
-
From the Instance name list, select the instance based on names.
-
Under the Connection details section, from the Credential list, you can either select a saved credential or add a new credential.
-
In the Maintenance DB box, type the name of the system database that is used as the maintenance database.
-
In the Endpoint box, type the name of the endpoint to connect to the database instance.
-
-
Click Next.
Note: For Azure Single servers, enter the user name in the syntax username@hostname.
-
On the Summary page, review the summary, and then click Finish.