Back up SAP HANA databases in Azure VMs
This article describes how to back up SAP HANA databases that are running on Azure VMs to an Azure Backup Recovery Services vault.
SAP HANA databases are critical workloads that require a low recovery-point objective (RPO) and long-term retention. You can back up SAP HANA databases running on Azure virtual machines (VMs) by using Azure Backup.
Note
See the SAP HANA backup support matrix to know more about the supported configurations and scenarios.
Prerequisites
Refer to the prerequisites and the What the pre-registration script does sections to set up the database for backup.
Establish network connectivity
For all operations, an SAP HANA database running on an Azure VM requires connectivity to the Azure Backup service, Azure Storage, and Microsoft Entra ID. This can be achieved by using private endpoints or by allowing access to the required public IP addresses or FQDNs. Not allowing proper connectivity to the required Azure services might lead to failure in operations like database discovery, configuring backup, performing backups, and restoring data.
The following table lists the various alternatives you can use for establishing connectivity:
Option | Advantages | Disadvantages |
---|---|---|
Private endpoints | Allow backups over private IPs inside the virtual network Provide granular control on the network and vault side |
Incurs standard private endpoint costs |
NSG service tags | Easier to manage as range changes are automatically merged No additional costs |
Can be used with NSGs only Provides access to the entire service |
Azure Firewall FQDN tags | Easier to manage since the required FQDNs are automatically managed | Can be used with Azure Firewall only |
Allow access to service FQDNs/IPs | No additional costs. Works with all network security appliances and firewalls. You can also use service endpoints for Storage. However, for Azure Backup and Microsoft Entra ID, you need to assign the access to the corresponding IPs/FQDNs. |
A broad set of IPs or FQDNs might be required to be accessed. |
Virtual Network Service Endpoint | Can be used for Azure Storage. Provides large benefit to optimize performance of data plane traffic. |
Can't be used for Microsoft Entra ID, Azure Backup service. |
Network Virtual Appliance | Can be used for Azure Storage, Microsoft Entra ID, Azure Backup service. Data plane
Management plane
Learn more about Azure Firewall service tags. |
Adds overhead to data plane traffic and decrease throughput/performance. |
More details around using these options are shared below:
Private endpoints
Private endpoints allow you to connect securely from servers inside a virtual network to your Recovery Services vault. The private endpoint uses an IP from the VNET address space for your vault. The network traffic between your resources inside the virtual network and the vault travels over your virtual network and a private link on the Microsoft backbone network. This eliminates exposure from the public internet. Read more on private endpoints for Azure Backup here.
Note
Private endpoints are supported for Azure Backup and Azure storage. Microsoft Entra ID has support private end-points in private preview. Until they are generally available, Azure backup supports setting up proxy for Microsoft Entra ID so that no outbound connectivity is required for HANA VMs. For more information, see the proxy support section.
NSG tags
If you use Network Security Groups (NSG), use the AzureBackup service tag to allow outbound access to Azure Backup. In addition to the Azure Backup tag, you also need to allow connectivity for authentication and data transfer by creating similar NSG rules for Microsoft Entra ID (AzureActiveDirectory) and Azure Storage(Storage). The following steps describe the process to create a rule for the Azure Backup tag:
In All Services, go to Network security groups and select the network security group.
Select Outbound security rules under Settings.
Select Add. Enter all the required details for creating a new rule as described in security rule settings. Ensure the option Destination is set to Service Tag and Destination service tag is set to AzureBackup.
Select Add to save the newly created outbound security rule.
You can similarly create NSG outbound security rules for Azure Storage and Microsoft Entra ID. For more information on service tags, see this article.
Azure Firewall tags
If you're using Azure Firewall, create an application rule by using the AzureBackup Azure Firewall FQDN tag. This allows all outbound access to Azure Backup.
Allow access to service IP ranges
If you choose to allow access service IPs, refer to the IP ranges in the JSON file available here. You'll need to allow access to IPs corresponding to Azure Backup, Azure Storage, and Microsoft Entra ID.
Allow access to service FQDNs
You can also use the following FQDNs to allow access to the required services from your servers:
Service | Domain names to be accessed | Ports |
---|---|---|
Azure Backup | *.backup.windowsazure.com |
443 |
Azure Storage | *.blob.core.windows.net *.queue.core.windows.net *.blob.storage.azure.net |
443 |
Azure AD | *.login.microsoft.com Allow access to FQDNs under sections 56 and 59 according to this article |
443 As applicable |
Use an HTTP proxy server to route traffic
Note
Currently, we only support HTTP Proxy for Microsoft Entra traffic for SAP HANA. If you need to remove outbound connectivity requirements (for Azure Backup and Azure Storage traffic) for database backups via Azure Backup in HANA VMs, use other options, such as private endpoints.
Using an HTTP proxy server for Microsoft Entra traffic
Go to the "opt/msawb/bin" folder
Create a new JSON file named "ExtensionSettingsOverrides.json"
Add a key-value pair to the JSON file as follows:
{ "UseProxyForAAD":true, "UseProxyForAzureBackup":false, "UseProxyForAzureStorage":false, "ProxyServerAddress":"http://xx.yy.zz.mm:port" }
Change the permissions and ownership of the file as follows:
chmod 750 ExtensionSettingsOverrides.json chown root:msawb ExtensionSettingsOverrides.json
No restart of any service is required. The Azure Backup service will attempt to route the Microsoft Entra traffic via the proxy server mentioned in the JSON file.
Use outbound rules
If the Firewall or NSG settings block the “management.azure.com”
domain from Azure Virtual Machine, snapshot backups will fail.
Create the following outbound rule and allow the domain name to do the database backup. Learn hot to create outbound rules.
- Source: IP address of the VM.
- Destination: Service Tag.
- Destination Service Tag:
AzureResourceManager
Create a Recovery Services vault
A Recovery Services vault is a management entity that stores recovery points that are created over time, and it provides an interface to perform backup-related operations. These operations include taking on-demand backups, performing restores, and creating backup policies.
To create a Recovery Services vault:
Sign in to the Azure portal.
Search for Backup center, and then go to the Backup center dashboard.
On the Overview pane, select Vault.
Select Recovery Services vault > Continue.
On the Recovery Services vault pane, enter the following values:
Subscription: Select the subscription to use. If you're a member of only one subscription, you'll see that name. If you're not sure which subscription to use, use the default subscription. There are multiple choices only if your work or school account is associated with more than one Azure subscription.
Resource group: Use an existing resource group or create a new one. To view a list of available resource groups in your subscription, select Use existing, and then select a resource in the dropdown list. To create a new resource group, select Create new, and then enter the name. For more information about resource groups, see Azure Resource Manager overview.
Vault name: Enter a friendly name to identify the vault. The name must be unique to the Azure subscription. Specify a name that has at least 2 but not more than 50 characters. The name must start with a letter and consist only of letters, numbers, and hyphens.
Region: Select the geographic region for the vault. For you to create a vault to help protect any data source, the vault must be in the same region as the data source.
Important
If you're not sure of the location of your data source, close the window. Go to the list of your resources in the portal. If you have data sources in multiple regions, create a Recovery Services vault for each region. Create the vault in the first location before you create a vault in another location. There's no need to specify storage accounts to store the backup data. The Recovery Services vault and Azure Backup handle that automatically.
After providing the values, select Review + create.
To finish creating the Recovery Services vault, select Create.
It can take a while to create the Recovery Services vault. Monitor the status notifications in the Notifications area at the upper right. After the vault is created, it appears in the list of Recovery Services vaults. If the vault doesn't appear, select Refresh.
Note
Azure Backup now supports immutable vaults that help you ensure that recovery points once created can't be deleted before their expiry as per the backup policy. You can make the immutability irreversible for maximum protection to your backup data from various threats, including ransomware attacks and malicious actors. Learn more.
Enable Cross Region Restore
At the Recovery Services vault, you can enable Cross Region Restore. Learn how to turn on Cross Region Restore.
Learn more about Cross Region Restore.
Discover the databases
In the Azure portal, go to Backup center and select +Backup.
Select SAP HANA in Azure VM as the datasource type, select a Recovery Services vault to use for backup, and then select Continue.
Select Start Discovery. This initiates discovery of unprotected Linux VMs in the vault region.
- After discovery, unprotected VMs appear in the portal, listed by name and resource group.
- If a VM isn't listed as expected, check whether it's already backed up in a vault.
- Multiple VMs can have the same name but they belong to different resource groups.
In Select Virtual Machines, select the link to download the script that provides permissions for the Azure Backup service to access the SAP HANA VMs for database discovery.
Run the script on each VM hosting SAP HANA databases that you want to back up.
After running the script on the VMs, in Select Virtual Machines, select the VMs. Then select Discover DBs.
Azure Backup discovers all SAP HANA databases on the VM. During discovery, Azure Backup registers the VM with the vault, and installs an extension on the VM. No agent is installed on the database.
Configure backup
Now enable backup.
In Step 2, select Configure Backup.
In Select items to back up, select all the databases you want to protect > OK.
In Backup Policy > Choose backup policy, create a new backup policy for the databases, in accordance with the instructions below.
After creating the policy, on the Backup menu, select Enable backup.
Track the backup configuration progress in the Notifications area of the portal.
Create a backup policy
A backup policy defines when backups are taken, and how long they're retained.
- A policy is created at the vault level.
- Multiple vaults can use the same backup policy, but you must apply the backup policy to each vault.
Note
Azure Backup doesn’t automatically adjust for daylight saving time changes when backing up an SAP HANA database running in an Azure VM.
Modify the policy manually as needed.
Specify the policy settings as follows:
In Policy name, enter a name for the new policy.
In Full Backup policy, select a Backup Frequency, choose Daily or Weekly.
- Daily: Select the hour and time zone in which the backup job begins.
- You must run a full backup. You can't turn off this option.
- Select Full Backup to view the policy.
- You can't create differential backups for daily full backups.
- Weekly: Select the day of the week, hour, and time zone in which the backup job runs.
- Daily: Select the hour and time zone in which the backup job begins.
In Retention Range, configure retention settings for the full backup.
- By default all options are selected. Clear any retention range limits you don't want to use, and set those that you do.
- The minimum retention period for any type of backup (full/differential/log) is seven days.
- Recovery points are tagged for retention based on their retention range. For example, if you select a daily full backup, only one full backup is triggered each day.
- The backup for a specific day is tagged and retained based on the weekly retention range and setting.
- The monthly and yearly retention ranges behave in a similar way.
In the Full Backup policy menu, select OK to accept the settings.
Select Differential Backup to add a differential policy.
In Differential Backup policy, select Enable to open the frequency and retention controls.
- At most, you can trigger one differential backup per day.
- Differential backups can be retained for a maximum of 180 days. If you need longer retention, you must use full backups.
Note
You can choose either a differential or an incremental as a daily backup but not both.
In Incremental Backup policy, select Enable to open the frequency and retention controls.
- At most, you can trigger one incremental backup per day.
- Incremental backups can be retained for a maximum of 180 days. If you need longer retention, you must use full backups.
Select OK to save the policy and return to the main Backup policy menu.
Select Log Backup to add a transactional log backup policy,
- In Log Backup, select Enable. This can't be disabled, since SAP HANA manages all log backups.
- Set the frequency and retention controls.
Note
Log backups only begin to flow after a successful full backup is completed.
Select OK to save the policy and return to the main Backup policy menu.
After you finish defining the backup policy, select OK.
Note
Each log backup is chained to the previous full backup to form a recovery chain. This full backup will be retained until the retention of the last log backup has expired. This might mean that the full backup is retained for an extra period to make sure all the logs can be recovered. Let's assume a user has a weekly full backup, daily differential and 2 hour logs. All of them are retained for 30 days. But, the weekly full can be really cleaned up/deleted only after the next full backup is available, that is, after 30 + 7 days. For example, a weekly full backup happens on Nov 16th. According to the retention policy, it should be retained until Dec 16th. The last log backup for this full happens before the next scheduled full, on Nov 22nd. Until this log is available until Dec 22nd, the Nov 16th full can't be deleted. So, the Nov 16th full is retained until Dec 22nd.
Run an on-demand backup
Backups run in accordance with the policy schedule. Learn how to run an on-demand backup.
Run SAP HANA native clients backup on a database with Azure Backup
You can run an on-demand backup using SAP HANA native clients to local file-system instead of Backint. Learn more how to manage operations using SAP native clients.
Configure multistreaming data backups for higher throughput using Backint
To configure multistreaming data backups, see the SAP documentation.
Learn about the supported scenarios.
Review backup status
Azure Backup periodically synchronizes the datasource between the extension installed on the VM and Azure Backup service, and shows the backup status in the Azure portal. The following table lists the (four) backup status for a datasource:
Backup state | Description |
---|---|
Healthy | The last backup is successful. |
Unhealthy | The last backup has failed. |
NotReachable | There's currently no synchronization occurring between the extension on the VM and the Azure Backup service. |
IRPending | The first backup on the datasource hasn't occurred yet. |
Generally, synchronization occurs every hour. However, at the extension level, Azure Backup polls every 5 minutes to check for any changes in the status of the latest backup compared to the previous one. For example, if the previous backup is successful but the latest backup has failed, Azure Backup syncs that information to the service to update the backup status in the Azure portal accordingly to Healthy or Unhealthy.
If no data sync occurs to the Azure Backup service for more than 2 hours, Azure Backup shows the backup status as NotReachable. This scenario might occur if the VM is shut down for an extended period or there's a network connectivity issue on the VM, causing the synchronization to cease. Once the VM is operational again and the extension services restart, the data sync operation to the service resumes, and the backup status changes to Healthy or Unhealthy based on the status of the last backup.
Next steps
Feedback
https://aka.ms/ContentUserFeedback.
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see:Submit and view feedback for