Enable backup for Azure Stack from the administration portal
Enable the Infrastructure Backup Service through the administration portal so that Azure Stack can generate infrastructure backups. The hardware partner can use these backups to restore your environment using cloud recovery in the event of a catastrophic failure. The purpose of cloud recovery is to ensure that your operators and users can log back into the portal after recovery is complete. Users will have their subscriptions restored including role-based access permissions and roles, original plans, offers, and previously defined compute, storage, network quotas, and Key Vault secrets.
However, the Infrastructure Backup Service does not back up IaaS VMs, network configurations, and storage resources such as storage accounts, blobs, tables, and so on, so users logging in after cloud recovery completes will not see any of their previously existing resources. Platform as a Service (PaaS) resources and data are also not backed up by the service.
Administrators and users are responsible for backing up and restoring IaaS and PaaS resources separately from the infrastructure backup processes. For information about backing up IaaS and PaaS resources, see the following links:
Enable or reconfigure backup
Open the Azure Stack administration portal.
Select All services, and then under the ADMINISTRATION category select Infrastructure backup. Choose Configuration in the Infrastructure backup blade.
Type the path to the Backup storage location. Use a Universal Naming Convention (UNC) string for the path to a file share hosted on a separate device. A UNC string specifies the location of resources such as shared files or devices. For the service, you can use an IP address. To ensure availability of the backup data after a disaster, the device should be in a separate location.
If your environment supports name resolution from the Azure Stack infrastructure network to your enterprise environment, you can use an FQDN rather than the IP.
Type the Username using the domain and username with sufficient access to read and write files. For example,
Type the Password for the user.
Type the password again to Confirm Password.
The frequency in hours determines how often backups are created. The default value is 12. Scheduler supports a maximum of 12 and a minimum of 4.
The retention period in days determines how many days of backups are preserved on the external location. The default value is 7. Scheduler supports a maximum of 14 and a minimum of 2. Backups older than the retention period are automatically deleted from the external location.
If you want to archive backups older than the retention period, make sure to backup the files before the scheduler deletes the backups. If you reduce the backup retention period (e.g. from 7 days to 5 days), the scheduler will delete all backups older than the new retention period. Make sure you are ok with the backups getting deleted before you update this value.
In Encryption Settings provide a certificate in the Certificate .cer file box. Backup files are encrypted using this public key in the certificate. You should provide a certificate that only contains the public key portion when you configure backup settings. Once you set this certificate for the first time or rotate the certificate in the future, you can only view the thumbprint of the certificate. You cannot download or view the uploaded certificate file. To create the certificate file, run the following PowerShell command to create a self-signed certificate with the public and private keys and export a certificate with only the public key portion.
$cert = New-SelfSignedCertificate ` -DnsName "www.contoso.com" ` -CertStoreLocation "cert:\LocalMachine\My" New-Item -Path "C:\" -Name "Certs" -ItemType "Directory" Export-Certificate ` -Cert $cert ` -FilePath c:\certs\AzSIBCCert.cer
1901 and above: Azure Stack accepts a certificate to encrypt infrastructure backup data. Make sure to store the certificate with the public and private key in a secure location. For security reasons, it is not recommended that you use the certificate with the public and private keys to configure backup settings. For more information on how to manage the lifecycle of this certificate, see Infrastructure Backup Service best practices.
1811 or earlier: Azure Stack accepts a symmetric key to encrypt infrastructure backup data. Use the New-AzsEncryptionKey64 cmdlet to create a key. After you upgrade from 1811 to 1901, backup settings will retain the encryption key. Recommendation is to update backup settings to use a certificate. Encryption key support is now deprecated. You will have at least 3 releases to update settings to use a certificate.
Select OK to save your backup controller settings.
To start a backup, click on Backup now to start an on-demand backup. An on-demand backup will not modify the time for the next scheduled backup. After the task completes, you can confirm the settings in Essentials:
You can also run the PowerShell cmdlet Start-AzsBackup on your Azure Stack administration computer. For more information, see Back up Azure Stack.
Enable or disable automatic backups
Backups are automatically scheduled when you enable backup. You can check the next schedule backup time in Essentials.
If you need to disable future scheduled backups, click on Disable Automatic Backups. Disabling automatic backups will keep backup settings configured and will retain the backup schedule. This action simply tells the scheduler to skip future backups.
Confirm that future scheduled backups have been disabled in Essentials:
Click on Enable Automatic Backups to inform the scheduler to start future backups at the scheduled time.
If you configured infrastructure backup before updating to 1807, automatic backups will be disabled. This way the backups started by Azure Stack do not conflict with backups started by an external task scheduling engine. Once you disable any external task scheduler, click on Enable Automatic Backups.
Update backup settings
As of 1901, support for encryption key is deprecated. If you are configuring backup for the first time in 1901, you must use a certificate. Azure Stack supports encryption key only if the key is configured before updating to 1901. Backward compatibility mode will continue for three releases. After that, encryption keys will no longer be supported.
In encryption settings, if you are configuring infrastructure backup for the first time after installing or updating to 1901, you must configure backup with a certificate. Using an encryption key is no longer supported.
To update the certificate used to encrypt backup data, you can upload a new .CER file with the public key portion and select OK to save settings.
New backups will start to use the public key in the new certificate. There is no impact to all existing backups created with the previous certificate. Make sure to keep the older certificate around in a secure location in case you need it for cloud recovery.
Backwards compatibility mode
If you configured backup before updating to 1901, the settings are carried over with no change in behavior. In this case, encryption key is supported for backwards compatibility. You have the option updating the encryption key or switching to use a certificate. You will have at least three releases to continue updating the encryption key. Use this time to transition to a certificate. To create a new encryption key use the New-AzsEncryptionKeyBase64 cmdlet.
Updating from encryption key to certificate is a one-way operation. After making this change, you cannot switch back to encryption key. All existing backups will remain encrypted with the previous encryption key.
Learn to run a backup. See Back up Azure Stack
Learn to verify that your backup ran. See Confirm backup completed in administration portal
Send feedback about: