| title | Configure Vaulted Backup for Azure Data Lake Storage using Azure portal, PowerShell, or Azure CLI | ||
|---|---|---|---|
| description | Learn how to configure vaulted backup for Azure Data Lake Storage using Azure portal, PowerShell, or Azure CLI. | ||
| ms.topic | how-to | ||
| ms.service | azure-backup | ||
| ms.custom |
|
||
| zone_pivot_groups | backup-client-portal-powershell-cli | ||
| ms.date | 11/18/2025 | ||
| author | AbhishekMallick-MS | ||
| ms.author | v-mallicka |
::: zone pivot="client-portal"
This article describes how to configure vaulted backups for Azure Data Lake Storage using Azure portal.
Before you configure vaulted backup for Azure Data Lake Storage, ensure the following prerequisites are met:
- The storage account must be in a supported region and of the required types.
- The target account mustn't have containers with the names same as the containers in a recovery point; otherwise, the restore operation fails.
- Identify or create a Backup vault in the same region as the Azure Data Lake Storage account.
- Create a backup policy for Azure Data Lake Storage that defines the backup schedule and retention range.
- Grant permissions to the Backup vault on storage accounts.
Note
- This feature is currently available in specific regions only. See the supported regions.
- Vaulted backup restores are only possible to a different storage account.
For more information about the supported scenarios, limitations, and availability, see the support matrix.
[!INCLUDE How to configure backup for Azure Data Lake Storage]
Learn how to monitor backup jobs.
::: zone-end
::: zone pivot="client-powershell"
This article describes how to configure vaulted backups for Azure Data Lake Storage using PowerShell.
Before you configure vaulted backup for Azure Data Lake Storage, ensure that the following prerequisites are met:
- Install the Azure PowerShell version Az 14.6.0. Learn how to install Azure PowerShell.
- Identify or create a Backup vault to configure Azure Data Lake Storage backup.
- Review the supported scenarios for Azure Data Lake Storage backup.
- Create a backup policy for Azure Data Lake Storage that defines the backup schedule and retention range.
After the vault and backup policy are created, configure vaulted backup for Azure Data Lake Storage by reviewing the following sections:
- Fetch the ARM ID of the storage account containing the Data Lake Storage to be protected
- Grant permissions to the Backup vault
- Trigger the request for backup configuration
The Azure Resource Manager (ARM) ID of the storage account is required to configure vaulted backup for Azure Data Lake Storage. This ID identifies the storage account that contains the Data Lake Storage you want to protect. For example, use the storage account PSTestSA in the resource group adlsrg in a different subscription.
To fetch the ARM ID of the storage account, run the following example cmdlet:
$SAId = "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx/resourcegroups/adlsrg/providers/Microsoft.Storage/storageAccounts/PSTestSA"
The Backup vault requires permissions on the storage account to enable backups on Data Lake Storage present within the storage account. The system-assigned managed identity of the vault is used for assigning such permissions.
You need to assign the required permissions via Azure role-based access control (RBAC) to the created vault (represented by vault Managed System Identity (MSI)) and the relevant storage account.
Learn how to grant permissions to the Backup vault using Azure portal for Azure Data Lake Storage.
After all the relevant permissions are set, configure Azure Date Lake Storage vaulted backup by running the following cmdlets:
-
Create a new backup configuration object to specify the set of containers you want to back up.
To back up all containers, pass the
-IncludeAllContainerparameter. For specific containers, pass the list of containers to the-VaultedBackupContainerparameter.$backupConfig=New-AzDataProtectionBackupConfigurationClientObject -DatasourceType AzureDataLakeStorage -IncludeAllContainer -StorageAccountResourceGroupName "StorageRG" -StorageAccountName "testpscmd" -
Prepare the request by using the relevant vault, policy, storage account, and the backup configuration object you created using the
Initialize-AzDataProtectionBackupInstancecmdlet.$instance=Initialize-AzDataProtectionBackupInstance -DatasourceType AzureDataLakeStorage -DatasourceLocation $TestBkpVault.Location -PolicyId $adlsBkpPol.Id -DatasourceId $SAId -BackupConfiguration $backupConfig -
Submit the request to trigger backup configuration using the
New-AzDataProtectionBackupInstancecmdlet.New-AzDataProtectionBackupInstance -ResourceGroupName "StorageRG" -VaultName $TestBkpVault.Name -BackupInstance $instance
::: zone-end
::: zone pivot="client-cli"
This article describes how to configure vaulted backups for Azure Data Lake Storage using Azure CLI.
Before you configure vaulted backup for Azure Data Lake Storage, ensure that the following prerequisites are met:
- Identify or create a Backup vault to configure Azure Data Lake Storage backup.
- Review the supported scenarios for Azure Data Lake Storage backup.
- Create a backup policy for Azure Data Lake Storage that defines the backup schedule and retention range.
After the vault and backup policy are created, configure vaulted backup for Azure Data Lake Storage by reviewing the following sections:
- Fetch the ARM ID of the storage account containing the Data Lake Storage to be protected
- Grant permissions to the Backup vault
- Trigger the request for backup configuration
Important
After a storage account is configured for Data Lake Storage backup, a few capabilities, such as change feed and delete lock, are affected. Learn more.
The Azure Resource Manager (ARM) ID of the storage account is required to configure vaulted backup for Azure Data Lake Storage. This ID identifies the storage account that contains the Data Lake Storage you want to protect. For example, use the storage account CLITestSA in the resource group adlsrg in a different subscription present in the Southeast Asia region.
TO fetch the ARM ID of the storage account, run the following example command:
"/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx/resourcegroups/adlsrg/providers/Microsoft.Storage/storageAccounts/CLITestSA"
The Backup vault requires permissions on the storage account to enable backups on Data Lake Storage present within the storage account. The system-assigned managed identity of the vault is used for assigning such permissions.
You need to assign the required permissions via Azure role-based access control (RBAC) to the created vault (represented by vault Managed System Identity (MSI)) and the relevant storage account.
Learn how to grant permissions to the Backup vault using Azure portal for Azure Data Lake Storage.
After all the relevant permissions are set, configure Azure Date Lake Storage vaulted backup by running the following example cmdlets:
-
Prepare the request by using the relevant vault, policy, storage account, and the backup configuration object you created using the
az dataprotection backup-instance initializecommand.az dataprotection backup-instance initialize --datasource-type AzureDataLakeStorage -l southeastasia --policy-id "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/testBkpVaultRG/providers/Microsoft.DataProtection/backupVaults/TestBkpVault/backupPolicies/AdlsPolicy1" --datasource-id "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourcegroups/adlsrg/providers/Microsoft.Storage/storageAccounts/CLITestSA" > backup_instance.json -
Submit the request to trigger backup configuration using the
az dataprotection backup-instance createcommand.az dataprotection backup-instance create -g adlsrg--vault-name TestBkpVault --backup-instance backup_instance.jsonThe following example JSON configures an Azure Data Lake Storage backup for a specified storage account with specified policy and container list.
{ "properties": { "friendlyName": " adlsbackup", "dataSourceInfo": { "resourceID": "/subscriptions/ xxxxxxx-xxxx-xxxx-xxxx /resourceGroups/adlsrg/providers/Microsoft.Storage/storageAccounts/adlsbackup", "resourceUri": "/subscriptions/ xxxxxxx-xxxx-xxxx-xxxx /resourceGroups/adlsrg/providers/Microsoft.Storage/storageAccounts/adlsbackup", "datasourceType": "Microsoft.Storage/storageAccounts/adlsBlobServices", "resourceName": " adlsbackup", "resourceType": "Microsoft.Storage/storageAccounts", "resourceLocation": "francesouth", "objectType": "Datasource" }, "policyInfo": { "policyId": "/subscriptions/ xxxxxxxx-xxxx-xxxx-xxxx/resourceGroups/adlsrg/providers/Microsoft.DataProtection/backupVaults/ TestBkpVault/backupPolicies/AdlsPolicy1", "policyParameters": { "backupDatasourceParametersList": [ { "containersList": [ "container7", "container8" ], "objectType": "AdlsBlobBackupDatasourceParameters" } ] } }, "protectionStatus": { "status": "ProtectionConfigured" }, "currentProtectionState": "ProtectionConfigured", "provisioningState": "Succeeded", "objectType": "BackupInstance" }, "id": "/subscriptions/ xxxxxxxx-xxxx-xxxx-xxxx /resourceGroups/adlsrg/providers/Microsoft.DataProtection/backupVaults/ TestBkpVault/backupInstances/adlsbackup", "name": " adlsbackup", "type": "Microsoft.DataProtection/backupVaults/backupInstances" }
::: zone-end