You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Account Kind | Only block blobs in a standard general-purpose v2 HNS-enabled storage account. <br><br>*Accounts using Network File Shares (NFS) 3.0, and Secure File Transfer Protocol (SFTP) protocols for blobs are currently not supported*.|
| Tier | Hot, Cool, and Cold tier blobs are supported.<br><br>*Archive tier blob backup isn't supported*. |
40
+
| Tier | Hot, Cool, and Cold tier blobs are supported.<br><br>*Backup for the Archive tier blob in Azure Data Lake storage account isn't supported*. |
41
41
| Upgraded storage accounts | Accounts upgraded from Azure Blob Storage to Azure Data Lake Storage aren't supported*. |
42
42
43
43
## Protection limits
@@ -49,31 +49,35 @@ The following table lists the protection limits:
49
49
| Maximum number of containers in a storage account that can be protected | 100 |
50
50
| Vault redundancy | LRS/ZRS/GRS |
51
51
52
-
### Supported and unsupported scenarios for Azure Data Lake Storage protection
52
+
### Supported scenarios for Azure Data Lake Storage protection
53
53
54
-
Azure Data Lake Storage protection has the following supported and unsupported scenarios:
54
+
Azure Data Lake Storage protection has the following supported scenarios:
55
+
56
+
- Backup vaults with System-Assigned Managed Identity (SAMI) works for backup, because the vault needs to access the storage account where the blobs are stored. The vault uses its system-assigned managed identity for this access.
57
+
- You can protect the storage account with the vault in another subscription but in the same region as storage account.
58
+
- Azure Data Lake Storage accounts support both Blob and Data File System (DFS) APIs.
59
+
-`$web` container can't be restored as `$web` on the target. Use the **renameTo** option and restore it with a different container name.
60
+
-`$root` container can be restored as `$root` on the target only if `$root` doesn't already exist there. If it already exists, use the **renameTo** option and restore it with a different container name.
61
+
62
+
### Unsupported scenarios and considerations for Azure Data Lake Storage protection
63
+
64
+
Azure Data Lake Storage protection has the following unsupported scenarios:
55
65
56
66
- Any new containers that get created after backup configuration for the storage account aren't backed up automatically. To enable the backup operation for the new containers, modify the protection of the storage account.
57
67
- The storage accounts to be backed up must contain a *minimum of one container*. If the storage account doesn't contain any containers or if no containers are selected, an error might appear when you configure backup.
58
-
- Object Replication fails to register changes when a storage account or container is deleted and recreated with the same name between two consecutive backups, causing recovery points to retain older blobs and versions.
59
-
- Blobs are excluded from recovery points if you rename any folder in their parent path when async copy in progress.
60
-
- The backup operation isn't supported for blobs created using async copy.
61
-
- Backup vaults with User-Assigned Managed Identity (UAMI) aren't compatible with Azure Blob Vaulted backups. Only System-Assigned Managed Identity (SAMI) works, because the vault needs to access the storage account where the blobs are stored. The vault uses its system-assigned managed identity for this access.
62
-
- You can protect the storage account with the vault in another subscription but in the same region as storage account.
63
-
- Archive tier for vault is currently not supported.
64
-
- Azure Data Lake Storage accounts support both Blob and Data File System (DFS) APIs. The system captures operations through Change Feed and uses directory snapshots to ensure consistent recovery.
68
+
- Backup vaults with User-Assigned Managed Identity (UAMI) aren't compatible with Azure Blob Vaulted backups.
69
+
- When an Azure Data Lake Storage account or container in it is deleted and recreated with the same name between two consecutive backups, then recovery points retain older blobs and versions.
70
+
- Archive tier for the backup data in a vault is currently not supported.
71
+
- Storage accounts upgraded from FNS to HNS are not supported for backup.
72
+
- SFTP- and NFS-enabled accounts aren’t supported for Vaulted Backup. Backup jobs on these accounts fail or hang when processing blobs uploaded via SFTP.
65
73
- Vaulted Backup doesn’t support cross-container data moves because backup policies are container-specific. If you move data between containers, the replication consistency breaks.
66
-
- When blob expiry is configured—either during creation using PutBlob or PutBlockList, or later via the SetBlobExpiry API — the following behaviors apply for storage accounts with Vaulted Backup enabled:
74
+
- When blob in Data Lake Storage accounts have expiry configured—either during creation using PutBlob or PutBlockList, or later via the SetBlobExpiry API — the following behaviors apply for Azure Data Lake storage account with Vaulted Backup enabled:
67
75
- Existing Blobs with Expiry Date: These blobs will continue to exhibit the current behavior: once expired, they remain in existing restore points, which can lead to inconsistencies in future restore points.
68
76
- Future Expiry Settings: Any attempt to set expiry using SetBlobExpiry will fail for storage accounts configured with Vaulted Backup. This restriction ensures restore point integrity going forward.
69
77
- When Vaulted Backup is enabled:
70
-
- Soft Delete: Objects can still be soft-deleted as expected.
71
-
- Undelete: Restore from soft-deleted state is not supported while Vaulted Backup is active. Undelete will only work if Vaulted Backup is disabled first. Re-enabling Vaulted Backup after disabling will trigger a full backup.
72
-
- Storage accounts upgraded from FNS to HNS are not supported for backup.
73
-
- SFTP- and NFS-enabled accounts aren’t supported for Vaulted Backup. Backup jobs on these accounts fail or hang when processing blobs uploaded via SFTP.
74
-
- $web container cannot be restored as $web on the target. Use the renameTo option and restore it with a different container name.
75
-
- $root container can be restored as $root on the target only if $root does not already exist there. If it already exists, use the renameTo option and restore it with a different container name.
76
-
78
+
- Soft Delete: Blobs in Azure Data Lake storage account can still be soft-deleted as expected.
79
+
- Undelete: Restore for blobs in Azure Data Lake storage account from soft-deleted state is not supported while Vaulted Backup is active. Undelete will only work if Vaulted Backup is disabled first. Re-enabling Vaulted Backup after disabling will trigger a full backup.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-monitoring-use-azuremonitor.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Azure Monitor Logs in Azure Backup
3
3
description: Monitor Azure Backup workloads and create custom alerts by using Azure Monitor.
4
4
ms.topic: how-to
5
-
ms.date: 12/30/2024
5
+
ms.date: 11/26/2025
6
6
ms.assetid: 01169af5-7eb0-4cb0-bbdb-c58ac71bf48b
7
7
author: AbhishekMallick-MS
8
8
ms.author: v-mallicka
@@ -14,14 +14,14 @@ ms.custom:
14
14
15
15
# Azure Monitor Logs
16
16
17
-
Azure Backup provides [built-in monitoring and alerting capabilities](backup-azure-monitoring-built-in-monitor.md) in a Recovery Services vault. These capabilities are available without any additional management infrastructure. The only pre-requisite for this capability is to have Log Analytics workspace configured. This feature is supported in the following scenarios:
17
+
Azure Backup provides [built-in monitoring and alerting capabilities](backup-azure-monitoring-built-in-monitor.md) in a Recovery Services vault. These capabilities are available without any extra management infrastructure. The only prerequisite for this capability is to have Log Analytics workspace configured. This feature is supported in the following scenarios:
18
18
19
19
- Monitoring data from multiple Recovery Services vaults across Subscriptions
20
20
- Visibility into custom scenarios
21
21
- Configuring alerts for custom scenarios
22
-
- Viewing information from an on-premises component. For example, System Center Data Protection Manager information in Azure, which the portal doesn't show in [**Backup Jobs**](backup-azure-monitoring-built-in-monitor.md#backup-jobs) or [**Backup Alerts**](move-to-azure-monitor-alerts.md#backup-alerts-in-recovery-services-vault)
22
+
- Viewing information from an on-premises component. For example, System Center Data Protection Manager information in Azure, which the portal doesn't show in [**Backup Jobs**](backup-azure-monitoring-built-in-monitor.md#backup-jobs) or [**Backup Alerts**](move-to-azure-monitor-alerts.md#backup-alerts-in-recovery-services-vault)
23
23
24
-
## Using Log Analytics workspace
24
+
## Monitor backup jobs using Log Analytics workspace
25
25
26
26
### Prerequisites for using Log Analytics workspace
27
27
@@ -42,7 +42,7 @@ Open the **Logs** section of the Log Analytics workspace and create a query for
42
42
43
43

44
44
45
-
Here the resource is already marked as the Log Analytics workspace, and action group integration is provided.
45
+
Here, the resource is already marked as the Log Analytics workspace, and action group integration is provided.
@@ -52,7 +52,7 @@ The defining characteristic of an alert is its triggering condition. Select **Co
52
52
53
53

54
54
55
-
If necessary, you can edit the Kusto query. Choose a threshold, period, and frequency. The threshold determines when the alert will be raised. The period is the window of time in which the query is run. For example, if the threshold is greater than 0, the period is 5 minutes, and the frequency is 5 minutes, then the rule runs the query every 5 minutes, reviewing the previous 5 minutes. If the number of results is greater than 0, you're notified through the selected action group.
55
+
If necessary, you can edit the Kusto query. Choose a threshold, period, and frequency. The threshold determines when the alert is raised. The period is the window of time in which the query is run. For example, if the threshold is greater than 0, the period is 5 minutes, and the frequency is 5 minutes, then the rule runs the query every 5 minutes, reviewing the previous 5 minutes. If the number of results is greater than 0, you're notified through the selected action group.
56
56
57
57
> [!NOTE]
58
58
> To run the alert rule once a day, across all the events/logs that were created on the given day, change the value of both 'period' and 'frequency' to 1440, that is, 24 hours.
@@ -71,7 +71,7 @@ For more information, see [Create, view, and manage log alerts by using Azure Mo
71
71
72
72
The default graphs give you Kusto queries for basic scenarios on which you can build alerts. You can also modify the queries to fetch the data you want to be alerted on. Paste the following sample Kusto queries on the **Logs** page, and then create alerts on the queries.
73
73
74
-
Recovery Services vaults and Backup vaults send data to a common set of tables that are listed in this article. However, there are slight differences in the schema for Recovery Services vaults and Backup vaults ([learn more](backup-azure-monitoring-built-in-monitor.md)). So, this section is split into multiple sub-sections that helps you to use the right queries depending on which workload or vault types you want to query.
74
+
Recovery Services vaults and Backup vaults send data to a common set of tables that are listed in this article. However, there are slight differences in the schema for Recovery Services vaults and Backup vaults ([learn more](backup-azure-monitoring-built-in-monitor.md)). So, this section is split into multiple subsections that helps you to use the right queries depending on which workload or vault types you want to query.
75
75
76
76
#### Queries common across Recovery Services vaults and Backup vaults
77
77
@@ -95,7 +95,7 @@ Recovery Services vaults and Backup vaults send data to a common set of tables t
95
95
96
96
#### Queries specific to Recovery Services vault workloads
97
97
98
-
- All successful Azure VM backup jobs
98
+
- All successful Azure Virtual Machine (VM) backup jobs
99
99
100
100
````Kusto
101
101
AddonAzureBackupJobs
@@ -198,7 +198,7 @@ Recovery Services vaults and Backup vaults send data to a common set of tables t
198
198
199
199
### Diagnostic data update frequency
200
200
201
-
The diagnostic data from the vault is pumped to the Log Analytics workspace with some lag. Every event arrives at the Log Analytics workspace *20 to 30 minutes* after it's pushed from the Recovery Services vault. Here are further details about the lag:
201
+
The diagnostic data from the vault is pumped to the Log Analytics workspace with some lag. Every event arrives at the Log Analytics workspace *20 to 30 minutes* after being pushed from the Recovery Services vault. Here are further details about the lag:
202
202
203
203
- Across all solutions, the backup service's built-in alerts are pushed as soon as they're created. So they usually appear in the Log Analytics workspace after 20 to 30 minutes.
204
204
- Across all solutions, on-demand backup jobs and restore jobs are pushed as soon as they *finish*.
@@ -210,7 +210,7 @@ The diagnostic data from the vault is pumped to the Log Analytics workspace with
210
210
> [!NOTE]
211
211
> The same delay applies to other destinations for diagnostics data, such as Storage accounts and Event Hubs.
212
212
213
-
## Using the Recovery Services vault's activity logs
213
+
## Monitor backup jobs using the Recovery Services vault's activity logs
214
214
215
215
> [!CAUTION]
216
216
> The following steps apply only to *Azure VM backups.* You can't use these steps for solutions such as the Azure Backup agent, SQL backups within Azure, or Azure Files.
@@ -233,11 +233,11 @@ To identify the appropriate log and create an alert:
Here the resource is the Recovery Services vault itself. Repeat the same steps for all of the vaults in which you want to be notified through activity logs. The condition won't have a threshold, period, or frequency because this alert is based on events. As soon as the relevant activity log is generated, the alert is raised.
236
+
Here, the resource is the Recovery Services vault itself. Repeat the same steps for all of the vaults in which you want to be notified through activity logs. The condition doesn't have a threshold, period, or frequency because this alert is based on events. As soon as the relevant activity log is generated, the alert is raised.
237
237
238
-
## Using Log Analytics to monitor at scale
238
+
## Monitor at scale using Log Analytics workspace
239
239
240
-
You can view all alerts created from activity logs and Log Analytics workspaces in Azure Monitor. Just open the **Alerts** pane on the left.
240
+
You can view all alerts created from activity logs and Log Analytics workspaces in Azure Monitor. Just open the **Alerts** pane.
241
241
242
242
Although you can get notifications through activity logs, we highly recommend using Log Analytics rather than activity logs for monitoring at scale. Here's why:
In the command output, the **RegistrationState** should change to **Registered**. If not, just run the **[Register-AzResourceProvider](/powershell/module/az.resources/register-azresourceprovider)** cmdlet again.
77
77
78
-
## Create a Recovery Services vault
78
+
## Create a Recovery Services vault for Azure VM backup
79
79
80
80
The following steps lead you through creating a Recovery Services vault. A Recovery Services vault is different than a Backup vault.
If you want to selectively back up a few disks and exclude others as mentioned in [these scenarios](selective-disk-backup-restore.md#scenarios), you can configure protection and backup only the relevant disks as documented [here](selective-disk-backup-restore.md#enable-backup-with-powershell).
258
258
259
-
## Monitoring a backup job
259
+
## Monitor an Azure VM backup job
260
260
261
261
You can monitor long-running operations, such as backup jobs, without using the Azure portal. To get the status of an in-progress job, use the [Get-AzRecoveryservicesBackupJob](/powershell/module/az.recoveryservices/get-azrecoveryservicesbackupjob) cmdlet. This cmdlet gets the backup jobs for a specific vault, and that vault is specified in the vault context. The following example gets the status of an in-progress job as an array, and stores the status in the $joblist variable.
0 commit comments