Skip to content

Commit b24e6d6

Browse files
author
akarshprabhu
committed
Restore CVM adds to improve steps to restore
1 parent 4e562e6 commit b24e6d6

3 files changed

Lines changed: 50 additions & 42 deletions

File tree

articles/backup/confidential-vm-backup.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,14 +25,13 @@ This article describes how to configure and back up Confidential VM (CVM) with P
2525

2626
Before you configure backup for CVM with CMK, ensure that the following prerequisites are met:
2727

28-
- Register for the preview feature `RestorePointSupportForConfidentialVMV2` under the `Microsoft.Compute` provider namespace by running the following cmdlet, which is auto‑approved.
28+
- Register for the preview feature `RestorePointSupportForConfidentialVMV2` under the `Microsoft.Compute` provider namespace by running the following cmdlet. The registration is autoapproved.
2929

3030
```azurepowershell-interactive
3131
Register-AzProviderFeature -FeatureName "RestorePointSupportForConfidentialVMV2" -ProviderNamespace "Microsoft.Compute"
3232
3333
```
3434

35-
3635
- Identify or create a Confidential VM (CVM) in a supported region. See the [supported regions](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=virtual-machines).
3736
- Identify or [create a Recovery Services Vault](backup-create-recovery-services-vault.md#create-a-recovery-services-vault) in the same region as the VM.
3837

articles/backup/confidential-vm-restore.md

Lines changed: 46 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Azure Backup - Restore Confidential VM using Azure Backup (preview)
33
description: Learn about restoring Confidential VM with Platform Managed Key (PMK) or Customer Managed Key (CMK) using Azure Backup.
44
ms.topic: how-to
5-
ms.date: 01/28/2026
5+
ms.date: 02/03/2026
66
ms.custom: references_regions
77
ms.service: azure-backup
88
author: AbhishekMallick-MS
@@ -17,54 +17,40 @@ This article describes how to restore Confidential VM (CVM) encrypted with Platf
1717

1818
Learn about the [supported scenarios for Confidential VM backup](backup-support-matrix-iaas.md#support-for-confidential-vm-backup-preview).
1919

20-
## Restore scenarios for Confidential VM
20+
## Prerequisites
21+
22+
Before you start the Confidential VM restore process, ensure you have the recovery points available in the Recovery Services vault.
23+
24+
## Restore scenarios for a Confidential VM
2125

2226
Confidential VM restore behavior depends on the state of the DES, Key Vault, and keys at the time of restore. Key restore scenarios include:
2327

2428
- **Original Key or Key Version intact**: Restore succeeds if the original Disk Encryption Set (DES) and key remain intact.
2529
- **Key Rotation**: Restore succeeds when a new key version is active, provided the previous key version isn't expired or deleted.
26-
- **Key Change**: If the DES uses a new key, restore succeeds only if the previous key still exists; it fails if the previous key is deleted.
30+
- **Key Change**: If the DES uses a new key in the same key vault, restore succeeds only if the original key(used during backup) still exists. It fails if original key is deleted. If you're using a different key vault - it should point to the same key as the original one.
2731
- **DES or Key Deleted**: Restore fails with errors, such as `UserErrorDiskEncryptionSetDoesNotExist` or `UserErrorDiskEncryptionSetKeyDoesNotExist`. To resolve, re-create the key and DES using restored key data, then retry the restore.
28-
- **Input DES Provided**: If you provide a new DES created from restored key data, restore can succeed if the key and version match the ones used at backup time.
32+
- **Input DES Provided**: If you provide a new DES created from restored key data, restore succeeds if the key and version match the ones used at backup time.
2933
- **Mismatched DES or Key**: Restore fails with `UserErrorInputDESKeyDoesNotMatchWithOriginalKey`. To resolve this error, restore the missing keys.
3034

3135
Learn how to [restore missing keys for Confidential VM restore](#restore-missing-keys-for-confidential-vm-restore).
3236

33-
## Prerequisites
34-
35-
Before you start the Confidential VM restore process, ensure you have the recovery points available in the Recovery Services vault.
36-
37-
## Assign permissions to DES and Confidential Guest VM Agent for restore
38-
39-
Disk Encryption Set and Confidential Guest VM Agent need permissions on the Key Vault or Managed HSM. To provide the permissions, follow these steps:
37+
## Restore a Confidential VM
4038

41-
**For Key vault**: To grant permissions to the Key vault, select the message *To associate a disk, image, or snapshot with this disk encryption set, you must grant permissions to the key vault*.
39+
### Restore with original key intact
40+
During the restore process, you can continue without providing a Disk encryption set input when the original(used during backup) Customer Managed Key (CMK), Key Vault, mHSM, and DES are available. In these scenarios, you can continue the restore process as usual. [Learn how to restore an Azure VM](backup-azure-arm-restore-vms.md).
4241

43-
**For Managed HSM**: To grant permissions to the Managed HSM, follow these steps:
44-
45-
1. Assign newly created DES with the Managed HSM Crypto User Role:
42+
### Restore when original key is rotated, lost, or compromised
43+
The restore process fails if the original CMK, Key Vault, mHSM, or DES referencing the CMK is unavailable, or if backup can't access the original CMK. In such cases, the initial restore attempt fails, and the CVM won't restore. To address this, follow these steps:
44+
1. Trigger the first restore operation without providing the disk encryption set input. This attempt fails due to the missing key, but it results in the key being restored in the storage account.
45+
1. After this process, restore the Customer Managed Key that was backed up by Azure Backup, then create a new DES that points to the recovered key. Learn how to [restore missing keys](#restore-missing-keys-for-confidential-vm-restore) and [assign required permissions](#assign-permissions-to-des-and-confidential-guest-vm-agent-for-restore).
46+
1. Initiate the restore operation again on the Restore page, this time entering the appropriate Disk Encryption Set.
4647

47-
1. In the [Azure portal](https://portal.azure.com/), go to **Managed HSM** > **Settings**, and then select **Local RBAC**.
48-
2. To add a new Role Assignment, select **Add**.
49-
3. Under **Role**, select **Managed HSM Crypto User Role**.
50-
4. Under **Scope**, select the restored key. You can also select **All Keys**.
51-
5. On the **Security principal**, select *newly created DES*.
52-
53-
2. Assign required permissions to the Confidential Guest VM Agent for booting up CVM:
54-
55-
1. In the [Azure portal](https://portal.azure.com/), go to **Managed HSM** > **Settings**, and then select **Local RBAC**.
56-
2. To add a new Role Assignment, select **Add**.
57-
3. Under **Role**, select **Managed HSM Crypto Service Encryption User**.
58-
4. Under **Scope**, select the restored key. You can also select **All Keys**.
59-
5. On the **Security principal**, select **Confidential Guest VM Agent**.
60-
61-
## Restore the Confidential VM
62-
63-
After you assign the required permissions, you can run the restore operation. [Learn how to restore an Azure VM](backup-azure-arm-restore-vms.md).
48+
> [!NOTE]
49+
> Restoring from a different DES - even if it uses the correct key - isn't currently supported from the snapshot-only tier restore points.
6450
6551
## Restore missing keys for Confidential VM restore
6652

67-
If the restore operation fails, you need to restore the PMK or CMK that Azure Backup backed up.
53+
If the restore operation fails, you need to restore the keys that Azure Backup backed up.
6854

6955
To restore the key using PowerShell, follow these steps:
7056

@@ -74,15 +60,12 @@ To restore the key using PowerShell, follow these steps:
7460
$vault = Get-AzRecoveryServicesVault -ResourceGroupName "<vault-rg>" -Name "<vault-name>"
7561
```
7662

77-
2. To list all failed restore jobs from the last 7 days, run the following cmdlet:
63+
2. To list all failed restore jobs from the last seven days, run the following cmdlet. If you want to fetch older jobs, update the day range in the cmdlet.
7864

7965
```azurepowershell
8066
$Jobs = Get-AzRecoveryServicesBackupJob -From (Get-Date).AddDays(-7).ToUniversalTime() -Status Failed -Operation Restore -VaultId $vault.ID
8167
```
8268

83-
>[!Note]
84-
>If you want to fetch older jobs, update the day range in the cmdlet.
85-
8669
3. To select the failed restore job from the result and get the job details, run the following cmdlet:
8770

8871
*Example*
@@ -132,6 +115,32 @@ To restore the key using PowerShell, follow these steps:
132115

133116
Now, you can create a new DES with Encryption type as *Confidential disk encryption with CMK*, which should point to the restored key. This DES should have enough permissions to perform a successful restore. If you use a new Key Vault or Managed HSM to restore the key, then *Backup Management Service* has enough permissions on it. [Learn how to grant permission for Key Vault or Managed HSM access](confidential-vm-backup.md#assign-permissions-for-confidential-vm-backup).
134117

118+
## Assign permissions to DES and Confidential Guest VM Agent for restore
119+
120+
Disk Encryption Set and Confidential Guest VM Agent need permissions on the Key Vault or Managed HSM. To provide the permissions, follow these steps:
121+
122+
**For Key vault**: To grant permissions to the Key vault, you can follow [these steps in the documentation](/azure/key-vault/general/assign-access-policy?tabs=azure-portal) or follow these steps:
123+
1. Navigate to the Disk encryption set instance.
124+
1. Select the message *To associate a disk, image, or snapshot with this disk encryption set, you must grant permissions to the key vault* and grant permissions.
125+
126+
**For Managed HSM**: To grant permissions to the Managed HSM, follow these steps:
127+
128+
1. Assign newly created DES with the Managed HSM Crypto User Role:
129+
130+
1. In the [Azure portal](https://portal.azure.com/), go to **Managed HSM** > **Settings**, and then select **Local RBAC**.
131+
2. To add a new Role Assignment, select **Add**.
132+
3. Under **Role**, select **Managed HSM Crypto User Role**.
133+
4. Under **Scope**, select the restored key. You can also select **All Keys**.
134+
5. On the **Security principal**, select *newly created DES*.
135+
136+
2. Assign required permissions to the Confidential Guest VM Agent for booting up CVM:
137+
138+
1. In the [Azure portal](https://portal.azure.com/), go to **Managed HSM** > **Settings**, and then select **Local RBAC**.
139+
2. To add a new Role Assignment, select **Add**.
140+
3. Under **Role**, select **Managed HSM Crypto Service Encryption User**.
141+
4. Under **Scope**, select the restored key. You can also select **All Keys**.
142+
5. On the **Security principal**, select **Confidential Guest VM Agent**.
143+
135144
## Related content
136145

137146
- [Support matrix for Confidential VM backup](backup-support-matrix-iaas.md#support-for-confidential-vm-backup-preview).

includes/confidential-vm-backup-support-matrix.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ The following table lists the supported scenarios for Confidential VM backup:
1111

1212
| Scenario | Supportability |
1313
| --- | --- |
14-
| [VM size](/azure/confidential-computing/virtual-machine-options) | Version 6 series is supported. <br> Version 5 series isn't supported. |
14+
| Virtual Machine size | **[v6-series](/azure/confidential-computing/virtual-machine-options)** is supported. <br> **[v5-series](/azure/confidential-computing/virtual-machine-options)** isn't supported. |
1515
| Region availability | Supported in UAE North, Korea Central. |
16-
| Key rotation for backups | When key rotation occurs on a confidential virtual machine, the keys for the VM disks, related restore points, and snapshots update automatically. <br><br> Note that the key rotation in this preview release might fail due to the following scenarios: <br><br> - A large number of disks are linked to a single Disk Encryption Set (DES), including their restore points and snapshots. <br> - More than 40 disks are attached to one DES when only restore points are associated with these disks. <br> - Both restore points and snapshots are present for disks connected to the same DES, which lowers the safe threshold of 40 disks. <br> - Performance limitations during key rotation when multiple disks share one DES. <br><br> Recommendation: Keep the number of disks connected to each DES to a minimum until the issue is resolved. |
17-
| Backup capabilities | - You can backup Confidential VMs with OS disk encryption only. <br> - Backup and restore fail if the CVM v2 opt-out feature flag is enabled for your subscription. <br> - Multi-disk crash consistent backup is unsupported. <br> - Cross Region Restore is currently unsupported as CVM v6 SKU isn't generally available in Azure paired regions. |
16+
| Key rotation for backups | When key rotation occurs on a confidential virtual machine, the keys for the VM disks, related restore points, and snapshots update automatically. <br><br> **Known issue:** The key rotation in this *preview release* might have performance issues or fail in the following scenarios: <br> - More than 40 disks are attached to one DES when (only) restore points are associated with these disks. <br> - If you also directly create disk snapshots outside of Azure backup for these disks connected to the same DES, this lowers the safe threshold of 40 disks to DES mapping. <br><br> **Recommendation**: Keep the number of disks connected to each DES to a minimum until the issue is resolved. |
17+
| Backup capabilities | - You can backup Confidential VMs with OS disk encryption only. <br> - Backup and restore fail if the CVM v2 opt-out feature flag is enabled for your subscription. <br> - Multi-disk crash consistent backup is unsupported. <br> - Cross Region Restore is currently unsupported as CVM v6 VM size isn't generally available in Azure paired regions. |

0 commit comments

Comments
 (0)