With Altaro VM Backup, you can send a redundant copy of your backups to an Azure Cloud Storage Account, this is ideal for Disaster Recovery purposes. To do so, please follow the steps below:



Prerequisites:


Note: If you are planning to run restores to Azure", make sure that the Azure datacenter you're selecting supports spinning up VMs.



A. Set up your Azure Storage Account


  1.  Sign in or Sign up to your Azure Portal account on https://portal.azure.com

  2. Go to [Storage Accounts] > [Add]


  3. Fill in the options on screen.

    Ensure you select Standard performance.

    Ensure you select General Purpose as the Account kind.

    Please note that you should select General Purpose v1 or v2 based on your calculation from this article.

    Choose your preference for Replication redundancy. Important: Selecting ZRS will require a General Purpose v2 account.

    More information about Azure Replication Options can be found here: https://docs.microsoft.com/en-gb/azure/storage/storage-redundancy

    Also, please see Azure Storage Pricing for pricing information for the different redundancy options.

    Altaro offsite backups are encrypted (256-Bit AES) natively through the product.



  4. Click [Review + create] to complete the storage account creation

  5. Once created, we need to get the 'Connection string' to enter into Altaro VM Backup. There are 2 possible ways you can get this:

    1. Access keys

      Locate the connection string for your account from [Settings] > [Access Keys]. You will need to use this in the next step to add your Azure location in Altaro VM Backup.



    2. SAS (Shared Access Signature)

      The second option, should you be required to make use of an 'SAS (Shared Access Signature)' instead of an 'Access key' you can generate one from [Settings] > [Shared access signature]

      The advantage of a Shared access signature is that you will be able to restrict an IP or a range from which requests are accepted. Note that this is also possible to do at the storage account level, using the Firewall.

      You can also set an expiration date/time, so if for instance you wish to give it a 1 year expiration you will need to generate a new one and re-enter it in Altaro VM Backup.

      IMPORTANT: Ensure that you set a reminder to regenerate your Connection string if you have given it an expiration date otherwise offsite backups will start failing with a '403 Forbidden Error'.

      To generate your Connection string, ensure that you leave all options ticked, then set your preferred expiry date, choose whether you would like to restrict 'Allowed IP addresses' and click [Generate SAS and connection string]



      Next, simply scroll down and locate your Connection string. You will need to use this in the next step to add your Azure location in Altaro VM Backup.




Note: Each Altaro VM Backup installation should make use of a different Azure Storage Account.




B. Configure your new Azure Storage Account as an Offsite Backup Location


To use your Azure Storage Account as an offsite copy location for your VMs, please proceed as follows:


  1. Open the Altaro VM Backup management console and go to [Setup] > [Backup Locations]

  2. Click Add Offsite Location:



  3. Choose the [Cloud Backup to an Azure Storage Account] option and click [Next]:



  4. Enter the Connection String generated in Section 'A' point number '5' above, then click [Test Connection] to verify you have the correct string.


  5. Once the connection test is successful, click [Finish] and the new Offsite Location will appear in your Backup Locations list as below. To change the Connection String you can click the Edit (pencil) icon.


  6. Lastly, select the VMs you wish to assign to this rotation and Drag and Drop them from the VM list on the left into the newly created Azure location, then click [Save Changes] to complete.

  7. Once done, either start an Offsite Copy manually from the [Offsite Copies] menu, or wait for your next Scheduled Offsite Copy job.