You can use Azure Backup to protect Azure Database for PostgreSQL- Flexible Server. This article summarizes supported regions, scenarios, and the limitations.
Supported regionsVaulted backup for PostgreSQL â flexible server is generally available in all public cloud regions and sovereign regions.
Support scenariosConsider the following support scenarios when you back up Azure Database for PostgreSQL â Flexible Server:
azuresu
or azure_pg_admin
, including the native PostgreSQL database. So, databases with these owners can't be backed up or restored.Azure Database for PostgreSQL â Flexible Server backups include the following limitations:
The use of create role scripts for azure_su
, azure_pg_admin
, replication
, localadmin
, and Entra Admin
causes the following errors during restoration on another flexible server, which you can safely ignore.
role "azure_pg_admin" already exists.
role "azuresu" already exists.
role "replication" already exists.
ERROR: must be superuser to create superusers
ERROR: Only roles with privileges of role "azuresu" may grant privileges as this role. permission denied granting privileges as role "azuresu"
ERROR: permission denied granting privileges as role "azuresu" SQL state: 42501 Detail: Only roles with privileges of role "azuresu" may grant privileges.
Ignore any errors related to pg_catalog, pg _aadauth extensions as it is owned by azure_su and localadmin does not have access to directly create this extension on flexible server, but these are automatically created on new flexible servers or when you enable Microsoft entra authentication.
ERROR: Only roles with the ADMIN option on role "pg_use_reserved_connections" may grant this role. permission denied to grant role "pg_use_reserved_connections"
ERROR: permission denied to grant role "pg_use_reserved_connections" SQL state: 42501 Detail: Only roles with the ADMIN option on role "pg_use_reserved_connections" may grant this role.
In PostgreSQL community version 16, the requirement for superuser privileges to set the Bypass Row -level security (RLS) attribute was removed. So, in versions 16 and higher, you can grant the Bypass RLS to azure_pg_admin allowing others to set the RLS. For versions lower than 16, the bypasses attribute is granted only to the server admin and no other nonsuperuser roles.
If you're using Entra Admins after restoration, you might encounter the Owner Change Issue : As a workaround, use the grant option to provide ownership.
Was this page helpful?
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4