Home > Manage Your Storage

Export to PDF

Manage Your Storage

Cloud Cyber Recovery supports use your own storage for application resilience. Navigate to Settings > Storage profiles, and all the storage profiles are displayed in the table.

If you are using your own storage, you can choose to use the following storage type: Microsoft Azure Blob Storage and Google Cloud Storage. In addition, if you may have set up the storage firewall to only allow trusted clients to access your storage, read the instructions in the Allow AvePoint Agent Servers to Access Your Storage Account section carefully and complete the settings as needed.

If you have updated your subscription from using default storage to your own storage, you must navigate to this page, click Change to my own storage link to configure the storage profiles connecting to your own storage. Otherwise, the backup will be interrupted.

Go to configure your own storage.

If you updated the subscription by using your own storage to default AvePoint storage, the backup service will force a full backup for the subsequent backup job in the schedule and automatically store the backup data to the default AvePoint storage. The legacy backup data stored on your own storage can still be used for restoring until it expires the retention period.

You can click the storage profile name to view the details of the storage location and click Edit to update the profile information. The storage information, apart from its path information, can be modified.

View details of a storage profile.

Follow the instructions below to create a storage profile:

  1. In the Storage profile page, click the Create button. The Create storage profile pane appears on the right.

    The Create storage profile panel.

  2. Enter a profile name for the storage location that you want to connect to and provide an optional description.

  3. In the Storage Type field, select a storage type from the list and then refer to the following sections for the storage configuration.

Microsoft Azure Storage

Complete the following steps:

*Note: The supported Azure account kinds are Storage and StorageV2 of Standard performance type. For details on creating a storage account, refer to the Microsoft article: .

  1. Storage type – Select Microsoft Azure Blob Storage from the drop-down list.

  2. Container name – Enter the container name you wish to access.

    *Note: The entered name must match an existing container.

  3. Account name – Enter the corresponding account name to access the specified container.

  4. Account key – Enter the corresponding account key to access the specified container.

  5. Click Save to save your storage. The storage path cannot be changed once saved, and the storage profile cannot be deleted once the storage has been applied to store the backup data for a region.

Google Cloud Storage

*Note: The following permissions are required for Google Cloud Storage. For permission details, refer to .

- storage.buckets.get - storage.objects.list - storage.objects.create - storage.objects.delete - storage.objects.get

Follow the instructions below:

  1. Storage type – Select Google Cloud Storage from the drop-down list.

  2. Service account email address – Enter the corresponding client email to access the specified service account.

  3. Private key – Enter the corresponding private key to access the specified service account.

  4. Project ID – Enter the corresponding project ID to access the specified service account.

  5. Bucket name – Enter the bucket name you wish to access.

    *Note: The entered name must match an existing bucket. If no bucket is available, refer to to create a new one.

  6. Click Save to save your storage. The storage path cannot be changed once saved, and the storage profile cannot be deleted once the storage has been applied to store the backup data for a region.

Allow AvePoint Agent Servers to Access Your Storage Account

If you are going to protect Azure storage or use your own storage device to store the backup data, read the instructions in this section carefully and complete the settings as needed. Otherwise, you can skip this topic.

When you are using your own storage, you may have set up the storage firewall to only allow trusted clients to access for security concerns. To ensure that AvePoint cloud products can access your storage, complete the settings as required in the following conditions:

*Note: If you are in trial and the storage account you want to use in the trial has a firewall enabled, read the conditions below and contact AvePoint Support for the corresponding reserved IP addresses or ARM VNet IDs.

- If you use a storage type other than Microsoft Azure storage, you must add **reserved** IP addresses to your storage firewall. To get the list of the reserved IP addresses, refer to . - If you are using Microsoft Azure storage, refer to the following: - If your storage account is in the same data center as the one you use to sign up for AvePoint Online Services or your storage account is in its , you must add the Azure Resource Manager (ARM) VNet subnets where the AvePoint agents are running on to your storage networking. You can find additional details in this Microsoft article: , and get the subnet ID of AvePoint cloud products for your data center from . For detailed instructions, refer to [Add ARM virtual networks](#missing-link). - **Other than the condition above**, you need to add all the reserved IP addresses to the Azure storage firewall. For details, refer to [Add reserved IP addresses](#missing-link).

Add reserved IP addresses

Follow the steps below:

  1. Navigate to AvePoint Online Services interface > Administration > Security.

  2. Click Download next to the Reserved IP Addresses tile to download the list of reserved IP addresses of AvePoint Online Services. For details, refer to .

  3. Go to the storage account that you want to secure.

  4. Select Networking on the menu.

  5. Check that you have selected to allow access from Selected networks.

  6. Enter the IP address or address range under Firewall > Address Range.

  7. Select Save to apply your changes.

Add ARM virtual networks

There are two ways to grant access to a subnet in a virtual network belonging to another tenant:

- Use the Azure CLI tool () ## Use the Azure CLI tool # Step 1 (Optional): If you have multiple Azure subscriptions, please switch to the correct subscription # This command sets the active subscription to the specified subscription ID. az account set --subscription xxxxxxxx-xxxx-xxxx-xxxx-yyyyyyyyyyyy # Step 2 (Optional): Confirm whether the subscription switch is correct # This command displays the current subscription information in a table format. az account show --output table # Step 3: Get the AvePoint Online Services network subnet resource ID # This variable stores the resource ID of the subnet in the virtual network. # Replace with the Azure Resource Manager (ARM) VNet ID downloaded from your AvePoint Online Services tenant. $SUBNETID="/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-yyyyyyyyyyyy/resourceGroups/ResourceGroupName/providers/Microsoft.Network/virtualNetworks/VirtualNetworkName/subnets/SubnetName" # Step 4: Set your resource group name # This variable stores the name of the resource group where your storage account is located. $DESTRG="customer_resource_group_name" # Step 5: Set your storage account name # This variable stores the name of the storage account to which you want to add the network rule. $DESTSTA="customer_storage_account_name" # Step 6: Add the firewall virtual network rule to grant access to AvePoint Online Services # This command adds a network rule to the specified storage account, allowing access from the specified subnet. az storage account network-rule add --resource-group $DESTRG --account-name $DESTSTA --subnet $SUBNETID # Step 7: List the current network rules for the storage account to verify the addition # This command lists the virtual network rules for the specified storage account. az storage account network-rule list --resource-group $DESTRG --account-name $DESTSTA --query virtualNetworkRules # Step 8 (Optional): Disable the public access to storage account # This command updates the storage account to deny public network access. az storage account update --resource-group $DESTRG --name $DESTSTA --default-action Deny # Step 9 (Optional): Verify that the default action for network rules is set to Deny # This command shows the network rule set for the specified storage account, including the default action. az storage account show --resource-group $DESTRG --name $DESTSTA --query networkRuleSet.defaultAction - Use the Azure Az PowerShell () ## Use the Azure Az PowerShell # Step 1: Sign in to Azure with your Azure Admin account Connect-AzAccount # Step 2 (Optional): If you have multiple Azure subscriptions, please switch to the correct subscription # This command sets the active subscription to the specified subscription ID. Set-AzContext -SubscriptionId "xxxxxxxx-xxxx-xxxx-xxxx-yyyyyyyyyyyy" # Step 3: Get the AvePoint Online Services network subnet resource ID # This variable stores the resource ID of the subnet in the virtual network. # Replace with the Azure Resource Manager (ARM) VNet ID downloaded from your AvePoint Online Services tenant. $SUBNETID="/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-yyyyyyyyyyyy/resourceGroups/ResourceGroupName/providers/Microsoft.Network/virtualNetworks/VirtualNetworkName/subnets/SubnetName" # Step 4: Set resource group name # This variable stores the name of the resource group where your storage account is located. $DESTRG="customer_resource_group_name" # Step 5: Set storage account name # This variable stores the name of the storage account to which you want to add the network rule. $DESTSTA="customer_storage_account_name" # Step 6: Add the firewall virtual network rule to grant access to AvePoint Online Services # This cmdlet adds a network rule to the specified storage account, allowing access from the specified subnet. Add-AzStorageAccountNetworkRule -ResourceGroupName $DESTRG -Name $DESTSTA -VirtualNetworkResourceId $SUBNETID # Step 7: Verify the newly added network rule # This cmdlet retrieves the network rule set for the specified storage account. Get-AzStorageAccountNetworkRuleSet -ResourceGroupName $DESTRG -AccountName $DESTSTA

You will see the virtual network rules in Azure Portal, as the screenshot below shows. You may also notice that a warning message “Insufficient Permission…” is displayed. It is because the subnet is not in your subscription. You can ignore it.

The vNet rules.