Forum Discussion
AWS RDS MySQL migration to Azure Database for MySQL
Azure DB for MySQL service performs automatic backups and allows point in time restore. There is no option for end user to trigger automatic backups but you can trigger a restore to a new server at any time to restore a backup as of specified time. You can do this through ARM templates or REST APIs. If you want, you can also take mysqldump and perform mysql restore using bash script when you want.
2. To perform on-premise restoration, mysqldump/restore is again your best option.
3. To whitelist IP addresses in server firewall to connect to server, you can refer following
https://docs.microsoft.com/en-us/azure/mysql/concepts-firewall-rules
- johnmarioAug 30, 2019Copper Contributor
-
Ensure that the source MySQL server is running a supported MySQL community edition. To determine the version of your MySQL instance, in the mysql utility or MySQL Workbench, run the
For more information, see the article https://docs.microsoft.com/azure/mysql/concepts-supported-versions.
-
Download and install the https://dev.mysql.com/doc/employee/en/employees-installation.htmlEmployees sample database.
-
Create an instance of https://docs.microsoft.com/azure/mysql/quickstart-create-mysql-server-database-using-azure-portal.
-
Create an Azure Virtual Network (VNet) for Azure Database Migration Service by using the Azure Resource Manager deployment model, which provides site-to-site connectivity to your on-premises source servers by using either https://docs.microsoft.com/azure/expressroute/expressroute-introduction or https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-about-vpngateways. For more information about creating a VNet, see the https://docs.microsoft.com/azure/virtual-network/, and especially the quickstart articles with step-by-step details.
-
Ensure that your VNet Network Security Group rules don't block the following inbound communication ports to Azure Database Migration Service: 443, 53, 9354, 445, and 12000. For more detail on Azure VNet NSG traffic filtering, see the article https://docs.microsoft.com/azure/virtual-network/virtual-networks-nsg.
-
Configure your https://docs.microsoft.com/sql/database-engine/configure-windows/configure-a-windows-firewall-for-database-engine-access (or your Linux firewall) to allow for database engine access. For MySQL server, allow port 3306 for connectivity.
-
Open your Windows firewall to allow Azure Database Migration Service to access the source MySQL server (the default TCP port is 3306).
-
When using a firewall appliance in front of your source database(s), you may need to add firewall rules to allow the Azure Database Migration Service to access the source database(s) for migration.
-
Create a server-level https://docs.microsoft.com/azure/sql-database/sql-database-firewall-configure for the Azure Database for MySQL server to allow Azure Database Migration Service access to the target databases. Provide the subnet range of the VNet used for Azure Database Migration Service.
-