AWS RDS MySQL migration to Azure Database for MySQL

Copper Contributor

Hi,

 

The current setup of MySQL on AWS uses the following features/services, what are the possible ways to address the following requirements without third-party tools/services;

 

  1. A way to execute backup and restore process, the relevant backups in Azure Database (SaaS) via automated restoration script.
  2. A copy of the online database backup to be exported for on-premise restoration.
  3. The database connectivity be able to Allow/Block port and IP.

Thank you.

2 Replies

@Trevine Cooray 

 

Azure DB for MySQL service performs automatic backups and allows point in time restore. There is no option for end user to trigger automatic backups but you can trigger a restore to a new server at any time to restore a backup as of specified time. You can do this through ARM templates or REST APIs. If you want, you can also take mysqldump and perform mysql restore using bash script when you want.

 

2. To perform on-premise restoration, mysqldump/restore is again your best option.

 

3.  To whitelist IP addresses in server firewall to connect to server, you can refer following

https://docs.microsoft.com/en-us/azure/mysql/concepts-firewall-rules

 

 

  • Ensure that the source MySQL server is running a supported MySQL community edition. To determine the version of your MySQL instance, in the mysql utility or MySQL Workbench, run the

    For more information, see the article Supported Azure Database for MySQL versions.

  • Download and install the MySQL Employees sample database.

  • Create an instance of Azure Database for MySQL.

  • Create an Azure Virtual Network (VNet) for Azure Database Migration Service by using the Azure Resource Manager deployment model, which provides site-to-site connectivity to your on-premises source servers by using either ExpressRoute or VPN. For more information about creating a VNet, see the Virtual Network Documentation, and especially the quickstart articles with step-by-step details.

  • Ensure that your VNet Network Security Group rules don't block the following inbound communication ports to Azure Database Migration Service: 443, 53, 9354, 445, and 12000. For more detail on Azure VNet NSG traffic filtering, see the article Filter network traffic with network security groups.

  • Configure your Windows Firewall (or your Linux firewall) to allow for database engine access. For MySQL server, allow port 3306 for connectivity.

  • Open your Windows firewall to allow Azure Database Migration Service to access the source MySQL server (the default TCP port is 3306).

  • When using a firewall appliance in front of your source database(s), you may need to add firewall rules to allow the Azure Database Migration Service to access the source database(s) for migration.

  • Create a server-level firewall rule for the Azure Database for MySQL server to allow Azure Database Migration Service access to the target databases. Provide the subnet range of the VNet used for Azure Database Migration Service.