[英]Azure sql database export to storage blob failed
I tried to export Sql Database in azure to storage blob but the operation failed.我尝试将 Azure 中的 Sql 数据库导出到存储 blob,但操作失败。 I do this task daily last month and this issue is new.
我上个月每天都在做这个任务,这个问题是新的。 It shows as follows :
它显示如下:
Error encountered during the service operation.Blob https://blob link/dbname-2019-1-16-14-24.bacpac is not writeable.服务运行过程中遇到错误。Blob https://blob link/dbname-2019-1-16-14-24.bacpac 不可写。 The remote server returned an error: (403) Forbidden.The remote server returned an error: (403) Forbidden.
远程服务器返回错误:(403) 禁止。远程服务器返回错误:(403) 禁止。
I had the same problem.我有同样的问题。 I have contacted Azure support and this is their response.
我已联系 Azure 支持,这是他们的回应。
We recently identified a regression in the import/export service that is generating incorrect SAS tokens to the storage accounts.
我们最近在导入/导出服务中发现了一个回归,它为存储帐户生成了错误的 SAS 令牌。
The engineering team has rolled out the fix, but it might take some time for the fix to get applied worldwide.
工程团队已推出修复程序,但修复程序在全球范围内应用可能需要一些时间。
Please try the following link to access Azure portal and then perform the export operations:
请尝试以下链接访问 Azure 门户,然后执行导出操作:
https://portal.azure.com/?feature.canmodifystamps=trueµsoft_azure_storage=stage1
https://portal.azure.com/?feature.canmodifystamps=trueµsoft_azure_storage=stage1
The portal shows an orange title bar if you open it via the above link, this is expected.
如果您通过上述链接打开门户,该门户会显示一个橙色标题栏,这是意料之中的。
So, it should be already fixed by now.所以,现在应该已经修复了。
If you're using sql scripts for back up following this link , then I suspect that the expired date of SHARED ACCESS SIGNATURE is reached.如果您在此链接后使用 sql 脚本进行备份,那么我怀疑已达到共享访问签名的过期日期。
Please re-generate SHARED ACCESS SIGNATURE , and then use the new key for backup.请重新生成SHARED ACCESS SIGNATURE ,然后使用新密钥进行备份。
Please let me know if any more issues.如果还有问题,请告诉我。
Make sure a firewall rule does not exist.确保防火墙规则不存在。 Please go to the Azure portal "Storage Accounts → "YourStorageAccountName" → Firewalls and Virtual Networks (left vertical panel). Put it to "Allow access" from "All networks". You can also configure the storage account with exceptions for trusted Microsoft services as explained here .
请转到 Azure 门户“存储帐户→“YourStorageAccountName”→ 防火墙和虚拟网络(左侧垂直面板)。从“所有网络”将其设置为“允许访问”。您还可以配置存储帐户,但受信任的 Microsoft 服务除外为解释在这里。
声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.