Microsoft SQL Server
Configure Microsoft SQL Server databases for backup.
Supported Versions
| Version | Notes |
|---|---|
| SQL Server 2017 | v14.x |
| SQL Server 2019 | v15.x |
| SQL Server 2022 | v16.x |
| Azure SQL Edge | Container-based |
Architecture
Unlike other database adapters that use CLI dump tools, SQL Server backup uses:
- T-SQL
BACKUP DATABASEcommand - Native
.bakformat (full database backup) - File transfer to access
.bakfiles (shared volume or SSH)
This means the backup file is created on the SQL Server first, then transferred to DBackup.
Configuration
Connection Settings
| Field | Description | Default |
|---|---|---|
| Host | SQL Server hostname | localhost |
| Port | SQL Server port | 1433 |
| User | SQL Server login | Required |
| Password | Login password | Required |
| Database | Database name(s) to backup | Required |
Configuration Settings
| Field | Description | Default |
|---|---|---|
| Encrypt | Use encrypted connection | true |
| Trust Server Certificate | Trust self-signed certs | false |
| Request Timeout | Query timeout in ms | 300000 (5 min) |
| Additional Options | Extra BACKUP options | - |
File Transfer Settings
| Field | Description | Default |
|---|---|---|
| Backup Path (Server) | Server-side backup directory | /var/opt/mssql/backup |
| File Transfer Mode | How to access .bak files | local |
| Local Backup Path | Host-side mounted path (local mode) | /tmp |
| SSH Host | SSH host (SSH mode, defaults to DB host) | - |
| SSH Port | SSH port (SSH mode) | 22 |
| SSH Username | SSH username (SSH mode) | - |
| SSH Auth Method | password / privateKey / agent | password |
| SSH Password | SSH password | - |
| SSH Private Key | PEM private key | - |
| SSH Passphrase | Key passphrase | - |
File Transfer Modes
DBackup supports two modes to access the .bak files that SQL Server creates on its filesystem.
Local Mode (Shared Volume)
Use this when DBackup and SQL Server share a filesystem - typically via Docker volume mounts or NFS shares.
services:
dbackup:
volumes:
- ./mssql-backups:/mssql-backups
# Configure in source:
# - Backup Path (Server): /var/opt/mssql/backup
# - File Transfer Mode: local
# - Local Backup Path: /mssql-backups
mssql:
image: mcr.microsoft.com/mssql/server:2022-latest
volumes:
- ./mssql-backups:/var/opt/mssql/backupHow It Works
- DBackup sends
BACKUP DATABASEcommand to SQL Server - SQL Server writes
.bakfile to/var/opt/mssql/backup - DBackup reads the file from
/mssql-backups(same volume) - DBackup processes (compress/encrypt) and uploads to destination
- Cleanup: Original
.bakfile is deleted
SSH Mode (Remote Server)
Use this when SQL Server runs on a remote host (bare-metal, VM, or remote Docker) and there is no shared filesystem. DBackup connects via SSH/SFTP to download/upload .bak files.
Setup
- Set File Transfer Mode to
SSH - Configure SSH credentials (host, username, password or key)
- Set Backup Path (Server) to the directory on the SQL Server host (e.g.,
/var/opt/mssql/backup) - Ensure the SSH user has read/write access to the backup path
SSH Host Default
If SSH Host is left empty, DBackup uses the same hostname as the database connection. This is the most common setup since SSH and SQL Server usually run on the same machine.
Backup Path is shared between SQL Server and SSH
The Backup Path (Server) is used for both the BACKUP DATABASE T-SQL command and the SSH/SFTP file transfer. This means:
- SQL Server must be able to write to this path
- The SSH user must be able to read and delete files in this path
- Both must reference the same physical directory on disk
If SQL Server runs in Docker, the default path /var/opt/mssql/backup only exists inside the container. Use a volume-mounted path that is identical on both the host and inside the container (e.g., /data/mssql-backups), so SSH can reach the same files:
services:
mssql:
volumes:
- /data/mssql-backups:/data/mssql-backupsThen set Backup Path (Server) to /data/mssql-backups.
If SQL Server is installed directly on the host (bare-metal/VM), you can use the default path /var/opt/mssql/backup since SSH has direct access to the host filesystem.
How It Works (Backup)
- DBackup sends
BACKUP DATABASEcommand to SQL Server - SQL Server writes
.bakfile to the backup path on its filesystem - DBackup connects via SSH/SFTP and downloads the
.bakfile - DBackup processes (compress/encrypt) and uploads to destination
- Cleanup: Remote
.bakfile is deleted via SSH
How It Works (Restore)
- DBackup downloads the backup from storage
- DBackup connects via SSH/SFTP and uploads the
.bakfile to the backup path - DBackup sends
RESTORE DATABASEcommand to SQL Server - SQL Server reads the
.bakfile from the backup path - Cleanup: Remote
.bakfile is deleted via SSH
SSH Authentication
| Method | Description |
|---|---|
| Password | Simple username/password authentication |
| Private Key | PEM-format private key (optionally with passphrase) |
| Agent | Uses the system SSH agent (SSH_AUTH_SOCK) |
Setting Up a Backup User
Create a dedicated login with backup permissions:
-- Create login
CREATE LOGIN dbackup WITH PASSWORD = 'secure_password_here';
-- Create user in master
USE master;
CREATE USER dbackup FOR LOGIN dbackup;
-- Grant backup permissions
ALTER SERVER ROLE [db_backupoperator] ADD MEMBER dbackup;
-- Or grant on specific databases:
USE mydb;
CREATE USER dbackup FOR LOGIN dbackup;
ALTER ROLE [db_backupoperator] ADD MEMBER dbackup;For restore operations:
ALTER SERVER ROLE [dbcreator] ADD MEMBER dbackup;Backup Process
DBackup executes:
BACKUP DATABASE [MyDatabase]
TO DISK = '/var/opt/mssql/backup/backup_20240115_120000.bak'
WITH FORMAT, INIT, COMPRESSIONBackup Options
Add custom options in "Additional Options":
-- With checksum verification
CHECKSUM
-- With differential backup
DIFFERENTIAL
-- Copy-only (doesn't break log chain)
COPY_ONLY
-- Custom description
DESCRIPTION = 'Daily backup'Connection Security
Encrypted Connection (Recommended)
Enable Encrypt option for production:
- Requires valid SSL certificate on SQL Server
- Or enable Trust Server Certificate for self-signed
Azure SQL
For Azure SQL Database:
- Enable Encrypt
- Keep Trust Server Certificate disabled
- Use Azure AD authentication if needed
Troubleshooting
Connection Timeout
Login failed. The login is from an untrusted domainSolutions:
- Increase Request Timeout for large databases
- Check network latency
- Verify SQL Server is accessible
Backup Permission Denied
Cannot open backup device. Operating system error 5 (Access denied)This error occurs when the SQL Server service account (typically mssql) cannot write to the backup directory.
Solutions:
- Ensure the
mssqluser has write access to the backup path:bashsudo chown mssql:mssql /path/to/backup-dir sudo chmod 770 /path/to/backup-dir - Docker: Verify the volume mount exists and the container user has write permissions
- Verify the backup directory exists on the SQL Server - it is not created automatically
File Not Found After Backup (Local Mode)
Backup completed but file not foundSolutions:
- Verify shared volume is mounted correctly
- Check Backup Path (Server) matches SQL Server mount
- Check Local Backup Path matches DBackup mount
- Verify paths are absolute
SSH Connection Failed (SSH Mode)
SSH connection failed: Authentication failedSolutions:
- Verify SSH credentials (username, password, or key)
- Check that the SSH host and port are correct
- Ensure the SSH service is running on the SQL Server host
- For private key auth, verify the key is in PEM format
- Check firewall rules allow SSH connections (port 22)
SSH File Transfer Failed - Permission Denied (SSH Mode)
Failed to download /path/to/backup.bak: Permission deniedThis is the most common SSH mode issue. The backup succeeds (SQL Server writes the .bak file), but the SSH/SFTP download fails because the SSH user cannot read the file.
Why this happens: SQL Server runs as the mssql service account and creates .bak files with restrictive permissions (typically 640, owner mssql:mssql). Even if the backup directory has 777 permissions, the file itself is owned by mssql with limited access - your SSH user cannot read it.
Solution 1 - Add SSH user to the mssql group (recommended):
sudo usermod -aG mssql your-ssh-userLog out and back in (or run newgrp mssql) for the change to take effect.
Solution 2 - Set default ACL on the backup directory:
sudo setfacl -d -m u:your-ssh-user:rwx /path/to/backup-dir
sudo setfacl -m u:your-ssh-user:rwx /path/to/backup-dirThis ensures every new file created in the directory is automatically readable by your SSH user.
Solution 3 - Change SQL Server's default file permissions:
sudo systemctl edit mssql-serverAdd:
[Service]
UMask=0022Then restart: sudo systemctl restart mssql-server. SQL Server will now create files with 644 permissions (world-readable).
TIP
Solution 1 is the quickest and least invasive fix. Solutions 2 and 3 are alternatives if you cannot modify group membership.
SSL Certificate Error
The certificate chain was issued by an authority that is not trustedSolutions:
- Enable Trust Server Certificate (development only)
- Install valid SSL certificate on SQL Server
- Add CA certificate to DBackup container
Azure SQL Edge (Docker)
For containerized development:
services:
mssql:
image: mcr.microsoft.com/azure-sql-edge:latest
environment:
- ACCEPT_EULA=Y
- SA_PASSWORD=YourStrong@Password123
ports:
- "1433:1433"
volumes:
- ./mssql-backups:/var/opt/mssql/backupConfigure source:
- Host:
mssql(service name) orhost.docker.internal - User:
sa - Encrypt:
false - Trust Server Certificate:
true
Restore
To restore a SQL Server backup:
- Go to Storage Explorer
- Find your
.bakbackup file - Click Restore
- Select target database configuration
- Choose:
- Restore to same database (overwrite)
- Restore to new database name
- Confirm and monitor progress
Restore Process
The restore process depends on the configured File Transfer Mode:
Local mode:
- Copy
.bakfile to shared volume (Local Backup Path) - Execute
RESTORE DATABASEcommand - Verify restore integrity
- Cleanup temporary files
SSH mode:
- Upload
.bakfile to server via SFTP (Backup Path) - Execute
RESTORE DATABASEcommand - Verify restore integrity
- Cleanup: Delete remote
.bakfile via SSH
Best Practices
- Use SSH mode for remote SQL Servers without shared filesystem access
- Use shared volumes with proper permissions for Docker setups
- Enable COMPRESSION in backup options (reduces size 60-80%)
- Use CHECKSUM for integrity verification
- Test restores regularly
- Monitor backup duration and adjust timeout
- Use encrypted connections in production
- Separate backup user from application user
- Enable Trust Server Certificate only in development - use valid certs in production