Skip to content

Cannot create Enhanced Azure Vm backup policy with PowerShell #27503

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
RobertMochnacky opened this issue Apr 3, 2025 · 2 comments
Open

Cannot create Enhanced Azure Vm backup policy with PowerShell #27503

RobertMochnacky opened this issue Apr 3, 2025 · 2 comments
Labels
bug This issue requires a change to an existing behavior in the product in order to be resolved. customer-reported Possible-Solution Recovery Services Backup Service Attention This issue is responsible by Azure service team. Similar-Issue

Comments

@RobertMochnacky
Copy link

RobertMochnacky commented Apr 3, 2025

Hi,
I Cannot create Enhanced Azure Vm backup policy with PowerShell (New-AzRecoveryServicesBackupProtectionPolicy).
I follow the steps in:
https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/backup/backup-azure-vms-enhanced-policy.md
The error message given: New-AzRecoveryServicesBackupProtectionPolicy: Parameter NO_PARAM in request is invalid. Please provide correct value for parameter NO_PARAM
While going through the MSDocs I got to know the following:
The default snapshot retention for each policy is set to two days. You can change the value to a minimum of 1 and a maximum of five days. For weekly policies, the snapshot retention is fixed to five days.
That is apparently not true as Verbose output on request body states:
"instantRpRetentionRangeInDays": 7
When I change it manually to 2 for example and invoke the request it works without a problem.
Please take a look at that and provide a feedback.
Thank you.

DEBUG: 7:57:54 AM - [ConfigManager] Got nothing from [DisplaySecretsWarning], Module = [], Cmdlet = []. Returning default value [True].
DEBUG: 7:57:54 AM - NewAzureRmRecoveryServicesBackupProtectionPolicy begin processing with ParameterSet '__AllParameterSets'.
DEBUG: 7:57:54 AM - using account id 'userid'...
DEBUG: 7:57:54 AM - [ConfigManager] Got [False] from [DisplayBreakingChangeWarning], Module = [Az.RecoveryServices], Cmdlet = [New-AzRecoveryServicesBackupProtectionPolicy].
DEBUG: Inside Restore. Going to create ResourceClient.
DEBUG: [Common.Authentication]: Authenticating using Account: 'userid', environment: 'AzureCloud', tenant: 'tenantid'
DEBUG: 7:57:54 AM - [ConfigManager] Got nothing from [DisableInstanceDiscovery], Module = [], Cmdlet = []. Returning default value [False].
DEBUG: 7:57:54 AM - [ConfigManager] Got [False] from [EnableLoginByWam], Module = [], Cmdlet = [].
DEBUG: 7:57:54 AM - [SilentAuthenticator] Calling SharedTokenCacheCredential.GetTokenAsync - TenantId:'tenantid', Scopes:'https://management.core.windows.net//.default', AuthorityHost:'https://login.microsoftonline.com/', UserId:'userid'
DEBUG: SharedTokenCacheCredential.GetToken invoked. Scopes: [ https://management.core.windows.net//.default ] ParentRequestId:
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z] [Internal cache] Clearing user token cache accessor.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z] [Internal cache] Total number of cache partitions found while getting refresh tokens: 3
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] IsLegacyAdalCacheEnabled: yes
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] IsLegacyAdalCacheEnabled: yes
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] IsLegacyAdalCacheEnabled: yes
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z] Found 3 cache accounts and 0 broker accounts
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z] Returning 3 accounts
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] MSAL MSAL.CoreCLR with assembly version '4.65.0.0'. CorrelationId()
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] === AcquireTokenSilent Parameters ===
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] LoginHint provided: False
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] Account provided: True
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] ForceRefresh: False
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ]
=== Request Data ===
Authority Provided? - True
Scopes - https://management.core.windows.net//.default
Extra Query Params Keys (space separated) -
ApiId - AcquireTokenSilent
IsConfidentialClient - False
SendX5C - False
LoginHint ? False
IsBrokerConfigured - False
HomeAccountId - False
CorrelationId -
UserAssertion set: False
LongRunningOboCacheKey set: False
Region configured:

DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] === Token Acquisition (SilentRequest) started:
Scopes: https://management.core.windows.net//.default
Authority Host: login.microsoftonline.com
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z] [Internal cache] Clearing user token cache accessor.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Internal cache] Total number of cache partitions found while getting access tokens: 3
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [FindAccessTokenAsync] Discovered 4 access tokens in cache using partition key: keyid.tenantid
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] Access token is not expired. Returning the found cache entry. [Current time (04/03/2025 05:57:54) - Expiration Time (04/03/2025 06:43:12 +00:00) - Extended Expiration Time (04/03/2025 06:43:12 +00:00)]
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] Returning access token found in cache. RefreshOn exists ? False
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ]
=== Token Acquisition finished successfully:
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] AT expiration time: 4/3/2025 6:43:12 AM +00:00, scopes: https://management.core.windows.net//.default https://management.core.windows.net//user_impersonation. source: Cache
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ]
[LogMetricsFromAuthResult] Cache Refresh Reason: NotApplicable
[LogMetricsFromAuthResult] DurationInCacheInMs: 0
[LogMetricsFromAuthResult] DurationTotalInMs: 4
[LogMetricsFromAuthResult] DurationInHttpInMs: 0
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] TokenEndpoint: ****
DEBUG: SharedTokenCacheCredential.GetToken succeeded. Scopes: [ https://management.core.windows.net//.default ] ParentRequestId: ExpiresOn: 2025-04-03T06:43:12.0000000+00:00
DEBUG: [Common.Authentication]: Received token with LoginType 'User', Tenant: 'tenantid', UserId: 'userid'
DEBUG: Client Created successfully
DEBUG: Input params - Name:NewPolicy, WorkloadType:AzureVM, BackupManagementType: NULL, RetentionPolicy:IsDailyScheduleEnabled:True, IsWeeklyScheduleEnabled:True, IsMonthlyScheduleEnabled:True, IsYearlyScheduleEnabled:True DailySchedule: DurationCountInDays: 7, RetentionTimes: {4/4/2025 1:00:00 AM}, WeeklySchedule: DurationCountInWeeks: 104, DaysOfTheWeek: {Sunday}, RetentionTimes: {4/4/2025 1:00:00 AM}, MonthlySchedule:DurationCountInMonths:60, RetentionScheduleType:Weekly, RetentionTimes: {4/4/2025 1:00:00 AM}, RetentionScheduleDaily:DaysOfTheMonth:{Date:1, IsLast:False},RetentionScheduleWeekly:DaysOfTheWeek:{Sunday}, WeeksOfTheMonth:{First}, RetentionTimes: {4/4/2025 1:00:00 AM}, YearlySchedule:DurationCountInYears:10, RetentionScheduleType:Weekly, RetentionTimes: {4/4/2025 1:00:00 AM}, RetentionScheduleDaily:DaysOfTheMonth:{Date:1, IsLast:False},RetentionScheduleWeekly:DaysOfTheWeek:{Sunday}, WeeksOfTheMonth:{First}, MonthsOfYear: {January}, RetentionTimes: {4/4/2025 1:00:00 AM}, SchedulePolicy:scheduleRunType:Daily, ScheduleRunTimes:{4/4/2025 1:00:00 AM}, ScheduleRunTimeZone: W. Europe Standard Time
DEBUG: [Common.Authentication]: Authenticating using Account: 'userid', environment: 'AzureCloud', tenant: 'tenantid'
DEBUG: 7:57:54 AM - [ConfigManager] Got nothing from [DisableInstanceDiscovery], Module = [], Cmdlet = []. Returning default value [False].
DEBUG: 7:57:54 AM - [ConfigManager] Got [False] from [EnableLoginByWam], Module = [], Cmdlet = [].
DEBUG: 7:57:54 AM - [SilentAuthenticator] Calling SharedTokenCacheCredential.GetTokenAsync - TenantId:'tenantid', Scopes:'https://management.core.windows.net//.default', AuthorityHost:'https://login.microsoftonline.com/', UserId:'userid'
DEBUG: SharedTokenCacheCredential.GetToken invoked. Scopes: [ https://management.core.windows.net//.default ] ParentRequestId:
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z] [Internal cache] Clearing user token cache accessor.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z] [Internal cache] Total number of cache partitions found while getting refresh tokens: 3
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] IsLegacyAdalCacheEnabled: yes
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] IsLegacyAdalCacheEnabled: yes
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] IsLegacyAdalCacheEnabled: yes
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z] Found 3 cache accounts and 0 broker accounts
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z] Returning 3 accounts
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] MSAL MSAL.CoreCLR with assembly version '4.65.0.0'. CorrelationId()
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] === AcquireTokenSilent Parameters ===
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] LoginHint provided: False
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] Account provided: True
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] ForceRefresh: False
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ]
=== Request Data ===
Authority Provided? - True
Scopes - https://management.core.windows.net//.default
Extra Query Params Keys (space separated) -
ApiId - AcquireTokenSilent
IsConfidentialClient - False
SendX5C - False
LoginHint ? False
IsBrokerConfigured - False
HomeAccountId - False
CorrelationId -
UserAssertion set: False
LongRunningOboCacheKey set: False
Region configured:

DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] === Token Acquisition (SilentRequest) started:
Scopes: https://management.core.windows.net//.default
Authority Host: login.microsoftonline.com
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z] [Internal cache] Clearing user token cache accessor.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Internal cache] Total number of cache partitions found while getting access tokens: 3
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [FindAccessTokenAsync] Discovered 4 access tokens in cache using partition key: partitionkeyid.tenantid
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] Access token is not expired. Returning the found cache entry. [Current time (04/03/2025 05:57:54) - Expiration Time (04/03/2025 06:43:12 +00:00) - Extended Expiration Time (04/03/2025 06:43:12 +00:00)]
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] Returning access token found in cache. RefreshOn exists ? False
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] [Region discovery] Not using a regional authority.
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ]
=== Token Acquisition finished successfully:
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] AT expiration time: 4/3/2025 6:43:12 AM +00:00, scopes: https://management.core.windows.net//.default https://management.core.windows.net//user_impersonation. source: Cache
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ]
[LogMetricsFromAuthResult] Cache Refresh Reason: NotApplicable
[LogMetricsFromAuthResult] DurationInCacheInMs: 0
[LogMetricsFromAuthResult] DurationTotalInMs: 5
[LogMetricsFromAuthResult] DurationInHttpInMs: 0
DEBUG: False MSAL 4.65.0.0 MSAL.CoreCLR .NET 9.0.1 Microsoft Windows 10.0.22631 [2025-04-03 05:57:54Z - ] TokenEndpoint: ****
DEBUG: SharedTokenCacheCredential.GetToken succeeded. Scopes: [ https://management.core.windows.net//.default ] ParentRequestId: ExpiresOn: 2025-04-03T06:43:12.0000000+00:00
DEBUG: [Common.Authentication]: Received token with LoginType 'User', Tenant: 'tenant', UserId: 'userid'
DEBUG: ============================ HTTP REQUEST ============================

HTTP Method:
GET

Absolute Uri:
https://management.azure.com/subscriptions/${subscriptionid}/resourceGroups/${resourceGroup}/providers/Microsoft.RecoveryServices/vaults/${vault}/backupPolicies/${policyName}?api-version=2024-10-01

Headers:
Accept-Language : en-US
x-ms-client-request-id : requiestid

Body:

DEBUG: ============================ HTTP RESPONSE ============================

Status Code:
NotFound

Headers:
Cache-Control : no-cache
Pragma : no-cache
x-ms-operation-identifier : tenantId=tenantid,objectId=objectid/francesouth/objectid
X-Content-Type-Options : nosniff
x-ms-request-id : requestid
x-ms-client-request-id : clientrequestid
x-ms-ratelimit-remaining-subscription-resource-requests: 149
x-ms-correlation-request-id : correlatrionrequestid
x-ms-routing-request-id : routingrequestid
Strict-Transport-Security : max-age=31536000; includeSubDomains
X-Cache : CONFIG_NOCACHE
X-MSEdge-Ref : Ref A: 842B0B7D294F4732A965CC944D113F88 Ref B: FRA231050414045 Ref C: 2025-04-03T05:57:54Z
Date : Thu, 03 Apr 2025 05:57:54 GMT

Body:
{}

DEBUG: Validation of Schedule policy is successful
DEBUG: Validation of Retention policy is successful
DEBUG: Copy of RetentionTime from with SchedulePolicy to RetentionPolicy is successful
DEBUG: Validation of Retention policy with Schedule policy is successful
DEBUG: Validation of Retention policy with Tiering policy is successful
DEBUG: ============================ HTTP REQUEST ============================

HTTP Method:
PUT

Absolute Uri:
https://management.azure.com/subscriptions/${subscriptionid}/resourceGroups/${resourceGroup}/providers/Microsoft.RecoveryServices/vaults/${vault}/backupPolicies/${policyName}?api-version=2024-10-01

Headers:
Accept-Language : en-US
x-ms-client-request-id : clientrequestid

Body:
{
"properties": {
"backupManagementType": "AzureIaasVM",
"schedulePolicy": {
"schedulePolicyType": "SimpleSchedulePolicyV2",
"scheduleRunFrequency": "Daily",
"dailySchedule": {
"scheduleRunTimes": [
"2025-04-04T01:00:00Z"
]
}
},
"retentionPolicy": {
"retentionPolicyType": "LongTermRetentionPolicy",
"dailySchedule": {
"retentionTimes": [
"2025-04-04T01:00:00Z"
],
"retentionDuration": {
"count": 7,
"durationType": "Days"
}
},
"weeklySchedule": {
"daysOfTheWeek": [
"Sunday"
],
"retentionTimes": [
"2025-04-04T01:00:00Z"
],
"retentionDuration": {
"count": 104,
"durationType": "Weeks"
}
},
"monthlySchedule": {
"retentionScheduleFormatType": "Weekly",
"retentionScheduleWeekly": {
"daysOfTheWeek": [
"Sunday"
],
"weeksOfTheMonth": [
"First"
]
},
"retentionTimes": [
"2025-04-04T01:00:00Z"
],
"retentionDuration": {
"count": 60,
"durationType": "Months"
}
},
"yearlySchedule": {
"retentionScheduleFormatType": "Weekly",
"monthsOfYear": [
"January"
],
"retentionScheduleWeekly": {
"daysOfTheWeek": [
"Sunday"
],
"weeksOfTheMonth": [
"First"
]
},
"retentionTimes": [
"2025-04-04T01:00:00Z"
],
"retentionDuration": {
"count": 10,
"durationType": "Years"
}
}
},
"tieringPolicy": {
"ArchivedRP": {
"tieringMode": "DoNotTier"
}
},
"instantRpRetentionRangeInDays": 7,
"timeZone": "W. Europe Standard Time",
"policyType": "V2"
}
}

DEBUG: ============================ HTTP RESPONSE ============================

Status Code:
BadRequest

Headers:
Cache-Control : no-cache
Pragma : no-cache
x-ms-operation-identifier : tenantId=tenantid,objectId=objectid/northeurope/id
X-Content-Type-Options : nosniff
x-ms-request-id : id
x-ms-client-request-id : id
x-ms-ratelimit-remaining-subscription-writes: 199
x-ms-ratelimit-remaining-subscription-global-writes: 2999
x-ms-correlation-request-id : id
x-ms-routing-request-id : id
Strict-Transport-Security : max-age=31536000; includeSubDomains
X-Cache : CONFIG_NOCACHE
X-MSEdge-Ref : Ref A: 9941985925C240389E04BA68644481F1 Ref B: FRA231050414045 Ref C: 2025-04-03T05:57:55Z
Date : Thu, 03 Apr 2025 05:57:55 GMT

Body:
{
"error": {
"code": "UserErrorInvalidRequestParameter",
"message": "Parameter NO_PARAM in request is invalid. Please provide correct value for parameter NO_PARAM"
}
}

DEBUG: Caught exception, type: System.AggregateException
DEBUG: Handling aggregate exception
DEBUG: Received CloudException, ErrorCode: UserErrorInvalidRequestParameter, Message: Parameter NO_PARAM in request is invalid. Please provide correct value for parameter NO_PARAM
DEBUG: 7:57:56 AM - [ConfigManager] Got nothing from [EnableErrorRecordsPersistence], Module = [Az.RecoveryServices], Cmdlet = [New-AzRecoveryServicesBackupProtectionPolicy]. Returning default value [False].
New-AzRecoveryServicesBackupProtectionPolicy: Parameter NO_PARAM in request is invalid. Please provide correct value for parameter NO_PARAM
DEBUG: 7:57:56 AM - [ConfigManager] Got [False] from [DisplayBreakingChangeWarning], Module = [Az.RecoveryServices], Cmdlet = [New-AzRecoveryServicesBackupProtectionPolicy].
DEBUG: 7:57:56 AM - [ConfigManager] Got nothing from [DisplayRegionIdentified], Module = [], Cmdlet = []. Returning default value [True].
DEBUG: 7:57:56 AM - [ConfigManager] Got nothing from [CheckForUpgrade], Module = [], Cmdlet = []. Returning default value [True].
DEBUG: AzureQoSEvent: Module: Az.RecoveryServices:7.5.1; CommandName: New-AzRecoveryServicesBackupProtectionPolicy; PSVersion: 7.5.0; IsSuccess: False; Duration: 00:00:01.5842732; SanitizeDuration: 00:00:00; Exception: Parameter NO_PARAM in request is invalid. Please provide correct value for parameter NO_PARAM;
DEBUG: 7:57:56 AM - [ConfigManager] Got nothing from [EnableDataCollection], Module = [], Cmdlet = []. Returning default value [True].
DEBUG: 7:57:56 AM - NewAzureRmRecoveryServicesBackupProtectionPolicy end processing.

Environment data[/+]

[+]PowerShell[/+] [+]Name Value[/+] [+]---- -----[/+] [+]PSVersion 7.5.0[/+] [+]PSEdition Core[/+] [+]GitCommitId 7.5.0[/+] [+]OS Microsoft Windows 10.0.22631[/+] [+]Platform Win32NT[/+] [+]PSCompatibleVersions {1.0, 2.0, 3.0, 4.0…}[/+] [+]PSRemotingProtocolVersion 2.3[/+] [+]SerializationVersion 1.1.0.1[/+] [+]WSManStackVersion 3.0[/+] [+][/+]
[+]### Module versions[/+]
[+]PowerShell[/+] [+]ModuleType Version PreRelease Name ExportedCommands[/+] [+]---------- ------- ---------- ---- ----------------[/+] [+]Script 4.0.2 Az.Accounts {Add-AzEnvironment, Clear-AzConfig, Clear-AzContext, Clear-AzDefault…}[/+] [+]Script 7.5.1 Az.RecoveryServices {Add-AzRecoveryServicesAsrReplicationProtectedItemDisk, Backup-AzRecoveryServicesBackupItem, Copy-AzRecoveryServicesVault, D…[/+] [+][/+]
[+]### Error output[/+]
[+]PowerShell[/+] [+]HistoryId: 38[/+] [+]RequestId : 3314c367-8f7b-4d24-9c90-dbcf3fa71501[/+] [+]Message : Parameter NO_PARAM in request is invalid. Please provide correct value for parameter NO_PARAM[/+] [+]ServerMessage : UserErrorInvalidRequestParameter: Parameter NO_PARAM in request is invalid. Please provide correct value for parameter NO_PARAM[/+] [+] (System.Collections.Generic.List`1[Microsoft.Rest.Azure.CloudError])[/+] [+]ServerResponse : {BadRequest}[/+] [+]RequestMessage : {PUT https://management.azure.com/subscriptions/753c9e4e-cfd9-49d2-ace4-bea94bb848f3/resourceGroups/rg-rsv-weu-001-t/providers/Microsoft.RecoveryServices/vaults/rsv-csb-weu-001- [/+] [+] t/backupPolicies/NewPolicy?api-version=2024-10-01}[/+] [+]InvocationInfo : {New-AzRecoveryServicesBackupProtectionPolicy}[/+] [+]Line : New-AzRecoveryServicesBackupProtectionPolicy -Name "NewPolicy" -WorkloadType AzureVM -RetentionPolicy $RetPol -SchedulePolicy $schedulePolicy[/+] [+]Position : At line:1 char:1[/+] [+] + New-AzRecoveryServicesBackupProtectionPolicy -Name "NewPolicy" -Workl …[/+] [+] + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[/+] [+]StackTrace : at Microsoft.Azure.Management.RecoveryServices.Backup.ProtectionPoliciesOperations.CreateOrUpdateWithHttpMessagesAsync(String vaultName, String resourceGroupName, String [/+] [+] policyName, ProtectionPolicyResource parameters, String xMsAuthorizationAuxiliary, Dictionary`2 customHeaders, CancellationToken cancellationToken)[/+] [+]HistoryId : 38[/+] [+]

@RobertMochnacky RobertMochnacky added bug This issue requires a change to an existing behavior in the product in order to be resolved. needs-triage This is a new issue that needs to be triaged to the appropriate team. labels Apr 3, 2025
@microsoft-github-policy-service microsoft-github-policy-service bot added customer-reported needs-triage This is a new issue that needs to be triaged to the appropriate team. and removed needs-triage This is a new issue that needs to be triaged to the appropriate team. labels Apr 3, 2025
Copy link

github-actions bot commented Apr 3, 2025

Here are some similar issues that might help you. Please check if they can solve your problem.


Possible solution (Extracted from existing issue, might be incorrect; please verify carefully)

Solution 1:

I figured out that RetentionPolicy DurationCountInDays only accepts values which are bigger than 7. In the new Az.Powershell Update there is an entry: Az.RecoveryServices IaaSVM policy minimum retention in days changed to 7 from 1. Source: https://docs.microsoft.com/en-us/powershell/azure/release-notes-azureps?view=azps-2.3.2#azrecoveryservices. Maybe this was just updated, but then I have two questions: Would you please update this in your documentation or improve the error message? https://docs.microsoft.com/en-us/powershell/module/az.recoveryservices/new-azrecoveryservicesbackupprotectionpolicy?view=azps-2.3.2. What is with RetentionPolicies which are already created? Are there still working and valid? Is this only for future RetentionPolicies?

Reference:

Solution 2:

@superfliege : Thanks for bringing this to our notice. This change is for new policies. Existing policies will be honored as it is. Will change the documentation to reflect this. Thanks.

Reference:

Powered by issue-sentinel

@microsoft-github-policy-service microsoft-github-policy-service bot removed the needs-triage This is a new issue that needs to be triaged to the appropriate team. label Apr 3, 2025
@isra-fel isra-fel added Recovery Services Backup Service Attention This issue is responsible by Azure service team. labels Apr 8, 2025
Copy link
Contributor

Thanks for the feedback! We are routing this to the appropriate team for follow-up. cc @Daya-Patil.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug This issue requires a change to an existing behavior in the product in order to be resolved. customer-reported Possible-Solution Recovery Services Backup Service Attention This issue is responsible by Azure service team. Similar-Issue
Projects
None yet
Development

No branches or pull requests

2 participants