Skip to content

Commit 148163d

Browse files
committed
SI and ADA updates
1 parent 33c81cc commit 148163d

10 files changed

+44
-18
lines changed

articles/migrate/common-questions-discovery-assessment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: rashijoshi
55
ms.author: rajosh
66
ms.manager: abhemraj
77
ms.topic: conceptual
8-
ms.date: 11/24/2022
8+
ms.date: 12/12/2022
99
ms.custom: engagement-fy23
1010
---
1111

@@ -305,7 +305,7 @@ The differences between agentless visualization and agent-based visualization ar
305305

306306
**Requirement** | **Agentless** | **Agent-based**
307307
--- | --- | ---
308-
Support |Available for VMware VMs in general availability (GA).<br/><br/> Available for Hyper-V VMs and physical servers in public preview. | In General Availability (GA).
308+
Support | Generally available for VMware VMs, Hyper-V VMs, bare-metal servers, and servers running on other public clouds like AWS, GCP etc. | In General Availability (GA).
309309
Agent | No need to install agents on machines you want to cross-check. | Agents to be installed on each on-premises machine that you want to analyze: The [Microsoft Monitoring agent (MMA)](../azure-monitor/agents/agent-windows.md), and the [Dependency agent](../azure-monitor/vm/vminsights-dependency-agent-maintenance.md).
310310
Prerequisites | [Review](concepts-dependency-visualization.md#agentless-analysis) the prerequisites and deployment requirements. | [Review](concepts-dependency-visualization.md#agent-based-analysis) the prerequisites and deployment requirements.
311311
Log Analytics | Not required. | Azure Migrate uses the [Service Map](../azure-monitor/vm/service-map.md) solution in [Azure Monitor logs](../azure-monitor/logs/log-query-overview.md) for dependency visualization. [Learn more](concepts-dependency-visualization.md#agent-based-analysis).

articles/migrate/concepts-dependency-visualization.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: conceptual
55
author: vineetvikram
66
ms.author: vivikram
77
ms.manager: abhemraj
8-
ms.date: 08/04/2022
8+
ms.date: 12/12/2022
99
ms.custom: engagement-fy23
1010
---
1111

@@ -39,7 +39,6 @@ Agentless dependency analysis works by capturing TCP connection data from server
3939
After discovery of dependency data begins, polling begins:
4040

4141
- The Azure Migrate appliance polls TCP connection data from servers every five minutes to gather data.
42-
- Data is collected from guest servers via vCenter Server, using vSphere APIs.
4342
- Polling gathers this data:
4443

4544
- Name of processes that have active connections.

articles/migrate/how-to-create-group-machine-dependencies-agentless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ This article describes how to set up agentless dependency analysis using Azure M
4040
2. As you configure the appliance, you need to specify the following in the appliance configuration manager:
4141
- The details of the source environment (vCenter Server(s)/Hyper-V host(s) or cluster(s)/physical servers) which you want to discover.
4242
- Server credentials, which can be domain/ Windows (non-domain)/ Linux (non-domain) credentials. [Learn more](add-server-credentials.md) about how to provide credentials and how the appliance handles them.
43-
- Verify the permissions required to perform agentless dependency analysis. For Windows servers, you need to provide domain or non-domain (local) account with administrative permissions. For Linux servers, you need to provide root user account, or an account with these permissions on /bin/netstat and /bin/ls files: CAP_DAC_READ_SEARCH and CAP_SYS_PTRACE.<br/><br/> You can set these capabilities using the following commands: <br/> sudo setcap CAP_DAC_READ_SEARCH,CAP_SYS_PTRACE=ep /bin/ls<br/> sudo setcap CAP_DAC_READ_SEARCH,CAP_SYS_PTRACE=ep /bin/netstat
43+
- Verify the permissions required to perform agentless dependency analysis. For Windows servers, you need to provide domain or non-domain (local) account with administrative permissions. For Linux servers, provide a sudo user account with permissions to execute ls and netstat commands or create a user account that has the CAP_DAC_READ_SEARCH and CAP_SYS_PTRACE permissions on /bin/netstat and /bin/ls files. <br/><br/>If you're providing a sudo user account, ensure that you have enabled NOPASSWD for the account to run the required commands without prompting for a password every time sudo command is invoked.
4444

4545
### Add credentials and initiate discovery
4646

articles/migrate/how-to-set-up-appliance-hyper-v.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: Vikram1988
55
ms.author: vibansa
66
ms.manager: abhemraj
77
ms.topic: how-to
8-
ms.date: 04/30/2022
8+
ms.date: 12/12/2022
99
ms.custom: engagement-fy23
1010
---
1111

@@ -174,7 +174,7 @@ Connect from the appliance to Hyper-V hosts or clusters, and start discovery.
174174
175175
### Provide server credentials
176176
177-
In **Step 3: Provide server credentials to perform software inventory and agentless dependency analysis.**, you can provide multiple server credentials. If you don't want to use any of these appliance features, you can skip this step and proceed with discovery of servers running on Hyper-V hosts/clusters. You can change this option at any time.
177+
In **Step 3: Provide server credentials to perform software inventory and agentless dependency analysis and to discover SQL Server instances and databases**, you can provide multiple server credentials. If you don't want to use any of these appliance features, you can skip this step and proceed with discovery of servers running on Hyper-V hosts/clusters. You can change this option at any time.
178178
179179
:::image type="content" source="./media/tutorial-discover-hyper-v/appliance-server-credentials-mapping.png" alt-text="Screenshot that shows providing credentials for software inventory and dependency analysis.":::
180180

articles/migrate/how-to-set-up-appliance-physical.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -156,6 +156,8 @@ Now, connect from the appliance to the physical servers to be discovered, and st
156156

157157
![Screenshot of SSH private key supported format.](./media/tutorial-discover-physical/key-format.png)
158158
1. If you want to add multiple credentials at once, click on **Add more** to save and add more credentials. Multiple credentials are supported for physical servers discovery.
159+
> [!Note]
160+
> By default, the credentials will be used to gather data about the installed applications, roles, and features, and also to collect dependency data from Windows and Linux servers, unless you disable the slider to not perform these features (as instructed in the last step).
159161
1. In **Step 2:Provide physical or virtual server details​**, click on **Add discovery source** to specify the server **IP address/FQDN** and the friendly name for credentials to connect to the server.
160162
1. You can either **Add single item** at a time or **Add multiple items** in one go. There is also an option to provide server details through **Import CSV**.
161163

@@ -173,6 +175,10 @@ Now, connect from the appliance to the physical servers to be discovered, and st
173175

174176
:::image type="content" source="./media/tutorial-discover-physical/disable-slider.png" alt-text="Screenshot that shows where to disable the slider.":::
175177

178+
1. To perform discovery of SQL Server instances and databases, you can add additional credentials (Windows domain/non-domain, SQL authentication credentials) and the appliance will attempt to automatically map the credentials to the SQL servers. If you add domain credentials, the appliance will authenticate the credentials against Active Directory of the domain to prevent any user accounts from locking out. To check validation of the domain credentials, follow these steps:
179+
- In the configuration manager credentials table, see **Validation status** for domain credentials. Only the domain credentials are validated.
180+
- If validation fails, you can select a Failed status to see the validation error. Fix the issue, and then select **Revalidate credentials** to reattempt validation of the credentials.
181+
176182
### Start discovery
177183

178184
Click on **Start discovery**, to kick off discovery of the successfully validated servers. After the discovery has been successfully initiated, you can check the discovery status against each server in the table.

articles/migrate/migrate-appliance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: Vikram1988
55
ms.author: vibansa
66
ms.manager: abhemraj
77
ms.topic: conceptual
8-
ms.date: 10/28/2022
8+
ms.date: 12/12/2022
99
ms.custom: engagement-fy23
1010
---
1111

@@ -53,7 +53,7 @@ The appliance has the following services:
5353
- **Web apps discovery and assessment agent**: sends the web apps configuration data to Azure.
5454

5555
> [!Note]
56-
> The last 3 services are only available in the appliance used for discovery and assessment of servers running in your VMware environment.
56+
> The last 3 services are available in the appliance used for discovery and assessment of servers running in your VMware VMs, Hyper-V VMs, bare-metal servers, and servers running on other public clouds like AWS, GCP etc.
5757
5858
## Appliance - VMware
5959

articles/migrate/tutorial-discover-aws.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: Vikram1988
55
ms.author: vibansa
66
ms.manager: abhemraj
77
ms.topic: tutorial
8-
ms.date: 11/13/2022
8+
ms.date: 12/12/2022
99
ms.custom: mvc, subject-rbac-steps
1010
#Customer intent: As a server admin I want to discover my AWS instances.
1111
---
@@ -264,6 +264,8 @@ Now, connect from the appliance to the physical servers to be discovered, and st
264264

265265

266266
1. If you want to add multiple credentials at once, select **Add more** to save and add more credentials. Multiple credentials are supported for physical servers discovery.
267+
> [!Note]
268+
> By default, the credentials will be used to gather data about the installed applications, roles, and features, and also to collect dependency data from Windows and Linux servers, unless you disable the slider to not perform these features (as instructed in the last step).
267269
1. In **Step 2:Provide physical or virtual server details​**, select **Add discovery source** to specify the server **IP address/FQDN** and the friendly name for credentials to connect to the server.
268270
1. You can either **Add single item** at a time or **Add multiple items** in one go. There is also an option to provide server details through **Import CSV**.
269271

@@ -280,6 +282,10 @@ Now, connect from the appliance to the physical servers to be discovered, and st
280282

281283
:::image type="content" source="./media/tutorial-discover-physical/disable-slider.png" alt-text="Screenshot that shows where to disable the slider.":::
282284

285+
1. To perform discovery of SQL Server instances and databases, you can add additional credentials (Windows domain/non-domain, SQL authentication credentials) and the appliance will attempt to automatically map the credentials to the SQL servers. If you add domain credentials, the appliance will authenticate the credentials against Active Directory of the domain to prevent any user accounts from locking out. To check validation of the domain credentials, follow these steps:
286+
- In the configuration manager credentials table, see **Validation status** for domain credentials. Only the domain credentials are validated.
287+
- If validation fails, you can select a Failed status to see the validation error. Fix the issue, and then select **Revalidate credentials** to reattempt validation of the credentials.
288+
283289
### Start discovery
284290

285291
Select **Start discovery**, to kick off discovery of the successfully validated servers. After the discovery has been successfully initiated, you can check the discovery status against each server in the table.

articles/migrate/tutorial-discover-gcp.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: Vikram1988
55
ms.author: vibansa
66
ms.manager: abhemraj
77
ms.topic: tutorial
8-
ms.date: 11/13/2022
8+
ms.date: 12/12/2022
99
ms.custom: mvc, subject-rbac-steps
1010
#Customer intent: As a server admin I want to discover my GCP instances.
1111
---
@@ -270,6 +270,8 @@ Now, connect from the appliance to the GCP servers to be discovered, and start t
270270

271271

272272
2. If you want to add multiple credentials at once, select **Add more** to save and add more credentials.
273+
> [!Note]
274+
> By default, the credentials will be used to gather data about the installed applications, roles, and features, and also to collect dependency data from Windows and Linux servers, unless you disable the slider to not perform these features (as instructed in the last step).
273275
3. In **Step 2:Provide physical or virtual server details​**, select **Add discovery source** to specify the server **IP address/FQDN** and the friendly name for credentials to connect to the server.
274276
4. You can either **Add single item** at a time or **Add multiple items** in one go. There's also an option to provide server details through **Import CSV**.
275277

@@ -284,6 +286,9 @@ Now, connect from the appliance to the GCP servers to be discovered, and start t
284286
1. Before initiating discovery, you can choose to disable the slider to not perform software inventory and agentless dependency analysis on the added servers. You can change this option at any time.
285287

286288
:::image type="content" source="./media/tutorial-discover-physical/disable-slider.png" alt-text="Screenshot that shows where to disable the slider.":::
289+
1. To perform discovery of SQL Server instances and databases, you can add additional credentials (Windows domain/non-domain, SQL authentication credentials) and the appliance will attempt to automatically map the credentials to the SQL servers. If you add domain credentials, the appliance will authenticate the credentials against Active Directory of the domain to prevent any user accounts from locking out. To check validation of the domain credentials, follow these steps:
290+
- In the configuration manager credentials table, see **Validation status** for domain credentials. Only the domain credentials are validated.
291+
- If validation fails, you can select a Failed status to see the validation error. Fix the issue, and then select **Revalidate credentials** to reattempt validation of the credentials.
287292

288293
### Start discovery
289294

articles/migrate/tutorial-discover-physical.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: Vikram1988
55
ms.author: vibansa
66
ms.manager: abhemraj
77
ms.topic: tutorial
8-
ms.date: 11/13/2022
8+
ms.date: 12/12/2022
99
ms.custom: mvc, subject-rbac-steps
1010
#Customer intent: As a server admin I want to discover my on-premises server inventory.
1111
---
@@ -286,6 +286,8 @@ Now, connect from the appliance to the physical servers to be discovered, and st
286286
![Screenshot of SSH private key supported format.](./media/tutorial-discover-physical/key-format.png)
287287

288288
1. If you want to add multiple credentials at once, select **Add more** to save and add more credentials. Multiple credentials are supported for physical servers discovery.
289+
> [!Note]
290+
> By default, the credentials will be used to gather data about the installed applications, roles, and features, and also to collect dependency data from Windows and Linux servers, unless you disable the slider to not perform these features (as instructed in the last step).
289291
1. In **Step 2:Provide physical or virtual server details​**, select **Add discovery source** to specify the server **IP address/FQDN** and the friendly name for credentials to connect to the server.
290292
1. You can either **Add single item** at a time or **Add multiple items** in one go. There's also an option to provide server details through **Import CSV**.
291293

@@ -301,6 +303,11 @@ Now, connect from the appliance to the physical servers to be discovered, and st
301303
1. Before initiating discovery, you can choose to disable the slider to not perform software inventory and agentless dependency analysis on the added servers. You can change this option at any time.
302304

303305
:::image type="content" source="./media/tutorial-discover-physical/disable-slider.png" alt-text="Screenshot that shows where to disable the slider.":::
306+
1. To perform discovery of SQL Server instances and databases, you can add additional credentials (Windows domain/non-domain, SQL authentication credentials) and the appliance will attempt to automatically map the credentials to the SQL servers. If you add domain credentials, the appliance will authenticate the credentials against Active Directory of the domain to prevent any user accounts from locking out. To check validation of the domain credentials, follow these steps:
307+
- In the configuration manager credentials table, see **Validation status** for domain credentials. Only the domain credentials are validated.
308+
- If validation fails, you can select a Failed status to see the validation error. Fix the issue, and then select **Revalidate credentials** to reattempt validation of the credentials.
309+
310+
304311

305312
### Start discovery
306313

articles/migrate/whats-new.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: overview
55
author: Vikram1988
66
ms.author: vibansa
77
ms.manager: abhemraj
8-
ms.date: 11/21/2022
8+
ms.date: 12/12/2022
99
ms.custom: mvc
1010
---
1111

@@ -17,12 +17,15 @@ ms.custom: mvc
1717
- Public Preview: Build business case using Azure Migrate for servers and workloads running in your VMware environment. It helps you eliminate guess work in your cost planning process and adds data driven insights to understand how Azure can bring the most value to your business.
1818

1919
Key highlights:
20+
- On-premises vs Azure total cost of ownership.
21+
- Year on year cashflow analysis.
22+
- Resource utilization based insights to identify servers and workloads that are ideal for cloud.
23+
- Quick wins for migration and modernization including end of support Windows OS and SQL versions.
24+
- Long term cost savings by moving from a capital expenditure model to an Operating expenditure model, by paying for only what you use.
25+
26+
- General Availability: Perform software inventory and agentless dependency analysis at-scale for Hyper-V virtual machines and bare metal servers or servers running on other clouds like AWS, GCP etc.
27+
Learn more on how to perform [software inventory](how-to-discover-applications.md) and [agentless dependency analysis](how-to-create-group-machine-dependencies-agentless.md).
2028

21-
- On-premises vs Azure total cost of ownership.
22-
- Year on year cashflow analysis.
23-
- Resource utilization based insights to identify servers and workloads that are ideal for cloud.
24-
- Quick wins for migration and modernization including end of support Windows OS and SQL versions.
25-
- Long term cost savings by moving from a capital expenditure model to an Operating expenditure model, by paying for only what you use.
2629

2730
## Update (November 2022)
2831

0 commit comments

Comments
 (0)