You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/migrate/tutorial-discover-physical.md
+22-15Lines changed: 22 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,17 +116,24 @@ For Linux servers, you can create a user account in one of two ways:
116
116
> [!Note]
117
117
> If you want to perform software inventory (discovery of installed applications) and enable agentless dependency analysis on Linux servers, it recommended to use Option 1.
118
118
119
-
### Option 2
120
-
- If you can't provide user account with sudo access, then you can set 'isSudo' registry key to value '0' in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureAppliance registry on the appliance server and provide a non-root account with the required capabilities using the following commands:
119
+
### Option 2: Discover using non-sudo user account
120
+
- If you can't provide user account with sudo access, then you can set 'isSudo' registry key to value '0' in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureAppliance registry on the appliance server.
121
+
- Provide a non-sudo user account with the required capabilities.
122
+
- Sign in as root user. Create a non-sudo user account by running the `sudo useradd <account-name>` command. Set a password for the non-sudo user account using the `sudo passwd <account-name>` command.
123
+
- Add the non-sudo user account to the wheel group using this command: `sudo usermod –aG wheel <account-name>`. Users in this group have permissions to run setcap commands as detailed below.
124
+
- Sign in to the non-sudo user account that was created and run the following commands:
121
125
122
126
**Command** | **Purpose**
123
127
--- | --- |
124
-
setcap CAP_DAC_READ_SEARCH+eip /usr/sbin/fdisk <br></br> setcap CAP_DAC_READ_SEARCH+eip /sbin/fdisk _(if /usr/sbin/fdisk is not present)_ | To collect disk configuration data
125
-
setcap "cap_dac_override,cap_dac_read_search,cap_fowner,cap_fsetid,cap_setuid,<br> cap_setpcap,cap_net_bind_service,cap_net_admin,cap_sys_chroot,cap_sys_admin,<br> cap_sys_resource,cap_audit_control,cap_setfcap=+eip" /sbin/lvm | To collect disk performance data
126
-
setcap CAP_DAC_READ_SEARCH+eip /usr/sbin/dmidecode | To collect BIOS serial number
127
-
chmod a+r /sys/class/dmi/id/product_uuid | To collect BIOS GUID
128
+
setcap CAP_DAC_READ_SEARCH+eip /usr/sbin/fdisk <br></br> setcap CAP_DAC_READ_SEARCH+eip /sbin/fdisk _(if /usr/sbin/fdisk is not present)_ | To collect disk configuration data.
129
+
setcap "cap_dac_override,cap_dac_read_search,cap_fowner,cap_fsetid,cap_setuid,cap_setpcap,cap_net_bind_service,cap_net_admin,cap_sys_chroot,cap_sys_admin,<br> cap_sys_resource,cap_audit_control,cap_setfcap=+eip" /sbin/lvm | To collect disk performance data.
130
+
setcap CAP_DAC_READ_SEARCH+eip /usr/sbin/dmidecode | To collect BIOS serial number.
131
+
chmod a+r /sys/class/dmi/id/product_uuid | To collect BIOS GUID.
132
+
sudo setcap CAP_DAC_READ_SEARCH,CAP_SYS_PTRACE=ep /bin/ls<br /> sudo setcap CAP_DAC_READ_SEARCH,CAP_SYS_PTRACE=ep /bin/netstat | To perform agentless dependency analysis on the server, set the required permissions on /bin/netstat and /bin/ls files.
128
133
129
-
- To perform agentless dependency analysis on the server, ensure that you also set the required permissions on /bin/netstat and /bin/ls files by using the following commands:<br /><code>sudo setcap CAP_DAC_READ_SEARCH,CAP_SYS_PTRACE=ep /bin/ls<br /> sudo setcap CAP_DAC_READ_SEARCH,CAP_SYS_PTRACE=ep /bin/netstat</code>
134
+
- Running all the above commands will prompt for a password. Enter the password of the non-sudo user account for each prompt.
135
+
- Add the credentials of the non-sudo user account to the Azure Migrate appliance.
136
+
- The non-sudo user account will execute the commands listed [here](discovered-metadata.md#linux-server-metadata) periodically.
130
137
131
138
### Create an account to access servers
132
139
@@ -204,7 +211,7 @@ Check that the zipped file is secure, before you deploy it.
204
211
205
212
### 3. Run the Azure Migrate installer script
206
213
207
-
1. Extract the zipped file to a folder on the server that will host the appliance. Make sure you don't run the script on a server with an existing Azure Migrate appliance.
214
+
1. Extract the zipped file to a folder on the server that will host the appliance. Make sure you don't run the script on a server with an existing Azure Migrate appliance.
208
215
209
216
2. Launch PowerShell on the above server with administrative (elevated) privilege.
210
217
@@ -244,15 +251,15 @@ Set up the appliance for the first time.
244
251
1. Open a browser on any server that can connect to the appliance, and open the URL of the appliance web app: **https://*appliance name or IP address*: 44368**.
245
252
246
253
Alternately, you can open the app from the desktop by selecting the app shortcut.
247
-
1. Accept the **license terms**, and read the third-party information.
254
+
1. Accept the **license terms**, and read the thirdparty information.
248
255
249
256
#### Set up prerequisites and register the appliance
250
257
251
258
In the configuration manager, select **Set up prerequisites**, and then complete these steps:
252
259
1.**Connectivity**: The appliance checks that the server has internet access. If the server uses a proxy:
253
260
- Select **Setup proxy** to specify the proxy address (in the form `http://ProxyIPAddress` or `http://ProxyFQDN`, where *FQDN* refers to a *fully qualified domain name*) and listening port.
254
261
- Enter credentials if the proxy needs authentication.
255
-
- If you have added proxy details or disabled the proxy or authentication, select **Save** to trigger connectivity and check connectivity again.
262
+
- If you have added proxy details or disabled the proxy or authentication, select **Save** to trigger connectivity, and check connectivity again.
256
263
257
264
Only HTTP proxy is supported.
258
265
1.**Time sync**: Check that the time on the appliance is in sync with internet time for discovery to work properly.
@@ -285,12 +292,12 @@ Now, connect from the appliance to the physical servers to be discovered, and st
285
292
1. In **Step 1: Provide credentials for discovery of Windows and Linux physical or virtual servers**, select **Add credentials**.
286
293
1. For Windows server, select the source type as **Windows Server**, specify a friendly name for credentials, add the username and password. Select **Save**.
287
294
1. If you're using password-based authentication for Linux server, select the source type as **Linux Server (Password-based)**, specify a friendly name for credentials, add the username and password. Select **Save**.
288
-
1. If you're using SSH key-based authentication for Linux server, you can select source type as **Linux Server (SSH key-based)**, specify a friendly name for credentials, add the username, browse and select the SSH private key file. Select **Save**.
295
+
1. If you're using SSH key-based authentication for Linux server, you can select source type as **Linux Server (SSH key-based)**, specify a friendly name for credentials, add the username, browse, and select the SSH private key file. Select **Save**.
289
296
290
297
- Azure Migrate supports the SSH private key generated by ssh-keygen command using RSA, DSA, ECDSA, and ed25519 algorithms.
291
298
- Currently Azure Migrate doesn't support passphrase-based SSH key. Use an SSH key without a passphrase.
292
299
- Currently Azure Migrate doesn't support SSH private key file generated by PuTTY.
293
-
- The SSH key file supports CRLF to mark a line break in the text file that you upload. SSH keys created on Linux systems most commonly have LF as their newline character so you can convert them to CRLF by opening the file in vim, typing `:set textmode` and saving the file.
300
+
- The SSH key file supports CRLF to mark a line break in the text file that you upload. SSH keys created on Linux systems most commonly have LF as their newline character so you can convert them to CRLF by opening the file in vim, typing `:set textmode`, and saving the file.
294
301
- If your Linux servers support the older version of RSA key, you can generate the key using the `$ ssh-keygen -m PEM -t rsa -b 4096` command.
295
302
- Azure Migrate supports OpenSSH format of the SSH private key file as shown below:
296
303
@@ -304,10 +311,10 @@ Now, connect from the appliance to the physical servers to be discovered, and st
304
311
305
312
306
313
- If you choose **Add single item**, you can choose the OS type, specify friendly name for credentials, add server **IP address/FQDN** and select **Save**.
307
-
- If you choose **Add multiple items**, you can add multiple records at once by specifying server **IP address/FQDN** with the friendly name for credentials in the text box. **Verify** the added records and select **Save**.
308
-
- If you choose **Import CSV**_(selected by default)_, you can download a CSV template file, populate the file with the server **IP address/FQDN** and friendly name for credentials. You then import the file into the appliance, **verify** the records in the file and select **Save**.
314
+
- If you choose **Add multiple items**, you can add multiple records at once by specifying server **IP address/FQDN** with the friendly name for credentials in the text box. **Verify** the added records, and select **Save**.
315
+
- If you choose **Import CSV**_(selected by default)_, you can download a CSV template file, populate the file with the server **IP address/FQDN** and friendly name for credentials. You then import the file into the appliance, **verify** the records in the file, and select **Save**.
309
316
310
-
1. Select Save. The appliance tries validating the connection to the servers added and shows the **Validation status** in the table against each server.
317
+
1. Select **Save**. The appliance tries validating the connection to the servers added and shows the **Validation status** in the table against each server.
311
318
- If validation fails for a server, review the error by selecting on **Validation failed** in the Status column of the table. Fix the issue, and validate again.
312
319
- To remove a server, select **Delete**.
313
320
1. You can **revalidate** the connectivity to servers anytime before starting the discovery.
0 commit comments