Skip to content

Commit 3d3ddcf

Browse files
authored
Merge pull request #167142 from SGSneha/27julytroubleshootappliance
updated hyperlinks
2 parents a35cb48 + cd4a29f commit 3d3ddcf

File tree

2 files changed

+8
-4
lines changed

2 files changed

+8
-4
lines changed

articles/migrate/migrate-support-matrix-physical.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@ Set up an account that the appliance can use to access the physical servers.
4040
- For Windows servers, use a domain account for domain-joined servers, and a local account for servers that are not domain-joined.
4141
- The user account should be added to these groups: Remote Management Users, Performance Monitor Users, and Performance Log Users.
4242
- If Remote management Users group isn't present, then add user account to the group: **WinRMRemoteWMIUsers_**.
43-
- The account needs these permissions for appliance to create a CIM connection with the server and pull the required configuration and performance metadata from the WMI classes listed here.
44-
- In some cases, adding the account to these groups may not return the required data from WMI classes as the account might be filtered by [UAC](/windows/win32/wmisdk/user-account-control-and-wmi). To overcome the UAC filtering, user account needs to have necessary permissions on CIMV2 Namespace and sub-namespaces on the target server. You can follow the steps [here](troubleshoot-appliance.md) to enable the required permissions.
43+
- The account needs these permissions for appliance to create a CIM connection with the server and pull the required configuration and performance metadata from the WMI classes listed [here.](migrate-appliance.md#collected-data---physical)
44+
- In some cases, adding the account to these groups may not return the required data from WMI classes as the account might be filtered by [UAC](/windows/win32/wmisdk/user-account-control-and-wmi). To overcome the UAC filtering, user account needs to have necessary permissions on CIMV2 Namespace and sub-namespaces on the target server. You can follow the steps [here](troubleshoot-appliance.md#access-is-denied-when-connecting-to-physical-servers-during-validation) to enable the required permissions.
4545

4646
> [!Note]
4747
> For Windows Server 2008 and 2008 R2, ensure that WMF 3.0 is installed on the servers.

articles/migrate/troubleshoot-appliance.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,10 @@ An error about time synchronization indicates that the server clock might be out
9090

9191
## VDDK check failing during 'Set up prerequisites' on VMware appliance
9292

93+
**Error**
94+
95+
The VDDK check failed as appliance could not find the required VDDK kit installed on the appliance. This can result in failures with ongoing replication.
96+
9397
**Remediation**
9498

9599
1. Ensure that you have downloaded VDDK kit 6.7 and have copied its files to- **C:\Program Files\VMware\VMware Virtual Disk Development Kit** on the appliance server.
@@ -140,8 +144,8 @@ This usually happens when the Azure user account that was used to register the a
140144
**Remediation**
141145

142146
1. Ensure that the currently logged in user account on the appliance has the required permissions on the Key Vault (mentioned in the error message). The user account needs permissions as mentioned [here](/azure/migrate/tutorial-discover-vmware#prepare-an-azure-user-account).
143-
2. Go to the Key Vault and ensure that your user account has an access policy with all the _Key, Secret and Certificate_ permissions assigned under Key vault Access Policy. Learn more [/azure/key-vault/general/assign-access-policy-portal]
144-
3. If you have enabled the appliance for **private endpoint connectivity**, ensure that the appliance is either hosted in the same VNet where the Key Vault has been created or it is connected to the Azure VNet (where Key Vault has been created) over a private link. Make sure that the Key Vault private link is resolvable from the appliance. Go to Azure Migrate: Discovery and assessment> Properties to find the details of private endpoints for resources like the Key Vault created during the Azure Migrate key creation. [Learn more](https://go.microsoft.com/fwlink/?linkid=2162447)
147+
2. Go to the Key Vault and ensure that your user account has an access policy with all the _Key, Secret and Certificate_ permissions assigned under Key vault Access Policy. [Learn more](/azure/key-vault/general/assign-access-policy-portal)
148+
3. If you have enabled the appliance for **private endpoint connectivity**, ensure that the appliance is either hosted in the same VNet where the Key Vault has been created or it is connected to the Azure VNet (where Key Vault has been created) over a private link. Make sure that the Key Vault private link is resolvable from the appliance. Go to **Azure Migrate**: **Discovery** and **assessment**> **Properties** to find the details of private endpoints for resources like the Key Vault created during the Azure Migrate key creation. [Learn more](https://go.microsoft.com/fwlink/?linkid=2162447)
145149
4. If you have the required permissions and connectivity, re-try the registration on the appliance after some time.
146150

147151
## Unable to connect to vCenter Server during validation

0 commit comments

Comments
 (0)