Skip to content

Commit 5e6fb01

Browse files
authored
Merge pull request #268404 from SnehaSudhirG/07Mar-MigrateBrokenLink
[SCOPED] Fixed the broken link
2 parents 4335098 + 38fb2c6 commit 5e6fb01

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/migrate/add-server-credentials.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.author: vibansa
66
ms.manager: abhemraj
77
ms.service: azure-migrate
88
ms.topic: how-to
9-
ms.date: 04/13/2023
10-
ms.custom: engagement-fy23
9+
ms.date: 03/07/2024
10+
ms.custom: engagement-fy24
1111
---
1212

1313
# Provide server credentials to discover software inventory, dependencies, web apps, and SQL Server instances and databases
@@ -44,7 +44,7 @@ The table below lists the permissions required on the server credentials provide
4444
Feature | Windows credentials | Linux credentials
4545
---| ---| ---
4646
**Software inventory** | Guest user account | Regular/normal user account (non-sudo access permissions)
47-
**Discovery of SQL Server instances and databases** | User account that is a member of the sysadmin server role or has [these permissions](migrate-support-matrix-vmware.md#configure-the-custom-login-for-sql-server-discovery) for each SQL Server instance.| _Not supported currently_
47+
**Discovery of SQL Server instances and databases** | User account that is a member of the sysadmin server role or has [these permissions](migrate-support-matrix-vmware.md?tabs=businesscase&pivots=sql-server-instance-database-discovery-requirements#configure-the-custom-login-for-sql-server-discovery) for each SQL Server instance.| _Not supported currently_
4848
**Discovery of ASP.NET web apps** | Domain or non-domain (local) account with administrative permissions | _Not supported currently_
4949
**Agentless dependency analysis** | Domain or non-domain (local) account with administrative permissions | Sudo user account with permissions to execute ls and netstat commands. If you are providing a sudo user account, ensure that you have enabled **NOPASSWD** for the account to run the required commands without prompting for a password every time the sudo command is invoked. <br /><br /> Alternatively, you can create a user account that has the CAP_DAC_READ_SEARCH and CAP_SYS_PTRACE permissions on /bin/netstat and /bin/ls files, set using the following commands:<br /><code>sudo setcap CAP_DAC_READ_SEARCH,CAP_SYS_PTRACE=ep /bin/ls<br /> sudo setcap CAP_DAC_READ_SEARCH,CAP_SYS_PTRACE=ep /bin/netstat</code>
5050

0 commit comments

Comments
 (0)