You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/migrate/vmware/set-discovery-scope.md
+8-13Lines changed: 8 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: v-sreedevank
5
5
ms.author: v-sreedevank
6
6
ms.topic: how-to
7
7
ms.service: azure-migrate
8
-
ms.date: 12/12/2022
8
+
ms.date: 11/07/2024
9
9
ms.custom: vmware-scenario-422, engagement-fy23
10
10
---
11
11
@@ -30,12 +30,9 @@ You can assign permissions on VMware vSphere inventory objects using one of two
30
30
- On the account used by the appliance, assign a role with the required permissions on the objects you want to scope.
31
31
- Alternatively, assign a role to the account at the data center level, and propagate to the child objects. Then give the account a **No access** role, for every object that you don't want in scope. We don't recommend this approach since it's cumbersome, and might expose access controls, because every new child object is automatically granted access inherited from the parent.
32
32
33
-
You can't scope inventory discovery at the vCenter Server folder level. If you need to scope discover to servers in a folder, create a user and grant access individually to each required server. Host and cluster folders are supported.
34
-
35
-
36
33
### Assign a role for assessment
37
34
38
-
1. On the appliance vCenter Server account you're using for discovery, apply the **Read-only** role for all parent objects that host servers you want to discover and assess (host, cluster, hosts folder, clusters folder, up to datacenter).
35
+
1. On the appliance vCenter Server account that you're using for discovery, apply the **Read-only** role for all parent objects that host servers that you want to discover and assess (host, cluster, hosts folder, clusters folder, up to datacenter).
39
36
2. Propagate these permissions to child objects in the hierarchy.
@@ -45,17 +42,15 @@ You can't scope inventory discovery at the vCenter Server folder level. If you n
45
42
1. On the appliance vCenter Server account you're using for migration, apply a user-defined role that has the [permissions needed](migrate-support-matrix-vmware-migration.md#vmware-vsphere-requirements-agentless), to all parent objects that host servers you want to discover and migrate.
46
43
2. You can name the role with something that's easier to identify. For example, <em>Azure_Migrate</em>.
47
44
48
-
## Work around for server folder restriction
49
-
50
-
Currently, the Azure Migrate: Discovery and assessment tool can't discover servers if access is granted at the vCenter Server folder level. If you do want to scope your discovery and assessment by server folders, use this workaround.
51
-
52
-
1. Assign read-only permissions on all servers located in the folders you want to scope for discovery and assessment.
53
-
2. Grant read-only access to all the parent objects that host the servers host, cluster, hosts folder, clusters folder, up to data center). You don't need to propagate the permissions to all child objects.
54
-
3. To use the credentials for discovery, select the datacenter as **Collection Scope**.
45
+
### Scoped discovery of VMs
55
46
47
+
1. To discover selective VMs, assign read permissions to the individual VMs. To discover all VMs from a folder, assign read permissions at the folder level and enable **Propagate to children** option.
48
+
1. Grant read-only access to all the parent objects that host the virtual machines including host, cluster, hosts folder, clusters folder, up to data center. You don't need to propagate the permissions to all child objects.
49
+
1. From vSphere client, make sure that the read permissions are applied to the parent objects both from the Hosts and Clusters view and from the VMs & templates view.
56
50
57
-
The role-based access control setup ensures that the corresponding vCenter user account has access to only tenant-specific servers.
0 commit comments