Skip to content

Commit c449701

Browse files
committed
review with Aditya AWS Iaas and te rest of the files exept single server
1 parent 09d3f95 commit c449701

File tree

33 files changed

+286
-391
lines changed

33 files changed

+286
-391
lines changed

articles/postgresql/.openpublishing.redirection.postgresql.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1629,6 +1629,11 @@
16291629
"source_path_from_root": "/articles/postgresql/migrate/migration-service/tutorial-migration-service-iaas.md",
16301630
"redirect_url": "/azure/postgresql/migrate/migration-service/tutorial-migration-service-iaas-offline",
16311631
"redirect_document_id": true
1632+
},
1633+
{
1634+
"source_path_from_root": "/articles/postgresql/migrate/migration-service/concepts-migration-service-postgresql.md",
1635+
"redirect_url": "/azure/postgresql/migrate/migration-service/overview-migration-service-postgresql",
1636+
"redirect_document_id": true
16321637
}
16331638
]
16341639
}

articles/postgresql/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -574,7 +574,7 @@
574574
href: migrate/migration-service/how-to-network-setup-migration-service.md
575575
- name: Troubleshoot
576576
items:
577-
- name: Premigration error codes
577+
- name: Known errors
578578
href: migrate/migration-service/troubleshoot-error-codes-premigration.md
579579
- name: Migrate data with pg_dump
580580
href: migrate/how-to-migrate-using-dump-and-restore.md

articles/postgresql/migrate/migration-service/concepts-known-issues-migration-service.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,8 @@ Here are common limitations that apply to migration scenarios:
5353

5454
- Migration to burstable SKUs isn't supported; databases must first be migrated to a non-burstable SKU and then scaled down if needed.
5555

56+
- The Migration Runtime Server is specifically designed to operate with the default DNS servers/private DNS zones i.e., **privatelink.postgres.database.azure.com**. Custom DNS names/DNS servers are not supported by the migration service when utilizing the migration runtime server feature. When configuring private endpoints for both the source and target databases, it is imperative to use the default private DNS zone provided by Azure for the private link service. The use of custom DNS configurations is not yet supported and may lead to connectivity issues during the migration process.
57+
5658
## Limitations migrating from Azure Database for PostgreSQL single server
5759

5860
- It's required that both the Azure Database for PostgreSQL single server and the Azure Database for PostgreSQL flexible server are in the same Azure region. Exceptions to this limitation are made for Azure Database for PostgreSQL flexible server situated in India, China, and UAE, where cross-region migrations are permitted.

articles/postgresql/migrate/migration-service/concepts-migration-service-runtime-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The migration runtime server is essential for transferring data between differen
3030

3131
To use the Migration Runtime Server feature within the migration service in Azure Database for PostgreSQL, follow these steps in the Azure portal:
3232

33-
- Sign in to the Azure portal and access the migration service in the Azure Database for PostgreSQL.
33+
- Sign in to the Azure portal and access the migration service (from the target server) in the Azure Database for PostgreSQL instance.
3434
- Begin a new migration workflow within the service.
3535
- When you reach the "Select runtime server" tab, use the Migration Runtime Server by selecting "Yes."
3636
Choose your Azure subscription and resource group and the location of the VNet-integrated Azure Database for PostgreSQL—Flexible server.

articles/postgresql/migrate/migration-service/how-to-network-setup-migration-service.md

Lines changed: 3 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ The table below summarizes the scenarios for connecting a source database to an
2727
| PostgreSQL installed Azure VM in same/different virtual network | VNet-integrated Azure Database for PostgreSQL - Flexible Server in same/different virtual network | Yes |
2828
| Azure Database for PostgreSQL - Single Server with public access | VNet-integrated Azure Database for PostgreSQL - Flexible Server | Yes |
2929
| Azure Database for PostgreSQL - Single Server with private endpoint | VNet-integrated Azure Database for PostgreSQL - Flexible Server | Yes |
30-
| Azure Database for PostgreSQL - Single Server with private endpoint | Azure Database for PostgreSQL - Flexible Server with private endpoint | Planned for future release |
31-
| On-premises/Azure VM/AWS with private access | Azure Database for PostgreSQL - Flexible Server with private endpoint | Planned for future release |
32-
| On-premises/Azure VM/AWS with private access | Azure Database for PostgreSQL - Flexible Server with public access | Planned for future release |
30+
| Azure Database for PostgreSQL - Single Server with private endpoint | Azure Database for PostgreSQL - Flexible Server with private endpoint | Yes |
31+
| On-premises/Azure VM/AWS with private access | Azure Database for PostgreSQL - Flexible Server with private endpoint | Yes |
32+
| On-premises/Azure VM/AWS with private access | Azure Database for PostgreSQL - Flexible Server with public access | No |
3333

3434
## Scenario 1: On-premises source to Azure Database for PostgreSQL with public access
3535

@@ -212,17 +212,6 @@ Below are the networking steps for migrating a PostgreSQL database from an on-pr
212212
- Attach a private DNS zone to the Flexible Server's private endpoint if not already configured.
213213
- Add virtual network links for the Flexible Server and Migration Runtime Server to the private DNS zone.
214214

215-
## Scenario 10: Custom private DNS Zone attached to the private endpoint
216-
217-
This scenario addresses the networking challenge when migrating databases to Azure PostgreSQL, which requires using Azure's default private DNS zone. Custom DNS configurations are incompatible with the Migration Runtime Server, necessitating the temporary use of Azure's default private DNS zone.
218-
219-
- Check if the source and target databases use custom DNS zones with private endpoints.
220-
- For both the source and target databases, set up new private endpoints that are linked to Azure's default private DNS zone.
221-
- Connect the new private endpoints to the **privatelink.postgres.database.azure.com** DNS zone for proper name resolution.
222-
- Ensure the Migration Runtime Server can resolve and communicate with both databases using the new private endpoints.
223-
- Carry out the database migration through the secondary endpoints that use the default private DNS zone.
224-
- Remove the secondary private endpoints after successful migration and restore any custom DNS configurations if needed.
225-
226215
## Resources for network setup
227216

228217
- To establish an **ExpressRoute** connection, refer to the [What is Azure ExpressRoute?](../../../expressroute/expressroute-introduction.md).

articles/postgresql/migrate/migration-service/how-to-setup-azure-cli-commands-postgresql.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,25 @@ If the cutover isn't successful, the migration moves to the `Failed` state.
8484

8585
For more information about this command, use the `help` parameter.
8686

87+
## Cancel the migration
88+
89+
To cancel the migration task, use the following command:
90+
91+
```azurecli
92+
az postgres flexible-server migration update cancel [--subscription]
93+
[--resource-group]
94+
[--name]
95+
[--migration-name]
96+
```
97+
98+
## The --help command
99+
100+
For more information about this command, use the `help` parameter:
101+
102+
```azurecli-interactive
103+
az postgres flexible-server migration update cancel -- help
104+
```
105+
87106
## Related content
88107

89108
- [Migration service in Azure Database for PostgreSQL](concepts-migration-service-postgresql.md)

articles/postgresql/migrate/migration-service/includes/aws/prerequisites-migration-service-postgresql-offline-aws.md

Lines changed: 2 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -33,34 +33,9 @@ The SKU chosen for the Azure Database for PostgreSQL should correspond with the
3333

3434
### Configure network setup
3535

36-
Proper networking setup is essential to ensure successful migration connectivity between the source and target. Here's a guide to help you establish the network connection for different scenarios:
36+
Network setup is crucial for the migration service to function correctly. Ensure that the source PostgreSQL server can communicate with the target Azure Database for PostgreSQL server. The following network configurations are essential for a successful migration.
3737

38-
- **Networking requirements for migration:**
39-
40-
- **ExpressRoute/IPsec VPN/VPN tunneling**: When connecting your on-premises/AWS source to Azure, you might need to set up an ExpressRoute, IPsec VPN, or VPN tunneling to facilitate secure data transfer.
41-
42-
- **VNET peering**: Establish virtual network peering between the two distinct VNets to enable direct network connectivity, a prerequisite for migration between the Azure VM and the Azure Database for PostgreSQL.
43-
44-
- **Connectivity Scenarios:**
45-
46-
The following table can help set up the network between the source and target.
47-
48-
| Source | Target | Connectivity Tips |
49-
| --- | --- | --- |
50-
| Public | Public | No other action is required if the source is whitelisted in the target's firewall rules. |
51-
| Private | Public | This configuration isn't supported; use pg_dump/pg_restore for data transfer. |
52-
| Public | Private | No other action is required if the source is whitelisted in the target's firewall rules. |
53-
| Private | Private | Establish an ExpressRoute, IPsec VPN, VPN Tunneling, or virtual network Peering between the source and target. |
54-
| Private | Private Endpoint | This configuration isn't supported; contact [Microsoft support](https://support.microsoft.com/en-US). |
55-
56-
- **Additional networking considerations:**
57-
58-
pg_hba.conf Configuration: To facilitate connectivity between the source and target PostgreSQL instances, it's essential to verify and potentially modify the pg_hba.conf file. This file includes client authentication and must be configured to allow the target PostgreSQL to connect to the source. Changes to the pg_hba.conf file typically require a restart of the source PostgreSQL instance to take effect.
59-
60-
> [!NOTE]
61-
> The pg_hba.conf file is located in the data directory of the PostgreSQL installation. This file should be checked and configured if the source database is an on-premises PostgreSQL server or a PostgreSQL server hosted on an Azure VM. For PostgreSQL instances on AWS RDS or similar managed services, the pg_hba.conf file is not directly accessible or applicable. Instead, access is controlled through the service's security and network access configurations.
62-
63-
For more information about network setup, visit [Network guide for migration service](../../how-to-network-setup-migration-service.md).
38+
For information about network setup, visit [Network guide for migration service](../../how-to-network-setup-migration-service.md).
6439

6540
### Enable extensions
6641

articles/postgresql/migrate/migration-service/includes/aws/prerequisites-migration-service-postgresql-online-aws.md

Lines changed: 24 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -49,11 +49,9 @@ If the source PostgreSQL version is less than 9.5, upgrade it to 9.5 or higher b
4949

5050
### Configure network setup
5151

52-
Networking is required to establish a successful connectivity between the source and target.
52+
Network setup is crucial for the migration service to function correctly. Ensure that the source PostgreSQL server can communicate with the target Azure Database for PostgreSQL server. The following network configurations are essential for a successful migration.
5353

54-
- You need to set up Express route/ IP Sec VPN/ VPN tunneling while connecting your source from AWS RDS to Azure.
55-
56-
For more information on network setup, visit [Network guide for migration service](../../how-to-network-setup-migration-service.md)
54+
For information about network setup, visit [Network guide for migration service](../../how-to-network-setup-migration-service.md).
5755

5856
### Enable extensions
5957

@@ -76,9 +74,28 @@ If yes, search the server parameters page for the shared_preload_libraries param
7674

7775
### Check server parameters
7876

79-
- You need to manually configure the server parameter values in the Azure Database for PostgreSQL – Flexible server based on the server parameter values configured in the source.
77+
These parameters aren't automatically migrated to the target environment and must be manually configured.
78+
79+
- Match server parameter values from the source PostgreSQL database to the Azure Database for PostgreSQL by accessing the "Server parameters" section in the Azure portal and manually updating the values accordingly.
80+
81+
- Save the parameter changes and restart the Azure Database for PostgreSQL to apply the new configuration if necessary.
8082

8183
### Check users and roles
8284

83-
- The users and different roles must be migrated manually to the Azure Database for PostgreSQL – Flexible server. For migrating users and roles, you can use `pg_dumpall --globals-only -U <<username> -f <<filename>>.sql`.
84-
- Azure Database for PostgreSQL – The flexible server doesn't support any superuser; users having roles of superuser need to be removed before migration.
85+
When migrating to Azure Database for PostgreSQL, it's essential to address the migration of users and roles separately, as they require manual intervention:
86+
87+
- **Manual Migration of Users and Roles**: Users and their associated roles must be manually migrated to the Azure Database for PostgreSQL. To facilitate this process, you can use the `pg_dumpall` utility with the `--globals-only` flag to export global objects such as roles and user accounts. Execute the following command, replacing `<<username>>` with the actual username and `<<filename>>` with your desired output file name:
88+
89+
```sql
90+
pg_dumpall --globals-only -U <<username>> -f <<filename>>.sql
91+
```
92+
93+
- **Restriction on Superuser Roles**: Azure Database for PostgreSQL doesn't support superuser roles. Therefore, users with superuser privileges must have those privileges removed before migration. Ensure that you adjust the permissions and roles accordingly.
94+
95+
By following these steps, you can ensure that user accounts and roles are correctly migrated to the Azure Database for PostgreSQL without encountering issues related to superuser restrictions.
96+
97+
### Disable high availability (reliability) and read replicas in the target
98+
99+
- Disabling high availability (reliability) and reading replicas in the target environment is essential. These features should be enabled only after the migration has been completed.
100+
101+
- By following these guidelines, you can help ensure a smooth migration process without the added variables introduced by HA and Read Replicas. Once the migration is complete and the database is stable, you can proceed to enable these features to enhance the availability and scalability of your database environment in Azure.

articles/postgresql/migrate/migration-service/includes/iaas/prerequisites-migration-service-postgresql-offline-iaas.md

Lines changed: 3 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -33,34 +33,15 @@ The SKU chosen for the Azure Database for PostgreSQL should correspond with the
3333

3434
### Configure network setup
3535

36-
Proper networking setup is essential to ensure successful migration connectivity between the source and target. Here's a guide to help you establish the network connection for different scenarios:
36+
Network setup is crucial for the migration service to function correctly. Ensure that the source PostgreSQL server can communicate with the target Azure Database for PostgreSQL server. The following network configurations are essential for a successful migration.
3737

38-
- **Networking requirements for migration:**
39-
40-
- **ExpressRoute/IPsec VPN/VPN tunneling**: When connecting your on-premises/AWS source to Azure, you might need to set up an ExpressRoute, IPsec VPN, or VPN tunneling to facilitate secure data transfer.
41-
42-
- **VNET peering**: Establish virtual network peering between the two distinct VNets to enable direct network connectivity, a prerequisite for migration between the Azure VM and the Azure Database for PostgreSQL.
43-
44-
- **Connectivity Scenarios:**
45-
46-
The following table can help set up the network between the source and target.
47-
48-
| Source | Target | Connectivity Tips |
49-
| --- | --- | --- |
50-
| Public | Public | No other action is required if the source is whitelisted in the target's firewall rules. |
51-
| Private | Public | This configuration isn't supported; use pg_dump/pg_restore for data transfer. |
52-
| Public | Private | No other action is required if the source is whitelisted in the target's firewall rules. |
53-
| Private | Private | Establish an ExpressRoute, IPsec VPN, VPN Tunneling, or virtual network Peering between the source and target. |
54-
| Private | Private Endpoint | This configuration isn't supported; contact [Microsoft support](https://support.microsoft.com/en-US). |
38+
For information about network setup, visit [Network guide for migration service](../../how-to-network-setup-migration-service.md).
5539

5640
- **Additional networking considerations:**
5741

5842
pg_hba.conf Configuration: To facilitate connectivity between the source and target PostgreSQL instances, it's essential to verify and potentially modify the pg_hba.conf file. This file includes client authentication and must be configured to allow the target PostgreSQL to connect to the source. Changes to the pg_hba.conf file typically require a restart of the source PostgreSQL instance to take effect.
5943

60-
> [!NOTE]
61-
> The pg_hba.conf file is located in the data directory of the PostgreSQL installation. This file should be checked and configured if the source database is an on-premises PostgreSQL server or a PostgreSQL server hosted on an Azure VM. For PostgreSQL instances on AWS RDS or similar managed services, the pg_hba.conf file is not directly accessible or applicable. Instead, access is controlled through the service's security and network access configurations.
62-
63-
For more information about network setup, visit [Network guide for migration service](../../how-to-network-setup-migration-service.md).
44+
The pg_hba.conf file is located in the data directory of the PostgreSQL installation. This file should be checked and configured if the source database is an on-premises PostgreSQL server or a PostgreSQL server hosted on an Azure VM.
6445

6546
### Enable extensions
6647

0 commit comments

Comments
 (0)