You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/migrate/migrate-support-matrix-hyper-v.md
+6-11Lines changed: 6 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,8 +56,8 @@ Geography | You can create Azure Migrate projects in a number of geographies. Al
56
56
| **Support** | **Details**
57
57
| :------------------- | :------------------- |
58
58
|**Host deployment**| The Hyper-V host can be standalone or deployed in a cluster. |
59
-
|**Permissions**| You need administrator permissions on the Hyper-V host. |
60
-
|**Host operating system**| Windows Server 2016 or Windows Server 2012 R2.<br/> You can't assess VMs located on Hyper-V hosts running Windows Server 2019. |
59
+
|**Permissions**| You need administrator permissions on the Hyper-V host. <br/> Alternatively, if you don't want to assign Administrator permissions, create a local or domain user account and add the user to these groups- Remote Management Users, Hyper-V Administrators and Performance Monitor Users. |
60
+
|**Host operating system**| Windows Server 2019, Windows Server 2016 or Windows Server 2012 R2.<br/> You can't assess VMs located on Hyper-V hosts running Windows Server 2012. |
61
61
|**PowerShell Remoting**| Must be enabled on each host. |
62
62
|**Hyper-V Replica**| If you use Hyper-V Replica (or you have multiple VMs with the same VM identifiers), and discover both the original and replicated VMs using Azure Migrate, the assessment generated by Azure Migrate might not be accurate. |
63
63
@@ -67,13 +67,8 @@ Geography | You can create Azure Migrate projects in a number of geographies. Al
|**Operating system**| All [Windows](https://support.microsoft.com/help/2721672/microsoft-server-software-support-for-microsoft-azure-virtual-machines) and [Linux](https://docs.microsoft.com/azure/virtual-machines/linux/endorsed-distros) operating systems that are supported by Azure. |
70
-
|**Permissions**| You need administrator permissions on each Hyper-V VM you want to assess. |
71
70
|**Integration Services**|[Hyper-V Integration Services](https://docs.microsoft.com/virtualization/hyper-v-on-windows/reference/integration-services) must be running on VMs that you assess, in order to capture operating system information. |
72
-
|**UEFI boot**| VMs with UEFI boot aren't supported for migration. |
73
-
|**Encrypted disks/volumes**| VMs with encrypted disks/volumes aren't supported for migration. |
74
-
|**RDM/passthrough disks**| If VMs have RDM or passthrough disks, these disks won't be replicated to Azure. |
75
-
|**NFS**| NFS volumes mounted as volumes on the VMs won't be replicated. |
76
-
|**Target disk**| Azure Migrate assessments recommend migration to Azure VMs with managed disks only. |
71
+
77
72
78
73
79
74
## Assessment-appliance requirements
@@ -98,8 +93,8 @@ To assess VMs, the Azure Migrate appliance needs internet connectivity.
98
93
**URL** | **Details**
99
94
--- | ---
100
95
*.portal.azure.com | Navigation to the Azure portal
101
-
*.windows.net | Sign in to your Azure subscription
102
-
*.microsoftonline.com | Creation of Azure Active Directory applications for appliance to service communications.
96
+
*.windows.net <br/> *.msftauth.net <br/> *.msauth.net <br/> *.microsoft.com <br/> *.live.com | Sign in to your Azure subscription
97
+
*.microsoftonline.com <br/> *.microsoftonline-p.com | Creation of Azure Active Directory applications for appliance to service communications.
103
98
management.azure.com | Creation of Azure Active Directory applications for appliance to service communications.
104
99
dc.services.visualstudio.com | Logging and monitoring
105
100
*.vault.azure.net | Manage secrets in Azure Key Vault when communicating between the appliance and service.
@@ -114,7 +109,7 @@ The following table summarizes port requirements for assessment.
114
109
115
110
**Device** | **Connection**
116
111
--- | ---
117
-
**Appliance** | Inbound connections on TCP port 3389 to allow remote desktop connections to the appliance.<br/> Inbound connections on port 44368 to remotely access the appliance management app using the URL: ``` https://<appliance-ip-or-name>:44368 ```<br/> Outbound connections on port 443 to send discovery and performance metadata to Azure Migrate.
112
+
**Appliance** | Inbound connections on TCP port 3389 to allow remote desktop connections to the appliance.<br/> Inbound connections on port 44368 to remotely access the appliance management app using the URL: ``` https://<appliance-ip-or-name>:44368 ```<br/> Outbound connections on ports 443, 5671 and 5672 to send discovery and performance metadata to Azure Migrate.
118
113
**Hyper-V host/cluster** | Inbound connections on WinRM ports 5985 (HTTP) and 5986 (HTTPS) to pull configuration and performance metadata of the Hyper-V VMs using a Common Information Model (CIM) session.
Appliance | Inbound connections on TCP port 3389 to allow remote desktop connections to the appliance.<br/><br/> Inbound connections on port 44368 to remotely access the appliance management app using the URL: ```https://<appliance-ip-or-name>:44368``` <br/><br/>Outbound connections on port 443 to send discovery and performance metadata to Azure Migrate.
102
+
Appliance | Inbound connections on TCP port 3389 to allow remote desktop connections to the appliance.<br/><br/> Inbound connections on port 44368 to remotely access the appliance management app using the URL: ```https://<appliance-ip-or-name>:44368``` <br/><br/>Outbound connections on port 443, 5671 and 5672 to send discovery and performance metadata to Azure Migrate.
103
103
vCenter server | Inbound connections on TCP port 443 to allow the appliance to collect configuration and performance metadata for assessments. <br/><br/> The appliance connects to vCenter on port 443 by default. If the vCenter server listens on a different port, you can modify the port when you set up discovery.
104
104
105
105
@@ -170,8 +170,8 @@ The Azure Migrate appliance needs internet connectivity to the internet.
170
170
**URL** | **Details**
171
171
--- | ---
172
172
*.portal.azure.com | Navigate to the Azure Migrate in the Azure portal.
173
-
*.windows.net | Log into your Azure subscription.
174
-
*.microsoftonline.com | Create Active Directory apps for the appliance to communicate with the Azure Migrate service.
173
+
*.windows.net <br/> *.msftauth.net <br/> *.msauth.net <br/> *.microsoft.com <br/> *.live.com | Log into your Azure subscription.
174
+
*.microsoftonline.com <br/> *.microsoftonline-p.com | Create Active Directory apps for the appliance to communicate with the Azure Migrate service.
175
175
management.azure.com | Create Active Directory apps for the appliance to communicate with the Azure Migrate service.
176
176
dc.services.visualstudio.com | Upload app logs used for internal monitoring.
177
177
*.vault.azure.net | Manage secrets in the Azure Key Vault.
Copy file name to clipboardExpand all lines: articles/migrate/tutorial-assess-vmware.md
+32-1Lines changed: 32 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -176,8 +176,39 @@ This starts discovery. It takes around 15 minutes for metadata of discovered VMs
176
176
177
177
### Scoping discovery
178
178
179
-
Discovery can be scoped by limiting access of the vCenter account used for discovery. You can set the scope to vCenter Server datacenters, clusters, folder of clusters, hosts, folder of hosts, or individual VMs.
179
+
Discovery can be scoped by limiting access of the vCenter account used for discovery. You can set the scope to vCenter Server datacenters, clusters, folder of clusters, hosts, folder of hosts, or individual VMs.
180
180
181
+
To set the scope, you need to perform the following steps:
182
+
1. Create a vCenter user account.
183
+
2. Define a new role with required privileges. (<em> required for agentless Server Migration </em>)
184
+
3. Assign permissions to the user account on vCenter objects.
185
+
186
+
**Create a vCenter user account**
187
+
1. Login to vSphere Web Client as the vCenter Server administrator.
4. Fill in the required information to create a new user and click **OK**.
191
+
192
+
**Define a new role with required privileges** (<em> required for agentless Server Migration </em>)
193
+
1. Login to the vSphere Web Client as the vCenter Server administrator.
194
+
2. Browse to **Administration** > **Role Manager**.
195
+
3. Select your vCenter Server from the drop-down menu.
196
+
4. Click on **Create role** action.
197
+
5. Type a name for the new role. (such as <em>Azure_Migrate</em>).
198
+
6. Assign these [permissions](https://docs.microsoft.com/azure/migrate/migrate-support-matrix-vmware#agentless-migration-vcenter-server-permissions) to the newly defined role.
199
+
7. Click **OK**.
200
+
201
+
**Assign permissions on vCenter objects**
202
+
203
+
There are 2 approaches to assign permissions on inventory objects in vCenter to the vCenter user account with a role assigned to it.
204
+
- For Server Assessment, **Read-only** role must be applied to the vCenter user account for all the parent objects where the VMs to be discovered are hosted. All parent objects - host, folder of hosts, cluster, folder of clusters in the hierarchy up to the data center are to be included. These permissions are to be propagated to child objects in the hierarchy.
205
+
206
+
Similarly for Server Migration, a user-defined role (can be named <em> Azure _Migrate</em>) with these [privileges](https://docs.microsoft.com/azure/migrate/migrate-support-matrix-vmware#agentless-migration-vcenter-server-permissions) assigned must be applied to the vCenter user account for all the parent objects where the VMs to be migrated are hosted.
- The alternative approach is to assign the user account and role at the datacenter level and propagate them to the child objects. Then give the account a **No access** role for every object (such as VMs) that you don’t want to discover/migrate. This configuration is cumbersome. It exposes accidental access controls, because every new child object is also automatically granted access that's inherited from the parent. Therefore, we recommend that you use the first approach.
211
+
181
212
> [!NOTE]
182
213
> Today, Server Assessment is not able to discover VMs if the vCenter account has access granted at vCenter VM folder level. If you are looking to scope your discovery by VM folders, you can do so by ensuring the vCenter account has read-only access assigned at a VM level. Following are instructions on how you can do this:
0 commit comments