Skip to content

Commit dd1f663

Browse files
authored
Merge pull request #100686 from HJToland3/localworking
hiten
2 parents 8c71116 + 5ee96b5 commit dd1f663

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

articles/dms/tutorial-sql-server-managed-instance-online.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: dms
1111
ms.workload: data-services
1212
ms.custom: "seo-lt-2019"
1313
ms.topic: article
14-
ms.date: 01/08/2020
14+
ms.date: 01/10/2020
1515
---
1616

1717
# Tutorial: Migrate SQL Server to an Azure SQL Database managed instance online using DMS
@@ -39,7 +39,7 @@ In this tutorial, you learn how to:
3939
> For an optimal migration experience, Microsoft recommends creating an instance of Azure Database Migration Service in the same Azure region as the target database. Moving data across regions or geographies can slow down the migration process and introduce errors.
4040
4141
> [!IMPORTANT]
42-
> It's important to reduce the duration of the online migration process as much as possible, to minimize the risk of interruption caused by instance reconfiguration or planned maintenance. In case of such an event, migration process will start from the beginning. In case of planned maintenance, there is a grace period of 36 hours before migration process is restarted.
42+
> Reduce the duration of the online migration process as much as possible to minimize the risk of interruption caused by instance reconfiguration or planned maintenance. In case of such an event, migration process will start from the beginning. In case of planned maintenance, there is a grace period of 36 hours before migration process is restarted.
4343
4444
[!INCLUDE [online-offline](../../includes/database-migration-service-offline-online.md)]
4545

@@ -65,7 +65,7 @@ To complete this tutorial, you need to:
6565
> [!IMPORTANT]
6666
> Regarding the storage account used as part of the migration, you must either:
6767
> * Choose to allow all network to access the storage account.
68-
> * Set up ACLs for the virtual network. For more information, see the article [Configure Azure Storage firewalls and virtual networks](https://docs.microsoft.com/azure/storage/common/storage-network-security).
68+
> * Turn on [subnet delegation](https://docs.microsoft.com/azure/virtual-network/manage-subnet-delegation) on MI subnet and update the Storage Account firewall rules to allow this subnet.
6969
7070
* Ensure that your virtual network Network Security Group rules don't block the following inbound communication ports to Azure Database Migration Service: 443, 53, 9354, 445, 12000. For more detail on virtual network NSG traffic filtering, see the article [Filter network traffic with network security groups](https://docs.microsoft.com/azure/virtual-network/virtual-networks-nsg).
7171
* Configure your [Windows Firewall for source database engine access](https://docs.microsoft.com/sql/database-engine/configure-windows/configure-a-windows-firewall-for-database-engine-access).
@@ -203,18 +203,19 @@ After an instance of the service is created, locate it within the Azure portal,
203203

204204
| | |
205205
|--------|---------|
206-
|**SMB Network location share** | The local SMB network share or Azure file share that contains the Full database backup files and transaction log backup files that Azure Database Migration Service can use for migration. The service account running the source SQL Server instance must have read\write privileges on this network share. Provide an FQDN or IP addresses of the server in the network share, for example, '\\\servername.domainname.com\backupfolder' or '\\\IP address\backupfolder'.|
206+
|**SMB Network location share** | The local SMB network share or Azure file share that contains the Full database backup files and transaction log backup files that Azure Database Migration Service can use for migration. The service account running the source SQL Server instance must have read\write privileges on this network share. Provide an FQDN or IP addresses of the server in the network share, for example, '\\\servername.domainname.com\backupfolder' or '\\\IP address\backupfolder'. For improved performance, it's recommended to use separate folder for each database to be migrated. You can provide the database level file share path by using the **Advanced Settings** option. |
207207
|**User name** | Make sure that the Windows user has full control privilege on the network share that you provided above. Azure Database Migration Service will impersonate the user credential to upload the backup files to Azure Storage container for restore operation. If using Azure File share, use the storage account name pre-pended with AZURE\ as the username. |
208208
|**Password** | Password for the user. If using Azure file share, use a storage account key as the password. |
209209
|**Subscription of the Azure Storage Account** | Select the subscription that contains the Azure Storage Account. |
210210
|**Azure Storage Account** | Select the Azure Storage Account that DMS can upload the backup files from the SMB network share to and use for database migration. We recommend selecting the Storage Account in the same region as the DMS service for optimal file upload performance. |
211211

212212
![Configure Migration Settings](media/tutorial-sql-server-to-managed-instance-online/dms-configure-migration-settings4.png)
213213

214+
> [!NOTE]
215+
> If Azure Database Migration Service shows error ‘System Error 53’ or ‘System Error 57’, the cause might result from an inability of Azure Database Migration Service to access Azure file share. If you encounter one of these errors, please grant access to the storage account from the virtual network using the instructions [here](https://docs.microsoft.com/azure/storage/common/storage-network-security?toc=%2fazure%2fvirtual-network%2ftoc.json#grant-access-from-a-virtual-network).
214216
215-
> [!NOTE]
216-
> If Azure Database Migration Service shows error ‘System Error 53’ or ‘System Error 57’, the cause might result frm an inability of Azure Database Migration Service to access Azure file share. If you encounter one of these errors, please grant access to the storage account from the virtual network using the instructions [here](https://docs.microsoft.com/azure/storage/common/storage-network-security?toc=%2fazure%2fvirtual-network%2ftoc.json#grant-access-from-a-virtual-network).
217-
217+
> [!IMPORTANT]
218+
> If loopback check functionality is enabled and the source SQL Server and file share are on the same computer, then source won't be able to access the files hare using FQDN. To fix this issue, disable loopback check functionality using the instructions [here](https://support.microsoft.com/help/926642/error-message-when-you-try-to-access-a-server-locally-by-using-its-fqd).
218219
219220
2. Select **Save**.
220221

0 commit comments

Comments
 (0)