|
1 | 1 | ---
|
2 |
| -title: Troubleshoot connectivity for Azure to Azure disaster recovery with Azure Site Recovery |
| 2 | +title: Troubleshoot connectivity for Azure to Azure disaster recovery with Azure Site Recovery |
3 | 3 | description: Troubleshoot connectivity issues in Azure VM disaster recovery
|
4 | 4 | author: sideeksh
|
5 | 5 | manager: rochakm
|
6 | 6 | ms.topic: how-to
|
7 |
| -ms.date: 08/05/2019 |
| 7 | +ms.date: 04/06/2020 |
8 | 8 | ---
|
9 | 9 |
|
10 | 10 | # Troubleshoot Azure-to-Azure VM network connectivity issues
|
11 | 11 |
|
12 |
| -This article describes the common issues related to network connectivity when you replicate and recover Azure virtual machines from one region to another region. For more information about networking requirements, see the [connectivity requirements for replicating Azure VMs](azure-to-azure-about-networking.md). |
| 12 | +This article describes the common issues related to network connectivity when you replicate and recover Azure virtual machines (VM) from one region to another region. For more information about networking requirements, see the [connectivity requirements for replicating Azure VMs](azure-to-azure-about-networking.md). |
13 | 13 |
|
14 | 14 | For Site Recovery replication to work, outbound connectivity to specific URLs or IP ranges is required from the VM. If your VM is behind a firewall or uses network security group (NSG) rules to control outbound connectivity, you might face one of these issues.
|
15 | 15 |
|
16 |
| -**URL** | **Details** |
17 |
| ---- | --- |
18 |
| -*.blob.core.windows.net | Required so that data can be written to the cache storage account in the source region from the VM. If you know all the cache storage accounts for your VMs, you can allow-list the specific storage account URLs (for example, cache1.blob.core.windows.net and cache2.blob.core.windows.net) instead of *.blob.core.windows.net |
19 |
| -login.microsoftonline.com | Required for authorization and authentication to the Site Recovery service URLs. |
20 |
| -*.hypervrecoverymanager.windowsazure.com | Required so that the Site Recovery service communication can occur from the VM. You can use the corresponding 'Site Recovery IP' if your firewall proxy supports IPs. |
21 |
| -*.servicebus.windows.net | Required so that the Site Recovery monitoring and diagnostics data can be written from the VM. You can use the corresponding 'Site Recovery Monitoring IP' if your firewall proxy supports IPs. |
| 16 | +| **URL** | **Details** | |
| 17 | +| --- | --- | |
| 18 | +| `*.blob.core.windows.net` | Required so that data can be written to the cache storage account in the source region from the VM. If you know all the cache storage accounts for your VMs, you can use an allow-list for the specific storage account URLs. For example, `cache1.blob.core.windows.net` and `cache2.blob.core.windows.net` instead of `*.blob.core.windows.net`. | |
| 19 | +| `login.microsoftonline.com` | Required for authorization and authentication to the Site Recovery service URLs. | |
| 20 | +| `*.hypervrecoverymanager.windowsazure.com` | Required so that the Site Recovery service communication can occur from the VM. You can use the corresponding _Site Recovery IP_ if your firewall proxy supports IPs. | |
| 21 | +| `*.servicebus.windows.net` | Required so that the Site Recovery monitoring and diagnostics data can be written from the VM. You can use the corresponding _Site Recovery Monitoring IP_ if your firewall proxy supports IPs. | |
22 | 22 |
|
23 | 23 | ## Outbound connectivity for Site Recovery URLs or IP ranges (error code 151037 or 151072)
|
24 | 24 |
|
25 |
| -## <a name="issue-1-failed-to-register-azure-virtual-machine-with-site-recovery-151195-br"></a>Issue 1: Failed to register Azure virtual machine with Site Recovery (151195) </br> |
26 |
| -- **Possible cause** </br> |
27 |
| - - Connection cannot be established to Site Recovery endpoints due to DNS resolution failure. |
28 |
| - - This is more frequently seen during re-protection when you have failed over the virtual machine but the DNS server is not reachable from the DR region. |
| 25 | +### Issue 1: Failed to register Azure virtual machine with Site Recovery (151195) |
29 | 26 |
|
30 |
| -- **Resolution** |
31 |
| - - If you're using custom DNS, make sure that the DNS server is accessible from the Disaster Recovery region. To check if you have a custom DNS go to the VM> Disaster Recovery network> DNS servers. Try accessing the DNS server from the virtual machine. If it is not accessible, make it accessible by either failing over the DNS server or creating the line of site between DR network and DNS. |
| 27 | +#### Possible cause |
32 | 28 |
|
33 |
| -  |
| 29 | +A connection can't be established to Site Recovery endpoints because of a Domain Name System (DNS) resolution failure. This problem is more common during reprotection when you've failed over the VM but the DNS server isn't reachable from the disaster recovery (DR) region. |
34 | 30 |
|
| 31 | +#### Resolution |
35 | 32 |
|
36 |
| -## Issue 2: Site Recovery configuration failed (151196) |
| 33 | +If you're using custom DNS, make sure that the DNS server is accessible from the disaster recovery region. |
| 34 | + |
| 35 | +To check if the VM uses a custom DNS setting: |
| 36 | + |
| 37 | +1. Open **Virtual machines** and select the VM. |
| 38 | +1. Navigate to the VMs **Settings** and select **Networking**. |
| 39 | +1. In **Virtual network/subnet**, select the link to open the virtual network's resource page. |
| 40 | +1. Go to **Settings** and select **DNS servers**. |
| 41 | + |
| 42 | +Try to access the DNS server from the virtual machine. If the DNS server isn't accessible, make it accessible by either failing over the DNS server or creating the line of site between DR network and DNS. |
| 43 | + |
| 44 | + :::image type="content" source="./media/azure-to-azure-troubleshoot-errors/custom_dns.png" alt-text="com-error"::: |
| 45 | + |
| 46 | +### Issue 2: Site Recovery configuration failed (151196) |
37 | 47 |
|
38 | 48 | > [!NOTE]
|
39 |
| -> If the virtual machines are behind **Standard** internal load balancer, it would not have access to O365 IPs (that is, login.microsoftonline.com) by default. Either change it to **Basic** internal load balancer type or create outbound access as mentioned in the [article](https://aka.ms/lboutboundrulescli). |
| 49 | +> If the VMs are behind a **Standard** internal load balancer, by default, it wouldn't have access to the Office 365 IPs such as `login.microsoftonline.com`. Either change it to **Basic** internal load balancer type or create outbound access as mentioned in the article [Configure load balancing and outbound rules in Standard Load Balancer using Azure CLI](/azure/load-balancer/configure-load-balancer-outbound-cli). |
| 50 | +
|
| 51 | +#### Possible cause |
40 | 52 |
|
41 |
| -- **Possible cause** </br> |
42 |
| - - Connection cannot be established to Office 365 authentication and identity IP4 endpoints. |
| 53 | +A connection can't be established to Office 365 authentication and identity IP4 endpoints. |
43 | 54 |
|
44 |
| -- **Resolution** |
45 |
| - - Azure Site Recovery required access to Office 365 IPs ranges for authentication. |
46 |
| - If you are using Azure Network security group (NSG) rules/firewall proxy to control outbound network connectivity on the VM, ensure you allow communication to O365 IPranges. Create an [Azure Active Directory (Azure AD) service tag](../virtual-network/security-overview.md#service-tags) based NSG rule for allowing access to all IP addresses corresponding to Azure AD |
47 |
| - - If new addresses are added to Azure AD in the future, you need to create new NSG rules. |
| 55 | +#### Resolution |
| 56 | + |
| 57 | +- Azure Site Recovery requires access to the Office 365 IP ranges for authentication. |
| 58 | +- If you're using Azure Network security group (NSG) rules/firewall proxy to control outbound network connectivity on the VM, ensure you allow communication to the Office 365 IP ranges. Create an [Azure Active Directory (Azure AD) service tag](/azure/virtual-network/security-overview#service-tags) based NSG rule that allows access to all IP addresses corresponding to Azure AD. |
| 59 | +- If new addresses are added to Azure AD in the future, you need to create new NSG rules. |
48 | 60 |
|
49 | 61 | ### Example NSG configuration
|
50 | 62 |
|
51 | 63 | This example shows how to configure NSG rules for a VM to replicate.
|
52 | 64 |
|
53 |
| -- If you're using NSG rules to control outbound connectivity, use "Allow HTTPS outbound" rules to port:443 for all the required IP address ranges. |
54 |
| -- The example presumes that the VM source location is "East US" and the target location is "Central US". |
| 65 | +- If you're using NSG rules to control outbound connectivity, use **Allow HTTPS outbound** rules to port 443 for all the required IP address ranges. |
| 66 | +- The example presumes that the VM source location is **East US** and the target location is **Central US**. |
| 67 | + |
| 68 | +#### NSG rules - East US |
| 69 | + |
| 70 | +1. Create an HTTPS outbound security rule for the NSG as shown in the following screenshot. This example uses the **Destination service tag**: _Storage.EastUS_ and **Destination port ranges**: _443_. |
| 71 | + |
| 72 | + :::image type="content" source="./media/azure-to-azure-about-networking/storage-tag.png" alt-text="storage-tag"::: |
| 73 | + |
| 74 | +1. Create an HTTPS outbound security rule for the NSG as shown in the following screenshot. This example uses the **Destination service tag**: _AzureActiveDirectory_ and **Destination port ranges**: _443_. |
55 | 75 |
|
56 |
| -### NSG rules - East US |
| 76 | + :::image type="content" source="./media/azure-to-azure-about-networking/aad-tag.png" alt-text="aad-tag"::: |
57 | 77 |
|
58 |
| -1. Create an outbound HTTPS (443) security rule for "Storage.EastUS" on the NSG as shown in the screenshot below. |
| 78 | +1. Create HTTPS port 443 outbound rules for the Site Recovery IPs that correspond to the target location: |
59 | 79 |
|
60 |
| -  |
| 80 | + | **Location** | **Site Recovery IP address** | **Site Recovery monitoring IP address** | |
| 81 | + | --- | --- | --- | |
| 82 | + | Central US | 40.69.144.231 | 52.165.34.144 | |
61 | 83 |
|
62 |
| -2. Create an outbound HTTPS (443) security rule for "AzureActiveDirectory" on the NSG as shown in the screenshot below. |
| 84 | +#### NSG rules - Central US |
63 | 85 |
|
64 |
| -  |
| 86 | +For this example, these NSG rules are required so that replication can be enabled from the target region to the source region post-failover: |
65 | 87 |
|
66 |
| -3. Create outbound HTTPS (443) rules for the Site Recovery IPs that correspond to the target location: |
| 88 | +1. Create an HTTPS outbound security rule for _Storage.CentralUS_: |
67 | 89 |
|
68 |
| - **Location** | **Site Recovery IP address** | **Site Recovery monitoring IP address** |
69 |
| - --- | --- | --- |
70 |
| - Central US | 40.69.144.231 | 52.165.34.144 |
| 90 | + - **Destination service tag**: _Storage.CentralUS_ |
| 91 | + - **Destination port ranges**: _443_ |
71 | 92 |
|
72 |
| -### NSG rules - Central US |
| 93 | +1. Create an HTTPS outbound security rule for _AzureActiveDirectory_. |
73 | 94 |
|
74 |
| -These rules are required so that replication can be enabled from the target region to the source region post-failover: |
| 95 | + - **Destination service tag**: _AzureActiveDirectory_ |
| 96 | + - **Destination port ranges**: _443_ |
75 | 97 |
|
76 |
| -1. Create an outbound HTTPS (443) security rule for "Storage.CentralUS" on the NSG. |
| 98 | +1. Create HTTPS port 443 outbound rules for the Site Recovery IPs that correspond to the source location: |
77 | 99 |
|
78 |
| -2. Create an outbound HTTPS (443) security rule for "AzureActiveDirectory" on the NSG. |
| 100 | + |**Location** | **Site Recovery IP address** | **Site Recovery monitoring IP address** | |
| 101 | + | --- | --- | --- | |
| 102 | + | East US | 13.82.88.226 | 104.45.147.24 | |
79 | 103 |
|
80 |
| -3. Create outbound HTTPS (443) rules for the Site Recovery IPs that correspond to the source location: |
| 104 | +### Issue 3: Site Recovery configuration failed (151197) |
81 | 105 |
|
82 |
| - **Location** | **Site Recovery IP address** | **Site Recovery monitoring IP address** |
83 |
| - --- | --- | --- |
84 |
| - Central US | 13.82.88.226 | 104.45.147.24 |
85 |
| -## Issue 3: Site Recovery configuration failed (151197) |
86 |
| -- **Possible cause** </br> |
87 |
| - - Connection cannot be established to Azure Site Recovery service endpoints. |
| 106 | +#### Possible cause |
88 | 107 |
|
89 |
| -- **Resolution** |
90 |
| - - Azure Site Recovery required access to [Site Recovery IP ranges](https://docs.microsoft.com/azure/site-recovery/azure-to-azure-about-networking#outbound-connectivity-using-service-tags) depending on the region. Make sure that required ip ranges are accessible from the virtual machine. |
| 108 | +A connection can't be established to Azure Site Recovery service endpoints. |
91 | 109 |
|
| 110 | +#### Resolution |
92 | 111 |
|
93 |
| -## Issue 4: A2A replication failed when the network traffic goes through on-premises proxy server (151072) |
94 |
| -- **Possible cause** </br> |
95 |
| - - The custom proxy settings are invalid, and Azure Site Recovery Mobility Service agent did not auto-detect the proxy settings from IE |
| 112 | +Azure Site Recovery required access to [Site Recovery IP ranges](azure-to-azure-about-networking.md#outbound-connectivity-using-service-tags) depending on the region. Make sure that required IP ranges are accessible from the VM. |
96 | 113 |
|
| 114 | +### Issue 4: Azure-to-Azure replication failed when the network traffic goes through on-premises proxy server (151072) |
97 | 115 |
|
98 |
| -- **Resolution** |
99 |
| - 1. Mobility Service agent detects the proxy settings from IE on Windows and /etc/environment on Linux. |
100 |
| - 2. If you prefer to set proxy only for Azure Site Recovery Mobility Service, you can provide the proxy details in ProxyInfo.conf located at:</br> |
101 |
| - - ``/usr/local/InMage/config/`` on ***Linux*** |
102 |
| - - ``C:\ProgramData\Microsoft Azure Site Recovery\Config`` on ***Windows*** |
103 |
| - 3. The ProxyInfo.conf should have the proxy settings in the following INI format.</br> |
104 |
| - *[proxy]*</br> |
105 |
| - *Address=http://1.2.3.4*</br> |
106 |
| - *Port=567*</br> |
107 |
| - 4. Azure Site Recovery Mobility Service agent supports only ***un-authenticated proxies***. |
| 116 | +#### Possible cause |
| 117 | + |
| 118 | +The custom proxy settings are invalid and the Azure Site Recovery Mobility service agent didn't autodetect the proxy settings from Internet Explorer (IE). |
| 119 | + |
| 120 | +#### Resolution |
| 121 | + |
| 122 | +1. The Mobility service agent detects the proxy settings from IE on Windows and `/etc/environment` on Linux. |
| 123 | +1. If you prefer to set proxy only for Azure Site Recovery Mobility service, you can provide the proxy details in _ProxyInfo.conf_ located at: |
| 124 | + |
| 125 | + - **Linux**: `/usr/local/InMage/config/` |
| 126 | + - **Windows**: `C:\ProgramData\Microsoft Azure Site Recovery\Config` |
| 127 | + |
| 128 | +1. The _ProxyInfo.conf_ should have the proxy settings in the following _INI_ format: |
| 129 | + |
| 130 | + ```plaintext |
| 131 | + [proxy] |
| 132 | + Address=http://1.2.3.4 |
| 133 | + Port=567 |
| 134 | + ``` |
| 135 | + |
| 136 | +1. Azure Site Recovery Mobility service agent supports only **unauthenticated proxies**. |
108 | 137 |
|
109 | 138 | ### Fix the problem
|
110 |
| -To allow [the required URLs](azure-to-azure-about-networking.md#outbound-connectivity-for-urls) or the [required IP ranges](azure-to-azure-about-networking.md#outbound-connectivity-using-service-tags), follow the steps in the [networking guidance document](site-recovery-azure-to-azure-networking-guidance.md). |
111 | 139 |
|
| 140 | +To allow [the required URLs](azure-to-azure-about-networking.md#outbound-connectivity-for-urls) or the [required IP ranges](azure-to-azure-about-networking.md#outbound-connectivity-using-service-tags), follow the steps in the [networking guidance document](site-recovery-azure-to-azure-networking-guidance.md). |
112 | 141 |
|
113 | 142 | ## Next steps
|
| 143 | + |
114 | 144 | [Replicate Azure virtual machines](site-recovery-replicate-azure-to-azure.md)
|
0 commit comments