Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Caution
This article references CentOS, a Linux distribution that is end of life (EOL). Consider your use and plan accordingly.
When you set up disaster recovery for VMware VMs and physical servers by using Azure Site Recovery, install the Site Recovery Mobility service on each on-premises VMware VM and physical server. The Mobility service captures data writes on the machine and forwards them to the Site Recovery process server.
Install on Windows machine
On each Windows machine you want to protect, complete the following:
Ensure that the machine has network connectivity to the process server. If you didn't set up a separate process server, the configuration server runs the process server by default.
Create an account that the process server can use to access the computer. The account needs administrator rights, either local or domain. Use this account only for the push installation and for agent updates.
If you don't use a domain account, disable Remote User Access control on the local computer as follows:
Under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System registry key, add a new DWORD: LocalAccountTokenFilterPolicy. Set the value to 1.
To do this step at a command prompt, run the following command:
REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f
In Windows Firewall on the machine you want to protect, select Allow an app or feature through Firewall. Enable File and Printer Sharing and Windows Management Instrumentation (WMI). For computers that belong to a domain, you can configure the firewall settings by using a Group Policy object (GPO).
Add the account that you created in CSPSConfigtool. To do this, sign in to your configuration server.
Open cspsconfigtool.exe. It's available as a shortcut on the desktop and in the %ProgramData%\ASR\home\svsystems\bin folder.
On the Manage Accounts tab, select Add Account.
Add the account you created.
Enter the credentials you use when you enable replication for a computer.
Install on Linux machine
On each Linux machine that you want to protect, complete the following:
Ensure that the Linux machine and the process server have network connectivity.
Use the built-in root user account for the process server to access the computer. This account should be a root user on the source Linux server. Use this account only for the push installation and for updates.
Check that the
/etc/hostsfile on the source Linux server has entries that map the local hostname to IP addresses associated with all network adapters.Install the latest
openssh,openssh-server, andopensslpackages on the computer that you want to replicate.Ensure that Secure Shell (SSH) is enabled and running on port 22.
Enable SFTP subsystem and password authentication in the
sshd_configfile. To do this, sign in as root.In the /etc/ssh/sshd_config file, find the line that begins with PasswordAuthentication.
Uncomment the line, and change the value to yes.
Find the line that begins with Subsystem, and uncomment the line.
Restart the sshd service.
Add the root user account in CSPSConfigtool. To do this, sign in to your configuration server.
Open cspsconfigtool.exe. It's available as a shortcut on the desktop and in the
%ProgramData%\home\svsystems\binfolder.On the Manage Accounts tab, select Add Account.
Add the account you created.
Enter the credentials you use when you enable replication for a computer.
Additional step for updating or protecting SUSE Linux Enterprise Server 11 SP3 machines. Ensure the latest version is available in the configuration server.
Note
Ensure the following ports are open in appliance:
- SMB share port:
445 - WMI port:
135,5985, and5986.
Anti-virus on replicated machines
If machines you want to replicate have active anti-virus software running, make sure you exclude the Mobility service installation folder from anti-virus operations (C:\ProgramData\ASR\agent). This ensures that replication works as expected.
Next steps
After the Mobility Service is installed, in the Azure portal, select + Replicate to start protecting these VMs. Learn more about enabling replication for VMware VMs and physical servers.