Site Recovery
30 TopicsTroubleshooting - Trusted root certificates (error code 151066)
You may receive an error message “Site Recovery configuration failed.” while configuring Azure to Azure VM replication. Most of these issues occurred due to the required trusted root certificates used for authorization and authentication aren't present on the machine. This troubleshooting article details some of the possible causes and recommended actions to resolve this issue.3.7KViews0likes1CommentTroubleshooting - Unable to delete Recovery Services Vault?/Can't delete Azure Backup Vault?
You may receive " Vault deletion error Vault: 'Vault name' cannot be deleted as there are existing resources within the vault. Please delete any replicated items, registered servers, Hyper-V sites (Used for Site Recovery), policy associations for System Center VMM clouds (Used for Site Recovery) and then delete the vault." when trying to remove the azure recovery services vault. Most of the Vault deletion errors that we encounter at support are due to the dependency resources exist in the vault. Please follow the steps metnioned in below articles to resolve this issue. For the site recovery resources Delete Recovery Services vault For the backup resources Delete an Azure Backup vault If you testing the product, want to rapidly delete the vault and not concerned about data loss, then you can use force delete method to remove vault and all its dependencies.Solved33KViews0likes11CommentsASR Replication Issue - Error ID 70171
Hi. I'm new to using this forum so hopefully someone can help me I have 2 x on-premise Hyper-V Windows 2012 R2 which replicate 10 servers into an Azure Recovery Vault which is used for ASR. I have a configured ASR policy which has been working for most of the year with no issues. On Thursday last week I received notification to upgrade my Hyper-V Hosts from Azure ACS to AAD for ASR. I did this and it all went well and they're on Agent Ver 5.1.2700.0 (latest) and I updated the MARS Agents to the latest too as I had a notice about these needing updating to the latest version. When I now list my 10 servers in Azure they are all RED and Replication Health is Critical and RPO column is blank. If I open ALL the servers they correctly state the App-and Crash resistance times : so why are they RED and stated as Replication Health Critical ?? The on-premise hyper-v replications says all is working and I used this article to check the finer points that replication is indeed being sent: https://docs.microsoft.com/en-us/azure/site-recovery/site-recovery-azure-to-azure-troubleshoot-errors#outbound-connectivity-for-site-recovery-urls-or-ip-ranges-error-code-151037-or-151072). Any ideas ?6.9KViews0likes2CommentsAzure Site recovery clearing locks
Recently had an issue in re-protecting VM's following failover to a secondary region. Tried everything and couldn't resolve eventually after speaking with Azure support i ran the below script and resolved the issue with locks not clearing on failed over VM's cls $subscriptionId = Read-Host 'What is your Azure Subscription ID?' $rgName = Read-Host 'Specify the name of the Resource group in which your VM is located' $vmName = Read-Host 'Specify the name of the VM' # Sign-in with Azure account credentials Login-AzureRmAccount # Select Azure Subscription Select-AzureRmSubscription -SubscriptionId $subscriptionId # Remove any locks $locks = Get-AzureRmResourceLock -ResourceGroupName $rgName -ResourceName $vmName -ResourceType Microsoft.Compute/virtualMachines if ($locks -ne $null -and $locks.Count -ge 0){ $canDelete = Read-Host 'The VM has locks that could prevent cleanup of Azure Site Recovery stale links left from previous protection. Do you want the locks deleted to ensure cleanup goes smoothly? Reply with Y/N.' if ($canDelete.ToLower() -eq "y"){ Foreach ($lock in $locks) { $lockId = $lock.LockId Remove-AzureRmResourceLock -LockId $lockId -Force Write-Host "Removed Lock $lockId for $vmName" } } } $linksResourceId = 'https://management.azure.com/subscriptions/' + $subscriptionId + '/providers/Microsoft.Resources/links' $vmId = '/subscriptions/' + $subscriptionId + '/resourceGroups/' + $rgName + '/providers/Microsoft.Compute/virtualMachines/' + $vmName + '/' Write-Host $("Deleting links for $vmId using resourceId: $linksResourceId") $links = @(Get-AzureRmResource -ResourceId $linksResourceId| Where-Object {$_.Properties.sourceId -match $vmId -and $_.Properties.targetId.ToLower().Contains("microsoft.recoveryservices/vaults")}) Write-Host "Links to be deleted" $links #Delete all links which are of type Foreach ($link in $links) { Write-Host $("Deleting link " + $link.Name) Remove-AzureRmResource -ResourceId $link.ResourceId -Force } $links = @(Get-AzureRmResource -ResourceId $linksResourceId| Where-Object {$_.Properties.sourceId -match $vmId -and $_.Properties.targetId.ToLower().Contains("/protecteditemarmid/")}) Write-Host "Cross subscription Links to be deleted" $links #Delete all links which are of type Foreach ($link in $links) { Write-Host $("Deleting link " + $link.Name) Remove-AzureRmResource -ResourceId $link.ResourceId -Force } Write-Host $("Deleted all links ")2.4KViews1like0CommentsAzure site recovery- replication policy for offline initial replication
Hi, I have 2 sites each site has one SCVMM configured to do Azure Site Recovery. ASR is configured to replicate the VM form one site to another. Here is the issue, my VM size is big and i want to do the initial replication offline instead of over the Network. And it just not allowing me to save the policy, saying permission issues can anyone help me to find, what could be going wrong here ?? ERROR MESSAGE Permissions couldn't be set for one or more hosts on the initial replication folder path. Provider error code: 31218 Provider error message: The VMM service couldn't provide permissions for cs\nimblenter image description hereecs1$ on \nimblecs1\f$. Error: Object reference not set to an instance of an object.. During cloud configuration, the VMM service provides permissions for Hyper-V service accounts on the import and export paths used for initial replication. Provider error possible causes: The VMM service doesn't have the required privileges to modify the permissions on the import and export paths. Provider error recommended action: Ensure that the VMM service account has the required privileges to perform this operation. POSSIBLE CAUSES Verify that the initial replication path exists and is accessible.2.1KViews0likes1CommentRecovery Services vault limit increased to 500 vaults per subscription per region
Today, we are delighted to announce increased scale limits for Azure Backup. Users can now create as many as 500 recovery services vaults in each subscription per region as compared to the earlier limit of 25 vaults per region per subscription. Customers who have been hitting the vault limits due to a restriction of 25 vaults can now go ahead and create vaults to manage their resources better. In addition, the number of Azure virtual machines that can be registered against each vault has been increased to 1,000 from the earlier limit of 200 machines under each vault. Read about it in the Azure blog.1.8KViews0likes0CommentsGDPR offers one more reason to focus on your disaster recovery strategy
Has your organization failed to devise a business continuity and disaster recovery plan because of the perception that it’s complex or expensive? Or perhaps you have a disaster recovery plan, but maybe you're not testing it frequently enough because of concerns about impacting production systems. If you’re in either category, you’ll want to start developing a plan now. Especially if your company does business in the European Union (EU) or might have any data on EU citizens. The General Data Protection Regulation (GDPR), which goes into effect May 25, 2018, is the EU’s new data protection regulation. While it doesn’t explicitly require that you back up data or implement a site recovery solution, the GDPR requirements provide additional reasons to stop waiting and fine-tune your DR plan. Learn more about it in the Azure blog.968Views0likes0CommentsAzure Backup Server + Hyper-V + Linux VM + Storage Snapshot + Backup from Azure Cloud to on prem
Hi there, I need some help on the following questions: 1. Do I need to install backup agent at the Hyper-V host in order to manage it? Or by default Azure backup server will be able to manage Hyper-V host without any agent installed? 2. I can see my Hyper-V host and the Windows guest VM, but not Linux VM. The integration pkg for the Linux VM is installed but cannot see the Linux VM to configure protection group. 3. Is that a way I can leverage hardware storage (aka storage snapshot) as the backup data source instead of the backup server reading the data from my production volume(s)? If this is possible, please advise how to do it either via powershell scripts or other method. 4. Is it possible to backup my Azure data from the cloud back to my on-prem backup storage? Imagine most of my workloads are running in the cloud but i need to backup a copy of my online production data back to on-prem.700Views0likes0CommentsAzure Site Recovery Issue With vSphere Infrastructure
Hi all, I found two problems 1,) CP server (Ver: 9.13.1.0) is replicating vSphere, but if the name of vSphere virtual machine is ":" (colon) it seems to fail to acquire the inventory. This is the same even if you run Deployment Planner. 2,) I can not delete registered vCenter · · ·. If there are people who have become similar phenomena, let's talk about it!961Views0likes1CommentProtect machines using managed disks between Azure regions using Azure Site Recovery
We are happy to announce that Azure Site Recovery (ASR) now provides you the ability to setup Disaster Recovery (DR) for IaaS VMs using managed disks. With this feature, ASR fulfills an important requirement to become an all-encompassing DR solution for all of your production applications hosted on laaS VMs in Azure, including applications hosted on VMs with managed disks. Managed disks provide several advantages including simplification of storage management and guaranteeing industry-leading durability and availability for disk storage. Read about it in the Azure blog.738Views0likes0Comments