NSX-T Data Center Migration Coordinator Guide
NSX-T Data Center Migration Coordinator Guide
Migration Coordinator
Guide
17 SEPTEMBER 2020
VMware NSX-T Data Center 3.0
NSX-T Data Center Migration Coordinator Guide
You can find the most up-to-date technical documentation on the VMware website at:
https://docs.vmware.com/
VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
©
Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc. 2
Contents
VMware, Inc. 3
NSX-T Data Center Migration Coordinator Guide
VMware, Inc. 4
NSX-T Data Center Migration Coordinator
Guide
The NSX-T Data Center Migration Coordinator Guide provides information about migrating a
® ®
VMware NSX for vSphere environment to an VMware NSX-T™ environment using the
migration coordinator utility.
®
It also includes information about migrating networking configurations from VMware vSphere to
an NSX-T Data Center environment using the migration coordinator.
Intended Audience
This manual is intended for anyone who wants to use the migration coordinator utility to migrate
an NSX Data Center for vSphere environment or vSphere networking to an NSX-T Data Center
environment. The information is written for experienced network and system administrators who
are familiar with virtual machine technology and datacenter operations.
VMware, Inc. 5
Migrating NSX Data Center for
vSphere 1
You can use the migration coordinator to migrate your existing deployment from a working NSX
Data Center for vSphere environment to an empty NSX-T Data Center environment.
Important The migration causes traffic outages during the NSX Manager and NSX Edge
migration process. You must complete the migration within a single maintenance window.
Contact your VMware support team before attempting the migration.
n Post-Migration Tasks
In addition to setting up the new NSX-T Data Center environment in advance, migration
preparation might also require modifying your existing NSX Data Center for vSphere
environment.
Most features have some limitations. If you import your NSX Data Center for vSphere
configuration to migration coordinator you get detailed feedback of what features and
configurations in your environment are supported or not supported.
See Detailed Feature Support for Migration Coordinator for detailed information about what is
supported by migration coordinator.
VMware, Inc. 6
NSX-T Data Center Migration Coordinator Guide
L2 Bridges No
NAT Yes
L2 VPN Yes
L3 VPN Yes
Guest Introspection No
Network Introspection No
Endpoint Protection No
Cross-vCenter NSX No
Platform Support
See the VMware Interoperability Matrix for supported versions of ESXi and vCenter Server:
http://partnerweb.vmware.com/comp_guide2/sim/interop_matrix.php#interop&175=&1=&2=.
VMware, Inc. 7
NSX-T Data Center Migration Coordinator Guide
NSX Data Center for vSphere with a No Contact your VMware representative
Cloud Management Platform, before proceeding with migration.
Integrated Stack Solution, or PaaS Scripts and integrations might break if
Solution you migrate.
For example:
n NSX Data Center for vSphere and
vRealize Automation
n NSX for vSphere and VMware
Integrated Openstack
n NSX for vSphere and vCloud
Director
n NSX for vSphere with Integrated
Stack Solution
n NSX for vSphere with PaaS
Solution such as Pivotal Cloud
Foundry, RedHat OpenShift
n NSX for vSphere with vRealize
Operations workflows
VMware, Inc. 8
NSX-T Data Center Migration Coordinator Guide
Stateless ESXi No
Host profiles No
vSphere FT No
SRIOV No
Private VLAN No
Ephemeral dvPortGroup No
DirectPath IO No
L2 security No
SNMP No
Hosts with multiple VTEPs No Hosts can have only one VTEP
interface configured. That is, only one
interface with TCP/IP stack vxlan per
host is supported for migration.
VMware, Inc. 9
NSX-T Data Center Migration Coordinator Guide
Appliance certificate No
Local users No
NSX roles assigned to a vCenter user Yes VMware Identity Manager must be
added via LDAP installed and configured to migrate
user roles for LDAP users.
Certificates
Operations
VMware, Inc. 10
NSX-T Data Center Migration Coordinator Guide
PortMirroring: No
n Distributed PortMirroring
n Remote Mirroring Source
n Remote Mirroring Destination
n Distributed Port Mirroring (legacy)
Hardware VTEP No
Promiscuous Mode No
Switch
L2 Bridging No
VMware, Inc. 11
NSX-T Data Center Migration Coordinator Guide
IP Discovery (ARP, ND, DHCPv4 and Yes The following binding limits apply on
DHCPv6) NSX-T for migration:
n 128 for ARP discovered IPs
n 128 for DHCPv4 discovered IPs
n 15 for DHCPv6 discovered IPs
n 15 for ND discovered IPs
MAC/IP replication No
VMware, Inc. 12
NSX-T Data Center Migration Coordinator Guide
Routing between Edge Services Yes Routes are converted to static routes
Gateway and Distributed Logical after migration.
Router
Node level settings on Edge Services No Node level settings, for example,
Gateway or Distributed Logical Router syslog or NTP server, are not
supported.
IPv6 No
IP Multicast routing No
Edge Firewall
Firewall Section: Display name Yes Firewall sections can have a maximum
of 1000 rules. If a section contains
more than 1000 rules, it is migrated as
multiple sections.
Action for default rule Yes NSX Data Center for vSphere API:
GatewayPolicy/action
NSX-T API: SecurityPolicy.action
VMware, Inc. 13
NSX-T Data Center Migration Coordinator Guide
Firewall Rule: rule tag Yes NSX Data Center for vSphere API:
ruleTag
NSX-T API: Rule_tag
Sources and destinations in firewall Yes NSX Data Center for vSphere API:
rules: n source/groupingObjectId
n Grouping objects n source/ipAddress
n IP addresses NSX-T API:
n source_groups
NSX Data Center for vSphere API:
n destination/groupingObjectId
n destination/ipAddress
NSX-T API:
n destination_groups
Services (applications) in firewall rules: Yes NSX Data Center for vSphere API:
n Service n application/applicationId
n Service Group n application/service/protocol
n Protocol/port/source port n application/service/port
n application/service/sourcePort
NSX-T API:
n Services
Firewall Rule: Logging Yes NSX Data Center for vSphere API:
logging
NSX-T API: logged
Edge NAT
NAT rule: rule tag Yes NSX Data Center for vSphere API:
ruleTag
NSX-T API: rule_tag
NAT rule: action Yes NSX Data Center for vSphere API:
action
NSX-T API: action
VMware, Inc. 14
NSX-T Data Center Migration Coordinator Guide
NAT rule: original address (Source Yes NSX Data Center for vSphere API:
address for SNAT originalAddress
rules, and the destination address for NSX-T API: source_network for SNAT
DNAT rules.) rule or destination_network for DNAT
rule
NAT rule: translatedAddress Yes NSX Data Center for vSphere API:
translatedAddress
NSX-T API: translated_network
NAT rule: logging Yes NSX Data Center for vSphere API:
loggingEnabled
NSX-T API: logging
NAT rule: enabled Yes NSX Data Center for vSphere API:
enabled
NSX-T API: disabled
NAT rule: description Yes NSX Data Center for vSphere API:
description
NSX-T API: description
NAT rule: protocol Yes NSX Data Center for vSphere API:
protocol
NSX-T API: Service
NAT rule: original port (source port for Yes NSX Data Center for vSphere API:
SNAT rules, destination port for DNAT originalPort
rules) NSX-T API: Service
NAT rule: translated port Yes NSX Data Center for vSphere API:
translatedPort
NSX-T API: Translated_ports
NAT rule: Source address in DNAT rule Yes NSX Data Center for vSphere API:
dnatMatchSourceAddress
NSX-T API: source_network
NAT rule: rule ID Yes NSX Data Center for vSphere API:
ruleID
NSX-T API: id and display_name
VMware, Inc. 15
NSX-T Data Center Migration Coordinator Guide
L2VPN
L3VPN
Changed Dead Peer Detection (dpd) Yes NSX Data Center for vSphere dpdelay
default values for: maps to NSX-T dpdinternal.
n dpddelay
Overlapping local and peer subnets of No NSX Data Center for vSphere supports
two or more sessions. policy-based IPSec VPN sessions
where the local and peer subnets of
two or more sessions overlap with
each other. This behavior is not
supported on NSX-T. You must
reconfigure the subnets so they do not
overlap before you start the migration.
If this configuration issue is not
resolved, the Migrate Configuration
step fails.
VMware, Inc. 16
NSX-T Data Center Migration Coordinator Guide
Load Balancer
LB pool member with different monitor No The pool member which has different
port monitor port is not migrated.
VMware, Inc. 17
NSX-T Data Center Migration Coordinator Guide
Cookie app session / session table No Configuration is not migrated, and the
associated virtual server has no
persistence setting.
Monitor for: No
n Explicit escape
n Quit
n Delay
Pool IP Filter No
n IPv6 addresses
VMware, Inc. 18
NSX-T Data Center Migration Coordinator Guide
DHCP Relay configured on Distributed Yes The DHCP Relay server IP must be one
Logical Router pointing to a DHCP of the Edge Services Gateway’s
Server configured on a directly internal interface IPs.
connected Edge Services Gateway The DHCP Server must be configured
on an Edge Services Gateway that is
directly connected to the Distributed
Logical Router configured with the
DHCP relay.
It is not supported to use DNAT to
translate a DHCP Relay IP that does
not match an Edge Services Gateway
internal interface.
IP Pools Yes
<dhcpOptions>
<other>
<code>80</code>
<value>2f766172</value>
</other>
</dhcpOptions>
VMware, Inc. 19
NSX-T Data Center Migration Coordinator Guide
Distributed Firewall
Identity-based Firewall No
VMware, Inc. 20
NSX-T Data Center Migration Coordinator Guide
Universal Sections No
VMware, Inc. 21
NSX-T Data Center Migration Coordinator Guide
Security Groups are supported for migration with the limitations listed. Security Groups are
migrated to NSX-T Data Center as Groups. See Inventory > Groups in the NSX-T Manager web
interface.
NSX Data Center for vSphere has system-defined and user-defined Security Groups. These are
all migrated to NSX-T as user-defined Groups.
The total number of ‘Groups’ after migration might not be equal to the number of Security
Groups on NSX for vSphere. For example, a Distributed Firewall rule containing a VM as its
source would be migrated into a rule containing a new Group with the VM as its member. This
increases the total number of groups on NSX-T after migration.
Security Group with members that No If any of the members of the Security
don’t exist Group do not exist, then the Security
Group is not migrated.
Security Group that contains a Security No If any members of the Security Group
Group with unsupported members are not supported for migration, the
Security Group is not migrated.
If a Security Group contains a Security
Group with unsupported members, the
parent Security Group is not migrated.
VMware, Inc. 22
NSX-T Data Center Migration Coordinator Guide
Security Group Member Types (Static No If a security group contains any of the
or Entity Belongs To): unsupported member types, the
n Cluster security group is not migrated.
n Datacenter
n Directory Group
n Distributed Port Group
n Legacy Port Group / Network
n Resource Pool
n vApp
Security Group Member Types (Static Yes Security groups, IP sets, and MAC sets
or Entity Belongs To): are migrated to NSX-T as Groups. If an
n Security Group NSX for vSphere security group
contains an IP set, MAC set, or nested
n IP Sets
security group as a static member, the
n MAC Sets
corresponding Groups are added to
the parent Group.
If one of these static members was not
migrated to NSX-T, the parent security
group does not migrate to NSX-T.
For example, an IP set with more than
2 million members cannot migrate to
NSX-T. Therefore, a security group
that contains an IP set with more than
2 million members cannot migrate.
Security Group Member Types (Static Yes If a security group contains logical
or Entity Belongs To): switches that do not migrate to NSX-T
n Logical Switch (Virtual Wire) segments, the security group does not
migrate to NSX-T.
VMware, Inc. 23
NSX-T Data Center Migration Coordinator Guide
Security Group Member Types (Static Yes If a security tag is added to the
or Entity Belongs To): security group as a static member or
n Security tag as a dynamic member using Entity
Belongs To, the security tag must exist
for the security group to be migrated.
If the security tag is added to the
security group as a dynamic member
(not using Entity Belongs To), the
existence of the security tag is not
checked before migrating the security
group.
Security Group Member Types (Static Yes n vNICs and VMs are migrated as an
or Entity Belongs To): ExternalIDExpression.
n vNIC n Orphaned VMs (VMs deleted from
n Virtual Machine hosts) are ignored during Security
Group migration.
n Once the Groups appear on NSX-T,
the VM and vNIC memberships are
updated after some time. During
this intermediate time, there can be
temporary groups and their
temporary groups might appear as
members. However, once the Host
Migration has finished, these extra
temporary groups are no longer
seen.
Using other available operators for Yes Available operators for VM Name,
dynamic membership criteria for Computer Name, and Computer OS
attributes: Name are Contains, Ends with, Equals
n Security Tag to, Not equals to, Starts with.
VMware, Inc. 24
NSX-T Data Center Migration Coordinator Guide
VMware, Inc. 25
NSX-T Data Center Migration Coordinator Guide
In NSX Data Center for vSphere, security tags are objects which can be applied to VMs. When
migrated to NSX-T security tags are attributes of a VM.
Services and Service Groups are migrated to NSX-T Data Center as Services. See Inventory >
Services in the NSX-T Manager web interface.
Services and Service Groups Yes Most of the default Services and
(Applications and Application Groups) Service Groups are mapped to NSX-T
Services. If any Service or Service
Group is not present in NSX-T, a new
Service is created in NSX-T.
Services and Service Groups with Yes If a name conflict is identified in NSX-T
naming conflicts for a modified Service or Service
Group a new Service is created in NSX-
T with a name in format: <NSXv-
Application-Name> migrated from
NSX-V
VMware, Inc. 26
NSX-T Data Center Migration Coordinator Guide
VMware, Inc. 27
NSX-T Data Center Migration Coordinator Guide
Unsupported Features
In all topologies, the following features are not supported:
n OSPF between Edge Services Gateways and northbound routers. You must reconfigure to
use BGP.
n IP Multicast.
n IPv6.
For detailed information about which features and configurations are supported, see Detailed
Feature Support for Migration Coordinator.
VMware, Inc. 28
NSX-T Data Center Migration Coordinator Guide
n BGP is configured between the Edge Services Gateway and northbound routers.
n VPN, NAT, DHCP server, DHCP relay, DNS forwarding, Edge Firewall are supported
services.
Figure 1-1. Topology 1: Before Migration - NSX Data Center for vSphere
n The IP addresses of the Distributed Logical Router interfaces are configured as downlinks on
the tier-0 gateway.
n The BGP configuration of the ESG is translated to a BGP configuration on the tier-0 gateway.
VMware, Inc. 29
NSX-T Data Center Migration Coordinator Guide
Note Depending on your configuration, you might need to provide new IP addresses for the
tier-0 gateway uplinks. For example, on an Edge Services Gateway, you can use the same IP
address for the router uplink and for the VPN service. On a tier-0 gateway, you must use the
different IP address for VPN and uplinks. See Example Configuration Issues for more information.
n The Distributed Logical Router has ECMP enabled and peers with multiple Edge Services
Gateways.
n BGP is configured between the Edge Services Gateway and northbound routers. The Edge
Services Gateways must be configured with the same BGP neighbors. All Edge Services
Gateways must point to the same autonomous system (AS).
n If BGP is configured between the Distributed Logical Router and Edge Services Gateway, all
BGP neighbors on the Distributed Logical Router must have the same weight.
VMware, Inc. 30
NSX-T Data Center Migration Coordinator Guide
Figure 1-3. Topology 2: Before Migration - NSX Data Center for vSphere
n The IPs of the Distributed Logical Router interfaces are configured as downlinks on the tier-0
Gateway.
n The combined BGP configurations of the Edge Services Gateways are translated to a BGP
configuration on the tier-0 gateway. Route redistribution configuration is translated.
n Static routes from Edge Services Gateways and Distributed Logical Routers are translated to
static routes on the tier-0 gateway.
VMware, Inc. 31
NSX-T Data Center Migration Coordinator Guide
n The first-level (router-facing) Edge Services Gateways must not run L4-L7 services.
n The first-level Edge Services Gateways must have BGP enabled and have at least one BGP
neighbor.
n The second-level Edge Services Gateways have ECMP enabled and peer with the first-level
Edge Services Gateways.
n NAT, DHCP server, DHCP relay, DNS forwarding, inline load balancer, and Edge firewall
are supported.
VMware, Inc. 32
NSX-T Data Center Migration Coordinator Guide
Figure 1-5. Topology 3: Before Migration - NSX Data Center for vSphere
After migration, this configuration is replaced with a tier-0 gateway and a tier-1 gateway.
n The first-level Edge Services Gateways are replaced with a tier-0 gateway. The service router
is in active/active mode.
n The IPs of the first-level Edge Services Gateway uplinks are used for the tier-0 gateway
uplinks.
n The second-level Edge Services Gateways are translated to a tier-1 gateway, which is linked
to the tier-0 gateway.
n The IPs of the Distributed Logical Router interfaces are configured as downlinks on the tier-1
Gateway.
n Any services running on the second-level Edge Services Gateway are migrated to the tier-1
gateway.
n The BGP configuration on the first-level Edge Services Gateways is translated to a BGP
configuration for the tier-0 gateway. Route redistribution configuration is translated.
n Static routes from Edge Services Gateways and Distributed Logical Routers are translated to
static routes on the tier-0 gateway. Static routes between the Distributed Logical Router and
second-level Edge Services Gateways are not needed, and so are not translated.
VMware, Inc. 33
NSX-T Data Center Migration Coordinator Guide
n The Distributed Logical Router has ECMP enabled and peers with multiple Edge Services
Gateway.
n BGP is configured between the Edge Services Gateway and northbound routers. All Edge
Services Gateways must be configured with the same BGP neighbors. All Edge Services
Gateways must point to the same autonomous system (AS).
n If BGP is configured between the Distributed Logical Router and Edge Services Gateway, all
BGP neighbors on the Distributed Logical Router must have the same weight.
n The router-facing Edge Services Gateways must not run L4-L7 services.
n An Edge Services Gateway is attached to the Distributed Logical Router to perform load
balancing services. It can also run Edge firewall and DHCP.
VMware, Inc. 34
NSX-T Data Center Migration Coordinator Guide
Figure 1-7. Topology 4: Before Migration - NSX Data Center for vSphere
After migration, the top-level Edge Services Gateways and the Distributed Logical Router are
replaced with a tier-0 gateway. The Edge Services Gateway performing load balancing services
is replaced with a tier-1 gateway.
n The IPs of the Distributed Logical Router interfaces are configured as downlinks on the tier-0
Gateway.
n The combined BGP configurations of the top-level Edge Services Gateways are translated to
a BGP configuration on the tier-0 gateway. Route redistribution configuration is translated.
n Static routes from the top-level Edge Services Gateways and Distributed Logical Routers are
translated to static routes on the tier-0 gateway.
n The load balancing configuration on the Edge Services Gateway is translated to a one-arm
load balancer configuration on the tier-1 Service Router.
VMware, Inc. 35
NSX-T Data Center Migration Coordinator Guide
This topology uses the following NSX Data Center for vSphere features:
n NSX Manager
n Distributed Firewall
n Service Composer
n Grouping Objects
n Transport Zone
n VXLAN
n Logical Switch
VMware, Inc. 36
NSX-T Data Center Migration Coordinator Guide
vCenter Clusters 8
ECMP paths 8
IP Sets 1,000
VMware, Inc. 37
NSX-T Data Center Migration Coordinator Guide
Caution Deploy a new NSX-T Data Center environment to be the destination for the NSX Data
Center for vSphere migration.
During the Import Configuration step, all NSX Edge node interfaces in the destination NSX-T
Data Center environment are shut down. If the destination NSX-T Data Center environment is
already configured and is in use, starting the configuration import will interrupt traffic.
n Deploy a single NSX Manager appliance to create the NSX-T Data Center environment.
n If you plan to use Maintenance Mode migration for hosts, configure a shared storage on
the cluster to be migrated from NSX Data Center for vSphere to NSX-T Data Center. This
enables automated vMotion for the migration process. Any VMs that do not meet this
criterion must be manually powered off prior to migration or manually vMotioned.
n Configure a compute manager in the NSX-T environment. Add the vCenter Server as a
compute resource.
Important Use the exact IP or hostname specified in NSX Data Center for vSphere
vCenter Server registration.
n If you want to import users from NSX Data Center for vSphere, set up VMware Identity
Manager.
n If your NSX Data Center for vSphere topology uses Edge Services Gateways, create an
NSX-T IP pool to use for the NSX-T Edge TEPs. These IPs must be able to communicate
with all the existing NSX Data Center for vSphere VTEPs.
n Join the Edge nodes to the management plane from the command line.
n Enter the details of your NSX Data Center for vSphere environment.
VMware, Inc. 38
NSX-T Data Center Migration Coordinator Guide
n Review messages and the reported configuration issues to identify any blocking issues or
other issues that require a change to the NSX Data Center for vSphere environment.
n If you make any changes to the NSX Data Center for vSphere environment while a
migration is in progress, you must restart the migration and import the configuration
again.
n Provide inputs to configuration issues that must be resolved before you can migrate your
NSX Data Center for vSphere environment to NSX-T Data Center. Resolving issues can be
done in multiple passes by multiple people.
4 Migrate configuration.
n After all configuration issues are resolved, you can migrate the configuration to NSX-T
Data Center. Configuration changes are made on NSX-T Data Center, but no changes are
made to the NSX Data Center for vSphere environment yet.
5 Migrate Edges.
n Routing and Edge services are migrated from NSX Data Center for vSphere to NSX-T
Data Center.
Caution North-South traffic is interrupted during the Migrate Edges step. All traffic that
was previously traversing through the Edge Services Gateways (North-South traffic)
moves to the NSX-T Edges.
6 Migrate Hosts.
n NSX Data Center for vSphere software is removed from the hosts, and NSX-T software is
installed. VM interfaces are connected to the new NSX-T Data Center segments.
Caution If you select In-Place migration mode, there is a traffic interruption for a few
seconds during the Migrate Hosts step. However, if you select Maintenance migration
mode, traffic interruption does not occur.
7 Finish Migration.
n After you have verified that the new NSX-T Data Center environment is working correctly,
you can finish the migration, which clears the migration state.
n Deploy two additional NSX Manager appliances before you use your NSX-T Data Center
environment in production environment.
VMware, Inc. 39
NSX-T Data Center Migration Coordinator Guide
NSX-T and deploy the VMs on NSX-T hosts. Connect the VMs to NSX-T segments and install
VMware Tools on the VMs.
Deploying on NSX-T with VMware Tools installed ensures that the VMs are populated into
security groups and receive the intended Distributed Firewall policies.
Caution VMs deployed without VMware Tools installed, or deployed on NSX for vSphere do not
receive the intended Distributed Firewall policies.
If you use vSphere templates to deploy VMs, update the templates to use NSX-T segments for
the VM network configuration. Specifying NSX-T segments ensures that any VMs deployed using
the templates are deployed on NSX-T hosts.
If you use automation tools to deploy VMs on vSphere, but do not use vSphere templates, you
might need to change your automation tool configuration to ensure that the VMs are deployed
on NSX-T.
Documentation
Check for the latest version of this guide and the release notes for NSX-T Data Center and
migration coordinator. You can find the documentation here: https://docs.vmware.com/en/
VMware-NSX-T-Data-Center/.
n See the VMware Product Interoperability Matrices for required versions of vCenter Server
and ESXi: http://partnerweb.vmware.com/comp_guide2/sim/
interop_matrix.php#interop&175=&1=&2=
n vSphere Distributed Switch versions 6.5.0, 6.6.0, and 7.0 are supported.
n The NSX for vSphere environment must match the NSX-T system requirements for ESXi,
vCenter Server, and vSphere Distributed Switch.
n If you want to migrate the user roles from NSX for vSphere, you must deploy and configure
VMware Identity Manager™. See the VMware Interoperability Matrices for compatible
versions: https://www.vmware.com/resources/compatibility/sim/
interop_matrix.php#interop&175=&140=. See the VMware Identity Manager documentation
for more information.
VMware, Inc. 40
NSX-T Data Center Migration Coordinator Guide
n The vCenter Server associated with the NSX Data Center for vSphere environment
configured as a compute manager on NSX-T Data Center.
n An IP pool to provide IPs for the Edge Tunnel End Points (TEPs). This step is required only
when your NSX Data Center for vSphere environment uses Edge Services Gateways.
In other words, you cannot merge your NSX Data Center for vSphere environment into an
existing NSX-T Data Center environment, which has NSX-T already installed on the vSphere host
clusters.
For details on deploying a licensed version of the NSX Manager appliance, see Install NSX
Manager and Available Appliances in the NSX-T Data Center Installation Guide.
VMware, Inc. 41
NSX-T Data Center Migration Coordinator Guide
Install one appliance to perform the migration. Deploy additional appliances to form a cluster
after the migration is finished. See Finish Deploying the NSX Manager Cluster.
If you install the NSX Manager appliance on an ESXi host that is a part of the NSX for vSphere
environment that is migrating, do not attach the appliance interfaces to an NSX for vSphere
logical switch. To prevent the management VMs in the NSX-T Data Center from losing
connectivity after the VMs are rebooted post migration, tag the management VMs. For more
information, see Tag Management VMs in a Collapsed Cluster Environment.
Prerequisites
Log into the NSX for vSphere NSX Manager web interface to retrieve the settings used for
vCenter Server registration. You must use the same settings. For example, if an IP is specified,
use the IP, not the FQDN.
Procedure
Option Description
Name and Description Type the name to identify the vCenter Server.
You can optionally describe any special details such as, the number of
clusters in the vCenter Server.
HTTPS Port of Reverse Proxy The default port is 443. If you use another port, verify that the port is open
on all the NSX Manager appliances.
Set the reverse proxy port to register the compute manager in NSX-T.
SHA-256 Thumbprint Type the vCenter Server SHA-256 thumbprint algorithm value.
Enable Trust Supported only on vCenter Server 7.0 and later versions.
Enable this field to trust compute manager for authentication.
If you left the thumbprint value blank, you are prompted to accept the server provided
thumbprint.
VMware, Inc. 42
NSX-T Data Center Migration Coordinator Guide
After you accept the thumbprint, it takes a few seconds for NSX-T Data Center to discover
and register the vCenter Server resources.
Note If the FQDN, IP, or thumbprint of the compute manager changes after registration, edit
the computer manager and enter the new values.
4 If the progress icon changes from In progress to Not registered, perform the following steps
to resolve the error.
a Select the error message and click Resolve. One possible error message is the following:
Results
It takes some time to register the compute manager with vCenter Server and for the connection
status to appear as UP.
You can click the compute manager's name to view the details, edit the compute manager, or to
manage tags that apply to the compute manager.
VMware, Inc. 43
NSX-T Data Center Migration Coordinator Guide
After the vCenter Server is successfully registered, do not power off and delete the NSX
Manager VM without deleting the compute manager first. Otherwise, when you deploy a new
NSX Manager, you will not be able to register the same vCenter Server again. You will get the
error that the vCenter Server is already registered with another NSX Manager.
Note After a vCenter Server (VC) compute manager is successfully added, it cannot be
removed if you successfully performed any of the following actions:
n Transport nodes are prepared using VDS that is dependent on the VC.
n Service VMs deployed on a host or a cluster in the VC using NSX service insertion.
n You use the NSX Manager UI to deploy Edge VMs, NSX Intelligence VM, or NSX Manager
nodes on a host or a cluster in the VC.
If you try to perform any of these actions and you encounter an error (for example, installation
failed), you can remove the VC if you have not successfully performed any of the actions listed
above.
If you have successfully prepared any transport node using VDS that is dependent on the VC or
deployed any VM, you can remove the VC after you have done the following:
n Unprepare all transport nodes. If uninstalling a transport node fails, you must force delete the
transport node.
n Undeploy all service VMs, any NSX Intelligence VM, all NSX Edge VMs and all NSX Manager
nodes. The undeployment must be successful or in a failed state.
n If an NSX Manager cluster consists of nodes deployed from the VC (manual method) and
nodes deployed from the NSX Manager UI, and you had to undeploy the manually deployed
nodes, then you cannot remove the VC. To sucessfully remove the VC, ensure that you re-
deploy an NSX Manager node from the VC.
This restriction applies to a fresh installation of NSX-T Data Center 3.0 as well as an upgrade.
Prerequisites
n Identify existing IP pools or DHCP ranges for NSX for vSphere VTEPs.
The IP range and VLAN must not already be in use in the NSX Data Center for vSphere
environment.
n Verify that the NSX-T TEP IP addresses have network connectivity to the NSX for vSphere
VTEP IP addresses.
VMware, Inc. 44
NSX-T Data Center Migration Coordinator Guide
Procedure
8 Click Save.
You can use the first step of migration, Import Configuration, to find out the number and size of
NSX Edge nodes that are needed. See Import the NSX Data Center for vSphere Configuration.
If the wrong number or size of NSX Edge nodes is deployed, you see an error that provides the
correct number and size.
If you see this message, click Rollback to roll back the migration. Deploy the appropriate number
and size of NSX Edge nodes, and restart the migration.
VMware, Inc. 45
NSX-T Data Center Migration Coordinator Guide
In a new NSX-T environment, there are many options for deploying NSX Edge nodes. However, if
you are migrating using migration coordinator, you must deploy NSX Edge nodes as a virtual
machine on ESXi. Deploy using an OVA or OVF file. Do not deploy on bare metal. Do not deploy
from the NSX Manager user interface.
NSX Edge nodes must be connected to trunk portgroups. To learn more about NSX Edge
networking, see "NSX Edge Networking Setup" in the NSX-T Data Center Installation Guide.
Prerequisites
n You must have sufficient ESXi hosts with appropriate resources available to accommodate
the NSX Edge appliances.
n Determine what number and size of Edge nodes are needed. If you start a migration with no
Edge nodes deployed on NSX-T, and run the Import Configuration step, the required
number and size of Edge nodes is displayed. See Determining NSX Edge Requirements for
more information.
Procedure
1 Locate the NSX Edge node appliance OVA file on the VMware download portal.
Either copy the download URL or download the OVA file onto your computer.
2 In the vSphere Client, select the host on which to install NSX Edge node appliance.
3 Right-click and select Deploy OVF template to start the installation wizard.
4 Enter the download OVA URL or navigate to the saved OVA file, and click Next.
5 Enter a name and location for the NSX Edge node , and click Next.
The name you type appears in the vCenter Server and vSphere inventory.
6 Select a compute resource for the NSX Edge node appliance, and click Next.
7 Review and verify the OVF template details, and click Next.
See the Import Configuration step for details on the size of Edge nodes you must deploy.
9 Select storage for the configuration and disk files, and click Next.
c Specify the datastore to store the NSX Edge node appliance files.
b For networks 1, 2, and 3, select the previously configured VDS trunk portgroups.
VMware, Inc. 46
NSX-T Data Center Migration Coordinator Guide
Post-migration, the NSX Edge node is connected to one of these three trunk networks using
only a single fastpath interface. The network settings can be adjusted or verified after the
NSX Edge node is deployed.
12 Click Next.
The following steps are all located in the Customize Template section of the Deploy OVF
Template wizard.
13 Enter the NSX Edge node system root, CLI admin, and audit passwords.
Note In the Customize Template window, ignore the message All properties have valid
values that is displayed even before you have entered values in any of the fields. This
message is displayed because all parameters are optional. The validation passes as you have
not entered values in any of the fields.
15 Enter the default gateway, management network IPv4, and management network netmask
address.
16 Enter the DNS Server list, the Domain Search list, and the NTP Server list.
17 (Optional) Do not enable SSH if you prefer to access NSX Edge using the console. However, if
you want root SSH login and CLI login to the NSX Edge command line, enable the SSH option.
18 Verify that all your custom OVA template specification is accurate and click Finish to initiate
the installation.
20 Open the console of the NSX Edge node to track the boot process.
If the console window does not open, make sure that pop-ups are allowed.
21 After the NSX Edge node starts, log in to the CLI with admin credentials.
Note After NSX Edge node starts, if you do not log in with admin credentials for the first
time, the data plane service does not automatically start on the NSX Edge node.
VMware, Inc. 47
NSX-T Data Center Migration Coordinator Guide
22 Run the get interface eth0 (without VLAN) or get interface eth0.<vlan_ID> (with a
VLAN) command to verify that the IP address was applied as expected.
Interface: eth0.100
Address: 192.168.110.37/24
MAC address: 00:50:56:86:62:4d
MTU: 1500
Default gateway: 192.168.110.1
Broadcast address: 192.168.110.255
...
23 Verify that the NSX Edge node has the required connectivity.
If you enabled SSH, make sure that you can SSH to your NSX Edge node and verify the
following:
n From the NSX Edge node, you can ping the node's default gateway.
n From the NSX Edge node, you can ping the hypervisor hosts that are either in the same
network or a network reachable through routing.
n From the NSX Edge node, you can ping the DNS server and NTP server.
Note If connectivity is not established, make sure the VM network adapter is in the proper
network or VLAN.
By default, the NSX Edge node datapath claims all virtual machine NICs except the
management NIC (the one that has an IP address and a default route). If you incorrectly
assigned a NIC as the management interface, follow these steps to use DHCP to assign
management IP address to the correct NIC.
a Log in to the NSX Edge CLI and type the stop service dataplane command.
c Place interface into the DHCP network and wait for an IP address to be assigned to that
interface.
The datapath fp-ethX ports used for the VLAN uplink and the tunnel overlay are shown in
the get interfaces and get physical-port commands on the NSX Edge node.
Do not join the NSX Edge node VM to the management plane using any other method. Do not
create transport nodes from the NSX Edge node VM.
VMware, Inc. 48
NSX-T Data Center Migration Coordinator Guide
Procedure
2 Open an SSH session or console session to the NSX Edge node VM.
3 On the NSX Manager appliance, run the get certificate api thumbprint command.
The command output is a string of alphanumeric numbers that is unique to this NSX Manager.
For example:
4 On the NSX Edge node VM, run the join management-plane command.
5 Verify the result by running the get managers command on your NSX Edge node VMs.
6 In the NSX Manager UI, navigate to System > Fabric > Nodes > Edge Transport Nodes.
n The Configuration State column displays Configure NSX. Click Configure NSX to begin
configuration on the node. If the NSX Version column does not display the version
number installed on the node, try refreshing the browser window.
n Do not click Configure NSX. Migration Coordinator will configure the NSX Edge node as
an Edge Transport Node during the migration.
VMware, Inc. 49
NSX-T Data Center Migration Coordinator Guide
System State
Check the following system states:
n Verify that the NSX for vSphere components are in a green state on the NSX Dashboard.
n Verify that all ESXi hosts are in an operational state. Address any problems with hosts
including disconnected states. There must be no pending reboots or pending tasks for
entering maintenance mode.
n Verify the publish status of Distributed Firewall and Service Composer to make sure that
there are no unpublished changes.
General Configuration
n Back up the NSX for vSphere and vSphere environments. See "NSX Backup and Restore" in
the NSX Administration Guide.
n The VXLAN port must be set to 4789. If your NSX for vSphere environment uses a different
port, you must change it before you can migrate. See "Change VXLAN Port" in the NSX for
vSphere NSX Administration Guide.
Controller Configuration
n Migration coordinator does not support NSX for vSphere transport zones using multicast or
hybrid replication mode. An NSX Controller cluster is required if VXLAN is in use. VLAN-
backed micro-segmentation topologies do not use VXLAN and so do not require an NSX
Controller cluster.
Host Configuration
n On all host clusters in the NSX for vSphere environment, check these settings and update if
needed:
n Manual Maintenance migration mode will be used. See the note below.
n If Automated Maintenance migration mode will be used for migration and the vCenter
Server version is 6.5 or 6.7.
n Note In the Manual Maintenance migration mode, if you decide to use vMotion for
migrating VMs, you have the flexibility to either disable vSphere DRS, or use any one
of the following vSphere DRS automation levels: Manual, Partially Automated, or Fully
Automated.
n Automated Maintenance migration mode will be used for migration and the vCenter
Server version is 7.0.
VMware, Inc. 50
NSX-T Data Center Migration Coordinator Guide
n Set the export version of Distributed Firewall filter to 1000. See Configure Export Version
of Distributed Firewall Filter on Hosts.
n If you have hosts that have NSX for vSphere installed, but are not added to a vSphere
Distributed Switch, you must add them to distributed switches if you want to migrate them to
NSX-T. See Configure Hosts Not Attached to vSphere Distributed Switches for more
information.
n On each cluster that has NSX for vSphere installed, check whether Distributed Firewall is
enabled. You can view the enabled status at Installation & Upgrade > Host Preparation.
If Distributed Firewall is enabled on any NSX for vSphere clusters before migration,
Distributed Firewall is enabled on all clusters when they migrate to NSX-T. Determine the
impact of enabling Distributed Firewall on all clusters and change the Distributed Firewall
configuration if needed.
n Verify that all hosts have only one VTEP interface configured. Check each host in Hosts and
Clusters > Host > Configure > VMKernel adapters. Verify that there is only one interface with
TCP/IP stack vxlan per host. Migrating hosts with multiple VTEPs is not supported.
n You might need to make changes to your NSX for vSphere route redistribution configuration
before migration starts.
n Prefix filters configured at the redistribution level are not migrated. Add any filters you
need as BGP filters in the Edge Service Gateway's BGP neighbor configuration.
n After migration, dynamically-learned routes between Distributed Logical Router and Edge
Services Gateway are converted to static routes and all static routes are redistributed into
BGP. If you need to filter any of these routes, before you start the migration configure
BGP neighbor filters to deny these prefixes while permitting others.
n NSX for vSphere supports policy-based IPSec VPN sessions where the local and peer subnets
of two or more sessions overlap with each other. This behavior is not supported on NSX-T.
You must reconfigure the subnets so they do not overlap before you start the migration. If
this configuration issue is not resolved, the Migrate Configuration step fails.
n If you have an Edge Services gateway performing one-armed load balancer function, you
must change the following configurations if present before you import the configuration:
n If the Edge Services Gateway has an interface configured for management, you must
delete it before migration. You can have only one connected interface on an Edge
Services Gateway providing one-arm load balancer function. If it has more than one
interface, the Migrate Configuration step fails.
VMware, Inc. 51
NSX-T Data Center Migration Coordinator Guide
n If the Edge Services Gateway firewall is disabled, and the default rule is set to deny, you
must enable the firewall and change the default rule to accept. After migration the firewall
is enabled on the tier-1 gateway, and the default rule accept takes effect. Changing the
default rule to accept before migration prevents incoming traffic to the load balancer
from being blocked.
n Verify that Edge Services Gateways are all connected correctly to the topology being
migrated. If Edge Services Gateways are part of the NSX for vSphere environment, but are
not correctly attached to the rest of the environment, they are not migrated.
For example, if an Edge Services Gateway is configured as a one-armed load balancer, but
has one of the following configurations, it is not migrated:
n The Edge Services Gateway does not have an uplink interface connected to a logical
switch.
n The Edge Services Gateway has an uplink interface connected to a logical switch, but the
uplink IP address not does match the subnet associated with the distributed logical router
that connects to the logical switch.
Security Configuration
n If you plan to use vMotion to move VMs during the migration, disable all SpoofGuard policies
in NSX Data Center for vSphere to prevent packet loss.
n Automated Maintenance mode uses DRS and vMotion to move VMs during migration.
n In Manual Maintenance mode, you can optionally use vMotion to move VMs during
migration.
VMware, Inc. 52
NSX-T Data Center Migration Coordinator Guide
You can use a distributed switch you already have in your environment, or create a new
distributed switch for this purpose. Right click the distributed switch and select Add and Manage
Hosts to add the hosts to the distributed switch. You do not need to assign physical uplinks or
VMkernel network adapters to the distributed switch.
See "Add Hosts to a vSphere Distributed Switch" in the vSphere Networking Guide for more
information.
If you import the configuration before you make this change, you must restart the migration to
import the updated configuration. See Make Changes to the NSX for vSphere Environment.
After the migration has finished, the hosts are no longer required to be attached to the
distributed switch.
n If you added the hosts to an existing distributed switch, you can remove them from the
distributed switch.
n If you added the hosts to a new distributed switch that you are not using for another
purpose, you can delete the distributed switch.
Procedure
c Use the filter information to retrieve the export version for the host.
VMware, Inc. 53
NSX-T Data Center Migration Coordinator Guide
d If the version is not 1000, set the export version. Use one of the following methods.
In a collapsed cluster design, all management VMs, workload VMs, and optionally edges run on
the same vSphere cluster that is prepared for NSX for vSphere. The management VMs of the
NSX-T Data Center must be initially attached to dvPortgroups. After migration, the management
VMs of NSX-T Data Center will be attached to NSX-T VLAN segments.
The management VMs in the NSX-T Data Center include appliances, such as NSX Manager,
vCenter Server, VMware Identity Manager, and so on. The NSX-T VLAN segment ports to which
these management VMs connect are blocked after the migration when these management VMs
are rebooted. Therefore, the management VMs might lose connectivity after the VMs reboot.
To prevent this problem, create a "management_vms" tag category, and add tags in this
category. Assign a tag from this category to all the management VMs in the NSX-T Data Center
environment. The migration coordinator migrates the VMs, which have tags in the
"management_vms" tag category, always to use the unblocked VLAN segment ports.
Procedure
4 Click the Tags tab and add a tag in the management_vms category.
6 Expand the collapsed cluster from the left Navigator view, right-click the name of the NSX
Manager VM, and select Tags & Custom Attributes > Assign Tag.
7 Assign a tag from the management_vms category to the NSX Manager VM.
VMware, Inc. 54
NSX-T Data Center Migration Coordinator Guide
8 Repeat steps 6 and 7 for all the management VMs in the cluster.
For a detailed information about tag categories and tags, see the vCenter Server and Host
Management documentation.
Prerequisites
Verify that you have completed all relevant preparation steps before you start the migration. See
Preparing to Migrate an NSX Data Center for vSphere Environment.
Note It is recommended that you first practice the migration process by completing the
procedures in this guide through Resolve Configuration Issues. This will highlight most unresolved
issues without committing you to complete the migration process. Until that point, you can roll
back or cancel the migration. See Roll Back or Cancel the NSX for vSphere Migration.
Caution Deploy a new NSX-T Data Center environment to be the destination for the NSX Data
Center for vSphere migration.
During the Import Configuration step, all NSX Edge node interfaces in the destination NSX-T
Data Center environment are shut down. If the destination NSX-T Data Center environment is
already configured and is in use, starting the configuration import will interrupt traffic.
Prerequisites
n Verify that the vCenter Server system associated with the NSX for vSphere environment is
registered as a compute manager. See Add a Compute Manager.
n If your NSX for vSphere environment uses Edge Services Gateways, verify that you have
created an IP pool in the NSX-T environment to use for Edge TEPs. See Create an IP Pool for
Edge Tunnel End Points.
Procedure
1 Using SSH, log in as admin to the NSX Manager VM and start the migration coordinator
service.
VMware, Inc. 55
NSX-T Data Center Migration Coordinator Guide
2 From a browser, log in to the NSX Manager node on which you started the migration
coordinator service. Log in as admin.
5 From the Import Configuration page, click Select NSX and provide the credentials for
vCenter and NSX for vSphere.
Note The drop-down menu for vCenter displays all vCenter Server systems that are
registered as compute managers. Click Add New if you need to add a compute manager.
7 When the import has finished, click Continue to proceed to the Resolve Configuration page.
If the import fails due to incorrect edge node configuration translation, click the Failed flag to
view information about the number and size of the required NSX Edge resources. After you
deploy the correct number and size of edge nodes, click Rollback to roll back this migration
attempt and restart the configuration import.
You can roll back or undo the migration from some of the migration steps. After the migration
has started, you can click Rollback on the furthest step completed. The button is disabled on all
other pages.
Table 1-11. Rolling Back NSX Data Center for vSphere Migration
Migration Step Rollback Details
Import Configuration Click Rollback on this page to roll back the Import
Configuration step.
Resolve Configuration Rollback is not available here. Click Rollback from the
Import Configuration page.
VMware, Inc. 56
NSX-T Data Center Migration Coordinator Guide
Table 1-11. Rolling Back NSX Data Center for vSphere Migration (continued)
Migration Step Rollback Details
Migrate Configuration Click Rollback on this page to roll back the migration of the
configuration to NSX-T and the input provided on the
Resolve Configuration page.
Verify that the rollback was successful before you start a
new migration. Log into the NSX Manager web interface
and switch to Manager mode. Verify that all configurations
have been removed. For more information about Manager
mode, see Overview of the NSX Manager in the NSX-T
Data Center Administration Guide.
Migrate Edges Click Rollback on this page to roll back the migration of
Edge routing and services to NSX-T.
There is a Cancel button on every page of the migration. Canceling a migration deletes all
migration state from the system. The migration coordinator shows the following warning
message when you cancel a migration at any step:
Caution Do not cancel a migration if Edge or Host migration has started. Canceling the migration
deletes all migration state and prevents you from rolling back the migration or viewing past
progress. If needed, roll back first to a point before Edge migration has occurred, and then
cancel.
VMware, Inc. 57
NSX-T Data Center Migration Coordinator Guide
After reviewing the blocking issues and warnings, you might need to change configurations in
your NSX for vSphere environment before you can migrate to NSX-T. If you change the NSX for
vSphere environment, you must restart the migration to pick up the new configuration. Review all
migration feedback before you provide input to avoid duplication of work.
Note For some NSX for vSphere features, there might be automatic configurations such as
certificates present. If these configurations are for features that are not supported for the specific
topology, these automatic configurations are flagged as issues that need to be skipped from
migration. For example, in topologies that don't support L4-L7 services on Edge Services
Gateways, the certificates present for VPN and DNS will raise issues to skip these configurations
from migration.
Procedure
1 From the Resolve Configuration page, review the reported issues in the Blocking category
to identify blocking issues that require changes to your NSX for vSphere environment.
VMware, Inc. 58
NSX-T Data Center Migration Coordinator Guide
Figure 1-10. Warnings and Categories of Issues on the Resolve Configuration Page
What to do next
If you find blocking issues, fix them in the NSX for vSphere environment before you can proceed
with the migration. See Make Changes to the NSX for vSphere Environment.
If you did not find any blocking issues or other configurations that require a change in the NSX
for vSphere environment, you can proceed with the migration. See Provide Input for
Configuration Issues.
Prerequisites
Verify that Host or Edge migration has not started. See Roll Back or Cancel the NSX for vSphere
Migration for more information about restarting the migration.
Procedure
Results
The migration starts over with the new NSX for vSphere configuration.
VMware, Inc. 59
NSX-T Data Center Migration Coordinator Guide
What to do next
Multiple people can provide the input over multiple sessions. You can return to a submitted input
and modify it. Depending on your configuration, you might run through the Resolve Issues
process multiple times, update your NSX for vSphere environment as needed, and restart the
migration.
Important If you have changed the NSX for vSphere environment for any reason since you last
imported the configuration, you must restart the migration. For example, if you have connected a
new VM to a logical switch, made a firewall rule change, or installed NSX for vSphere on new
hosts. See Make Changes to the NSX for vSphere Environment for information on restarting the
migration.
For some examples of configuration issues and the required input, including Edge node setup,
see Example Configuration Issues.
Note For some NSX for vSphere features, there might be automatic configurations such as
certificates present. If these configurations are for features that are not supported for the specific
topology, these automatic configurations are flagged as issues that need to be skipped from
migration. For example, in topologies that don't support L4-L7 services on Edge Services
Gateways, the certificates present for VPN and DNS will raise issues to skip these configurations
from migration.
Prerequisites
n Verify that you have reviewed all issues and migration messages and are ready to continue
with the migration.
n Verify that you have addressed all blocking issues and other issues requiring a change to the
NSX for vSphere.
Procedure
1 Navigate to System > Migrate. Click Resolve Configuration on the Migrate NSX for vSphere
pane.
2 From the Resolve Configuration page, click each issue and provide input.
Each issue can cover multiple configuration items. For each item there might be one or more
possible resolutions to the issue, for example, skip, configure, or select a specific value.
For issues that apply to multiple configuration items, you can provide input for each item
individually, or select all and provide one answer for all items.
VMware, Inc. 60
NSX-T Data Center Migration Coordinator Guide
3 After the input is provided, a Submit button is displayed on the Resolve Configuration page.
Click Submit to save your progress.
4 When you have provided input for all configuration issues, click Submit.
The input is validated. You are prompted to update any invalid input. Additional input might
be required for some configuration items.
5 After you have submitted all requested input, click Continue to proceed to the Migrate
Configuration step.
Migrating Hosts in vCenter Server 7.0 Using Automated Maintenance Migration Mode
Consider the following scenario:
n vSphere DRS is not enabled on the clusters that are being migrated.
In this scenario, the following blocking issue messages are displayed on the Resolve
Configuration page:
To resolve the DRS configuration issue, go to the vSphere Client, and enable DRS on each cluster
that is being migrated. Ensure that the DRS Automation Level is set to Fully Automated.
To resolve the second blocking issue, go to the vSphere Client, and enable vMotion on the
VMkernel adapter of each host in the cluster. For detailed steps about enabling vMotion on the
VMkernel adapter, see the vSphere 7.0 product documentation.
After fixing the blocking configuration issues in the NSX for vSphere environment, roll back the
current migration, and import the configuration again.
VMware, Inc. 61
NSX-T Data Center Migration Coordinator Guide
In NSX-T, this configuration is replaced by two NSX Edge nodes, both of which must have their
uplinks on the same network.
For example, an Edge Services Gateway with HA might have this configuration:
n vnic1 has IP address 192.178.14.2/24 and is attached to port group Public-DVPG which uses
VLAN 11.
n vnic4 has IP address 192.178.44.2/24 and is attached to port group Public-DVPG-2 which uses
VLAN 15.
To work after migration, at least one of these IP addresses has to change, as they both must be
on the same network.
Here is an example of the information that might be provided during Resolve Configuration.
n ID is fa3346d8-2502-11e9-8013-000c2936d594.
n IP address is 192.178.14.2/24.
n VLAN is 11.
n ID is fa2de198-2502-11e9-9d7a-000c295cffc6.
n IP address is 192.178.14.4/24.
n You do not need to provide the VLAN because the same VLAN configured for the first NSX
Edge node is assumed for the second node.
If needed, you can roll back the configuration that is migrated. Rolling back does the following:
VMware, Inc. 62
NSX-T Data Center Migration Coordinator Guide
See Roll Back or Cancel the NSX for vSphere Migration for more information.
Prerequisites
Procedure
2 Verify that all NSX for vSphere configurations are displayed on the NSX-T NSX Manager
interface or API.
Important When the configuration is migrated to NSX-T, the configuration changes are
made in the NSX Manager database, but it might take some time for the configuration to take
effect. You must verify that all expected NSX for vSphere configurations appear on the NSX
Manager interface or API in NSX-T before you proceed to the Migrate Edges step. For
example, firewall configuration, logical switches, transport zones.
Customized MTU settings in the Edge Services Gateways routing interfaces are not migrated to
NSX-T. Any logical router interfaces created in NSX-T use the global default MTU setting, which is
1500. If you want to ensure that all logical router interfaces have a larger MTU, you can change
the global default MTU setting. You can also modify interface MTUs on a case-by-case basis.
Procedure
If you are migrating a VLAN-backed micro-segmentation topology, you do not have any Edge
Service Gateway appliances to migrate. You should still click Start so you can proceed to the
Migrate Hosts step.
VMware, Inc. 63
NSX-T Data Center Migration Coordinator Guide
If needed, you can roll back the Edge migration to use the Edge Services Gateway in the NSX for
vSphere environment. See Roll Back or Cancel the NSX for vSphere Migration for more
information.
Caution If you roll back the Migrate Edges step, verify that the traffic is going back through the
NSX for vSphere Edge Services Gateways. You might need to take manual action to assist the
rollback.
Prerequisites
n Verify that you have a backup of NSX for vSphere and vSphere since the most recent
configuration changes were made.
n Verify that all NSX for vSphere configurations that you expected to migrate appear on the
NSX Manager UI or API in NSX-T Data Center.
n If you are using new IP addresses for the NSX-T Edge node uplinks, you must configure the
northbound routers with these new BGP neighbor IP addresses.
n Verify that you have created an IP pool for Edge Tunnel End Points (TEP). See Create an IP
Pool for Edge Tunnel End Points.
Procedure
All Edges are migrated. The uplinks on the NSX for vSphere Edge Services Gateways are
internally disconnected, and the uplinks on the NSX-T Edge nodes are brought online.
2 Verify that routing and services are working correctly in the new NSX-T Data Center
environment.
If so, you can migrate the hosts. See Configuring NSX Data Center for vSphere Host
Migration.
Results
n The routing and service configuration from NSX for vSphere Edge Services Gateway (ESG)
are transferred to the newly created NSX-T Data Center Edge nodes.
n The new TEP IP addresses for the newly created NSX-T Data Center Edge nodes are
configured from a newly created IP pool for Edge Tunnel End Points.
n The NSX for vSphere VTEP IP pool is migrated to the NSX-T Data Center environment.
VMware, Inc. 64
NSX-T Data Center Migration Coordinator Guide
n Click Settings to change the global settings: Pause Between Groups and Migration Order
Across Groups.
n Select a single host group (cluster) and use the arrows to move it up or down in the migration
sequence.
n Select one or more host groups (clusters) and click Actions to change these host groups
settings: Migration Order Within Groups, Migration State, and Migration Mode.
By default, Pause Between Groups is disabled. If you want to verify the status of the applications
running on each cluster before proceeding to the next one, enable Pause Between Groups.
n Migration Order Across Groups is a global setting that applies to all host groups.
VMware, Inc. 65
NSX-T Data Center Migration Coordinator Guide
n Parallel: Up to five host groups at a time are migrated. After those five host groups are
migrated, the next batch of up to five host groups are migrated.
Important For migrations involving vSphere Distributed Switch 7.0, do not select parallel
migration order across groups.
n Migration Order Within Groups is a host group (cluster) specific setting, so can be
configured separately on each host group.
n Serial: One host within the host group (cluster) at a time is migrated.
n Parallel: Up to five hosts within the host group are migrated at a time. After those hosts
are migrated, the next batch of up to five hosts are migrated.
Important Do not select parallel migration order within groups for a cluster if you plan to
use Maintenance migration mode for that cluster.
By default, both settings are set to Serial. Together, the settings determine how many hosts are
migrated at a time.
Serial Serial 1
One host from one host group
Serial Parallel 5
Five hosts from one host group
Parallel Serial 5
One host from five host groups
Parallel Parallel 25
Five hosts from five host groups
Important If there is a failure to migrate a host, the migration process will pause after all in-
progress host migrations have finished. If Parallel is selected for both migration across groups
and migration within groups, there might be a long outage for the failed host before you can
retry migration.
If migration fails for a host, you can move its host group to the bottom of the list of groups. The
migration of other host groups can proceed while you resolve the problem with the failed host.
VMware, Inc. 66
NSX-T Data Center Migration Coordinator Guide
Migration State
Host groups (clusters) can have one of two migration states:
n Enabled
Hosts groups with a migration state of Enabled are migrated to NSX-T when you click Start
on the Migrate Hosts page.
n Disabled
You can temporarily exclude host groups from migration by setting the migration state for
the groups to Disabled. Hosts in disabled groups are not migrated to NSX-T when you click
Start on the Migrate Hosts page. However, you must enable and migrate all Disabled host
groups before you can click Finish. Finish all host migration tasks and click Finish within the
same maintenance window.
In the Resolve Configuration step, the migration coordinator identifies the hosts that are
ineligible for migration. In the Migrate Hosts step, these hosts are assigned the migration state of
Do not migrate. For example, hosts that do not have NSX for vSphere installed have the Do not
migrate status.
Migration Mode
Migration Mode is a host group (cluster) specific setting, and can be configured separately on
each host group. In the Migrate Hosts step, you select whether to use In-Place or Maintenance
mode.
n Automated
n Manual
In the Resolve Configuration step of the migration process, you select which type of
Maintenance migration mode to use. You select a Maintenance mode even if you plan to migrate
hosts using In-Place mode. When you select Maintenance migration mode in the Migrate Hosts
step, the value you specified in the Resolve Configuration step determines whether Automated
Maintenance mode or Manual Maintenance mode is used. However, in the Migrate Hosts step, if
you select In-Place mode, your selected choice of Maintenance mode in the Resolve
Configuration step does not take effect.
In-Place migration mode is not supported if your NSX for vSphere installation uses vSphere
Distributed Switch 7.0.
If your environment uses Distributed Firewall, select Automated Maintenance migration mode. If
you select a different migration mode, the following limitations apply to environments with
Distributed Firewall:
n If you use Manual Maintenance migration mode, all VMs must be moved to NSX-T hosts,
connected to NSX-T segments, and powered on before the last NSX for vSphere host starts
migrating. When you migrate your last NSX for vSphere host, do not power off the VMs on
the host. Move them to an NSX-T host using vMotion.
VMware, Inc. 67
NSX-T Data Center Migration Coordinator Guide
n If you use Manual Maintenance migration mode, VMs have a gap in firewall protection for up
to 5 minutes after they move to an NSX-T host.
n If you use In-Place migration mode, and you have Distributed Firewall rules that are applied
to a VM, those rules are not pushed to the host until the host and all its VMs are migrated.
Until the rules are pushed to the host, the following applies:
n If the NSX-T default rule is accept, the VM is not protected by the applied-to rules.
NSX-T is installed and NSX components are migrated while VMs are running on the hosts.
Hosts are not put in maintenance mode during migration. Virtual machines experience a short
network outage and network storage I/O outage during the migration.
A task of entering maintenance mode is automatically queued. VMs are moved to other hosts
using vMotion. Depending on availability and capacity, VMs are migrated to NSX for vSphere
or NSX-T hosts. After the host is evacuated, the host enters maintenance mode, NSX-T is
installed, and NSX components are migrated. VMs are migrated back to the newly configured
NSX-T host.
A task of entering maintenance mode is automatically queued. To allow the host to enter
maintenance mode, do one of the following tasks:
Once the host is in maintenance mode, NSX-T is installed on the host and NSX components
are migrated.
You can configure several settings related to the host migration, including migration order and
enabling hosts. Make sure that you understand the effects of these settings. See Configuring NSX
Data Center for vSphere Host Migration for more information. Understanding the host migration
settings is especially important if you use Distributed Firewall or vSphere Distributed Switch 7.0.
VMware, Inc. 68
NSX-T Data Center Migration Coordinator Guide
For more information about what happens during host migration, see Changes Made During Host
Migration.
Caution Host migration should be completed during the same maintenance window as Edge
migration.
Prerequisites
n Verify that Edge migration has finished and all routing and services are working correctly.
n Verify that all ESXi hosts are in an operational state. Address any problems with hosts
including disconnected states. There must be no pending reboots or pending tasks for
entering maintenance mode.
Procedure
If you selected the In-Place or Automated Maintenance migration mode for all hosts groups,
the host migration starts.
2 If you selected the Manual Maintenance migration mode for any host groups, you must
complete one of the following tasks for each VM so that the hosts can enter maintenance
mode.
Option Action
Power off or suspend VMs. a Right click the VM and select Power > Power off , Power > Shut Down
Guest OS, or Power > Suspend.
b After the host has migrated, attach the VM interfaces to the appropriate
NSX-T segments and power on the VM.
Move VMs using vMotion. a Right click the VM and select Migrate. Follow the prompts to move the
VM to a different host.
Move VMs using cold migration. a Right click the VM and select Power > Power off , Power > Shut Down
Guest OS, or Power > Suspend.
b Right click the VM and select Migrate. Follow the prompts to move the
VM to a different host, connecting the VM interfaces to the appropriate
NSX-T segments.
The host enters maintenance mode after all VMs are moved, powered off, or suspended. If
you want to use cold migration to move the VMs to a different host before the migrating host
enters maintenance mode, you must leave at least one VM running while you move VMs.
When the last VM is powered off or suspended, the host enters maintenance mode, and
migration of the host to NSX-T starts.
VMware, Inc. 69
NSX-T Data Center Migration Coordinator Guide
Results
After a host has migrated to NSX-T using In-Place migration mode, you might see a critical alarm
with message Network connectivity lost. This alarm occurs because the host no longer has a
physical NIC connected to the vSphere Distributed Switch it was previously connected to. To
restore the migrated hosts to the Connected state, click Reset to Green on each host, and
suppress the warnings, if any.
If migration fails for a host, the migration pauses after all in-progress host migrations finish. When
you have resolved the problem with the host, click Retry to retry migration of the failed host.
If migration fails for a host, you can move its host group to the bottom of the list of groups. The
migration of other host groups can proceed while you resolve the problem with the failed host.
n Each N-VDS is created with a name that references the distributed switch name. For
example, distributed switch ComputeSwitchA is created as N-VDS nvds.ComputeSwitchA.
n If different clusters use different distributed switches to back logical switches, an N-VDS is
created with a name that combines all the distributed switch names. For example, if
ComputeCluster1 and ComputeCluster2 use distributed switch ComputeSwitchA to back logical
switches and ComputeCluster3 uses ComputeSwitchB to back logical switches, the N-VDS is
created as nvds.ComputeSwitchA.ComputeSwitchB.
n PNICs and vmks in the vSphere Distributed Switch are migrated to N-VDS.
n NSX for vSphere VTEPs are migrated to NSX-T Data Center TEPs.
Hosts configured for vSphere Distributed Switch version 7.0 continue using the same switch
after migration.
n PNICs and vmks in the vSphere Distributed Switch remain connected on the same
vSphere Distributed Portgroups.
n NSX for vSphere VTEPs are migrated to NSX-T Data Center TEPs and connected to
standalone ports on the same vSphere Distributed Switch.
VMware, Inc. 70
NSX-T Data Center Migration Coordinator Guide
Important Verify everything is working and click Finish within the maintenance window. Clicking
Finish performs some post-migration clean-up. Do not leave the migration coordinator in a
unfinished state beyond the migration window.
You will see errors on hosts after the migration. The error message is: UserVars.RmqHostId' is
invalid or exceeds the maximum number of characters permitted. The error occurs because
this host is still part of the NSX Data Center for vSphere inventory.
Prerequisites
n Verify that all expected items have been migrated to the NSX-T Data Center environment.
Procedure
2 Click Finish
A dialog box appears to confirm finishing the migration. If you finish the migration, all
migration details are cleared. You can no longer review the settings of this migration. For
example, which inputs were made on the Resolve Configuration page, or which hosts were
excluded from the migration.
Post-Migration Tasks
After migration has finished, some additional actions might be required.
n If you migrated from NSX for vSphere 6.4.4, perform a reboot of all hosts that have migrated
to NSX-T. The reboot must be done before you upgrade to a later version of NSX-T.
n During migration, all transport nodes are added to a group called NSGroup with TransportNode
for CPU Mem Threshold. This group ensures that the transport nodes have the correct CPU
memory threshold settings in NSX-T. This group is required after migration has completed. If
you need to remove a transport node from NSX-T after migration, you must first remove the
transport node from this group.
Make sure you are in Manager mode and then select Inventory > Groups to remove the
transport node from the NSGroup with TransportNode for CPU Mem Threshold group. For more
information about Manager mode, see Overview of the NSX Manager in the NSX-T Data
Center Administration Guide.
n Verify that you have a valid backup and restore configuration. See "Backing Up and Restoring
the NSX Manager" in the NSX-T Data Center Administration Guide.
VMware, Inc. 71
NSX-T Data Center Migration Coordinator Guide
See the NSX-T Data Center Installation Guide for the following information:
The process for uninstalling NSX for vSphere after migration to NSX-T is different from the
standard uninstall for NSX for vSphere.
Prerequisites
n Verify that the migration is successful, and all functionality is working in the NSX-T
environment.
n Verify that you have clicked Finish on the Migrate Hosts page.
Procedure
1 Delete the ESX Agent Manager agencies that are associated with the NSX for vSphere
environment.
a In the vSphere Client, navigate to Menu > Administration. Under Solutions, click vCenter
Server Extensions. Double-click vSphere ESX Agent Manager and click the Configure
tab.
b For each agency that has a name starting with _NSX_, select the agency, then click the
three dots menu ( ) and select Delete Agency.
a Access the Extension Manager from the Managed Object Browser at https://<vcenter-
ip>/mob/?moid=ExtensionManager.
b Click UnregisterExtension.
VMware, Inc. 72
NSX-T Data Center Migration Coordinator Guide
d In the UnregisterExtension dialog box, enter com.vmware.nsx.ui.h5 in the Value text box
and click Invoke Method.
e You can verify that you unregistered the extensions by going to the Extension Manager
page at https://<vcenter-ip>/mob/?moid=ExtensionManager and viewing the values for
the extensionList property.
VMware, Inc. 73
NSX-T Data Center Migration Coordinator Guide
3 Delete the vSphere Web Client directories and vSphere Client (HTML5) directories for NSX for
vSphere and then restart the client services.
n If you are using a vCenter Server Appliance, log in as root using the console or SSH.
You must log in as root and run the commands from the Bash shell. You can start the
Bash shell using the following commands.
n If you are using vCenter Server for Windows, log in as an administrator using the
console or RDP.
Note A plug-in directory might not be present if you have never launched the associated
client.
c Restart the client services on the vCenter Server Appliance or vCenter Server on
Windows.
VMware, Inc. 74
NSX-T Data Center Migration Coordinator Guide
b Locate the following NSX for vSphere appliance VMs. On each VM, right click and select
Power Off then right click and select Delete from Disk.
VMware, Inc. 75
NSX-T Data Center Migration Coordinator Guide
Migration coordinator is not visible at System > Migrate. Verify if the migration coordinator service is running on
NSX Manager.
When returning to migration coordinator, the migration in The migration coordinator does not store the credentials of
progress is not visible. vCenter Server or NSX Manager. If the migration
coordinator service is restarted when a migration is in
progress, the System > Migrate page might display stale
setup information, or no setup information. To display the
latest migration status if the migration coordinator service
is restarted, do the following:
1 Refresh the System > Migrate page.
2 Click Get Started and enter the credentials for vCenter
Server and NSX Manager.
Import configuration fails. 1 Click Retry to try importing again. Only the failed
import steps are retried.
VMware, Inc. 76
NSX-T Data Center Migration Coordinator Guide
Host migration fails due to a missing compute manager The compute manager configuration is a prerequisite for
configuration. migration. However, if the compute manager configuration
is removed from the NSX Manager after the migration is
started, the migration coordinator retains the setting. The
migration proceeds until the host migration step, which
fails.
Add a compute manager to NSX Manager and enter the
same vCenter Server details that were used for the initial
NSX for vSphere configuration import.
Host migration fails due to stale dvFilters present. Log in to the host which failed to migrate, identify the
Example error message: Stale dvFilters present: ['port disconnected ports, and either reboot the appropriate VM
33554463 (disconnected)', 'port 33554464 (disconnected)'] or connect the disconnected ports. Then you can retry the
Stale dvfilters present. Aborting ] Host Migration step.
1 Log into the command-line interface of the host which
failed to migrate.
2 Run summarize-dvfilter and look for the ports
reported in the error message.
VMware, Inc. 77
NSX-T Data Center Migration Coordinator Guide
Problem Solution
After host migration using vMotion, VMs might experience If SpoofGuard is enabled in NSX for vSphere before
traffic outage if SpoofGuard is enabled in NSX for vSphere. migration, do any one of these workaround steps after
Symptoms: vMotion of VMs:
The vmkernel.log file on the host at /var/run/log/ shows n Disable SpoofGuard policies.
a drop in traffic due to SpoofGuard. n Add the port IP and MAC address bindings as manual
For example, the log file shows: WARNING: swsec.throttle: bindings.
SpoofGuardMatchWL:296:[nsx@6876 comp="nsx-esx" n If ARP snooping is enabled, wait for the VM IP
subcomp="swsec"]Filter 0x8000012 [P]DROP sgType 4 vlan 0 addresses to be snooped by ARP.
mac 00:50:56:84:ee:db In the first two options, network traffic is restored
Cause: immediately.
The logical switch and the logical switch port configuration In the third option:
are migrated through the migration coordinator, which n Traffic downtime is observed until the VM sends an
migrates the SpoofGuard configuration. However, the ARP request or reply.
discovered port bindings are not migrated through n If DHCP snooping is also enabled and the VM IP
vMotion. Therefore, SpoofGuard drops the packets. address was assigned by the DHCP server, then it will
most likely be snooped as an ARP first and later as a
DHCP-snooped IP address.
VMware, Inc. 78
Migrating vSphere Networking
2
You can use the migration coordinator to migrate an existing vSphere Distributed Switch
configuration to an NSX-T Data Center environment.
For vSphere Distributed Switch versions 6.5.0 and 6.6.0, Migration coordinator moves the
vSphere Distributed Switch, compute hosts, PNICs, vmkNICs, and vNIC backings to the N-VDS.
Note For vSphere Distributed Switch version 7.0, vSphere networking to NSX-T Data Center
migration is not supported. It is recommended you perform a fresh install of NSX-T Data Center
and configure it for use with your vSphere deployment.
Note You can use migration coordinator to migrate vSphere Distributed Switch configurations to
NSX-T only if NSX for vSphere is not installed on the host.
n Add the vCenter Server system that manages the vSphere Distributed Switch (versions
6.5.0 and 6.6.0) you want to migrate.
VMware, Inc. 79
NSX-T Data Center Migration Coordinator Guide
Provide answers to configuration questions that must be resolved before you can migrate
your vSphere environment to NSX-T. Resolving issues can be done in multiple passes by
multiple people.
n Migrate configuration.
n After all configuration issues are resolved, you can import the configuration to NSX-T.
Configuration changes are made on NSX-T, but no changes are made to the vSphere
environment yet.
n Migrate Hosts.
n NSX-T software is installed on the hosts. VM interfaces are disconnected from vSphere
Distributed Switch port groups and connected to the new NSX-T segments.
Caution If you select In-Place migration mode, there is a traffic interruption during the
Migrate Hosts step. However, if you select Maintenance migration mode, traffic
interruption does not occur.
n Finish Migration.
n After you have verified that the migrated networking is working correctly, you can click
Finish to clear the migration state. You can now migrate another vSphere Distributed
Switch to NSX-T.
It is recommended you install NSX-T Data Center separately and configure it to use with your
current vSphere implementation.
VMware, Inc. 80
NSX-T Data Center Migration Coordinator Guide
Procedure
Option Description
Name and Description Type the name to identify the vCenter Server.
You can optionally describe any special details such as, the number of
clusters in the vCenter Server.
HTTPS Port of Reverse Proxy The default port is 443. If you use another port, verify that the port is open
on all the NSX Manager appliances.
Set the reverse proxy port to register the compute manager in NSX-T.
SHA-256 Thumbprint Type the vCenter Server SHA-256 thumbprint algorithm value.
Enable Trust Supported only on vCenter Server 7.0 and later versions.
Enable this field to trust compute manager for authentication.
If you left the thumbprint value blank, you are prompted to accept the server provided
thumbprint.
After you accept the thumbprint, it takes a few seconds for NSX-T Data Center to discover
and register the vCenter Server resources.
Note If the FQDN, IP, or thumbprint of the compute manager changes after registration, edit
the computer manager and enter the new values.
4 If the progress icon changes from In progress to Not registered, perform the following steps
to resolve the error.
a Select the error message and click Resolve. One possible error message is the following:
VMware, Inc. 81
NSX-T Data Center Migration Coordinator Guide
Results
It takes some time to register the compute manager with vCenter Server and for the connection
status to appear as UP.
You can click the compute manager's name to view the details, edit the compute manager, or to
manage tags that apply to the compute manager.
After the vCenter Server is successfully registered, do not power off and delete the NSX
Manager VM without deleting the compute manager first. Otherwise, when you deploy a new
NSX Manager, you will not be able to register the same vCenter Server again. You will get the
error that the vCenter Server is already registered with another NSX Manager.
Note After a vCenter Server (VC) compute manager is successfully added, it cannot be
removed if you successfully performed any of the following actions:
n Transport nodes are prepared using VDS that is dependent on the VC.
n Service VMs deployed on a host or a cluster in the VC using NSX service insertion.
n You use the NSX Manager UI to deploy Edge VMs, NSX Intelligence VM, or NSX Manager
nodes on a host or a cluster in the VC.
If you try to perform any of these actions and you encounter an error (for example, installation
failed), you can remove the VC if you have not successfully performed any of the actions listed
above.
If you have successfully prepared any transport node using VDS that is dependent on the VC or
deployed any VM, you can remove the VC after you have done the following:
n Unprepare all transport nodes. If uninstalling a transport node fails, you must force delete the
transport node.
n Undeploy all service VMs, any NSX Intelligence VM, all NSX Edge VMs and all NSX Manager
nodes. The undeployment must be successful or in a failed state.
n If an NSX Manager cluster consists of nodes deployed from the VC (manual method) and
nodes deployed from the NSX Manager UI, and you had to undeploy the manually deployed
nodes, then you cannot remove the VC. To sucessfully remove the VC, ensure that you re-
deploy an NSX Manager node from the VC.
This restriction applies to a fresh installation of NSX-T Data Center 3.0 as well as an upgrade.
In a collapsed vSphere cluster design, all management VMs and workload VMs of the NSX-T Data
Center must be initially attached to dvPortgroups. After migration, the management VMs will be
attached to the NSX-T VLAN segments.
VMware, Inc. 82
NSX-T Data Center Migration Coordinator Guide
The management VMs in the NSX-T Data Center include appliances, such as NSX Manager,
vCenter Server, VMware Identity Manager, and so on. The NSX-T VLAN segment ports to which
these management VMs connect are blocked after the migration when these management VMs
are rebooted. Therefore, the management VMs might lose connectivity after the VMs reboot.
To prevent this problem, create a "management_vms" tag category, and add tags in this
category. Assign a tag from this category to all the management VMs in the NSX-T Data Center
environment. The migration coordinator migrates the VMs, which have tags in the
"management_vms" tag category, always to use the unblocked VLAN segment ports.
Procedure
4 Click the Tags tab and add a tag in the management_vms category.
6 Expand the collapsed cluster from the left Navigator view, right-click the name of the NSX
Manager VM, and select Tags & Custom Attributes > Assign Tag.
7 Assign a tag from the management_vms category to the NSX Manager VM.
8 Repeat steps 6 and 7 for all the management VMs in the cluster.
For a detailed information about tag categories and tags, see the vCenter Server and Host
Management documentation.
The migration coordinator service runs on one NSX Manager node. Perform all migration
operations from the node that is running the migration coordinator service.
Prerequisites
n Verify that the vCenter Server system associated with the vSphere Distributed Switch you
want to migrate is registered as a compute manager. See Add a Compute Manager.
VMware, Inc. 83
NSX-T Data Center Migration Coordinator Guide
Procedure
1 Log in to an NSX Manager CLI as admin and start the migration coordinator service.
2 From a browser, log in to the NSX Manager node which is running the migration coordinator
service. Log in using an account with admin privileges.
5 From the Import Configuration page, click Select vSphere and provide the requested
information about your vSphere environment.
Note The drop-down menu for vCenter displays all vCenter Server systems that are
registered as compute managers. Click Add New if you need to add a compute manager.
7 When the import has finished, click Continue to proceed to the Resolve Issues page.
You can roll back or undo the migration from some of the migration steps. After the migration
has started, you can click Rollback on the furthest step completed. The button is disabled on all
other pages.
Import Configuration Click Rollback on this page to roll back the Import
Configuration step.
Resolve Configuration Rollback is not available here. Click Rollback from the
Import Configuration page.
Migrate Configuration Click Rollback on this page to roll back the migration of the
configuration to NSX-T and the input provided on the
Resolve Configuration page.
VMware, Inc. 84
NSX-T Data Center Migration Coordinator Guide
There is a Cancel button on every page of the migration. Canceling a migration deletes all
migration state from the system. The migration coordinator shows the following warning
message when you cancel a migration at any step:
Caution Do not cancel a migration if Host migration has started. Canceling the migration deletes
all migration state and prevents you from rolling back the migration or viewing past progress.
You must provide feedback for all configuration issues that must be resolved before the
migration can continue. Multiple people can provide the feedback over multiple sessions. After
you provide feedback for a given issue, you can click Submit to save it. You can return to a
submitted input and modify it.
After you have submitted feedback for all issues, the feedback is validated. The validation might
result in additional requests for feedback before the migration can proceed.
Procedure
1 From the Resolve Configuration page, click Select Switch to select which vSphere
Distributed Switch to migrate.
Issues are organized into groups. Each issue can cover multiple configuration items. For each
item there might be one or more possibly resolutions to the issue, for example, skip,
configure, or select a specific value.
For issues that apply to multiple configuration items, you can provide feedback for each
individually, or select all and provide one answer for all items.
Multiple people can provide the input over multiple sessions. You can return to a submitted
input and modify it.
4 After some feedback has been provided, a Submit button appears on the Resolve Issues
page. Click Submit to save your progress.
5 When you have provided feedback for all configuration issues, click Submit.
The input is validated. You are prompted to update any invalid input. Additional input might
be required for some configuration items.
VMware, Inc. 85
NSX-T Data Center Migration Coordinator Guide
6 After you have submitted all requested feedback, click Continue to proceed to the Migrate
Configuration step.
If needed, you can roll back the configuration migration. This will do the following:
See Roll Back or Cancel the vSphere Networking Migration for more information.
Prerequisites
Procedure
n Click Settings to change the global settings: Pause Between Groups and Migration Order
Across Groups.
VMware, Inc. 86
NSX-T Data Center Migration Coordinator Guide
n Select a single host group (cluster) and use the arrows to move it up or down in the migration
sequence.
n Select one or more host groups (clusters) and click Actions to change these host groups
settings: Migration Order Within Groups, Migration State, and Migration Mode.
By default, Pause Between Groups is disabled. If you want to verify the status of the applications
running on each cluster before proceeding to the next one, enable Pause Between Groups.
n Migration Order Across Groups is a global setting that applies to all host groups.
n Parallel: Up to five host groups at a time are migrated. After those five host groups are
migrated, the next batch of up to five host groups are migrated.
Important For migrations involving vSphere Distributed Switch 7.0, do not select parallel
migration order across groups.
n Migration Order Within Groups is a host group (cluster) specific setting, so can be
configured separately on each host group.
n Serial: One host within the host group (cluster) at a time is migrated.
n Parallel: Up to five hosts within the host group are migrated at a time. After those hosts
are migrated, the next batch of up to five hosts are migrated.
Important Do not select parallel migration order within groups for a cluster if you plan to
use Maintenance migration mode for that cluster.
By default, both settings are set to Serial. Together, the settings determine how many hosts are
migrated at a time.
VMware, Inc. 87
NSX-T Data Center Migration Coordinator Guide
Serial Serial 1
One host from one host group
Serial Parallel 5
Five hosts from one host group
Parallel Serial 5
One host from five host groups
Parallel Parallel 25
Five hosts from five host groups
Important If there is a failure to migrate a host, the migration process will pause after all in-
progress host migrations have finished. If Parallel is selected for both migration across groups
and migration within groups, there might be a long outage for the failed host before you can
retry migration.
If migration fails for a host, you can move its host group to the bottom of the list of groups. The
migration of other host groups can proceed while you resolve the problem with the failed host.
Migration State
Host groups (clusters) can have one of two migration states:
n Enabled
Hosts groups with a migration state of Enabled are migrated to NSX-T when you click Start
on the Migrate Hosts page.
n Disabled
You can temporarily exclude host groups from migration by setting the migration state for
the groups to Disabled. Hosts in disabled groups are not migrated to NSX-T when you click
Start on the Migrate Hosts page. However, you must enable and migrate all Disabled host
groups before you can click Finish. Finish all host migration tasks and click Finish within the
same maintenance window.
Migration Mode
Migration Mode is a host group (cluster) specific setting, and can be configured separately on
each host group. In the Migrate Hosts step, you select whether to use In-Place or Maintenance
mode.
VMware, Inc. 88
NSX-T Data Center Migration Coordinator Guide
n Automated
n Manual
In the Resolve Configuration step of the migration process, you select which type of
Maintenance migration mode to use. You select a Maintenance mode even if you plan to migrate
hosts using In-Place mode. When you select Maintenance migration mode in the Migrate Hosts
step, the value you specified in the Resolve Configuration step determines whether Automated
Maintenance mode or Manual Maintenance mode is used. However, in the Migrate Hosts step, if
you select In-Place mode, your selected choice of Maintenance mode in the Resolve
Configuration step does not take effect.
NSX-T is installed and hosts are migrated while VMs are running on the hosts. Hosts are not
put in maintenance mode during migration. Virtual machines experience a short network
outage and network storage I/O outage during the migration.
A task of entering maintenance mode is automatically queued. VMs are moved to other hosts
using vMotion. Depending on availability and capacity, VMs are migrated to vSphere or NSX-
T hosts. After the host is evacuated, the host enters maintenance mode, and NSX-T is
installed. VMs are moved back to the newly configured NSX-T host.
A task of entering maintenance mode is automatically queued. To allow the host to enter
maintenance mode, do one of the following tasks:
You can configure several settings related to the host migration, including migration order and
enabling hosts. Before you change any default settings, make sure that you understand the
effects of these settings. See Configuring vSphere Host Migration for more information.
Caution There is a traffic interruption during the host migration. Perform this step during a
maintenance window.
If migration fails for a host, the migration pauses after all in-progress host migrations finish. When
you have resolved the problem with the host, click Retry to retry migration of the failed host.
VMware, Inc. 89
NSX-T Data Center Migration Coordinator Guide
If migration fails for a host, you can move its host group to the bottom of the list of groups. The
migration of other host groups can proceed while you resolve the problem with the failed host.
Prerequisites
n Verify that all ESXi hosts are in an operational state. Address any problems with hosts
including disconnected states. There must be no pending reboots or pending tasks for
entering maintenance mode.
Procedure
If you selected the In-Place or Automated Maintenance migration mode for all hosts groups,
the host migration starts.
2 If you selected the Manual Maintenance migration mode for any host groups, you must
complete one of the following tasks for each VM so that the hosts can enter maintenance
mode.
Option Action
Power off or suspend VMs. a Right click the VM and select Power > Power off , Power > Shut Down
Guest OS, or Power > Suspend.
b After the host has migrated, attach the VM interfaces to the appropriate
NSX-T segments and power on the VM.
Move VMs using vMotion. a Right click the VM and select Migrate. Follow the prompts to move the
VM to a different host.
Move VMs using cold migration. a Right click the VM and select Power > Power off , Power > Shut Down
Guest OS, or Power > Suspend.
b Right click the VM and select Migrate. Follow the prompts to move the
VM to a different host, connecting the VM interfaces to the appropriate
NSX-T segments.
Results
After a host has migrated to NSX-T using In-Place migration mode, you might see a critical alarm
with message Network connectivity lost. This alarm occurs because the host no longer has a
physical NIC connected to the vSphere Distributed Switch it was previously connected to. To
restore the migrated hosts to the Connected state, click Reset to Green on each host, and
suppress the warnings, if any.
If migration fails for a host, the migration pauses after all in-progress host migrations finish. When
you have resolved the problem with the host, click Retry to retry migration of the failed host.
If migration fails for a host, you can move its host group to the bottom of the list of groups. The
migration of other host groups can proceed while you resolve the problem with the failed host.
VMware, Inc. 90
NSX-T Data Center Migration Coordinator Guide
Finish Migration
After you have migrated hosts to the NSX-T Data Center environment, confirm that the new
environment is working correctly. If everything is functioning correctly, you can finish the
migration.
Important Verify everything is working and click Finish within the maintenance window. Clicking
Finish performs some post-migration clean-up. Do not leave the migration coordinator in a
unfinished state beyond the migration window.
Prerequisites
Procedure
2 Click Finish
A dialog box appears to confirm finishing the migration. If you finish the migration, all
migration details are cleared. You can no longer review the settings of this migration. For
example, which inputs were made on the Resolve Issues page.
VMware, Inc. 91