Share via

Azure Migrate my Appliance shows offline

Claus, Frank 45 Reputation points
2026-03-27T00:33:13.59+00:00

I have been using Azure Migrate for over a year using the modern appliance. The appliance is currently showing offline when attempting to perform a migration. I recently removed an on prem authoritative zone for privatelink.blob.core.windows.net and have individual zones for specific azure private endpoints for blob resources. I have server level forwarders going out to google, comcast and cisco dns for public internet. I have tried also adding a conditional forwarder for privatelink.blob.core.windows.net pointing to my Azure Private DNS resolver IP. I can resolve all private endpoints including the storage account used by the Migrate project. I can also resolve the private endpoints for prod.migration.windowsazure.com. It looks to have been in a disconnected state since the 17th so I don't think the issue is related to my dns zone changes as that was yesterday. I have rebooted the appliance as well as restarting the relevant services. Any ideas on how to approach would be appreciated. Thanks

Azure Migrate
Azure Migrate

A central hub of Azure cloud migration services and tools to discover, assess, and migrate workloads to the cloud.

0 comments No comments

2 answers

Sort by: Most helpful
  1. Siva shunmugam Nadessin 7,735 Reputation points Microsoft External Staff Moderator
    2026-03-27T14:15:28.6133333+00:00

    Hello Claus, Frank,

    Thank you for reaching out to the Microsoft Q&A forum.

    We understand that your Azure Migrate appliance has been in a disconnected state since the 17th and you’ve already verified DNS for all private-link endpoints and rebooted/restarted services. Let’s walk through a focused approach to get it back online:

    Re-run the appliance prerequisites

    • On the appliance server, open the Azure Migrate Appliance Configuration Manager.

    • Go to Set up prerequisites and click Re-run the checks.

    • Look for any failures in “Internet connectivity,” “DNS resolution” or “Service status.”

    Verify the DRA service

    • Open an elevated PowerShell or CMD on the appliance and run: net stop dra net start dra

    • In the Config Manager under View appliance services, ensure the DRA (Data Replication Agent) shows as Running.

    Run the local diagnostics

    • In the Appliance Configuration Manager, go to Troubleshooting > Diagnostic tests and click Run diagnostic tests.

    • Address any issues flagged (disk space, service health, network tests, etc.).

    Double-check DNS resolution and network connectivity

    • From the appliance, run: Resolve-DnsName .migration.windowsazure.com Resolve-DnsName .privatelink.blob.core.windows.net Test-NetConnection –ComputerName .migration.windowsazure.com –Port 443

    • If these fail, add host‐file entries or a conditional forwarder on your DNS server pointing the FQDNs to the correct private IPs, then clear the appliance cache: ipconfig /flushdns

    Verify outbound port/URL access

    • Ensure outbound TCP 443 isn’t blocked by a firewall or proxy.

    • Confirm access to all required Azure Migrate URLs (see https://docs.microsoft.com/azure/migrate/migrate-appliance#url-access).

    Check logs for errors

    • Windows Event Viewer → Applications & Services Logs → Microsoft → AzureMigrate.

    • Appliance logs under C:\ProgramData\Microsoft Azure\Migrate\Logs. Look for repeated connectivity or authentication errors.

    Give it time

    • After fixes, wait 5–10 minutes for the appliance to re-register in the portal.

    • In the Azure Portal, refresh the Azure Migrate project and check the appliance tile for “Online.”

    If you still see “Offline” after all of the above, please share:

    • Any specific error messages or event IDs from the appliance logs

    • Results of your DNS resolution and Test-NetConnection commands

    • Confirmation of whether you’re using a proxy (and its settings) on the appliance

    Hope this helps get your appliance back online!

    References


  2. Q&A Assist
    2026-03-27T00:33:32.5533333+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    Use the appliance’s private endpoint and DNS connectivity as the primary troubleshooting focus, since the appliance appears offline to Azure Migrate when it cannot reach its service endpoints, even if individual private endpoints resolve correctly.

    Recommended approach:

    1. Verify DNS resolution from the appliance itself Run these from the appliance (not from another server):
      • For Azure Migrate discovery/assessment endpoints (from the downloaded DNS settings file):
             nslookup <migrate-agent-name>.disc.privatelink.prod.migration.windowsazure.com
             nslookup <migrate-agent-name>.asm.privatelink.prod.migration.windowsazure.com
             nslookup <migrate-agent-name>.hub.privatelink.prod.migration.windowsazure.com
        
      • For the storage account used by the Migrate project:
             nslookup <storage-account-name>.blob.core.windows.net
        
      • For the Key Vault used by the project (if applicable):
             nslookup <your-key-vault-name>.vault.azure.net
        
      Each of these must resolve to a private IP address that matches the IPs in the Download DNS settings file from the Azure Migrate project properties. If any FQDN resolves to a public IP or fails to resolve, temporarily add host entries on the appliance with the FQDN → private IP mappings from the DNS settings file and retest. This is the recommended quick test path.
    2. Confirm private DNS zone health and VNet linkage In the Azure portal:
      • Ensure the following Private DNS Zones exist in the resource group that holds the private endpoints:
        • privatelink.blob.core.windows.net (for storage)
        • privatelink.vaultcore.azure.net (for Key Vault, if used)
        • privatelink.prod.migration.windowsazure.com (for Azure Migrate discovery/assessment/migration)
      • On each zone, check Virtual network links and confirm the VNet that contains the Azure Migrate private endpoints is linked. If the zone is missing, create it and link it as described in the documentation.
    3. Validate private endpoint connectivity from the appliance From the appliance, run Test-NetConnection (PowerShell) or equivalent to the private endpoint IPs for:
      • Storage account
      • Key Vault
      • Azure Migrate service endpoints (from the DNS settings file)
      The tests should show the ports as reachable. If DNS resolution is correct but ports are blocked, review:
      • Any firewall on the appliance
      • Azure Firewall or custom NVA in the path
      • Network peering or custom gateway/NAT that might be altering routing or DNS behavior
    4. Check proxy behavior for private-link FQDNs If the appliance uses a proxy:
      • If the proxy is only for internet access, add bypass rules so that *.disc.privatelink.prod.migration.windowsazure.com, *.asm.privatelink.prod.migration.windowsazure.com, *.hub.privatelink.prod.migration.windowsazure.com, *.privatelink.siterecovery.windowsazure.com, *.vault.azure.net, and *.blob.core.windows.net go directly over the private link instead of via the proxy.
      • If the proxy is used for all outbound traffic, ensure the proxy itself can resolve these FQDNs to the correct private IPs. For testing, manually add DNS records on the proxy with the mappings from the DNS settings file.
    5. Re-validate Azure Migrate project DNS settings In the Azure portal:
      • Go to Azure Migrate: Discovery and assessment → Properties and Migration and modernization → Properties.
      • Use Download DNS settings and confirm that every FQDN in that file resolves correctly from the appliance to the listed private IPs.
    6. If the appliance still shows offline
      • After fixing any DNS or connectivity issues, restart the appliance services and retry registration/discovery.
      • If the error message shows a specific endpoint (for example, AgentNotConnected with a URL), ensure that exact URL resolves to the correct private IP and is reachable from the appliance.

    This sequence ensures the appliance uses the correct private DNS zones, resolves all Azure Migrate and storage/Key Vault endpoints to private IPs, and can reach them over the network without being intercepted or misrouted by proxies or firewalls.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.