After you have migrated Edge Services Gateway VMs to NSX-T Edge nodes, and verified that routing and services are working correctly, you can migrate your NSX-V hosts to NSX-T host transport nodes.
You can configure several settings related to the host migration, including migration order and enabling hosts. Make sure that you understand the effects of these settings. See Configuring NSX-V Host Migration for more information. Understanding the host migration settings is especially important if you use Distributed Firewall or vSphere Distributed Switch 7.0 or later.
For more information about what happens during host migration, see Changes Made During Host Migration in an End-to-End Migration.
Partner Service | Host Migration Mode |
---|---|
Only Guest Introspection | In-Place and Maintenance modes are supported. |
Only Network Introspection | Maintenance mode is supported. However, Automated Maintenance mode is recommended. In-Place mode is not supported. |
Both Guest Introspection and Network Introspection | Maintenance mode is supported. In-Place mode is not supported. |
You must disable IPFIX and reboot the ESXi hosts before migrating them.
If the partner service in your NSX-V environment provides Guest Introspection or both Guest Introspection and Network Introspection service, follow the procedure in this topic to migrate cluster-by-cluster. After all the host clusters are migrated to NSX-T, do a host-based service deployment in each NSX-T cluster.
If the partner service in your NSX-V environment provides only Network Introspection service, use the host migration approaches that are explained in Migrate Hosts with Network Introspection Service.
Prerequisites
- Verify that Edge migration has finished and all routing and services are working correctly.
- In the vCenter Server UI, go to the Hosts and Clusters page, and verify that all ESXi hosts are in an operational state. Address any problems with hosts including disconnected states. There must be no pending reboots or pending tasks for entering and exiting maintenance mode.
Procedure
Results
After a host has migrated to NSX-T using In-Place migration mode, you might see a critical alarm with message Network connectivity lost. This alarm occurs when a vSphere Distributed Switch (VDS) 6.5 or 6.7 migrates to an N-VDS because the host no longer has a physical NIC connected to the VDS it was previously connected to. To restore the migrated hosts to the Connected state, click Reset to Green on each host, and suppress the warnings, if any.
If migration fails for a host, you can move its host group to the bottom of the list of groups. The migration of other host groups can proceed while you resolve the problem with the failed host.
If migration fails for a host, the migration pauses after all in-progress host migrations finish. When you have resolved the problem with the host, click Retry to retry migration of the failed host. If the host still fails to migrate, you can configure NSX-T on the host manually or remove the host from the system. In this case, at the end of the host migration step, the Finish button will not be enabled because of the host that failed to migrate. You need to call the REST API POST https://<nsx-mgr-IP>/api/v1/migration?action=finalize_infra
(<nsx-mgr-IP> is the IP address of the NSX Manager where the migration service is running) using a REST API client (for example, postman or curl) to finish the migration, and then perform the post-migration tasks.
For information about troubleshooting other host migration problems, see Troubleshooting Migration Issues.
What to do next
Download the final output mapping file after all the hosts in the cluster are migrated successfully to NSX-T. You must download the final mapping file before clicking Finish.
For more information about the mapping file, see Output Mapping File.
- Deploy a Partner Service for Endpoint Protection
Click this link to deploy a partner service that provides only Endpoint Protection or both Endpoint Protection and Network Introspection services to the NSX-T workload VMs.
- Deploy a Partner Service for Network Introspection
Click this link to deploy a partner service that provides only Network Introspection service to the NSX-T workload VMs.