Azure Migrate Hyper-V guest discovery fails (Error 60001 / WinRM Negotiate 0x8009030d “Failed to open runspace”) even though manual remoting works
I’m evaluating whether migrating to Azure makes sense and I’m using Azure Migrate to assess our Hyper-V environment. I created a Migrate project, deployed/connected the Hyper-V appliance, and hosts/VMs are discovered. However, software/performance discovery for guest VMs fails.
Symptoms
- Azure Migrate shows Error ID 60001 for one or more discovered guest VMs.
Error details include:
“Failed to open runspace (state: Broken)”
“WinRM cannot process the request… using **Negotiate** authentication… **0x8009030d** (A specified logon session does not exist…)”
The failure is reported across multiple addresses for the same VM (hostname/FQDN/IP), depending on what the appliance tries.
What I’ve verified (high level)
On the Hyper-V hosts and guest VMs:
WinRM service running, WSMan listener present, TCP 5985 listening, Windows Firewall rules allow WinRM
Basic WMI/CIM queries succeed locally
Time is in sync across systems (to avoid Kerberos/NTLM issues).
The credential I configured in the appliance is a **domain account** and is in the **Remote Management Users** group (and I also tested with elevated permissions).
From the **appliance VM itself**, I can successfully remote to the same target systems with the same credential, for example:
`Invoke-Command -ComputerName <host-or-vm> -Authentication Negotiate -Credential <domaincred> -ScriptBlock { hostname; whoami }`
This succeeds against my Hyper-V hosts (and I can also reach target VMs manually).
What I’ve tried
Removed/re-added the credentials in the appliance.
Refreshed/revalidated in the portal multiple times.
Rebuilt the appliance / created a brand new Migrate project and repeated setup.
Disabled IPv6 on the appliance to rule out v6 selection issues (no change).
Question Given that manual WinRM / PowerShell remoting from the appliance to the target works, what specific Azure Migrate guest discovery dependency or authentication requirement commonly causes 0x8009030d / “Failed to open runspace” errors?
In particular:
Are there known cases where Azure Migrate uses a different authentication path than a normal Invoke-Command test (e.g., SPN/hostname requirements, constrained delegation, UAC remote token behavior, WinRM auth settings such as CredSSP/Basic/AllowUnencrypted, etc.)?
What logs on the appliance or target should I look at to pinpoint why Azure Migrate fails to create the runspace despite WinRM being reachable?
Sanitized error excerpt Error ID: 60001 Error details: Unable to connect… Failed to open runspace (state: Broken)… WinRM Negotiate… 0x8009030d “A specified logon session does not exist…”I’m evaluating whether migrating to Azure makes sense and I’m using Azure Migrate to assess our Hyper-V environment. I created a Migrate project, deployed/connected the Hyper-V appliance, and hosts/VMs are discovered. However, software/performance discovery for guest VMs fails.
Symptoms
Azure Migrate shows Error ID 60001 for one or more discovered guest VMs.
Error details include:
“Failed to open runspace (state: Broken)”
“WinRM cannot process the request… using **Negotiate** authentication… **0x8009030d** (A specified logon session does not exist…)”
The failure is reported across multiple addresses for the same VM (hostname/FQDN/IP), depending on what the appliance tries.
What I’ve verified (high level)
On the Hyper-V hosts and guest VMs:
WinRM service running, WSMan listener present, TCP 5985 listening, Windows Firewall rules allow WinRM
Basic WMI/CIM queries succeed locally
Time is in sync across systems (to avoid Kerberos/NTLM issues).
The credential I configured in the appliance is a **domain account** and is in the **Remote Management Users** group (and I also tested with elevated permissions).
From the **appliance VM itself**, I can successfully remote to the same target systems with the same credential, for example:
`Invoke-Command -ComputerName <host-or-vm> -Authentication Negotiate -Credential <domaincred> -ScriptBlock { hostname; whoami }`
This succeeds against my Hyper-V hosts (and I can also reach target VMs manually).
What I’ve tried
Removed/re-added the credentials in the appliance.
Refreshed/revalidated in the portal multiple times.
Rebuilt the appliance / created a brand new Migrate project and repeated setup.
Disabled IPv6 on the appliance to rule out v6 selection issues (no change).
Question
Given that manual WinRM / PowerShell remoting from the appliance to the target works, what specific Azure Migrate guest discovery dependency or authentication requirement commonly causes 0x8009030d / “Failed to open runspace” errors?
In particular:
Are there known cases where Azure Migrate uses a different authentication path than a normal Invoke-Command test (e.g., SPN/hostname requirements, constrained delegation, UAC remote token behavior, WinRM auth settings such as CredSSP/Basic/AllowUnencrypted, etc.)?
What logs on the appliance or target should I look at to pinpoint why Azure Migrate fails to create the runspace despite WinRM being reachable?
Sanitized error excerpt
Error ID: 60001
Error details: Unable to connect… Failed to open runspace (state: Broken)… WinRM Negotiate… 0x8009030d “A specified logon session does not exist…”