Share via

An unexpected error occured while processing the request.

Alexandru Girigan (IBAM Admin) 0 Reputation points
2026-05-06T07:31:26.89+00:00

I'm trying to use Migrate PostgreSQL to Azure Database for PostgreSQL flexible server tool but get "An unexpected error occured while processing the request. '" when trying to connect to the Source server.

The server is in a different VNET, but a connection has been opened from the Azure VNET where my PostgreSQL flexible server exists to the Source server I'm trying to access.

This connection has been confirmed by running psql commands from an Azure Container App that resides in the same VNET as my PostgreSQL flexible server.

Azure Database for PostgreSQL

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-05-06T07:31:40.6233333+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    The tracking ID error indicates a failure inside the migration service, but the context only provides concrete guidance for specific, surfaced error codes and for connectivity/time-out issues. Use the following checks that are supported by the documentation:

    1. Validate basic connectivity from migration service perspective The migration service must be able to reach both source and target, not just the flexible server VNET:
      • Error 603000 (“Connection failed. Connection to the server {serverName} was unsuccessful. Ensure that the source server is reachable from the target or runtime server.”) is raised when the migration service cannot reach the source.
      • Even if psql works from an Azure Container App in the same VNET as the flexible server, ensure that the migration runtime (or migration service subnet, if using the built-in runtime) has the same network access (NSGs, firewalls, routes) to the source.
      • If this is a migration-service-based scenario, follow the network debugging guidance referenced by error 603000 to verify routing and firewall rules end‑to‑end.
    2. Check for connection time-outs between source and migration service If the underlying problem is a time-out, it can surface as generic failures:
      • Typical time-out symptoms in the migration service include:
        • server closed the connection unexpectedly
        • SSL SYSCALL error: EOF detected
        • unexpected EOF on client connection
        • couldn't receive data from client: Connection reset by peer
      • To mitigate time-outs between source and migration service or between migration service and target, adjust TCP keepalive parameters on both source and target PostgreSQL instances:
        • tcp_keepalives_idle=10
        • tcp_keepalives_interval=10
        • tcp_keepalives_count=60
      • These can be applied without restarting PostgreSQL and help keep long‑running connections alive.
    3. Confirm SSL and authentication settings The migration service surfaces specific error codes for SSL and authentication issues:
      • 603001 – SSL configuration error: server does not support SSL; set SSL mode to prefer and retry.
      • 603100 – Authentication failed: incorrect password.
      • 603102 – Source database missing. Ensure that the connection profile used by the migration tool matches the way psql connects (hostname, port, SSL mode, database name, username, password).
    4. Check for pre-migration validation errors
      • The migration service has a catalog of premigration error codes. If the UI or logs expose a code (for example, 603000/603001/603100/603101/603102), use the documented resolution for that specific code.
    5. If the error persists with only a tracking ID
      • Since the message is “An unexpected error occurred while processing the request” with only a tracking ID, and no mapped error code is shown in the UI, collect:
        • The tracking ID
        • Time of failure
        • Source and target server names
      • Then open an Azure support request so the service team can look up the tracking ID and correlate it with internal logs.

    In parallel, verify that the source PostgreSQL server allows connections from the migration service subnet (not just from the flexible server VNET) and that any firewalls or network security groups permit outbound traffic from the migration runtime to the source on the PostgreSQL port.


    References:

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.