Prepare
Prepare the Origin Environment
ssh
access set up and can be enabled from the RMM.
TCP port 22 is the default, however, other ports may be used by
specifying the desired port.
Linux
- Access Credentials:
root
user or an account withsudo
privileges - Storage: If Logical Volume Manager (LVM) is used, the volume groups on the origin must have at least 15 percent of the used space available as free extents.
no-exec
:/tmp
and/var/tmp
filesystems should not be configured withno-exec
properties infstab
.- Grub: Origin servers should have
/etc/default/grub
file. - Antivirus: If any antivirus program is running on Origin, it
should allowlist
/mnt/rackware/
directory.
Windows
- Access Credentials:
SYSTEM
user or local user with administrative privileges. - Storage: Each volume should have sufficient free space (approx. 20 percent) for VSS snapshots.
- Antivirus: Origin should allowlist
rsync.exe
,rwattr.exe
,rwchangesvc.exe
, andrw_tngsync_util.exe
for any antivirus program or Windows Defender. - Language: For support in any language other than English for
SYSTEM
locale, contact Rackware Support.
Prepare the Target Environment
The target environment has the following essential needs:
- A system administrator ensures that there are enough resources to back up the origin environment, such as CPU, memory, or storage.
- Register a
clouduser
with RMM.
Oracle recommends that the system is set up for continuous and automatic monitoring and also set up with notifications for resources approaching low thresholds.
Create a
clouduser
TCP/443
port is open to the destination API service.
The following is a list of required permissions a user must have for basic autoprovision to work. Permissions required for additional autoprovision features are listed by feature below:
read
permission on theinstance-images
resource.manage
permission on theinstances
resource.inspect
permission on theVCNs
resource.use
permission on thesubnet
resource.inspect
permission on theprivate-ips
resource.read
permission on thepublic-ips
resource.use
permission on thevNIC
resource.inspect
permission on thevNIC-attachments
resource.inspect
permission on thecompartments
resource.
To use reserved public IP addresses, these additional permissions are required:
manage
permission on thepublic-ips
resource.use
permission on theprivate-ips
resource.
To attach additional volumes to instances, these additional permissions are required.
manage
permission on thevolumes
resource.manage
permission on thevolume-attachments
resource.
If a simpler set of permissions is desired at the cost of being slightly more permissive, these permissions can be used in place of the above:
manage
permission on theinstance-family
,volume-family
, andvirtual-network-family
resources.inspect
permission on thecompartments
resource.
If simplicity in the policy is highest priority, a single permission can be used:
manage
permission on theall-resources
resource.
To create the user, log into your endpoint control plane and follow these steps:
- Navigate to Dashboard, Identity, Users, and click Create User. We've used Private Cloud Appliance as the example. However, the process is nearly identical on Compute Cloud@Customer and OCI.
- On Private Cloud
Appliance, add
clouduser
to the Administrators group to provide all the necessary permissions. On Compute Cloud@Customer, use the administrative user. On OCI, use an individual user with appropriate permissions. - Once you create
clouduser
and grant the appropriate permissions, you can registerclouduser
in RMM.