Prepare
Prepare the Origin Environment
ssh access set up and can be enabled from the RMM.
TCP port 22 is the default, however, other ports may be used by
specifying the desired port.
Linux
- Access Credentials:
rootuser or an account withsudoprivileges - Storage: If Logical Volume Manager (LVM) is used, the volume groups on the origin must have at least 15 percent of the used space available as free extents.
no-exec:/tmpand/var/tmpfilesystems should not be configured withno-execproperties infstab.- Grub: Origin servers should have
/etc/default/grubfile. - Antivirus: If any antivirus program is running on Origin, it
should allowlist
/mnt/rackware/directory.
Windows
- Access Credentials:
SYSTEMuser or local user with administrative privileges. - Storage: Each volume should have sufficient free space (approx. 20 percent) for VSS snapshots.
- Antivirus: Origin should allowlist
rsync.exe,rwattr.exe,rwchangesvc.exe, andrw_tngsync_util.exefor any antivirus program or Windows Defender. - Language: For support in any language other than English for
SYSTEMlocale, contact Rackware Support.
Prepare the Target Environment
The target environment has the following essential needs:
- A system administrator ensures that there are enough resources to back up the origin environment, such as CPU, memory, or storage.
- Register a
clouduserwith RMM.
Oracle recommends that the system is set up for continuous and automatic monitoring and also set up with notifications for resources approaching low thresholds.
Create a
clouduser
TCP/443 port is open to the destination API service.
The following is a list of required permissions a user must have for basic autoprovision to work. Permissions required for additional autoprovision features are listed by feature below:
readpermission on theinstance-imagesresource.managepermission on theinstancesresource.inspectpermission on theVCNsresource.usepermission on thesubnetresource.inspectpermission on theprivate-ipsresource.readpermission on thepublic-ipsresource.usepermission on thevNICresource.inspectpermission on thevNIC-attachmentsresource.inspectpermission on thecompartmentsresource.
To use reserved public IP addresses, these additional permissions are required:
managepermission on thepublic-ipsresource.usepermission on theprivate-ipsresource.
To attach additional volumes to instances, these additional permissions are required.
managepermission on thevolumesresource.managepermission on thevolume-attachmentsresource.
If a simpler set of permissions is desired at the cost of being slightly more permissive, these permissions can be used in place of the above:
managepermission on theinstance-family,volume-family, andvirtual-network-familyresources.inspectpermission on thecompartmentsresource.
If simplicity in the policy is highest priority, a single permission can be used:
managepermission on theall-resourcesresource.
To create the user, log into your endpoint control plane and follow these steps:
- Navigate to Dashboard, Identity, Users, and click Create User. We've used Private Cloud Appliance as the example. However, the process is nearly identical on Compute Cloud@Customer and OCI.
- On Private Cloud
Appliance, add
clouduserto the Administrators group to provide all the necessary permissions. On Compute Cloud@Customer, use the administrative user. On OCI, use an individual user with appropriate permissions. - Once you create
clouduserand grant the appropriate permissions, you can registerclouduserin RMM.