[+]
Updated on 11/10/2016
CloudEndure installation on Linux (AWS)
Before installation
  • Make sure you have Python installed on the machine (version 2.4-2.7)
  • CloudEndure was tested on:
    • SUSE Linux (SLES) 11
    • Debian Linux 8
    • Kali Linux 2.0
    • Ubuntu 10.04, 11.04, 11.10, 12.04, 12.10, 13.04, 13.10, 14.04, 16.04
    • Red Hat Enterprise Linux (RHEL) 5.0-7.1
    • CentOS 5.0-7.1
    • Oracle Linux 5.0-7.1
     Other versions and flavors of Linux may work, but have not been tested.
  • Only machines using the GRUB bootloader are supported.
  • According to AWS requirements, machines running Red Hat Enterprise Linux (RHEL) must have Cloud Access (BYOL) licenses to be copied to AWS.
  • Make sure that outgoing traffic from the machine to ports  1500, 80 and 443 is enabled at all times. Ports 80 and 443 are needed to download the agent itself and additional software packages. Port 443 is also needed for agent upgrades and for communication with the centralized management. Port 1500 is needed for the replication traffic itself.
  • CloudEndure replicates whole volumes. In case you choose to replicate a partition, its entire volume will be replicated.
  • When replicating machine from on-premise, CloudEndure currently only attaches at most one private IP address to the replica instance. Additional IP addresses can be allocated and attached using AWS API, CLI or console. 

  • Make sure that you have an account with CloudEndure, that this account has been activated and you have entered your AWS Access Key Id and Secret Access Key in the AWS credentials tab of the Account page.
  • If you are installing the agent on a non-AWS machine, before installing an agent, make sure that your CloudEndure console Replication Settings tab in the Account page has “Source” set to Generic and “Target” is set to your desired target AWS region.
  • Make sure that the AWS account you associated with your CloudEndure account is compliant with the following IAM policy:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Action": "ec2:*",
            "Effect": "Allow",
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": "elasticloadbalancing:*",
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": "cloudwatch:*",
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": "autoscaling:*",
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": "iam:GetUser",
            "Resource": "*"
        },
        {
            "Effect":"Allow",
            "Action":"iam:PassRole",
            "Resource":"*"
        },
        {
            "Effect":"Allow",
            "Action":"iam:ListInstanceProfiles",
            "Resource":"*"
        },
        {
            "Effect": "Allow",
            "Action": "kms:ListKeys",
            "Resource": "*"
        }
    ]
}