Acronis Cyber Infrastructure 3.
Copyright Statement Copyright ©Acronis International GmbH, 2002-2019. All rights reserved. ”Acronis” and ”Acronis Secure Zone” are registered trademarks of Acronis International GmbH. ”Acronis Compute with Confidence”, ”Acronis Startup Recovery Manager”, ”Acronis Instant Restore”, and the Acronis logo are trademarks of Acronis International GmbH. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc.
Contents 1. About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2. Launching Acronis Cyber Infrastructure Instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3. Obtaining Password and Logging in to Acronis Cyber Infrastructure . . . . . . . . . . . . . . . . . . 6 4. Setting Up Backup Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.
CHAPTER 1 About This Guide This guide explains how to set up Backup Gateway on Amazon to store backups in the Amazon cloud. Briefly, you will need to do the following: 1. Deploy an instance with Acronis Cyber Infrastructure from an Amazon Machine Image (AMI) on Amazon EC2. 2. Obtain the password and log in to the Acronis Cyber Infrastructure admin panel. 3. Set up Backup Gateway to work with the Amazon cloud. All these steps are described in the next chapters.
CHAPTER 2 Launching Acronis Cyber Infrastructure Instance First, you need to create and launch an instance with Acronis Cyber Infrastructure. Do the following: 1. In the AWS Console Home, click Launch a virtual machine and search for “Acronis Cyber Infrastructure” on the AWS Marketplace. 2. Click Select by the found AMI. 3. On wizard step 2, choose the t2.medium type for the instance.
Chapter 2. Launching Acronis Cyber Infrastructure Instance 4. Wizard steps 3 to 5—Configure Instance Details, Add Storage, and Add Tags—are optional. You can skip them by clicking NEXT. Make sure, however, that the storage cluster deployed in the instance has plenty of logical space for staging (keeping backups locally before sending them to the cloud). For example, if you perform backups daily, provide enough space for at least 1.5 days’ worth of backups.
Chapter 2. Launching Acronis Cyber Infrastructure Instance 6. On wizard step 7, generate a new key pair to be able to access the instance via SSH. Download the key pair. Important: Save the key in a safe place: make the key file readable only by you (e.g., chmod 400 on Linux or Mac) and place it in a directory that only you can access (e.g., chmod 700 on Linux or Mac).
Chapter 2. Launching Acronis Cyber Infrastructure Instance 7. Click Launch Instance. 8. Associate an elastic IP address with your instance as described in the Amazon AWS documentation. This will make your instance available from the Internet. Once the instance is running, you can access it by hostname found in instance details. For example: https://ec2-18-197-117-93.eu-central-1.compute.amazonaws.com.
CHAPTER 3 Obtaining Password and Logging in to Acronis Cyber Infrastructure After launching the instance, you need to obtain the default Acronis Cyber Infrastructure admin panel password, which is stored inside the instance in /.initial-admin-password. You can access the instance via SSH, using the previously generated key. For example, on Linux or Mac: # chmod 400 astor-23.pem # ssh -i astor-23.pem cloud-user@ec2-18-197-117-93.eu-central-1.compute.amazonaws.com # cat /.
Chapter 3. Obtaining Password and Logging in to Acronis Cyber Infrastructure 3. Click Connect and accept the server fingerprint. 4. Navigate to the home directory, i.e. /home/cloud-user. 5. The password file is hidden, so click View > Show Hidden Files in order to make it visible in the SFTP client.
Chapter 3. Obtaining Password and Logging in to Acronis Cyber Infrastructure 6. Download and open the password file .initial-admin-password. Using the password, log in to the Acronis Cyber Infrastructure admin panel as admin at the instance hostname and port 8888. For example, https://ec2-18-197-117-93.eu-central-1.compute.amazonaws.com:8888/. Take note of the following: 1.
Chapter 3. Obtaining Password and Logging in to Acronis Cyber Infrastructure resist a brute-force attack. 2. The instance will be using a self-signed certificate by default, so you will need to either accept it in the web browser or upload a valid certificate issued by a trusted authority. Normally, the first step after installing Acronis Cyber Infrastructure is to create a storage cluster.
CHAPTER 4 Setting Up Backup Gateway 4.1 Important Requirements and Restrictions • When working with public clouds, Backup Gateway uses the local storage (inside the VM) as the staging area as well as to keep service information. It means that the data to be uploaded to the cloud is first stored locally and only then sent to the destination. Because of this, you must make sure that the local storage is redundant and permanent. Using temporary disks may result in data loss.
Chapter 4. Setting Up Backup Gateway 4. Select Public Cloud as storage type. 5. Make sure the correct network interface is selected in the drop-down list. Click NEXT. If necessary, click the cogwheel icon and configure node’s network interfaces on the Network Configuration screen. 6. On the Public cloud parameters pane, select Amazon S3, the desired region, and fill out the keys and bucket information. Important: The specified bucket folder must be writeable. 7.
Chapter 4. Setting Up Backup Gateway 9. On the Register in backup software pane, specify the following information for your Acronis product: • In Address, specify the address of the Acronis Backup Cloud management portal (e.g., https://cloud.acronis.com/) or the hostname/IP address and port of the Acronis Backup Advanced management server (e.g., http://192.168.1.2:9877).