Deployment Guide
Configuring the Rapid Recovery Agent on a Linux machine
Run the Rapid Recovery Configuration utility after installing Rapid Recovery Agent software on a Linux machine. This compiles
and installs the kernel module on the Linux machine you want to protect in your Core.
The configuration utility offers several configuration options, and provides hints in the numbered steps of the instructions when
it detects your specific configuration information.
Complete the steps below to configure the Rapid Recovery Agent software on any Linux machine. Some configuration options
differ based on the Linux distribution you are installing.
1. Open a terminal session with root access.
2. Launch the configuration utility by typing the following command, and then press Enter:
sudo /usr/bin/rapidrecovery-config
The configuration utility starts. This lists several configuration options, each with an index number to enter for the
appropriate configuration step.
3. Configure the port for this protected machine by typing the following command, and then press Enter. The default port is
8006.
1 <agent_port>
For example, if using the default port, type the command:
1 8006
4. Configure users available for protection, by typing the following command, and then press Enter:
1 <user_names_separated_by_comma>
For example, if using usernames michael, administrator, and test_user1, type the command:
2 michael,administrator,test_user1
5. Configure firewall rules to select a firewall configuration manager. This establishes firewall exceptions for the port designated
in step 1.
If the utility detects one or more firewall configuration managers (such as lokkit or firewalld), each is listed in the utility in line
3. Select the appropriate configuration manager and enter it, starting with the command number (3), and then press Enter:
3 <firewall_configuration>
For example, if using firewalld, type the command:
3 firewalld
6. Query the list of compatible kernel modules from the utility by entering the command number, and then press Enter:
4
A sub-shell returns all kernel modules compatible for installation. For example, the following could be returned:
Searching for all available for installation kernels.
This might take a while, depending on the Internet connection speed.
Kernels compatible for module installation:
0 - linux-image-3.16.0.23-generic
1 - linux-image-3.16.0.31-generic
2 - linux-image-3.16.0.33-generic
3 - linux-image-3.16.0.34-generic
Input indices of the kernel modules you wish to install, delimited by space; use
'all' to install into all supported kernels, or 'q' to quit.
7. Configure the appropriate Rapid Recovery kernel module.
36
Preparing to protect your servers










