RackWare FAQ 2023
RackWare FAQ 2023
Interestingly the RMM also supports virtual to physical (V -> P). This latter case may be counterintuitive,
but is useful in the DR use case when falling back to a datacenter from a cloud environment. It would be
common for a physical server, perhaps running a database in an Origin datacenter to failover to a virtual
server running in the cloud. For a DR test, or a real DR event, being able to seamlessly fallback to a
physical server from the cloud is required for a complete DR solution.
Some applications such as extremely large and high IO databases may require some additional setup and
configuration. The RackWare discover process identifies such servers for consideration. Consult
RackWare for details.
For larger projects, these can easily be automated via pre and post API calls as part of replication and
sync.
NFS and CIFS may have a more complex decision tree. If NFS/CIFS are implemented via a standard Linux
or Windows server the RMM standard mechanism can be used on those servers with full integrity. In
this case the RMM connects to the NFS/CIFS server itself as it would any other server. From this context
the RMM is replicating the block storage mounted on that server. Replicating the NFS/CIFS data from
the client side is not supported.
If the NFS/CIFS storage is implemented on a hardware appliance there are other considerations such as
whether or not multiple writers are configured. Consult RackWare for more information.
For Linux, the RMM uses passwordless SSH and can be configured with a non-root user with a sudo
configuration.
Passwordless SSH is also used for Windows. RackWare has a small MSI that can be used to configure
SSH on the Windows servers. Administrator privileges are required.
What is required on the Target and Source side for replication and sync?
RackWare performs replication and sync via the Operating System which translates into a few
requirements. First, the RMM uses the highly secure SSH communications protocol between itself and
the client servers. This requires IP level network connectivity and the use of TCP port 22.
Additionally, the RMM utilizes a small number of standard OS packages and utilities. For example, on
Windows VSS Shadow Copy is required. In the majority of cases, on production servers, all the
necessary packages are already available. The RMM can automatically install these packages if desired.
Origin servers also require sufficient storage as working area to perform the replication and sync
operations. The RMM by default does not access a live filesystem, but takes a snapshot of the Image
and performs all operations on the snapshot. It is recommended that each partition has about 15% of
free space for this function. High IO rate servers may require more.
Consult the RMM Prerequisites and Operational Requirements document for details.
Normally the RMM Server is deployed in the Target environment and connects to the Origin
environment over a WAN connection. That WAN connection can be over a private network or a public
interface. In this topology, all information exchanged with the Origin server is fully protected by highly
secure protocols. This can run over the public Internet, any private network, or any VPN or tunnel. The
only requirement is that the RMM can connect to the Origin server at the IP level.
The RMM configures SSH to use ciphers in the following preferred order:
• aes128-ctr
• aes192-ctr
• aes256-ctr
• arcfour256
• arcfour128
• aes128-cbc
• 3des-cbc
• blowfish-cbc
• cast128-cbc
• aes192-cbc
• aes256-cbc
• arcfour
The preferred order as well as the available ciphers can be customized. Contact RackWare for more
information.
How are Domains handled? GPOs? What type of user needs to be set up?
Replication and sync semantics preserve all Domain settings, including GPOs on the Target side.
Applications, when booted, will attempt to login via the same Domain users as on the Origin. So, the
Target environment requires a Domain Controller with the same or similar settings as the Origin.
It's important to remember that while the Image bits are preserved from Origin to Target, the Target
boots on different hardware. When initially booting the server in the Target, a best practice is to reset
the Domain account for that server. RackWare does not recommend changing the SID.