跳至主要內容

XHERE Pre-Settings

Mr.OneProCloud2025年8月18日大约 4 分钟

XHERE Pre-Settings

Create & Configure XHERE Account for DR purpose

Create User & Granting Authorization to User

After the XHERE cloud platform is deployed, the default account is usually the admin account, and the admin account has the authority to perform all operations.

Managing User Access Keys

dr-site-xhere-pre-settings-1.jpeg
dr-site-xhere-pre-settings-1.jpeg
dr-site-xhere-pre-settings-2.jpeg
dr-site-xhere-pre-settings-2.jpeg
dr-site-xhere-pre-settings-3.jpeg
dr-site-xhere-pre-settings-3.jpeg

After clicking "Generate", simply enter a name and you can create an token for “admin” account.

Bridged Network Setup

To meet the requirements for disaster recovery, the network needs to be created in advance.

The required network includes:

  1. The network where the HyperBDR disaster recovery tool is located.

  2. The network where the Cloud Sync Gateway is located.

  3. The network where the disaster recovery services are located.

The method for creating the network is as follows:

dr-site-xhere-pre-settings-4.jpeg
dr-site-xhere-pre-settings-4.jpeg
dr-site-xhere-pre-settings-5.png
dr-site-xhere-pre-settings-5.png

Explanation: Establish your network based on the following disaster recovery network scenarios.

  1. HyperBDR Bridged Network:

If accessing through an intranet , create a DR Bridged network and place HyperBDR VM instances in this network.

  1. Data Backup Bridged Network:

Dedicated Bridged network and subnet for Data backup, interconnected with the on-premises IDC through Intranet.

  1. Business Bridged Network:

Business Bridged network and subnet used for disaster takeover and drills.

Test Network Access between Bridged Network

The pre-created bridged networks need to ensure network communication between them.

Test the network connectivity between the on-premises IDC Network and HyperBDR Bridged Network

Execute the command on the source host :

ssh -v -p 10443 <The intranet IP address of the Instance A> 
ssh -v -p 30080 <The intranet IP address of the Instance A>

Test results: If you can successfully access and enter the password, it indicates normal access.

Test the network connectivity between the HyperBDR Bridged Network and Data Backup Bridged Network

Then execute command :

ssh -v -p 22 <The intranet IP address of the Instance B> 
ssh -v -p 10729 <The intranet IP address of the Instance B> 
ssh -v -p 16100 <The intranet IP address of the Instance B>

Test results:

If you can successfully access and enter the password, it indicates normal access.

Test the network connectivity between the on-premises IDC Network and the Data Backup Bridged Network

Execute the command on the source host :

ssh -v -p 3260 <The intranet IP address of the Instance>

Test results: If you can successfully access and enter the password, it indicates normal access.

Test the network connectivity between the HyperBDR Bridged Network and Business Bridged Network

Then execute command:

ssh -v -p 22 <The intranet IP address of the Instance C> 
ssh -v -p 10729 <The intranet IP address of the Instance C>

Test results:

If you can successfully access and enter the password, it indicates normal access.

Create HyperBDR Security Policy

In XHERE, security policies can be set for a specific host. For example:

dr-site-xhere-pre-settings-6.jpeg
dr-site-xhere-pre-settings-6.jpeg
dr-site-xhere-pre-settings-7.jpeg
dr-site-xhere-pre-settings-7.jpeg

NOTE: For Source IP range, we recommend use safe range to replace 0.0.0.0/0. For example, if your external ip address is 110.242.68.66, source can be configurated as 110.242.68.66/32.

If it is a public network environment, it is recommended to set whitelist access on port 22 to ensure security.

Create VM for HyperBDR

Log in to the XHERE Console

Create Cloud Instance based on Configuration Information

The resource configuration for HyperBDR servers is as follows:

dr-site-xhere-pre-settings-8.png
dr-site-xhere-pre-settings-8.png
dr-site-xhere-pre-settings-9.png
dr-site-xhere-pre-settings-9.png

On this page, you can select an Ubuntu 20.04 image to create a host for installing the HyperBDR tool. Choose the instance specifications of 8U16G200G for the host.

XHERE platform account quota check

During the disaster recovery process, it is essential to ensure that the cloud account has sufficient resource quotas to support data synchronization and disaster recovery. To prevent potential failure of disaster recovery due to insufficient quotas, it is necessary to perform a resource quota check before initiating the disaster recovery.

If the remaining quota in the XHERE account is insufficient, it is necessary to clean up unnecessary resources in the account or apply for an expansion of XHERE resource quotas.

Source host resource inventory

Need to gather information on the computing and storage resources for the host systems awaiting disaster recovery and input the details into a table.

Resources TypeSize
The total number of source host
The total number of source host CPU
The total number of source host RAM(MB)
The total number of source host disks
The total disk capacity for source host(GB)

XHERE account resource quota check

View the relevant resources in “Resource Management”.

dr-site-xhere-pre-settings-10.png
dr-site-xhere-pre-settings-10.png

Modify the ssh policy of the Cloud Sync Gateway instance security group

You can configure "Network isolation" for the "Cloud Sync Gateway" instance and set rules for inbound and outbound traffic through a whitelist.

dr-site-xhere-pre-settings-11.png
dr-site-xhere-pre-settings-11.png
dr-site-xhere-pre-settings-12.png
dr-site-xhere-pre-settings-12.png

Your primary language is en-US, do you want to switch to it?

您的首选语言是 en-US,是否切换到该语言?