Technical prerequisites
Technical prerequisites
Implementing Elastic Disaster Recovery is a critical step in ensuring business continuity and resilience against unexpected disruptions. To achieve a successful deployment, it is essential to meet specific technical requirements that encompass various aspects of the system. These requirements range from network settings and communication protocols to supported operating systems, Regions, and installation prerequisites.
The following sections provide a detailed overview of the technical requirements necessary for the implementation of Elastic Disaster Recovery. They include guidelines for staging area subnets, network requirements, Amazon S3 bucket access, operational subnets, supported AWS Regions, general installation requirements, and specific considerations for Windows and Linux systems.
-
Administrative rights - Elastic Disaster Recovery can only be initialized by the Admin user of your AWS Account.
-
If you are using Single Sign On (SSO), refer to Authenticating with identities in AWS Elastic Disaster Recoveryfor more information
-
-
Multi-Account Requirements Reference
-
Staging Account Planning and Limitations: Due to AWS account wide API limitations, Elastic Disaster Recovery is limited to protecting 300 source servers per AWS account. In order to replicate more than 300 servers, you would be required to create multiple staging area AWS accounts. It would still be possible to recover all of your servers into a single recovery environment. Elastic Disaster Recovery can recover up to 3,000 servers into a single target AWS account.
-
-
Network Requirements https://docs.aws.amazon.com/drs/latest/userguide/Network-Requirements.htmlReference
-
Preparation: Create a dedicated staging subnet for data replication from source servers to AWS.
-
This subnet should have a Classless Inter Domain Routing (CIDR) range that meets the following criteria:
-
Not overlap with the source server CIDR ranges.
-
Have enough IP addresses for 1 replication server per 15 source volumes, or dedicated replication servers for highly transactional sources.
-
Support 1 conversion server per source server to be launched.
-
-
-
Staging subnet access requirements: The staging area subnet requires outbound internet access to the Amazon EC2, Amazon S3, and Elastic Disaster Recovery endpoints within the Target Region. You can create private link endpoints, or use public internet access to communicate with these AWS services.
-
Communication over TCP Port 443: All communication is encrypted with TLS. All control plane traffic is handled over TCP port 443 and should be permitted for the following:
-
Between the source servers and Elastic Disaster Recovery Service
-
Between the staging area subnet and AWS Elastic Disaster Recovery
-
The Elastic Disaster Recovery AWS Region-specific Console address: example: drs.eu-west-1.amazonaws.com
-
Amazon S3 service URLs (required for downloading AWS Elastic Disaster Recovery software)
-
The AWS Replication Agent installer should have access to the S3 bucket URL of the AWS Region you are using with Elastic Disaster Recovery.
-
The staging area subnet should have access to the Regional S3 endpoint.
-
The staging area subnet requires outbound access to the Amazon EC2 endpoint of its AWS Region.
-
-
Communication over TCP Port 1500: All data replication traffic is transmitted between the Source servers and the staging area subnet using TCP Port 1500; this communication is also encrypted.
-
Bandwidth Requirements: The average network bandwidth must exceed the peak write rate of the source servers to ensure successful replication in the AWS Elastic Disaster Recovery service. Adequate network capacity is critical to maintain continuous data protection and meet your recovery point objectives.
-
-
Amazon S3 Buckets Reference
-
Access Requirements: Agent installation and replication server components require Amazon S3 bucket access.
-
VPC Endpoint Policy: Ensure that the relevant VPC endpoint policy includes access to all required Amazon S3 buckets. Refer to the example policy for replicating to us-east-1 and Amazon S3 documentation for policy requirements.
-
-
Operational Subnets https://docs.aws.amazon.com/drs/latest/userguide/Network-Settings-Preparations.html Reference
-
Drill and Recovery Subnets: Create Recovery subnets (and optionally Drill subnets), before attempting to launch Recovery Instances. Instances are launched in a subnet specified in the Amazon EC2 launch template associated with each source server.
-
-
Supported Elastic Disaster Recovery AWS Regions Reference
-
Refer to AWS Elastic Disaster Recovery supported Regions reference for an up to date list of all supported Regions.
-
-
Supported Operating Systems https://docs.aws.amazon.com/drs/latest/userguide/Supported-Operating-Systems.html Reference
-
Elastic Disaster Recovery supports many versions of Windows and Linux operating systems, some of which are not natively supported by Amazon EC2. Refer to Supported Operating Systems for up-to-date versions of supported operating systems.
-
-
Windows Installation Requirements https://docs.aws.amazon.com/drs/latest/userguide/installation-requiremets.html#windows-requirements Reference
-
Supported Operating Systems: Ensure that your source server operating system is supported.
-
Free Disk Space: At least 4 GB of free disk space on the root directory (C:by default).
-
Free RAM: At least 300 MB of free RAM.
-
MAC Address Stability: Ensure that the MAC addresses of the source servers do not change upon a reboot or any other common changes in your network environment. The AWS Replication Agent may use the MAC address in its process to link the source server to its replication infrastructure.
-
-
Linux Installation Requirements https://docs.aws.amazon.com/drs/latest/userguide/installation-requiremets.html#linux-requirements Reference
-
Supported Operating Systems: Ensure that your source server operating system is supported (referenced above)
-
MAC Address Stability: Ensure that the MAC addresses of the source servers do not change upon a reboot or any other common changes in your network environment. The AWS Replication Agent may use the MAC address in its process to link the source server to its replication infrastructure.
-
Python: Python 2 (2.4 or above) or Python 3 (3.0 or above) must be installed on the server.
-
Free Disk Space: At least 4 GB on the root directory (/), 500 MB on the /tmp directory.
-
GRUB Bootloader: The active bootloader software must be GRUB 1 or 2.
-
/tmp Directory: Mounted as read+write and with the exec option.
-
Sudoers List: The Linux account that is installing AWS Elastic Disaster Recovery needs to be in the sudoers list.
-
dhclient Package: Ensure that the dhclient package is installed.
-
Kernel Headers: Verify that kernel-devel/linux-headers are installed and match the running kernel version.
-
Symbolic Link Considerations: Ensure that the content of the kernel-devel/linux-headers is not a symbolic link.
-
Sometimes, the content of the kernel-devel/linux-headers, which match the version of the kernel, is actually a symbolic link. In this case, you will need to remove the link before installing the required package.
-
To verify that the folder that contains the kernel-devel/linux-headers is not a symbolic link, run the following command:
-
On RHEL/CENTOS/Oracle:
ls -l /usr/src/kernels`
-
On Debian/Ubuntu/SUSE:
ls -l /usr/src`
-
-
-
If you found that the content of the kernel-devel/linux-headers, which matches the version of the kernel, is a symbolic link, you need to delete the link.
-
Run the following command:
rm /usr/src/`
-
For example:
rm /usr/src/linux-headers-4.4.1`
-
-
-
-
Kernel Headers Installation: For the agent to operate properly, you need to install a kernel headers package with the exact same version number of the running kernel.
-
To install the correct kernel-devel/linux-headers, run the following commands:
-
On RHEL/CENTOS/Oracle/SUSE:
sudo yum install kernel-devel-
+uname -r+` -
On Debian/Ubuntu:
s__udo apt-get install linux-headers-
+uname -r+`
-
-
If no matching package was found on the repositories configured on your server, you can download it manually from the Internet and then install it. To download the matching kernel-devel/linux-headers package, navigate to the following sites:
-
RHEL, CENTOS, Oracle, and SUSE package directory
-
Debian package directory
-
Ubuntu package directory
-
-
-
-
-
AWS Specific Considerations
-
Number of disks per server
-
Elastic Disaster Recovery uses Amazon Elastic Block Store and Amazon Elastic Compute Cloud for the replication infrastructure. Because of this, Elastic Disaster Recovery is limited to the amount of disks that can be added to the replication servers.
-
For Nitro replication instances (such as t3.small), we are limited to source servers with less than 26 volumes
-
For Xen replication instances (such as t2.small), the limitation is 40 volumes per source server
-
-
-
Maximum source disk size
-
Elastic Disaster Recovery uses Amazon Elastic Block Store and Amazon Elastic Compute Cloud for the replication infrastructure. Because of this, Elastic Disaster Recovery is limited to the 16TB for each disk on the source machines being protected.
-
-