Converse agora com nosso suporte
Chat com o suporte

QoreStor 7.2.1 - Azure Deployment Guide

Accessing and configuring the virtual machine

*
NOTE: If you recently created the virtual machine, it is recommended that you wait 3 or 4 minutes before you begin this procedure.
1
By default, the instance does not have the DNS name configured. To configure the DNS name, find the DNS name field in the Networking section, and then click Configure.
A screenshot of a computer Description automatically generated with medium confidence
2
By default, Azure provides the <region>.cloudapp.azure.com domain. Edit the options for the name based on your Public IP configuration, and then click Save.
5
After you log in, verify the filesystem is operational for I/O using the system --show command. Check if "System State," is in "Operational Mode".
*
NOTE: The system prompts you for the connection string in secret.
7
To access the QoreStor UI, use the public IP assigned in the section Creating the virtual machine. The URL for accessing QoreStor UI would be https://<public_ip_of_virutal_machine>:5233.

Port usage

QoreStor uses certain ports for the services mentioned in the following table. The table also mentions the recommended network group settings (NSG) in Azure for each of the ports. Please refer to the next section for instructions on how to change the default/recommended NSG settings.

Component / Function

Ports used

Protocol

Details

Default Network Security Group setting in Azure

SSH

22

TCP

SSH uses port 22. We recommend keeping this port open to enable secure connections within and from outside QoreStor.

22: ENABLE

UI

5233

TCP

QoreStor uses 5233 for HTTPS connections (and not 443). Since this connection is secure, the port remains open in default NSG settings for all incoming traffic.

5233: ENABLE

Object (S3)

Object container uses port range 9001-9005 for data transfer. By default, NSG disables these ports. However, to use the Object container, enable the ports in NSG.

Port used by secure connect. Secure connect is enabled by default and we recommend keeping this port open in NSG settings.

Configuring Azure Network Security Group settings

The settings for enabling or disabling the Network Security Group (NSG) settings are available in Azure using the following instructions.

*
NOTE: Any modification to this NSG will change the default settings recommended by QoreStor.
A screenshot of a computer Description automatically generated with low confidence
4
When opening an additional port, to add inbound rules for that specific port, click Inbound security rules on the left side, and then click the Add tab on the top side of the page.

Source

Select an IP or an Azure NSG. If the port can be used from any external interface, select Any.

Source port ranges

Select a port range on the specified source. To select any range, select *.

Destination

Leave as the default selection, Any.

Service

Leave as the default selection, Custom.

Destination port ranges

(Required) Enter 9001-9005 for this port.

Protocol

Select TCP.

Action

Select Allow.

Priority

Select an appropriate priority.

The rules are executed by priority, with the lowest number representing the highest priority. When selecting priorities, leave spaces between the numbers so that you can insert new priorities later.

Name

Enter an appropriate name for this rule; for example, ObjectServer_9000, which highlights the port number and the functionality.

Add a description as needed.

6
Click Add.
Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação