Applies to: Amazon RDS MySQL, Amazon RDS Oracle, Amazon RDS PostgreSQL
For enhanced performance, configure an Amazon EC2 instance on the proxy. The proxy server facilitates the native database backup operations and restore operations.
For instructions about creating the following item in Amazon Web Services, go to the Amazon Elastic Compute Cloud Documentation, website, Amazon Elastic Compute Cloud.
-
Create an Amazon account.
-
Obtain a user access key by using AWS Identity and Access Management (IAM). For more information, go to the Amazon IAM User Guide website, Managing Access Keys for IAM Users. You use the IAM user access keys to control access to specific AWS services and resources for an AWS account.
-
Create an Amazon Security Group with the appropriate rules. For information, go to the Amazon Elastic Cloud Compute Documentation website, Amazon Security Groups for Linux Instances.
-
Create a Amazon Machine Image for Red Hat Enterprise Linux. For information, go to the Amazon Elastic Compute Cloud Documentation website, Creating an Instance Store-Backed Linux AMI.
You can use an AMI available from Amazon, or create your own custom AMI. If you create a custom AMI, you must verify that it is valid before you use the Commvault software.
This is the AMI that hosts the EC2 instance.
-
If you do not have an Amazon key pair, you must create one. For more information, go to the Amazon Elastic Compute Cloud Documentation website,Amazon EC2 Key Pairs.
-
Configure the permissions to access AWS resources. When you use the access key and secret key for an IAM user, you must have appropriate permissions, which can be any of the following types:
-
Amazon EC2 Full Access
-
Administrator Access
-
Custom permissions to access AWS resources
For more information, see:
Record all of the Amazon information, for example, the user and the key pair, before you start the Commvault configuration.
-
-
Set the instance MTU value to 1500. For more information, go to the website, and the Amazon Redshift website, Queries Appear to Hang and Sometimes Fail to Reach the Cluster and Configuring the MTU of an Instance.