Compute
Elastic Cloud Server
Huawei Cloud Flexus
Bare Metal Server
Auto Scaling
Image Management Service
Dedicated Host
FunctionGraph
Cloud Phone Host
Huawei Cloud EulerOS
Networking
Virtual Private Cloud
Elastic IP
Elastic Load Balance
NAT Gateway
Direct Connect
Virtual Private Network
VPC Endpoint
Cloud Connect
Enterprise Router
Enterprise Switch
Global Accelerator
Management & Governance
Cloud Eye
Identity and Access Management
Cloud Trace Service
Resource Formation Service
Tag Management Service
Log Tank Service
Config
OneAccess
Resource Access Manager
Simple Message Notification
Application Performance Management
Application Operations Management
Organizations
Optimization Advisor
IAM Identity Center
Cloud Operations Center
Resource Governance Center
Migration
Server Migration Service
Object Storage Migration Service
Cloud Data Migration
Migration Center
Cloud Ecosystem
KooGallery
Partner Center
User Support
My Account
Billing Center
Cost Center
Resource Center
Enterprise Management
Service Tickets
HUAWEI CLOUD (International) FAQs
ICP Filing
Support Plans
My Credentials
Customer Operation Capabilities
Partner Support Plans
Professional Services
Analytics
MapReduce Service
Data Lake Insight
CloudTable Service
Cloud Search Service
Data Lake Visualization
Data Ingestion Service
GaussDB(DWS)
DataArts Studio
Data Lake Factory
DataArts Lake Formation
IoT
IoT Device Access
Others
Product Pricing Details
System Permissions
Console Quick Start
Common FAQs
Instructions for Associating with a HUAWEI CLOUD Partner
Message Center
Security & Compliance
Security Technologies and Applications
Web Application Firewall
Host Security Service
Cloud Firewall
SecMaster
Anti-DDoS Service
Data Encryption Workshop
Database Security Service
Cloud Bastion Host
Data Security Center
Cloud Certificate Manager
Edge Security
Managed Threat Detection
Blockchain
Blockchain Service
Web3 Node Engine Service
Media Services
Media Processing Center
Video On Demand
Live
SparkRTC
MetaStudio
Storage
Object Storage Service
Elastic Volume Service
Cloud Backup and Recovery
Storage Disaster Recovery Service
Scalable File Service Turbo
Scalable File Service
Volume Backup Service
Cloud Server Backup Service
Data Express Service
Dedicated Distributed Storage Service
Containers
Cloud Container Engine
SoftWare Repository for Container
Application Service Mesh
Ubiquitous Cloud Native Service
Cloud Container Instance
Databases
Relational Database Service
Document Database Service
Data Admin Service
Data Replication Service
GeminiDB
GaussDB
Distributed Database Middleware
Database and Application Migration UGO
TaurusDB
Middleware
Distributed Cache Service
API Gateway
Distributed Message Service for Kafka
Distributed Message Service for RabbitMQ
Distributed Message Service for RocketMQ
Cloud Service Engine
Multi-Site High Availability Service
EventGrid
Dedicated Cloud
Dedicated Computing Cluster
Business Applications
Workspace
ROMA Connect
Message & SMS
Domain Name Service
Edge Data Center Management
Meeting
AI
Face Recognition Service
Graph Engine Service
Content Moderation
Image Recognition
Optical Character Recognition
ModelArts
ImageSearch
Conversational Bot Service
Speech Interaction Service
Huawei HiLens
Video Intelligent Analysis Service
Developer Tools
SDK Developer Guide
API Request Signing Guide
Terraform
Koo Command Line Interface
Content Delivery & Edge Computing
Content Delivery Network
Intelligent EdgeFabric
CloudPond
Intelligent EdgeCloud
Solutions
SAP Cloud
High Performance Computing
Developer Services
ServiceStage
CodeArts
CodeArts PerfTest
CodeArts Req
CodeArts Pipeline
CodeArts Build
CodeArts Deploy
CodeArts Artifact
CodeArts TestPlan
CodeArts Check
CodeArts Repo
Cloud Application Engine
MacroVerse aPaaS
KooMessage
KooPhone
KooDrive
Help Center/ Migration Center/ User Guide/ New Edition/ Migration Preparations/ Deploying the MgC Agent (Formerly Edge)

Deploying the MgC Agent (Formerly Edge)

Updated on 2025-02-17 GMT+08:00

Before using the big data functions, you need to deploy the MgC Agent on a server that can access your metadata source.

CAUTION:

The MgC Agent does not support automatic restart. Do not restart the MgC Agent during task execution, or tasks will fail.

Preparations

  • Prepare a Linux server for installing the MgC Agent in the source intranet environment. The Linux server must:
    • Be able to access the Internet and the domain names of MgC, IoTDA, and other cloud services. For details about the domain names to be accessed, see Domain Names.
    • Allow the ports required by the MgC Agent (formerly Edge). For details about the required ports, see Communication Matrix.
    • Allow outbound traffic on 8883 if the server is in a security group.
    • Run CentOS 8.X.
    • Have at least 4 CPUs and 8 GB of memory. If you want to use big data verification, the server must have at least 8 CPUs and 16 GB of memory.
    CAUTION:

    Do not install the MgC Agent on a source server to be migrated.

    • High resource consumption: The MgC Agent consumes CPU and memory resources during collection and migration. If a large number of migration tasks are performed by the MgC Agent, services on the source server may be affected.
    • Port occupation: The MgC Agent occupies some ports on the server, which may affect services running on it.
  • Run the following command to check whether rng-tools is installed on the Linux server where the MgC Agent is installed:
    rpm -qa | grep rng-tools
    If no rng-tools-related information is displayed, rng-tools is not installed on the server. Run the following command to install rng-tools:
    yum -y install rng-tools
  • Disable any antivirus and protection software on the Linux server where the MgC Agent is installed. This type of software may stop the MgC Agent from executing migration commands, resulting in migration failures.
  • Add an inbound rule to the security group of the Linux server to allow TCP traffic on port 27080. Set the source address to the IP address of the Windows server you use to log in to the MgC Agent console.

  • Sign up for a HUAWEI ID and enable Huawei Cloud services, and obtain an AK/SK pair for the account.
  • Create a migration project on the MgC console.

Downloading and Installing the MgC Agent

  1. Sign in to the MgC console from the Linux server you prepared.
  2. In the navigation pane on the left, choose MgC Agents.
  3. In the Linux area, click Download Installation Package or Copy Download Command to download the MgC Agent installation program to the Linux server.
  4. Decompress the MgC Agent installation package.

    tar zxvf Edge.tar.gz

  5. Go to the scripts directory in the decompressed MgC Agent directory.

    cd Edge/scripts/

  6. Run the MgC Agent installation script.

    ./install.sh

  7. Enter the EIP bound to the NIC of the Linux server. The IP address will be used for accessing the MgC Agent console. If the entered IP address is not used by the Linux server, the system will prompt you whether to use any public IP address of the Linux server as the MgC Agent access address.

  8. Check if the message shown in the following figure is displayed. If it is, the MgC Agent for Linux has been installed. The port in the following figure is for reference only. Note the actual port returned. Generally, the port is 27080.

    Update environment variables.

    source /etc/profile

  9. On the Windows server for which an inbound rule is added to the security group of the server where the MgC Agent is installed, open a browser and enter https://<IP-address-entered-in-step-7>:<port-obtained-in-step-8> in the address box to access the user registration page of the MgC Agent. For example, if the IP address entered in step 7 is 192.168.x.x and the port returned in step 8 is 27080, the MgC Agent access address is https://192.168.x.x:27080.

    NOTICE:

    If there are access problems, check the IP address entered in the address box and the inbound rule settings of the security group of the Linux server with the MgC Agent installed.

Registering an Account

When you log in to the MgC Agent console for the first time, you must set a username and password. Keep the username and password secure.

  1. On the Register page, specify a username and password, confirm the password, and click Privacy Statement.

  2. Read the privacy statement carefully before selecting I have read and agree to the Privacy Statement, and click Register.

    CAUTION:

    You are advised to change your password for accessing the MgC Agent every three to six months.

Connecting the MgC Agent to MgC

  1. Use the registered account to log in to the MgC Agent console.
  2. On the Overview page, click Connect in the upper right corner. The Connect to MgC page is displayed on the right.

    Figure 1 Connecting the MgC Agent to MgC

  3. In Step 1: Enter Cloud Credential, select the region where your MgC migration project is located, enter the AK/SK of your Huawei Cloud account, and click Query Project. After the MgC Agent is authenticated using the entered AK/SK pair, you can go to the next step. If the system displays a message indicating that the AK/SK pair is incorrect, try to rectify the fault by following the instructions in What Can I Do If the AK/SK Verification Fails?

    NOTICE:

    If your source servers need to be migrated, the entered AK/SK pair must have permissions to use SMS. For details, see SMS Custom Policies.

    Determine whether to save the entered AK/SK pair as the target credential which will be used for migrating your workloads to Huawei Cloud.

    • If you select No, the entered AK/SK pair will be deleted after the MgC Agent is connected to MgC.
    • If you select Yes, the entered AK/SK pair will be encrypted and saved locally after the connection to MgC is established. When you migrate workloads to Huawei Cloud, the AK/SK pair will be delivered to SMS-Agent on the source servers for executing the migration.

  4. In Step 2: Select MgC Migration Project, select a migration project from the project drop-down list. The MgC Agent will report the collected information about your source resources to this project.
  5. In Step 3: Preset MgC Agent Name, specify a name for the MgC Agent, which will be displayed on the MgC console, and click Next. Confirm the connection to MgC, and click OK.

    CAUTION:

    After the MgC Agent is connected to MgC, the name you specified here cannot be modified.

  6. If Connected shows up on the overview page, the connection to MgC is successful.

Adding Resource Credentials

You can add credentials of the following types of resources to the MgC Agent: private clouds, servers, big data clusters, and containers. For details about the authentication methods supported for each resource type, see Table 1.

Table 1 Authentication methods

Resource Type

Authentication Method

Description

Public cloud

  • AK/SK
  • Configuration file
  • ID/Secret
  • AK/SK pairs of cloud platforms, such as Huawei Cloud, Alibaba Cloud, AWS, Tencent Cloud, Qiniu Cloud, and Kingsoft Cloud
  • Upload the configuration file used to access Google Cloud. The configuration file contains credentials for Google Cloud service accounts, and the file must be in .json format and cannot exceed 4 KB.
  • IDs and secrets are Azure credentials. To learn how to obtain Azure credentials, see How Do I Obtain Azure Credentials?

Private cloud

Username/Password

Enter the username and password for logging in to the source private cloud.

Databases

Username/Password

Enter the username and password of the database.

Big data - Executor

Username/Password

Enter the username and password for logging in to the server deployed as an executor. Then specify Network Range, which can be a single IP address or an IP address range.

The value can be:

  • A single IP address, for example, 192.168.10.10/32
  • An IP address range, for example, 192.168.52.0/24
  • All IP addresses. You need to enter 0.0.0.0/0.

Big data - Hive Metastore

Username/Key

Upload the core-site.xml, hivemetastore-site.xml, hive-site.xml, krb5.conf, and user.keytab files. For details about how to obtain the certificate files, see How Do I Obtain the Hive Metastore Credential Files?

Big data - Data Lake Search (DLI)

AK/SK

Enter the AK/SK pair of the Huawei Cloud account. For details about how to obtain an AK/SK pair, see How Do I Obtain the AK/SK and Project ID?

Big Data - MaxCompute

AK/SK

Enter the AK/SK pair of the source Alibaba Cloud account. For details about how to obtain the key pair, see Viewing the Information About AccessKey Pairs of a RAM User.

Big data - Doris

Username/Password

Enter the username and password of the Doris database.

Big data - HBase

Username/Key

  • For an unsecured cluster, upload the core-site.xml, hdfs-site.xml, yarn-site.xml, mapred-site.xml, and hbase-site.xml files.
  • For a secured cluster, upload seven files, including core-site.xml, hdfs-site.xml, yarn-site.xml, krb5.conf, user.keytab, mapred-site.xml, and hbase-site.xml.

The preceding configuration files are usually stored in the conf subdirectory of the Hadoop and HBase installation directories.

Big data - ClickHouse

Username/Password

Enter the username and password of the ClickHouse database.

Windows server

Username/Password

Enter the username and password for logging in to the server. Then specify Network Range, which can be a single IP address or an IP address range.

The value can be:

  • A single IP address, for example, 192.168.10.10/32
  • An IP address range, for example, 192.168.52.0/24
  • All IP addresses. You need to enter 0.0.0.0/0.

Linux server

  • Username/Password
  • Username/Key
  • If you select Username/Password, enter the username and password for logging in to the server.
  • If you select Username/Key, enter the username and the password of the key file for logging in to the server, and upload the key file in .pem format.
    NOTICE:

    If the key file is not encrypted, you do not need to enter the password.

Then specify Network Range, which can be a single IP address or an IP address range. The value can be:

  • A single IP address, for example, 192.168.10.10/32
  • An IP address range, for example, 192.168.52.0/24
  • All IP addresses. You need to enter 0.0.0.0/0.

Container

Configuration file

The configuration file must be a .json or .yml file.

  1. Use the registered username and password to log in to the MgC Agent console.
  2. In the navigation pane, choose Agent-based Discovery > Credentials.
  3. Click Create Certificate above the list.

    Figure 2 Adding a credential

  4. Select a resource type and authentication method as prompted. Specify a credential name, enter your credentials, and click Confirm.

    • If the MgC Agent is not connected to MgC, the added resource credentials can be used for deep collection.
    • If the MgC Agent is connected to MgC, the added resource credentials will be automatically synchronized to MgC.

We use cookies to improve our site and your experience. By continuing to browse our site you accept our cookie policy. Find out more

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback