The on-prem path delivers Wirekite as a single self-extracting installer (Documentation Index
Fetch the complete documentation index at: https://docs.wirekite.io/llms.txt
Use this file to discover all available pages before exploring further.
wirekite-installer.run) that you run on a Linux host you control. Wirekite
lives at /opt/wirekite/, the web UI runs as a systemd service on port 8443,
and all configuration lives in /etc/wirekite/wirekite.cfg.
Requirements
| Requirement | Notes |
|---|---|
| Operating system | Ubuntu 20.04+, RHEL 8+, Debian 11+, or Amazon Linux 2 |
| Architecture | x86_64 |
| Privileges | Root or sudo |
| Init system | systemd |
| Free TCP ports | 8443 (UX) and 9443 (API, only if API enabled) |
| Disk | ~2 GB for the install tree; migration data + change files are on disks you allocate |
If you plan to use Oracle as a source, the installer bundles the runtime
libraries it needs — no separate Oracle Instant Client install is required.
What you receive from Wirekite
Two artifacts, delivered out-of-band (signed URL, secure email, or portal):wirekite-installer.run— the self-extracting installer. Same binary regardless of which source/target you’ll use.- License pair — two small files:
wirekite.license— your customer licensewirekite.key— the decryption key paired with that license
Install
Step 1: Run the installer
Non-interactive (recommended for scripting):-- separates installer-extractor arguments from the install-script
arguments that follow.
The installer will:
- Extract the install tree to
/opt/wirekite/ - Create the
wirekitesystem user - Validate and install your license pair to
/opt/wirekite/license/ - Write
/etc/wirekite/wirekite.cfgwithDEPLOYMENT=onprem - Mint a self-signed CA and TLS server cert (
wirekite_camode, default) - Generate the per-host
instance/encryption.key - Install the dynamic linker config for bundled database drivers
- Install the
wirekite-ux.servicesystemd unit and start it
--license-file / --license-key, the installer prompts for them
interactively.
Step 2: Browse to the UI
Openhttps://<host>:8443/ in a browser. Because the default cert is
self-signed, your browser will show a “your connection is not private”
warning — accept it (or see Bring your own TLS
certificate below).
You’ll land on the setup page. Create the root user (username +
password). After that, sign in and start configuring sources, targets, and
migrations.
Bring your own TLS certificate
To avoid the browser warning, supply a CA-issued certificate at install time:CN or SAN must match the hostname users will type in the
browser.
Split-disk layout (recommended for production)
Wirekite reads two optional keys from/etc/wirekite/wirekite.cfg:
DATA_BASE_DIR— where extracted-row files for initial loads are stagedCHANGE_BASE_DIR— where CDC change files are staged
wirekite user:
$WIREKITE_HOME/instance/<migration>/.
Service management
The installer registerswirekite-ux.service. Manage it with the usual
systemctl commands:
wirekite-ux is the only unit required. The orchestrator and per-database
loaders are launched as child processes by the UX server when migrations run.
Upgrade
To upgrade to a new release:-
Stop the UX server:
-
Run the new installer:
/opt/wirekite/instance/— encryption key, users, migrations metadata/opt/wirekite/license/— your license pair/opt/wirekite/certs/— your TLS certs
- The installer restarts the UX server on success.
Uninstall
-y to skip the confirmation prompt. The uninstaller stops + removes the
systemd unit, deletes /opt/wirekite/, removes the wirekite user, and
deletes /etc/wirekite/.
Troubleshooting
License validation failed
Run the license utility directly:License has expired— contact your Wirekite rep for a renewal.Host ID mismatch— your license is bound to a specific MAC address. Either run on the bound host or request a host-independent license.license file has been tampered with— the.licenseand.keyare mismatched, or one was modified after issue. Reinstall the pair you originally received.
UX server won’t start
8443 is free (sudo lsof -i :8443) and that
/opt/wirekite/ux/server/certs/ contains a readable server.crt +
server.key.