LSM allows the User or Scripts to access the underlying "Target Operating System" (Windows, Linux, BSD...) file system(s) when the RAM Agent is active in RAM.
Refer to RAM Agent CLI to access the RAM Agent CLI.
Provided are examples for Windows (WS 2016), RHEL/CentOS/Oracle 7.6 and Ubuntu 18.04 LTS.
Note that the RAM Agent Username is "ramagent" and the RAM Agent password is "live".
Remote Access the Windows file system on a Machine
From the LSM Server command line, ssh to the Machine using its Service IP address (in this case, Windows Server 2016 Standard):
# ssh ramagent@192.168.49.130
The authenticity of host '192.168.49.130 (192.168.49.130)' can't be established.
ECDSA key fingerprint is SHA256:D0iTzdw6tXHg2MMBOh/jnsBFk4UEtOq7unwhp/dqjxw.
ECDSA key fingerprint is MD5:f2:19:48:28:5e:2d:e2:8e:89:ce:e3:57:75:f9:ea:c8.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.49.130' (ECDSA) to the list of known hosts.
ramagent@192.168.49.130's password: live
ramagent@LsmRamAgent:~$ sudo su -
root@LsmRamAgent:~# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
loop0 7:0 0 216.5M 1 loop /lib/live/mount/rootfs/filesystem.squashfs
sda 8:0 0 60G 0 disk
├─sda1 8:1 0 500M 0 part
└─sda2 8:2 0 59.5G 0 part
root@LsmRamAgent:~# mkdir /mnt/sda2
root@LsmRamAgent:~# ll /mnt/
total 0
drwxr-xr-x 3 root root 60 Feb 7 15:24 ./
drwxr-xr-x 33 root root 280 Feb 7 15:24 ../
drwxr-xr-x 2 root root 40 Feb 7 15:24 sda2/
root@LsmRamAgent:~# mount -o ro /dev/sda2 /mnt/sda2 # Note: mount as read-only in this example
root@LsmRamAgent:~# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
loop0 7:0 0 216.5M 1 loop /lib/live/mount/rootfs/filesystem.squashfs
sda 8:0 0 60G 0 disk
├─sda1 8:1 0 500M 0 part
└─sda2 8:2 0 59.5G 0 part /mnt/sda2
root@LsmRamAgent:~# ll /mnt/sda2
total 1180065
drwxrwxrwx 1 root root 4096 Jan 8 06:02 ./
drwxr-xr-x 3 root root 60 Feb 7 15:24 ../
-rwxrwxrwx 1 root root 384322 Jul 16 2016 bootmgr*
-rwxrwxrwx 1 root root 1 Jul 16 2016 BOOTNXT*
lrwxrwxrwx 2 root root 15 Jan 8 06:02 'Documents and Settings' -> /mnt/sda2/Users/
-rwxrwxrwx 1 root root 1207959552 Jan 25 02:18 pagefile.sys*
drwxrwxrwx 1 root root 0 Jul 16 2016 PerfLogs/
drwxrwxrwx 1 root root 4096 Jan 8 06:02 ProgramData/
drwxrwxrwx 1 root root 4096 Jan 8 06:36 'Program Files'/
drwxrwxrwx 1 root root 4096 Jul 16 2016 'Program Files (x86)'/
drwxrwxrwx 1 root root 0 Jan 8 06:02 Recovery/
drwxrwxrwx 1 root root 0 Jan 8 06:38 '$Recycle.Bin'/
drwxrwxrwx 1 root root 0 Jan 8 05:54 'System Volume Information'/
drwxrwxrwx 1 root root 4096 Jan 8 06:33 Users/
drwxrwxrwx 1 root root 20480 Jan 8 06:32 Windows/
# ll /mnt/sda2/Users/desktop.ini
-rwxrwxrwx 1 root root 174 Jul 16 2016 /mnt/sda2/Users/desktop.ini*
Remote Access the RHEL/CentOS/Oracle file system on a Machine
From the LSM Server command line, ssh to the Machine using its Service IP address (in this case, CentOS 7.6):
# ssh ramagent@192.168.49.129
The authenticity of host '192.168.49.129 (192.168.49.129)' can't be established.
ECDSA key fingerprint is SHA256:tPtVnX9eM0Bc5ZpoWy0cI+lH/aElY4C33FK8L5Zczr0.
ECDSA key fingerprint is MD5:ad:3e:8c:65:b6:d8:be:f6:bf:b5:21:88:1a:2c:71:de.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.49.129' (ECDSA) to the list of known hosts.
ramagent@192.168.49.129's password: live
ramagent@LsmRamAgent:~$ sudo su -
root@LsmRamAgent:~# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
loop0 7:0 0 216.5M 1 loop /lib/live/mount/rootfs/filesystem.squashfs
sda 8:0 0 40G 0 disk
├─sda1 8:1 0 1G 0 part
└─sda2 8:2 0 39G 0 part
├─centos-swap 253:0 0 2G 0 lvm
└─centos-root 253:1 0 37G 0 lvm
root@LsmRamAgent:~# vgchange -ay
2 logical volume(s) in volume group "centos" now active
root@LsmRamAgent:~# lvscan
ACTIVE '/dev/centos/swap' [2.00 GiB] inherit
ACTIVE '/dev/centos/root' [36.99 GiB] inherit
root@LsmRamAgent:~# mkdir /mnt/sda2
root@LsmRamAgent:~# ll /mnt/
total 0
drwxr-xr-x 3 root root 60 Feb 7 22:02 ./
drwxr-xr-x 33 root root 280 Feb 7 22:02 ../
drwxr-xr-x 2 root root 40 Feb 7 22:02 sda2/
root@LsmRamAgent:~# mount -o ro /dev/centos/root /mnt/sda2 # Note: mount as read-only in this example
root@LsmRamAgent:~# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
loop0 7:0 0 216.5M 1 loop /lib/live/mount/rootfs/filesystem.squashfs
sda 8:0 0 40G 0 disk
├─sda1 8:1 0 1G 0 part
└─sda2 8:2 0 39G 0 part
├─centos-swap 253:0 0 2G 0 lvm
└─centos-root 253:1 0 37G 0 lvm /mnt/sda2
root@LsmRamAgent:~# ll /mnt/sda2
total 12
dr-xr-xr-x. 17 root root 224 Jan 18 06:10 ./
drwxr-xr-x 3 root root 60 Feb 7 22:02 ../
lrwxrwxrwx. 1 root root 7 Jan 18 06:01 bin -> usr/bin/
drwxr-xr-x. 2 root root 6 Jan 18 06:00 boot/
drwxr-xr-x. 2 root root 6 Jan 18 06:00 dev/
drwxr-xr-x. 75 root root 8192 Jan 18 20:34 etc/
drwxr-xr-x. 2 root root 6 Apr 11 2018 home/
lrwxrwxrwx. 1 root root 7 Jan 18 06:01 lib -> usr/lib/
lrwxrwxrwx. 1 root root 9 Jan 18 06:01 lib64 -> usr/lib64/
drwxr-xr-x. 2 root root 6 Apr 11 2018 media/
drwxr-xr-x. 2 root root 6 Apr 11 2018 mnt/
drwxr-xr-x. 2 root root 6 Apr 11 2018 opt/
drwxr-xr-x. 2 root root 6 Jan 18 06:00 proc/
dr-xr-x---. 2 root root 135 Jan 18 13:52 root/
drwxr-xr-x. 2 root root 6 Jan 18 06:00 run/
lrwxrwxrwx. 1 root root 8 Jan 18 06:01 sbin -> usr/sbin/
drwxr-xr-x. 2 root root 6 Apr 11 2018 srv/
drwxr-xr-x. 2 root root 6 Jan 18 06:00 sys/
drwxrwxrwt. 10 root root 235 Jan 18 20:33 tmp/
drwxr-xr-x. 13 root root 155 Jan 18 06:01 usr/
drwxr-xr-x. 19 root root 267 Jan 18 06:14 var/
root@LsmRamAgent:~# ll /mnt/sda2/etc/sysconfig/network-Scripts/ifcfg-ens32
-rw-r--r--. 1 root root 329 Jan 18 06:10 /mnt/sda2/etc/sysconfig/network-Scripts/ifcfg-ens32
Remote Access the Ubuntu file system on a Machine
From the LSM Server command line, ssh to the Machine using its Service IP address (in this case, Ubuntu 18.04 LTS):
# ssh ramagent@192.168.49.131
The authenticity of host '192.168.49.131 (192.168.49.131)' can't be established.
ECDSA key fingerprint is SHA256:mKoiB8pTO5pHaT643Vk5d0qUawjud/QZbTUnHFXzINc.
ECDSA key fingerprint is MD5:21:6f:d2:cc:d4:6e:d5:16:14:12:b9:63:ac:36:93:34.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.49.131' (ECDSA) to the list of known hosts.
ramagent@192.168.49.131's password: live
ramagent@LsmRamAgent:~$ sudo su -
root@LsmRamAgent:~# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
loop0 7:0 0 216.5M 1 loop /lib/live/mount/rootfs/filesystem.squashfs
sda 8:0 0 60G 0 disk
├─sda1 8:1 0 1M 0 part
└─sda2 8:2 0 60G 0 part
root@LsmRamAgent:~# mkdir /mnt/sda2
root@LsmRamAgent:~# ll /mnt/
total 0
drwxr-xr-x 3 root root 60 Feb 7 23:47 ./
drwxr-xr-x 33 root root 280 Feb 7 23:47 ../
drwxr-xr-x 2 root root 40 Feb 7 23:47 sda2/
root@LsmRamAgent:~# mount -o ro /dev/sda2 /mnt/sda2 # Note: mount as read-only in this example
root@LsmRamAgent:~# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
loop0 7:0 0 216.5M 1 loop /lib/live/mount/rootfs/filesystem.squashfs
sda 8:0 0 60G 0 disk
├─sda1 8:1 0 1M 0 part
└─sda2 8:2 0 60G 0 part /mnt/sda2
root@LsmRamAgent:~# ll /mnt/sda2
total 1970288
drwxr-xr-x 23 root root 4096 Jan 10 18:29 ./
drwxr-xr-x 3 root root 60 Feb 7 23:47 ../
drwxr-xr-x 2 root root 4096 Jan 20 21:14 bin/
drwxr-xr-x 3 root root 4096 Jan 20 21:13 boot/
drwxr-xr-x 4 root root 4096 Jul 25 2018 dev/
drwxr-xr-x 90 root root 4096 Jan 20 21:14 etc/
drwxr-xr-x 3 root root 4096 Jan 10 19:04 home/
lrwxrwxrwx 1 root root 33 Jan 10 18:27 initrd.img -> boot/initrd.img-4.15.0-43-generic
lrwxrwxrwx 1 root root 33 Jul 25 2018 initrd.img.old -> boot/initrd.img-4.15.0-29-generic
drwxr-xr-x 22 root root 4096 Jul 25 2018 lib/
drwxr-xr-x 2 root root 4096 Jul 25 2018 lib64/
drwx------ 2 root root 16384 Jan 10 18:21 lost+found/
drwxr-xr-x 2 root root 4096 Jul 25 2018 media/
drwxr-xr-x 2 root root 4096 Jul 25 2018 mnt/
drwxr-xr-x 2 root root 4096 Jul 25 2018 opt/
drwxr-xr-x 2 root root 4096 Apr 24 2018 proc/
drwx------ 3 root root 4096 Jan 10 20:15 root/
drwxr-xr-x 13 root root 4096 Jul 25 2018 run/
drwxr-xr-x 2 root root 12288 Jan 20 21:11 sbin/
drwxr-xr-x 4 root root 4096 Jan 10 19:04 snap/
drwxr-xr-x 2 root root 4096 Jul 25 2018 srv/
-rw------- 1 root root 2017460224 Jan 10 18:29 swap.img
drwxr-xr-x 2 root root 4096 Apr 24 2018 sys/
drwxrwxrwt 7 root root 4096 Jan 20 21:26 tmp/
drwxr-xr-x 10 root root 4096 Jul 25 2018 usr/
drwxr-xr-x 13 root root 4096 Jul 25 2018 var/
lrwxrwxrwx 1 root root 30 Jan 10 18:27 vmlinuz -> boot/vmlinuz-4.15.0-43-generic
lrwxrwxrwx 1 root root 30 Jul 25 2018 vmlinuz.old -> boot/vmlinuz-4.15.0-29-generic
# ll /mnt/sda2/root
total 24
drwx------ 3 root root 4096 Jan 10 20:15 ./
drwxr-xr-x 23 root root 4096 Jan 10 18:29 ../
-rw------- 1 root root 35 Jan 10 20:15 .bash_history
-rw-r--r-- 1 root root 3106 Apr 9 2018 .bashrc
-rw-r--r-- 1 root root 148 Aug 17 2015 .profile
drwx------ 2 root root 4096 Jan 10 19:04 .ssh/