Resume or initiate a migration session.
Start with New Session only for first-time browser pairing. Use Recovery Session when this browser already paired earlier and needs to rejoin. Use Project Tools later with application credentials only.
New Session
Use this for the first browser pairing only. The rescue console remains the source of truth and must confirm the short pairing secret before the browser unlocks.
Recovery Session
Use this only after the browser was paired before and later lost state. Recovery does not create a new pairing session; it only restores operator access.
Project Tools
Use this path after the initial migration when you need tenant-scoped follow-up work such as root conversion. This mode does not require a MIG and does not re-enter rescue-session controls.
Show step-by-step application credential setup
Use a dedicated application credential for Milkshake project tools. Milkshake should create and retain its own isolated worker network, subnet, router, and security groups in the tenant project. Keep the scratch VM off production networks and grant only the permissions needed to read migrated images, create one scratch VM, upload the converted result, and create or reuse the dedicated worker network resources.
- Milkshake should create a dedicated worker network, subnet, router, and security groups the first time Project Tools runs in this tenant. Those resources should persist for later conversions.
- Do not place the scratch VM on a production workload network. Attach it only to the dedicated Milkshake worker network.
- Create an application credential from a project user or role set that can create and delete the scratch VM, upload images, manage temporary worker storage, and create or reuse the Milkshake worker network resources.
- Paste the auth URL, region, application credential ID, and secret into this page. Milkshake will use those values only for tenant-scoped post-migration tools.
Milkshake needs the same target region and Keystone auth URL that appear above. Example access rule file for the APIs Milkshake needs:
Create the application credential with that access rule file, then copy the generated ID and secret:
Example OpenStack CLI flow for the dedicated Milkshake worker network resources:
If your cloud supports application credential access rules, restrict the credential further. Do not attach a keypair or floating IP to the scratch VM, keep inbound security-group rules empty, and let the Milkshake worker network resources persist for reuse.