Contents
- Deploying the Central Node and Sensor components as a cluster
- Deploying a storage server
- Step 1. Viewing the End User License Agreement and Privacy Policy
- Step 2. Selecting a server role
- Step 3. Selecting the deployment mode
- Step 4. Selecting a disk for installing the component
- Step 5. Selecting a network mask for server addressing
- Step 6. Selecting a network mask for addressing of application components
- Step 7. Selecting the cluster network interface
- Step 8. Selecting the external network interface
- Step 9. Selecting the method of obtaining IP addresses for network interfaces
- Step 10. Creating an administrator account and authenticating the server in the cluster
- Step 11. Adding DNS server addresses
- Step 12. Configuring time synchronization with an NTP server
- Step 13. Selecting disks for the Ceph storage
- Deploying the processing server
- Step 1. Viewing the End User License Agreement and Privacy Policy
- Step 2. Selecting a server role
- Step 3. Selecting a disk for installing the component
- Step 4. Selecting a network mask for cluster server addressing
- Step 5. Selecting a network mask for addressing of application components
- Step 6. Selecting the cluster network interface
- Step 7. Selecting the external network interface
- Step 8. Selecting the method of obtaining IP addresses for network interfaces
- Step 9. Authenticating the server in the cluster
- Step 10. Configuring receipt of mirrored traffic from SPAN ports
- Purging hard drives on storage servers
- Deploying a storage server
Deploying the Central Node and Sensor components as a cluster
A cluster must include at least 4 servers: 2 storage servers and 2 processing servers. You can use the Sizing Guide determine the right number of servers for your organization.
Deployment of the Central Node and Sensor components in the form of a cluster includes the following steps:
- Deploying the first storage server
The first step is to deploy the storage server. After the storage server is deployed, you can add additional storage and processing servers to the cluster.
- Deploying processing servers and additional storage servers
You can deploy the servers in any order.
- Configuring the sizing settings of the application
At the final stage of cluster deployment, you need to configure the scaling settings of the application: specify the planned volume of SPAN traffic, email traffic, the number of hosts with the Endpoint Agent component, as well as the size of the Storage and event database.
The Central Node component is always installed together with the Sensor component. If you need to use the Central Node component separately, when deploying the processing server, turn off receipt of mirrored traffic from SPAN ports at step 11.
If you have a cluster deployed on physical servers and want to add more hard drives to these servers or replace some of the existing drives and then reinstall the cluster, you must purge the drives previously allocated for the OSD (Object Storage Daemon) on the storage servers before installing components. Otherwise, the application is not guaranteed to work correctly. If you want to completely disconnect the drives and no longer plan to reconnect them to the server, purging the drives is not necessary.
Deploying a storage server
To deploy a data storage server, you need to run a disk image with the Central Node and Sensor components.
If an error occurred while performing the steps of the Setup Wizard, contact Technical Support.
Step 1. Viewing the End User License Agreement and Privacy Policy
To continue the installation, you must read the End User License Agreement and Privacy Policy and accept their terms and conditions. Installation will not continue until you accept the terms of the End User License Agreement and Privacy Policy.
To accept the terms and conditions of the End User License Agreement and the Privacy Policy when installing the components based on the Ubuntu operating system:
- Select the language for viewing the End User License Agreement and Privacy Policy of AO Kaspersky Lab in the list and press Enter.
This opens a window with the text of the AO Kaspersky Lab End User License Agreement.
- Read the AO Kaspersky Lab End User License Agreement.
To move up and down, you can use the keys: ↑, ↓, PageUp, and PageDown.
- If you accept the AO Kaspersky Lab End User License Agreement, select the I accept button and press Enter.
This opens a window with the text of the AO Kaspersky Lab Privacy Policy.
- Read the AO Kaspersky Lab Privacy Policy.
- If you accept the terms and conditions of the AO Kaspersky Lab Privacy Policy, select the I accept button and press Enter.
The Setup Wizard proceeds to the next step.
To accept the terms and conditions of the End User License Agreement and the Privacy Policy when installing the components based on the Astra Linux operating system:
- Select the language for viewing the End User License Agreement for Astra Linux operating systems from the list by pressing the F1 key and press Enter.
This opens a window with the text of the Astra Linux End User License Agreement.
- Read the End User License Agreement of the Astra Linux operating systems.
To move up and down, you can use the keys: ↑, ↓, PageUp, and PageDown.
- If you accept the terms and conditions of the End User License Agreement of Astra Linux operating systems, select Yes and press Enter.
This opens a window in which you can select the language for viewing the AO Kaspersky Lab End User License Agreement and Privacy Policy.
- Select the language for viewing the AO Kaspersky Lab End User License Agreement and Privacy Policy in the list and press Enter.
This opens a window with the text of the AO Kaspersky Lab End User License Agreement.
- Read the AO Kaspersky Lab End User License Agreement.
To move up and down, you can use the keys: ↑, ↓, PageUp, and PageDown.
- If you accept the terms and conditions of the AO Kaspersky Lab End User License Agreement, select the I accept button and press Enter.
This opens a window with the text of the AO Kaspersky Lab Privacy Policy.
- Read the AO Kaspersky Lab Privacy Policy.
- If you accept the terms and conditions of the AO Kaspersky Lab Privacy Policy, select the I accept button and press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 2. Selecting a server role
To select a server role:
- Select one of the following options:
- storage.
This role is for installing a storage server for deploying the Central Node component as a cluster.
- processing.
This role is for installing a processing server for deploying the Central Node component as a cluster.
The role also includes the installation and configuration of the Sensor component.
- single.
This role is for installing the Central Node and Sensor components on the same server.
- sensor.
This role is for installing the Sensor component on a standalone server.
- storage.
- Press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 3. Selecting the deployment mode
To select a deployment mode:
- Select one of the following options:
- First node installation.
Select this value when deploying the first server in the cluster.
- Add extra node to the cluster.
Select this value when deploying a server that will be added to an existing cluster.
- First node installation.
- Press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 4. Selecting a disk for installing the component
You need at least 150 GB of disk space. If less than 150 GB of disk space is available, the installation finishes with an error.
To select a disk for installing the component:
- Select one of the suggested drives for installing the component and press Enter.
The confirmation window is displayed.
- Select Yes and press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 5. Selecting a network mask for server addressing
We recommend using the default value.
The netmask may not match netmasks used in the organization's infrastructure.
To specify the network mask for server addressing:
- If you want to use the predefined value for the network mask, select the Ok button and press Enter.
Default value: 198.18.0.0/16.
- If you want to specify a different network mask, in the Subnet field, enter your value, select the Ok button, and press Enter.
The mask must match the template: x.x.0.0/16.
The Setup Wizard proceeds to the next step.
Page topStep 6. Selecting a network mask for addressing of application components
We recommend using the default value.
The network for application component addressing must not overlap with the network for cluster server addressing.
To specify the network mask for addressing the main components of the application:
- If you want to use the predefined value for the network mask, select the Ok button and press Enter.
Default value: 198.19.0.0/16.
- If you want to specify a different network mask, in the Bridge/overlay subnets field, enter your value, select the Ok button, and press Enter.
The mask must match the template: x.x.0.0/16.
The Setup Wizard proceeds to the next step.
Page topStep 7. Selecting the cluster network interface
The cluster network interface is used for communication between cluster servers.
To select the cluster network interface:
- Select the row containing the network interface that is used for the internal network.
To select a row, you can use the ↑, ↓, PageUp, and PageDown keys. The selected row is highlighted in red.
- Press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 8. Selecting the external network interface
The external network interface is used for SSH access to the server, managing the web interface of Kaspersky Anti Targeted Attack Platform, and other external connections.
To select the external network interface:
- Select the row containing the network interface that is used for the external network.
To select a row, you can use the ↑, ↓, PageUp, and PageDown keys. The selected row is highlighted in red.
- Press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 9. Selecting the method of obtaining IP addresses for network interfaces
To select a method for obtaining an IP address for network interfaces:
- Select the row containing the Configuration type: and press Enter.
To select a row, you can use the ↑, ↓, PageUp, and PageDown keys. The selected row is highlighted in red.
- In the opened window, select one of the following options:
- dhcp.
- static.
- If you selected static:
- Select the row containing the parameter and press the Enter key.
- In the opened window, enter the required data and press Enter twice.
You need to specify a value for each parameter.
- Select the row containing Save.
- Press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 10. Creating an administrator account and authenticating the server in the cluster
During this step, you need to do one of the following:
- Create an administrator account if you are deploying the first server in the cluster.
- Authenticate a server in the cluster if you are deploying additional storage servers.
Creating the administrator account
An administrator account is only required when deploying the first server in the cluster. If you are deploying an additional storage server, instead of opening a window that prompts you to create an administrator account, the application prompts you to authenticate the server in the cluster.
When deploying the first server in the cluster, you need to create an administrator account. This account is used to work in the web interface for sizing management, the application administrator menu, and to work in Technical Support Mode.
By default, the user name of the administrator account is admin. You must enter a password for that user account.
To enter a password for the administrator user account:
- This opens a window; in that window, in the min length field, enter the minimum password length. You must enter a value of 8 or greater.
- Select Ok and press Enter.
This opens the password creation window.
- This opens a window; in that window, in the password field, enter the password for the administrator account.
To select a row, you can use the ↑, ↓, PageUp, and PageDown keys. The selected row is highlighted in red.
- In the confirm field, enter the password again.
- Select Ok and press Enter.
The Setup Wizard proceeds to the next step.
Page topAuthenticating the server in the cluster
Authenticating a server in the cluster is only required when deploying additional storage servers. If you are deploying the first server in the cluster, the application prompts you to create an administrator account instead of authenticating the server.
To authenticate a server in the cluster, you need to enter the admin account password that was set when the first server in the cluster was deployed.
To authenticate a server in the cluster:
- In the password field, enter the password for the administrator account.
- Select Ok and press Enter.
To select a button, you can use the ↑, ↓, PageUp, and PageDown keys.
The server in the cluster will be authenticated. The Setup Wizard proceeds to the next step.
Page topStep 11. Adding DNS server addresses
This step is available if you are deploying the first server in the cluster.
Configure the DNS settings for the operation of servers with application components.
To add DNS server addresses:
- Select the Add field and press Enter.
- Enter the IP address of the DNS server in the IPv4 format.
- If you want to add the IP address of an additional DNS server, select the Add field, press Enter and enter the address of the server.
- Having added all DNS servers, select the Continue field and press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 12. Configuring time synchronization with an NTP server
This step is available if you are deploying the first server in the cluster.
Configure synchronization of the server time with the NTP server.
- Select the Add field and press Enter.
- Enter the IP address or name of the NTP server.
- If you want to add the IP address or name of an additional NTP server, select the Add field, press Enter, and enter the IP address or name of the NTP server.
- Having added all NTP servers, select the Continue field and press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 13. Selecting disks for the Ceph storage
Select the disks for the Ceph storage. The number of drives is determined according to the scaling guide.
To select disks for the Ceph storage:
- Select the row containing the required drive.
To select a row, you can use the ↑, ↓, PageUp, and PageDown keys. The selected row is highlighted in red.
- Press Enter.
- Repeat steps 1 to 2 to select more drives if you want to select multiple drives.
- Select the Apply and finish field and press Enter.
The confirmation window is displayed.
- Select Yes and press Enter.
The configuration may take some time. Then the installation is complete. You can proceed to the configuration of cluster servers in the web interface for sizing management.
Page topDeploying the processing server
To deploy a processing server, you need to run a disk image with the Central Node and Sensor components.
If an error occurred while performing the steps of the Setup Wizard, contact Technical Support.
Step 1. Viewing the End User License Agreement and Privacy Policy
To continue the installation, you must read the End User License Agreement and Privacy Policy and accept their terms and conditions. Installation will not continue until you accept the terms of the End User License Agreement and Privacy Policy.
To accept the terms and conditions of the End User License Agreement and the Privacy Policy when installing the components based on the Ubuntu operating system:
- Select the language for viewing the End User License Agreement and Privacy Policy of AO Kaspersky Lab in the list and press Enter.
This opens a window with the text of the AO Kaspersky Lab End User License Agreement.
- Read the AO Kaspersky Lab End User License Agreement.
To move up and down, you can use the keys: ↑, ↓, PageUp, and PageDown.
- If you accept the AO Kaspersky Lab End User License Agreement, select the I accept button and press Enter.
This opens a window with the text of the AO Kaspersky Lab Privacy Policy.
- Read the AO Kaspersky Lab Privacy Policy.
- If you accept the terms and conditions of the AO Kaspersky Lab Privacy Policy, select the I accept button and press Enter.
The Setup Wizard proceeds to the next step.
To accept the terms and conditions of the End User License Agreement and the Privacy Policy when installing the components based on the Astra Linux operating system:
- Select the language for viewing the End User License Agreement for Astra Linux operating systems from the list by pressing the F1 key and press Enter.
This opens a window with the text of the Astra Linux End User License Agreement.
- Read the End User License Agreement of the Astra Linux operating systems.
To move up and down, you can use the keys: ↑, ↓, PageUp, and PageDown.
- If you accept the terms and conditions of the End User License Agreement of Astra Linux operating systems, select Yes and press Enter.
This opens a window in which you can select the language for viewing the AO Kaspersky Lab End User License Agreement and Privacy Policy.
- Select the language for viewing the AO Kaspersky Lab End User License Agreement and Privacy Policy in the list and press Enter.
This opens a window with the text of the AO Kaspersky Lab End User License Agreement.
- Read the AO Kaspersky Lab End User License Agreement.
To move up and down, you can use the keys: ↑, ↓, PageUp, and PageDown.
- If you accept the terms and conditions of the AO Kaspersky Lab End User License Agreement, select the I accept button and press Enter.
This opens a window with the text of the AO Kaspersky Lab Privacy Policy.
- Read the AO Kaspersky Lab Privacy Policy.
- If you accept the terms and conditions of the AO Kaspersky Lab Privacy Policy, select the I accept button and press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 2. Selecting a server role
To select a server role:
- Select one of the following options:
- storage.
This role is for installing a storage server for deploying the Central Node component as a cluster.
- processing.
This role is for installing a processing server for deploying the Central Node component as a cluster.
The role also includes the installation and configuration of the Sensor component.
- single.
This role is for installing the Central Node and Sensor components on the same server.
- sensor.
This role is for installing the Sensor component on a standalone server.
- storage.
- Press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 3. Selecting a disk for installing the component
You need at least 150 GB of disk space. If less than 150 GB of disk space is available, the installation finishes with an error.
To select a disk for installing the component:
- Select one of the suggested drives for installing the component and press Enter.
The confirmation window is displayed.
- Select Yes and press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 4. Selecting a network mask for cluster server addressing
We recommend using the default value.
The netmask may not match netmasks used in the organization's infrastructure.
To specify the network mask for cluster server addressing:
- If you want to use the predefined value for the network mask, select the Ok button and press Enter.
Default value: 198.18.0.0/16.
- If you want to specify a different network mask, in the Subnet field, enter your value, select the Ok button, and press Enter.
The mask must match the template: x.x.0.0/16.
The Setup Wizard proceeds to the next step.
Page topStep 5. Selecting a network mask for addressing of application components
We recommend using the default value.
The network for application component addressing must not overlap with the network for cluster server addressing.
To specify the network mask for addressing the main components of the application:
- If you want to use the predefined value for the network mask, select the Ok button and press Enter.
Default value: 198.19.0.0/16.
- If you want to specify a different network mask, in the Bridge/overlay subnets field, enter your value, select the Ok button, and press Enter.
The mask must match the template: x.x.0.0/16.
The Setup Wizard proceeds to the next step.
Page topStep 6. Selecting the cluster network interface
The cluster network interface is used for communication between cluster servers.
To select the cluster network interface:
- Select the row containing the network interface that is used for the internal network.
To select a row, you can use the ↑, ↓, PageUp, and PageDown keys. The selected row is highlighted in red.
- Press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 7. Selecting the external network interface
The external network interface is used for SSH access to the server, managing the web interface of Kaspersky Anti Targeted Attack Platform, and other external connections.
To select the external network interface:
- Select the row containing the network interface that is used for the external network.
To select a row, you can use the ↑, ↓, PageUp, and PageDown keys. The selected row is highlighted in red.
- Press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 8. Selecting the method of obtaining IP addresses for network interfaces
To select a method for obtaining an IP address for network interfaces:
- Select the row containing the Configuration type: and press Enter.
To select a row, you can use the ↑, ↓, PageUp, and PageDown keys. The selected row is highlighted in red.
- In the opened window, select one of the following options:
- dhcp.
- static.
- If you selected static:
- Select the row containing the parameter and press the Enter key.
- In the opened window, enter the required data and press Enter twice.
You need to specify a value for each parameter.
- Select the row containing Save.
- Press Enter.
The Setup Wizard proceeds to the next step.
Page topStep 9. Authenticating the server in the cluster
To authenticate a server in the cluster, you need to enter the admin account password that was set when the first server in the cluster was deployed.
To authenticate a server in the cluster:
- In the password field, enter the password for the administrator account.
- Select Ok and press Enter.
To select a button, you can use the ↑, ↓, PageUp, and PageDown keys.
The server in the cluster will be authenticated. The Setup Wizard proceeds to the next step.
Page topStep 10. Configuring receipt of mirrored traffic from SPAN ports
To turn on receipt of mirrored traffic from SPAN ports:
- This opens a window, in that window, select Yes and press Enter.
- In the displayed list, select the network interfaces from which you want to capture network traffic.
- Select the line containing Apply and finish and press Enter.
The configuration may take some time. Then the installation is complete. For the application to work correctly, you need to configure the server in the web interface for sizing management.
To turn off receipt of mirrored traffic from SPAN ports:
- This opens a window, in that window, select No and press Enter.
The configuration may take some time. Then the installation is complete. For the application to work correctly, you need to configure the server in the web interface for sizing management.
Page topPurging hard drives on storage servers
If you have a cluster deployed on servers and want to add more hard drives to these servers or replace some of the existing drives and then reinstall the cluster, you must purge the drives previously allocated for the OSD (Object Storage Daemon) on the storage servers before installing components. Otherwise, the application is not guaranteed to work correctly.
To purge the disks allocated for OSD on a live storage server:
- Sign in to the management console of the server where you want to purge the disks over SSH or through the terminal.
- Stop the OSD starter service by running
sudo
systemctl stop kata-osd-starter.service
. - Stop OSD containers by running
sudo
docker ps --filter name=osd -q | xargs docker stop
. - Get a list of OSD disks by running
sudo
ceph-volume --cluster ceph lvm list | grep devices
. - Purge these disks by running
sudo
ceph-volume lvm zap --destroy /dev/<disk name>
.You must run this command for each drive that you got at step 4. For example:
sudo
ceph-volume lvm zap --destroy /dev/sda
.
The OSD daemon is removed from the disks.
If the server is not live, you must delete the information about volume groups from each disk allocated for the OSD.
To delete the information about volume groups from each disk allocated for the OSD on a non-live server:
- Start the server with the alternative operating system.
- Get group IDs for each disk allocated for the OSD using the
sudo
pvs
command.This command outputs a table where
PV
are physical volumes,VG
indicates logical group membership,Fmt
indicates the volume format, andSize
indicates the physical volume size. - Remove the relevant volume groups by running
sudo
vgremove <volume group ID>
.
Information about volume groups on disks allocated for OSD is deleted.
Page top