Linux UCT-V Installation
You can install UCT-V on various Linux distributions using Debian or RPM packages.
Refer to the following sections for the Linux UCT-V installation:
- Single Network Interface Configuration
- Multiple Network Interface Configuration
- Linux Network Firewall Requirements
- Install UCT-Vs
Single Network Interface Configuration
A single network interface card (NIC) acts both as the source and the destination interface. A UCT-V with a single network interface configuration lets you monitor the ingress or egress traffic from the network interface. The monitored traffic is sent out using the same network interface.
For example, assume that there is only one interface eth0 in the monitoring instance. In the UCT-V configuration, you can configure eth0 as the source and the destination interface, and specify both egress and ingress traffic to be selected for monitoring purpose. The egress and ingress traffic from eth0 is mirrored and sent out using the same interface.
Using a single network interface card as the source and the destination interface can sometimes cause increased latency in sending the traffic out from the instance.
Example of the UCT-V configuration file for a single NIC configuration:
Grant permission to monitor ingress and egress traffic at iface
# eth0 m
irror-src-ingress mirror-src-egress mirror-dst
Multiple Network Interface Configuration
A UCT-V lets you configure two network interface cards (NICs). One network interface card can be configured as the source interface and another network interface card can be configured as the destination interface.
For example, assume that there is eth0 and eth1 in the monitoring instance. In the UCT-V configuration, eth0 can be configured as the source interface and egress traffic can be selected for monitoring purpose. The eth1 interface can be configured as the destination interface. So, the mirrored traffic from eth0 is sent to eth1. From eth1, the traffic is sent to the GigaVUE V Series Node.
Example of the UCT-V configuration file for a dual NIC configuration:
Grant permission to monitor ingress and egress traffic at iface
#
'eth0' to monitor and 'eth1' to transmit the mirrored packets.
# eth0 m
irror-src-ingress mirror-src-egress
# eth1 m
irror-dst
Linux Network Firewall Requirements
If Network Firewall requirements or security groups are configured in your environment, then you must open the following ports for the virtual machine. Refer to Security Group for OpenStack to know more details on the firewall requirements or security groups required for your environment.
Direction |
Port |
Protocol |
CIDR |
Purpose |
---|---|---|---|---|
Inbound |
9901 |
TCP |
UCT-V Controller IP |
Allows UCT-V to receive control and management plane traffic from UCT-V Controller |
You can use the following commands to add the Network Firewall rule.
sudo firewall-cmd --add-port=9901/tcp
sudo firewall-cmd --runtime-to-permanent
Install UCT-Vs
You must have sudo/root access to edit the UCT-V configuration file.
For dual or multiple network interface configuration, you may need to modify the network configuration files to make sure that the extra NIC/Network Interface will initialize at boot time.
Prerequisites
Before installing UCT-V.deb or .rpm packages on your Linux VMs, ensure you have the following packages:
Python3 |
Python3-pip |
Python modules |
netifaces |
urllib3 |
requests |
iproute-tc for RHEL and CentOS VMs |
Note: When using Amazon Linux version 2, ensure iproute-tc package is installed first.
You can install the UCT-Vs either from Debian or RPM packages.
Refer to the following topics for details: