Linux UCT-V Installation

You can install UCT-V on various Linux distributions using Debian or RPM packages.

Refer to the following sections for the Linux UCT-V installation:

Single Network Interface Configuration

A single network interface card (NIC) acts both as the source and the destination interface. A UCT-V with a single network interface configuration lets you monitor the ingress or egress traffic from the network interface. The monitored traffic is sent out using the same network interface.

For example, assume that there is only one interface eth0 in the monitoring instance. In the UCT-V configuration, you can configure eth0 as the source and the destination interface and specify both egress and ingress traffic to be selected for monitoring purposes. The egress and ingress traffic from eth0 is mirrored and sent out using the same interface.

Using a single network interface card as the source and the destination interface can sometimes cause increased latency in sending the traffic out from the instance.

Example of the UCT-V configuration file for a single NIC configuration:

Grant permission to monitor ingress and egress traffic at iface

            # eth0   mirror-src-ingress mirror-src-egress mirror-dst

Multiple Network Interface Configuration

A UCT-V lets you configure two network interface cards (NICs). One network interface card can be configured as the source interface and another network interface card can be configured as the destination interface.

For example, assume that there are eth0 and eth1 in the monitoring instance. In the UCT-V configuration, eth0 can be configured as the source interface and egress traffic can be selected for monitoring purpose. The eth1 interface can be configured as the destination interface. So, the mirrored traffic from eth0 is sent to eth1. From eth1, the traffic is sent to the GigaVUE V Series Node.

Example of the UCT-V configuration file for a dual NIC configuration:

Grant permission to monitor ingress and egress traffic at iface

# 'eth0' to monitor and 'eth1' to transmit the mirrored packets.
# eth0  mirror-src-ingress mirror-src-egress 
# eth1  mirror-dst

Loopback Network Interface Configuration

UCT-V supports the ability to tap and mirror the loopback interface. You can tap the loopback interfaces on the workload, which carries application level traffic inside the Virtual Machine itself. The loopback interface is always configured as a bi-directional traffic, regardless of the configurations provided in the configuration file.

Linux Network Firewall Requirements

If Network Firewall requirements or security groups are configured in your environment, then you must open the following ports for the virtual machine. Refer to Network Firewall Requirement for GigaVUE Cloud Suite to know more details on the firewall requirements or security groups required for your environment.

Direction

Port

Protocol

CIDR

Purpose

Inbound

9901

TCP

UCT-V Controller IP

Allows UCT-V to receive control and management plane traffic from UCT-V Controller

You can use the following commands to add the Network Firewall rule.

sudo firewall-cmd --add-port=9901/tcp

sudo firewall-cmd --runtime-to-permanent

Install UCT-Vs

You must have sudo/root access to edit the UCT-V configuration file.

For dual or multiple network interface configurations, you may need to modify the network configuration files to ensure that the extra NIC/Network Interface will initialize at boot time.

Prerequisites

Before installing UCT-V.deb or .rpm packages on your Linux VMs, ensure you have the following packages:

■   Python3
■   Python3-pip
■   Python modules
o   netifaces
o   urllib3
o   requests
■   iproute-tc for RHEL and CentOS VMs

Note:  When using Amazon Linux version 2, ensure iproute-tc package is installed first.

You can install the UCT-Vs either from Debian or RPM packages.

Refer to the following topics for details: