Configure GigaVUE Fabric Components using AWS

This section provides step-by-step information on how to register GigaVUE fabric components using AWS EC2 or a configuration file.

Recommended Instance Type

The following table lists the recommended instance type for deploying the fabric components:

Fabric Component Machine type
GigaVUE V Series Node c5n.xlarge
UCT-V Controller t2.medium

Deployment Guidelines

Points to remember before deploying the fabric components using generic mode:

  • Set the correct MTU for tunnels: Use 8950 for IPv4 tunnels and 8930 for IPv6. To update the Traffic Acquisition Tunnel MTU:
    1. Select the monitoring domain.

    2. Select the Edit Monitoring Domain option.

    3. Enter the Traffic Acquisition Tunnel MTU value and select Save.

    Set the correct MTU before deploying the Monitoring Session. If not, you must undeploy and redeploy the session after updating the MTU.

  • When deploying the fabric components using generic mode, you must use the connection name as the subGroupName in the registration data.
  • You can also create a monitoring domain under Third Party Orchestration and provide the monitoring domain name and the connection name as groupName and subGroupName in the registration data. For details, refer to Create Monitoring Domain.
  • You can use only UCT-V or Customer Orchestrated Source as the traffic acquisition method when using generic mode.
  • When you deploy the fabric components using third party orchestration, you cannot delete the monitoring domain without unregistering the registered fabric components.
  • You can also upload custom certificates to GigaVUE V Series Nodes, GigaVUE V Series Proxy, and UCT-V Controller using your own cloud platform when deploying the fabric components. For details, refer to Install Custom Certificate.
  • GigaVUE V Series Node must have a minimum of two Networks Interfaces (NIC) attached to it, a management NIC and a data NIC. You can add both these interfaces when deploying the GigaVUE V Series Node in AWS. For details, refer to the Launch an instance using the Launch Instance Wizard topic in Amazon EC2 Documentation.

In your AWS EC2, you can configure the following GigaVUE fabric components:

Configure UCT-V Controller in AWS

You can configure more than one UCT-V Controller in a monitoring domain.

To register UCT-V Controller in AWS EC2, use any one of the following methods:

Register UCT-V Controller during Instance Launch

In your AWS EC2 portal, to launch the UCT-V Controller AMI instance and register UCT-V Controller using user data, follow these steps:

  1. On the Instances page of AWS EC2, click Launch instances. The Launch Instance wizard appears. For detailed information, refer to Launch an instance using the Launch Instance Wizard topic in Amazon EC2 Documentation.
  2. On the Step 3: Configure Instance Details tab, enter the User data as text in the following format and deploy the instance. The UCT-V Controller uses this user data to generate config file (/etc/gigamon-cloud.conf) used to register with GigaVUE-FM. You can also install custom certificates to UCT-V Controller, refer to the below table for details:

    Field

    User Data

    User data without custom certificate

    Copy
    #cloud-config
     write_files:
     - path: /etc/gigamon-cloud.conf
       owner: root:root
       permissions: '0644'
       content: |
         Registration:
            groupName: <Monitoring Domain Name>
            subGroupName: <Connection Name>
            user: <Username>
            password: <Password>
            remoteIP: <IP address of the GigaVUE-FM>
            sourceIP: <IP address of UCT-V Controller> (Optional Field)
            remotePort: 443

    User data with custom certificate

    Copy
    #cloud-config
     write_files:
     - path: /etc/cntlr-cert.conf
       owner: root:root
       permissions: "0644"
       content: |
          -----BEGIN CERTIFICATE-----
          <certificate content>
          -----END CERTIFICATE-----
     - path: /etc/cntlr-key.conf
       owner: root:root
       permissions: "400"
       content: |
          -----BEGIN PRIVATE KEY-----
          <private key content>
          -----END PRIVATE KEY-----
     - path: /etc/gigamon-cloud.conf
       owner: root:root
       permissions: '0644'
       content: |
         Registration:
             groupName: <Monitoring Domain Name>
             subGroupName: <Connection Name>
             user: <Username>
             password: <Password>
             remoteIP: <IP address of the GigaVUE-FM>
             sourceIP: <IP address of UCT-V Controller> (Optional Field)
             remotePort: 443

    Note:  The minimum value for the authentication key encryption length provided during the key generation is 2048.

  3. Navigate to Instances > Actions > Instance Settings > Edit user data and edit the user data.

The UCT-V Controller deployed in AWS EC2 appears on the Monitoring Domain page of GigaVUE‑FM.

Register UCT-V Controller after Instance Launch

To register UCT-V Controller after launching a Virtual Machine using a configuration file, follow these steps:

  1. Log in to the UCT-V Controller.
  2. Create a local configuration file (/etc/gigamon-cloud.conf) and enter the following user data.
    Copy
    Registration:
        groupName: <Monitoring Domain Name>
        subGroupName: <Connection Name>
        user: <Username>
        password: <Password>
        remoteIP: <IP address of the GigaVUE-FM>
        sourceIP: <IP address of UCT-V Controller> (Optional Field)
        remotePort: 443
  3. Restart the UCT-V Controller service.
    $ sudo service uctv-cntlr restart

Assign Static IP address for UCT-V Controller

By default, the UCT-V Controller gets assigned an IP address using DHCP. If you wish to assign a static IP address, follow these steps:

  1. Navigate to /etc/netplan/ directory.
  2. Create a new .yaml file. (Other than the default 50-cloud-init.yaml file)
  3. Update the file as shown in the following sample:
    Copy
    network:
      version: 2
      renderer: networkd
      ethernets:
        <interface>:                # Replace with your actual interface name (e.g., eth0)
          dhcp4: no
          dhcp6: no
          addresses:
            - <IPV4/24>             # e.g., 192.168.1.10/24
            - <IPV6/64>             # e.g., 2001:db8:abcd:0012::1/64
          nameservers:
            addresses:
              - <DNS_IPV4>          # e.g., 8.8.8.8
              - <DNS_IPV6>          # e.g., 2001:4860:4860::8888
          routes:
            - to: 0.0.0.0/0
              via: <IPV4_GW>        # e.g., 192.168.1.1
            - to: ::/0
              via: <IPV6_GW>        # e.g., 2001:db8:abcd:0012::fffe
                            
    Example netplan config:

    network:
      version: 2
      renderer: networkd
      ethernets:
        ens3:
          addresses:
             -192.168.1.10/24
             -2001:db8:1::10/64
          nameservers:
            addresses:
              -8.8.8.8
              -2001:4860:4860::8888
          routes:
            -to: 0.0.0.0/0
              via: 192.168.1.1
              metric: 100
            -to: ::/0
               via: 2001:db8:1::1
              metric: 100
  4. Save the file.
  5. Restart theUCT-V Controller service.
$ sudo service uctv-cntlr restart

The deployed UCT-V Controller registers with the GigaVUE‑FM. After successful registration, the UCT-V Controller sends heartbeat messages to GigaVUE‑FM every 30 seconds. If one heartbeat is missing, the fabric component status appears as Unhealthy. If more than five heartbeats fail to reach GigaVUE‑FM, tries to reach the UCT-V Controller. If that fails as well then GigaVUE‑FM unregisters the UCT-V Controller and it is removed from GigaVUE‑FM.

 

Configure UCT-V in AWS

Note:  Deployment of GigaVUE fabric components through a third-party orchestrator is supported on Linux and Windows platforms. detailed information on Linux and Windows UCT-V, refer to Linux UCT-V Installationand Windows UCT-V Installation

You must register UCT-V through the registered UCT-V Controller and communicates through PORT 8891.

To register UCT-V in AWS, use one of the following methods.

Register UCT-V during Instance Launch

Note:  Registering UCT-V during Virtual Machine Launch is not applicable for Windows Agents. You can register your Windows Agents after launching the Virtual machine, using a configuration file.

In your AWS EC2, to launch the UCT-V AMI instance and register the UCT-V using user data, follow these steps:

  1. On the Instances page of AWS EC2, click Launch instances. The Launch Instance wizard appears. For detailed information, refer to Launch an instance using the Launch Instance Wizard topic in Amazon EC2 Documentation.
  2. On the Step 3: Configure Instance Details tab, enter the User data as text in the following format and deploy the instance. The UCT-V uses this user data to generate config file (/etc/gigamon-cloud.conf) used to register with GigaVUE‑FM.
    Copy
    #cloud-config
     write_files:
     - path: /etc/gigamon-cloud.conf
       owner: root:root
       permissions: '0644'
       content: |
         Registration:
             groupName: <Monitoring Domain Name>
             subGroupName: <Connection Name>
             user: <Username>
             password: <Password>
             remoteIP: <IP address of the UCT-V Controller 1>, <IP address of the UCT-V Controller 2>
             sourceIP: <IP address of UCT-V> (Optional Field)
             remotePort: 8891
             
  3. Navigate to Instances > Actions > Instance Settings > Edit user data and edit the user data.

Register UCT-V after Instance Launch

Note:  You can configure more than one UCT-V Controller for a UCT-V, so that if one UCT-V Controller goes down, the UCT-V registration will happen through another Controller that is active.

To register UCT-V after launching a Virtual Machine using a configuration file, follow the steps given below:

  1. Install the UCT-V in the Linux or Windows platform. For detailed instructions, refer to Linux UCT-V Installation and Windows UCT-V Installation.

  2. Log in to the UCT-V.
  3. Create a local configuration file and enter the following user data.
    • /etc/gigamon-cloud.conf is the local configuration file in Linux platform.
    • C:\ProgramData\uctv\gigamon-cloud.conf is the local configuration file in Windows platform.
    • When creating C:\ProgramData\uctv\gigamon-cloud.conf file, ensure that the file name extension is .conf. To view the file name extension in Windows, follow the steps given below:
      1. Go to File Explorer and open the File Location.
      2. On the top navigation bar, click View.
      3. In the View tab, enable the File name extensions check box.
    Copy
    Registration:
        groupName: <Monitoring Domain Name>
        subGroupName: <Connection Name>
        user: <Username>
        password: <Password>
        remoteIP: <IP address of the UCT-V Controller 1>, <IP address of the UCT-V Controller 2>
        sourceIP: <IP address of UCT-V> (Optional Field)
        remotePort: 8891
    • You must configure User and Password in the User Management page. For details, refer to Configure Role-Based Access for Third Party Orchestration. Enter the UserName and Password created in the Add Users Section.

    • If you are using multiple interface in UCT-V and UCT-V Controller is not connected to the primary interface, then add the following to the above registration data:
      localInterface:<Interface to which UCT-V Controller is connected>
  4. Restart the UCT-V service.
    • Linux platform:
      $ sudo service uctv restart
    • Windows platform: Restart from the Task Manager.

The deployed UCT-V registers with the GigaVUE‑FM through the UCT-V Controller. After successful registration, the UCT-V sends heartbeat messages to GigaVUE‑FM every 30 seconds. If one heartbeat is missing, UCT-V status appears as Unhealthy. If more than five heartbeats fail to reach GigaVUE‑FM, then GigaVUE‑FM tries to reach UCT-V. If that fails as well, then GigaVUE‑FM unregisters the UCT-V. It is removed from GigaVUE‑FM .

Configure GigaVUE V Series Nodes and V Series Proxy in AWS

Note:  It is not mandatory to register GigaVUE V Series Nodes via V Series proxy however, if there is a large number of nodes connected to GigaVUE‑FM or if the user does not wish to reveal the IP addresses of the nodes, then you can register your nodes using GigaVUE V Series Proxy. In this case, GigaVUE‑FM communicates with GigaVUE V Series Proxy to manage the GigaVUE V Series Nodes.

To register GigaVUE V Series Node and GigaVUE V Series Proxy in AWS EC2, use any one of the following methods.

Register GigaVUE V Series Node and GigaVUE V Series Proxy during Instance Launch

  1. On the Instances page of AWS EC2, click Launch instances. The Launch Instance wizard appears. For detailed information, refer to Launch an instance using the Launch Instance Wizard topic in Amazon EC2 Documentation.
  2. On the Step 3: Configure Instance Details tab, enter the User data as text in the following format and deploy the instance. The GigaVUE V Series Nodes or V Series proxy uses this user data to generate config file (/etc/gigamon-cloud.conf) used to register with GigaVUE-FM.

    Field

    User Data

    User data without custom certificate

    Copy
    #cloud-config
     write_files:
     - path: /etc/gigamon-cloud.conf
       owner: root:root
       permissions: '0644'
       content: |
         Registration:
            groupName: <Monitoring Domain Name>
            subGroupName: <Connection Name>
            user: <Username>
            password: <Password>
            remoteIP: <IP address of the GigaVUE-FM> or <IP address of the Proxy>
            remotePort: 443

    User data with custom certificate

    Copy
    #cloud-config
     write_files:
     - path: /etc/cntlr-cert.conf
       owner: root:root
       permissions: "0644"
       content: |
          -----BEGIN CERTIFICATE-----
          <certificate content>
          -----END CERTIFICATE-----
     - path: /etc/cntlr-key.conf
       owner: root:root
       permissions: "400"
       content: |
          -----BEGIN PRIVATE KEY-----
          <private key content>
          -----END PRIVATE KEY-----
     - path: /etc/gigamon-cloud.conf
       owner: root:root
       permissions: '0644'
       content: |
         Registration:
             groupName: <Monitoring Domain Name>
             subGroupName: <Connection Name>
             user: <Username>
             password: <Password>
             remoteIP: <IP address of the GigaVUE-FM> or <IP address of the Proxy>
             remotePort: 443

    Note:  The minimum value for the authentication key encryption length provided during the key generation is 2048.

    • You can register your GigaVUE V Series Nodes directly with GigaVUE‑FM or you can use V Series proxy to register your GigaVUE V Series Nodes with GigaVUE‑FM. If you wish to register GigaVUE V Series Nodes directly, enter the remotePort value as 443 and the remoteIP as <IP address of the GigaVUE‑FM> or if you wish to deploy GigaVUE V Series Nodes using V Series proxy then, enter the remotePort value as 8891 and remoteIP as <IP address of the Proxy>.
    • User and Password must be configured in the User Management page. Refer to Configure Role-Based Access for Third Party Orchestration for more detailed information. Enter the UserName and Password created in the Add Users Section.
    You can navigate to Instances > Actions > Instance Settings > Edit user data and edit the user data.

Register GigaVUE V Series Node and GigaVUE V Series Proxy after Instance Launch

To register GigaVUE V Series Node and GigaVUE V Series Proxy after launching the virtual machine using a configuration file, follow the steps given below:

  1. Log in to the GigaVUE V Series Node or Proxy.
  2. Create a local configuration file (/etc/gigamon-cloud.conf) and enter the following user data.
    Copy
    Registration:
        groupName: <Monitoring Domain Name>
        subGroupName: <Connection Name>
        user: <Username>
        password: <Password>
        remoteIP: <IP address of the GigaVUE-FM> or <IP address of the proxy>
        remotePort: 443
    • You can register your GigaVUE V Series Nodes directly with GigaVUE‑FM or you can use GigaVUE V Series proxy to register your GigaVUE V Series Nodes with GigaVUE‑FM. If you wish to register GigaVUE V Series Nodes directly, enter the remotePort value as 443 and the remoteIP as <IP address of the GigaVUE‑FM> or if you wish to deploy GigaVUE V Series Nodes using V Series proxy then, enter the remotePort value as 8891 and remoteIP as <IP address of the Proxy>.
    • User and Password must be configured in the User Management page. Refer to Configure Role-Based Access for Third Party Orchestration for more detailed information. Enter the UserName and Password created in the Add Users Section.

  3. Restart the GigaVUE V Series Node or Proxy service. 
    • V Series node:
      $ sudo service vseries-node restart
    • V Series proxy:
      $ sudo service vps restart

The deployed GigaVUE V Series Proxy registers with the GigaVUE‑FM. After successful registration the GigaVUE V Series Proxy sends heartbeat messages to GigaVUE‑FM every 30 seconds. If one heartbeat is missing, the fabric component status appears as 'Unhealthy'. If more than five heartbeats fail to reach GigaVUE‑FM. then GigaVUE‑FM tries to reach the GigaVUE V Series proxy and if that fails as well then GigaVUE‑FM unregisters the GigaVUE V Series proxy and it will be removed from GigaVUE‑FM.

Note:  When the GigaVUE V Series Node is stopped or terminated from the AWS, it does not send any unregistration request and GigaVUE‑FM unregisters the V Series Node soon after.

Keep in mind the following when upgrading the GigaVUE‑FM to 6.1.00 or higher version (when using third party orchestration to deploy fabric components):

When upgrading GigaVUE‑FM to any version higher than 6.0.00 and if the GigaVUE V Series Nodes version deployed in that GigaVUE‑FM is lower than or equal to 6.0.00, then for the seamless flow of traffic, GigaVUE‑FM automatically creates Users and Roles in GigaVUE‑FM with the required permission. The username would be orchestration, and the password would be orchestration123A! for the user created in GigaVUE‑FM. Ensure there is no existing user in GigaVUE‑FM, with the username orchestration.

Once the upgrade is complete,we recommend to change the password on the Users page. For details, refer to Configure Role-Based Access for Third Party Orchestration.