Cluster Requirements and Best Practices¶
This section focuses mostly on best practices for a NetEye deployment in a cluster environment, since system requirements for each Cluster Node correspond to those for a Single Node.
These guidelines are subject to change and should not be considered as hard requirements, because they may vary significantly depending on the running services and logging level.
The design of a network infrastructure in which NetEye is involved should be carefully designed in order to take advantage all of its functionalities, especially in the case of a particularly complex setup, in which the experience of a NetEye specialist can prove useful. To get in touch with one of them, please contact us at info@wuerth-phoenix.net.
Cluster Networking Requirements¶
This section illustrates in details the requirements and their rationale for all networking involving a NetEye Cluster: inbound, outbound (“Corporate Network”), and among the nodes composing the cluster (called “intra-cluster communication” or “Private (Heartbeat) Network” in the remainder).
The remainder of this section is therefore rather conversational, to summarize the content, we point out a few good practices:
setting up a (NetEye) Cluster requires a dedicated network for intra-cluster communication, separated from the Corporate Network
intra-cluster communication should be allowed freely without limitations
Each NetEye Cluster node should have its own IP Address in the Private Network
Corporate Network¶
Configuring the NetEye Cluster and allowing communication between Cluster and Corporate Network impacts several parts of networking and requires to open a number of ports. Key concepts and points to focus on include:
- Network Layer: Monitoring and Management Network
This network will be used by NetEye to collect monitoring and performance data, system logs and allow access to:
NetEye Web interface
Each node SSH interface
Any other running services
The bottom line for this network is that it must be able to access–and must be reached by–every system that needs to be monitored by NetEye.
- Network Link
Although a single NIC will suffice, to allow service continuity in case of hardware malfunction we suggest that you plan for bonding of two network adapters in an active/standby (failover) configuration.
- IP Addresses: Physical node
A dedicated IP address for each node. Each IP should be in the same network segment. This IP is used both for management tasks and active (from NetEye to devices) monitoring.
- IP Addresses: Management (iDRAC)
A dedicated IP address for the management interface of each node.
- Cluster Virtual IP Address
One IP address used by the clustered system to allow monitoring and management from the public network
Depending on the services enabled on the NetEye Cluster, a number of ports must be used for the communication flow with the Corporate Network.
In general, Satellite Nodes, while they are NetEye instances, do not need to respect all these requirements. Indeed, Satellite Nodes already communicate securely with the NetEye Master node using NATS/Tornado. Moreover, the purpose of Satellite Nodes is to monitor the infrastructure and collect data, therefore they only need to allow traffic for NATS (Master/Satellite communication), Icinga (monitoring), and Elastic (EBP and related services).
Private (Heartbeat) Network¶
Intra-cluster communication should be usually freely allowed. Key concepts and points to focus on include:
- Network Layer: Internal Communication Network
This network will be used for internal communication between each NetEye service. NetEye cluster nodes should be able to talk to each other without restriction. For security reasons, you should not share this network with other systems.
- Network Link
Although a single NIC will suffice, to allow service continuity in case of hardware malfunction we suggest that you plan for bonding of two network adapters in an active/standby (failover) configuration. Ensure inter-node, round-trip latency between each node is less than 300ms, with a target of 2ms as optimal, as stated in the RHEL Corosync documentation.”
- IP Addresses
Internal services running on a NetEye Cluster with all modules installed require at least 30 IP Addresses. It is therefore strongly recommended to always configure a dedicated /24 network (e.g., 172.20.12.0/24) to avoid running out of available IPs and being forced to reconfigure the whole network if the cluster is expanded.”
Note
None of these IPs should be publicly exposed, because they are used only by services running on the NetEye cluster.