Kaspersky Next XDR Expert

Single-node deployment: Preparing the administrator and target hosts

Preparing for a single-node deployment includes configuring the administrator and target hosts. In the single-node configuration, the Kubernetes cluster and Kaspersky Next XDR Expert components are installed on one target host. After preparing the target host and specifying the configuration file, you will be able to deploy Kaspersky Next XDR Expert on the target host by using KDT.

Preparing the administrator host

You first need to prepare a device that will act as the administrator host from which KDT will launch. This host can be either included in the Kubernetes cluster that is created by KDT during the deployment or not. If the administrator host is not included in the cluster, it will be used only to deploy and manage the Kubernetes cluster and Kaspersky Next XDR Expert. If the administrator host is included in the cluster, it will also act as a target host that is used for operation of Kaspersky Next XDR Expert components. In this case, only one host will be used for deployment and operation of the solution.

To prepare the administrator host:

  1. Make sure that the hardware and software on the administrator host meet the requirements for KDT.
  2. Allocate at least 10 GB of free space in the temporary files directory (/tmp) for KDT. If you do not have enough free space in this directory, run the following command to specify the path to another directory:

    export TMPDIR=<new_directory>/tmp

  3. Install the package for Docker version 23 or later, and then perform the post-installation steps to configure the administration host for proper functioning with Docker.

    Do not install unofficial distributions of Docker packages from the operating system maintainer repositories.

  4. For the administrator host that will be included in the cluster, perform additional preparatory steps:
    1. Since the device will act as the administrator and target host, make sure that it meets the requirements for the single-node deployment.
    2. Make sure that the cgroup v2 technology is supported on the administrator host.

      The cgroup v2 technology is supported for the Linux kernel version 2.6.24 or later.

Preparing the target host

The target host is a physical or virtual machine that is used to deploy Kaspersky Next XDR Expert and included in the Kubernetes cluster. The target host manages the Kubernetes cluster, stores metadata, as well as the Kaspersky Next XDR Expert components work on this host. A minimum cluster configuration for the single-node deployment includes one target host, which acts as the primary and worker nodes. On this primary worker node, the Kubernetes cluster and Kaspersky Next XDR Expert components are installed.

If you want to run the Kaspersky Next XDR Expert deployment from the target host, you must prepare this host as the administrator host, as described in the previous procedure, and then perform the preparing for the target host.

To prepare the target host:

  1. Make sure that the hardware and software on the target host meet the requirements for the single-node deployment.

    Since the DBMS will be installed on the target host, you also need to make sure that the target host meets the requirements for the DBMS.

    For proper functioning of Kaspersky Next XDR Expert, the Linux kernel version must be 5.15.0.107 or later on the target host with the Ubuntu family operating systems.

    Do not install Docker on the target host unless the target host will be used as the administrator host. KDT will install all necessary software and dependencies during the deployment.

  2. Install the DBMS on the target host.

    You must install the DBMS before the Kaspersky Next XDR Expert deployment, because in this case the DBMS and Kaspersky Next XDR Expert components will be installed on the same target host, and the DBMS will not be included in the Kubernetes cluster.

  3. Install the sudo package, if this package is not already installed. For Debian family operating systems, install the UFW package.
  4. Configure the /etc/environment file. If your organization's infrastructure uses a proxy server to access the internet, configure the internet access by using the proxy server on the target hosts.
  5. If the primary worker node has the UFW configuration, allow IP forwarding. In the /etc/default/ufw file, set DEFAULT_FORWARD_POLICY to ACCEPT.
  6. Provide access to the package repository that stores the following packages required for Kaspersky Next XDR Expert:
    • nfs-common
    • tar
    • iscsi-package
    • wireguard
    • wireguard-tools

    KDT will try to install these packages during the deployment from the package repository. You can also install these packages manually.

  7. Ensure that the curl and libnfs packages are installed on the primary worker node.

    The curl and libnfs packages are not installed during the deployment from the package repository by using KDT. You must install these packages manually, if they are not already installed. The libnfs package version 12 and later is used.

  8. Reserve static IP addresses for the target host and for the Kubernetes cluster gateway.

    The Kubernetes cluster gateway is intended for connecting to the Kaspersky Next XDR Expert components installed inside the Kubernetes cluster. The gateway IP address is an IPv4 address (for example, 10.80.23.182). It is specified in the configuration file (the ingress_ip parameter).

    Make sure that the target host and the Kubernetes cluster gateway are located in the same broadcast domain.

  9. On your DNS server, register the service FQDNs to connect to the Kaspersky Next XDR Expert services.

    By default, the Kaspersky Next XDR Expert services are available at the following addresses:

    • <console_host>.<smp_domain>—Access to the OSMP Console interface.
    • <admsrv_host>.<smp_domain>—Interaction with Administration Server.
    • <kuma_host>.<smp_domain>—Access to the KUMA Console interface.
    • <api_host>.<smp_domain>—Access to the Kaspersky Next XDR Expert API.
    • <monitoring_host>.<smp_domain>—Access to OSMP metrics.

      Where <console_host>, <admsrv_host>, <kuma_host>, and <api_host>, and <monitoring_host> are service host names, <smp_domain> is a service domain name. These parameters are parts of the service FQDNs, which you can specify in the configuration file. If you do not specify custom values of service host names, the default values are used: console_host—"console", admsrv_host—"admsrv", kuma_host—"kuma", api_host—"api", monitoring_host—"monitoring".

    The listed service FQDNs must be resolved to the IP address of the Kubernetes cluster as follows:

    • <console_host>.<smp_domain>—10.80.23.182
    • <admsrv_host>.<smp_domain>—10.80.23.182
    • <kuma_host>.<smp_domain>—10.80.23.182
    • <api_host>.<smp_domain>—10.80.23.182
    • <monitoring_host>.<smp_domain>—10.80.23.182
  10. Create the user accounts that will be used for the Kaspersky Next XDR Expert deployment.

    These accounts are used for the SSH connection and must be able to elevate privileges (sudo) without entering a password. To do this, add the created user accounts to the /etc/sudoers file.

  11. Configure the SSH connection between the administrator and target hosts:
    1. On the administrator host, generate SSH keys by using the ssh-keygen utility without a passphrase.
    2. Copy the public key to the target host (for example, to the /home/<user_name>/.ssh directory) by using the ssh-copy-id utility.

      If you use the target host as the administrator host, you must copy the public key to it, too.

  12. For proper function of the Kaspersky Next XDR Expert components, open the required ports on the firewall of the administrator and target hosts, if necessary.
  13. Configure time synchronization over Network Time Protocol (NTP) on the administrator and target hosts.
  14. If necessary, prepare custom certificates for working with Kaspersky Next XDR Expert public services.

    You can use one intermediate certificate that is issued off the organization's root certificate or leaf certificates for each of the services. The prepared custom certificates will be used instead of self-signed certificates.