Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Aura tab collection
paramsJTdCJTIyZ2VuZXJhbCUyMiUzQSU3QiUyMnRhYlNwYWNpbmclMjIlM0EwJTJDJTIydGFiV2lkdGglMjIlM0ExMDAlMkMlMjJ0YWJIZWlnaHQlMjIlM0E1MCUyQyUyMmRpcmVjdGlvbiUyMiUzQSUyMmhvcml6b250YWwlMjIlN0QlMkMlMjJjb250ZW50JTIyJTNBJTdCJTIyYmFja2dyb3VuZENvbG9yJTIyJTNBJTdCJTIyY29sb3IlMjIlM0ElMjIlMjNmZmYlMjIlN0QlMkMlMjJib3JkZXIlMjIlM0ElN0IlMjJzdHlsZSUyMiUzQSUyMnNvbGlkJTIyJTJDJTIyd2lkdGglMjIlM0ExJTJDJTIydG9wJTIyJTNBdHJ1ZSUyQyUyMmJvdHRvbSUyMiUzQXRydWUlMkMlMjJsZWZ0JTIyJTNBdHJ1ZSUyQyUyMnJpZ2h0JTIyJTNBdHJ1ZSUyQyUyMmNvbG9yJTIyJTNBJTdCJTIybGlnaHQlMjIlM0ElMjIlMjNjY2NlY2YlMjIlN0QlN0QlMkMlMjJwYWRkaW5nJTIyJTNBJTdCJTIydG9wJTIyJTNBMTAlMkMlMjJyaWdodCUyMiUzQTEwJTJDJTIyYm90dG9tJTIyJTNBMTAlMkMlMjJsZWZ0JTIyJTNBMTAlN0QlN0QlMkMlMjJhY3RpdmUlMjIlM0ElN0IlMjJiYWNrZ3JvdW5kQ29sb3IlMjIlM0ElN0IlMjJjb2xvciUyMiUzQSU3QiUyMmxpZ2h0JTIyJTNBJTIyJTIzZjU4MjI3JTIyJTdEJTdEJTJDJTIydGV4dCUyMiUzQSU3QiUyMmZvbnRTaXplJTIyJTNBMTYlMkMlMjJjb2xvciUyMiUzQSU3QiUyMmxpZ2h0JTIyJTNBJTIyJTIzMDAwMDAwJTIyJTdEJTJDJTIydGV4dEFsaWduJTIyJTNBJTIybGVmdCUyMiUyQyUyMmZvbnRXZWlnaHQlMjIlM0ElMjJib2xkJTIyJTdEJTdEJTJDJTIyaG92ZXIlMjIlM0ElN0IlMjJiYWNrZ3JvdW5kQ29sb3IlMjIlM0ElN0IlMjJjb2xvciUyMiUzQSUyMiUyM2RmZTFlNiUyMiU3RCUyQyUyMnRleHQlMjIlM0ElN0IlMjJmb250U2l6ZSUyMiUzQTE4JTJDJTIyY29sb3IlMjIlM0ElMjIlMjM1ZTZjODQlMjIlMkMlMjJ0ZXh0QWxpZ24lMjIlM0ElMjJsZWZ0JTIyJTJDJTIyZm9udFdlaWdodCUyMiUzQSUyMmxpZ2h0ZXIlMjIlN0QlN0QlMkMlMjJpbmFjdGl2ZSUyMiUzQSU3QiUyMmJhY2tncm91bmRDb2xvciUyMiUzQSU3QiUyMmNvbG9yJTIyJTNBJTIyJTIzZjRmNWY3JTIyJTdEJTJDJTIydGV4dCUyMiUzQSU3QiUyMmZvbnRTaXplJTIyJTNBMTYlMkMlMjJjb2xvciUyMiUzQSUyMiUyMzVlNmM4NCUyMiUyQyUyMnRleHRBbGlnbiUyMiUzQSUyMmxlZnQlMjIlMkMlMjJmb250V2VpZ2h0JTIyJTNBJTIybGlnaHRlciUyMiU3RCUyQyUyMmJvcmRlciUyMiUzQSU3QiUyMnRvcCUyMiUzQXRydWUlMkMlMjJsZWZ0JTIyJTNBdHJ1ZSUyQyUyMnJpZ2h0JTIyJTNBdHJ1ZSUyQyUyMmJvdHRvbSUyMiUzQXRydWUlMkMlMjJ3aWR0aCUyMiUzQTElMkMlMjJzdHlsZSUyMiUzQSUyMnNvbGlkJTIyJTJDJTIyY29sb3IlMjIlM0ElN0IlMjJsaWdodCUyMiUzQSUyMiUyM2NjY2VjZiUyMiU3RCU3RCU3RCU3RA==
Aura tab
summaryAWS
paramsJTdCJTIydGl0bGUlMjIlM0ElMjJBV1MlMjIlN0Q=
  1. Open the AWS console.

  2. In the search bar, type Target groups. A list is displayed. Click Target groups.

  3. On the Target groups page, click Create target group.

  4. On the Specify group details page, complete the following:

Area

Parameter

Description

Basic Configuration

Choose a target type

Select the Instances option for the target type.

Target group name

Enter a unique target group name.
For example, KyvosRepoting

Protocol: Port

  1. Enter Protocol as HTTP or HTTPS.

  2. Enter port.

NOTE:

  • The recommended option is to use the same protocol as used for Kyvos Web Portal.

  • If you use the existing port that is already in use, then modify the already existing rule for that port. Refer to step 13, as mentioned below.
    In case, you use a new port, add a new rule for that port. Refer to step 14, as mentioned below.

IP address type

Select the IPv4 option.

VPC

Select the VPC with the instances that you want to include in the target group.

Protocol version

Select the HTTP 1 option.

Health Checks

Health check protocol

Select the Health check Protocol as HTTP.

Health check path

Enter the health check path as
/kyvosreporting/

  1. Click Next. The Register Targets page is displayed.

  2. Select the instance from the list that is used for running Kyvos Reporting Service.

  3. Enter the port 8080 for the selected instance that is used for running Kyvos Reporting Service.

  4. Click Include as pending below. It will show the added instance under the Review targets section.

  5. Click Register pending targets. It will register the pending targets to the Target group.

  6. Click Create Target Group. The target group is created. After creating Target group, you need to configure Load Balancer for Listener

  7. Navigate EC2 > Load Balancer and then search for the Load Balancer that is being used for Kyvos Web Portal.

  8. Click the Listeners and rules tab.

  9. If using an existing protocol:port that is listener, select the Add Rule option.

    Anchor
    step13
    step13

    1. From the Manage rules list, select Add Rule.
      While adding a rule on the Add Rule wizard, the following fields are mandatory.

    2. Select Protocol: Port checkbox.

    3. Enter a unique name for the rule, and then click Next. For example, KyvosReportingRule.

    4. On the Details rule conditions section, click Add Condition, and then click Next. Select the Rule condition type as Path from the list and click Confirm.

    5. On the Add condition section, add the Path section as /kyvosreporting and /kyvosreporting/* with ‘or’ condition. Click Confirm.

    6. Verify the path and click Next.

    7. In the Action types section, select the Forward to target groups option.

    8. Select the target group that is used for configuring Kyvos Reporting from the list.
      Note: Keep the remaining settings unchanged.

    9. Enter Priority as 2.

    10. Click Next. Confirm the Rule details and click Create. The rule is created.
      You can also delete the rule that you have created.

  10. If you want to use a new protocol:port that is a listener, select Add listener. The Add Listener page is displayed. Ensure that the new port should be reachable.

    Anchor
    step14
    step14

    1. In the Listener Configuration section, enter the required Protocol and Port.

    2. In the Routing actions section, select Forward to target groups.

    3. Select the Target group from the list that you wan to use for forwarding to request to Kyvos Reporting Service.

    4. Click Add. The listener is added to the Load balancer.

Aura tab
summaryAzure
paramsJTdCJTIydGl0bGUlMjIlM0ElMjJBenVyZSUyMiU3RA==
  1. Open Azure console.

  2. On the Home page, click Managed resource group.

  3. In the Search bar, type Load Balancer. Select the required Load Balancer from the list. enter Managed application center.

  4. Go to Marketplace application

  5. Select your Kyvos application.

  6. Click Managed resource group and then search for application gateway.

    image (58).pngImage Added
  7. In the Settings section of the left pane, click Backend Pool. On the Backend Pools page, click Add.

  8. On the Add backend Pool dialog box,

    1. Enter a name for the backend pool. For Example, KyvosReportingbackendpool

    2. Select No to add backend pool without targets.

    3. Select the Virtual Machine option from Target Type list, and then select the Kyvos Reporting Service node from Target list that you have already added.

    4. Click Save. The backend pool is added.

      image (51).png
  9. After adding backend pool, click Listener in the Settings section display in the left pane of the page. The Listeners page is displayed. Click Add.

  10. On the Listeners page, add Listener’s details such as,

    1. Enter name of the listener.

    2. Select Protocol as HTTP and Port as 8080.

    3. Select Listener type as Basic.

    4. Click Add. The Listener is added.

      image (52).png
  11. After adding a listener, you need to add Backend Settings display in the Settings section.

  12. Click Backend settings, the Backend settings dialog is displayed.

  13. On the Backend Settings dialog box, complete the fields as shown in the following page.

    image (53).png

    NOTE: First you need to select the No display in the Use a custom probe section and save without it. You must update it after creating the Health probe.
    The Backend settings are now saved.

  14. After saving the Backend settings, select the Frontend IP configurations from the Settings section display in the left pane.

  15. On the Frontend IP configurations page, ensure that the frontend IP address has Public IP configured. This IP will be used for Kyvos Reporting URL.

    image (54).png
  16. After verifying Frontend IP configurations, click a Rule display in the Settings section. On the Rules page, click Add.

    image (55).png
  17. On the Rules page, complete the fields as shown in the following image.

    1. Enter a rule name.

    2. Enter Priority as 4.

    3. Click the Backend Targets tab, and then select the backend target and backend settings you have created.

    4. Click Save. The rule is created.

  18. After creating a rule, click Health probes from the Settings section display in the left pane. On the Health Probes page, click Add.

    image (56).png
  19. On the Health probe dialog, complete the following fields.

    1. Enter a name for the health probe.

    2. Select protocol.

    3. Select the No option to pick host name from backend settings.

    4. Enter the Host name.

    5. Enter the Kyvos Reporting path as /kyvosreporting/

    6. Enter Interval (seconds), Timeout (seconds), Unhealthy threshold.

    7. Select the Yes option to use probe matching conditions.

    8. Enter the HTTP response status code match.

    9. Select backend settings from the list that you have created.

    10. Click Test to verify the backend health before adding the health probe.

    11. Click Test. After successful test, click Save.

Aura tab
summaryGCP
paramsJTdCJTIydGl0bGUlMjIlM0ElMjJHQ1AlMjIlN0Q=
Panel
panelIconIdatlassian-note
panelIcon:note:
bgColor#DEEBFF

For GCP, you must configure Load Balancer. To do this, refer to the Configuring External Load Balancer for GCP section.

  1. Go the Instance Group used in Load Balancer.

  2. Edit the Instance Group.

  3. From the VM Instances list, select the VMs on which you want to use this backend service.

    image-20240125-132312.png
  4. Click Save.

...

Aura tab collection
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
Aura tab
summaryAWS
paramsJTdCJTIydGl0bGUlMjIlM0ElMjJBV1MlMjIlN0Q=
Panel
panelIconIdatlassian-note
panelIcon:note:
bgColor#DEEBFF

Before deleting target group, you must delete the rule that is using that target group.

Step:1 Removing a rule

  1. Open AWS console.

  2. Go to EC2 > Load balancers, and then navigate to the Load balancer you have created. The Load balancer page is displayed.

  3. Navigate to the Listening and rules section, and then select the rule you want to delete.

  4. From the Actions list, select Delete rule. On the confirmation message, click Delete. The rule is deleted.

Step:2 Removing Target group

  1. Navigate EC2 > Load Balancer and then search for the Load Balancer that is being used for Kyvos Reporting Service.

  2. Click the Listeners and rules tab.

  3. If the listener is the same then you must delete the rule associated with that listener that is forwarding request to the Kyvos Reporting Target group. If you are using a listener that is having a single rule, then the listener is itself deleted.

  4. Go to EC2 > Target groups.

  5. Search your target group that is being used for Kyvos Reporting.

  6. Select the target group and then click Delete from the Actions list.

Aura tab
summaryAzure
paramsJTdCJTIydGl0bGUlMjIlM0ElMjJBenVyZSUyMiU3RA==
  1. Open Azure console.

  2. Go to Kyvos Application.

  3. Click Managed resource group.

  4. In overview tab, search for application gateway

  5. Delete a rule that you have created.

  6. Delete a backend pool that you have created.

  7. Delete backend settings that you have created.

  8. Delete listener that you have created.  

  9. Delete health probe that you have created.

Aura tab
summaryGCP
paramsJTdCJTIydGl0bGUlMjIlM0ElMjJHQ1AlMjIlN0Q=
  1. Go the Instance Group used in Load Balancer.

  2. Edit the Instance Group.

  3. Using the minus icon in the VM Instances list, you can remove the VMs that you no longer require for this backend service.

    image-20240125-132542.png
  4. Click Save.