KHIKA User Guide

From khika
Jump to navigation Jump to search

File:Example.jpgUnder construction. The user guide to come here.

Accessing the KHIKA Gui

Login

In this section we assume that your VM is ready. You can login into the GUI using the Web Browser (Google Chrome) for further configuration of KHIKA. Note: KHIKA does not support any browser apart from Google Chrome.

Open the Google Chrome browser and enter IP address of KHIKA server. The URL is in the format : "https://IP_address_of_KHIKA_App_Server"

Note that the certificate for the web server is self-signed and hence the browse will warn you at this. You may ignore this warning and proceed.


Login1.jpg


Click Advanced to proceed to get below message


Login2.jpg


Following landing page for user login appears.


Login3.jpg


If you wish to install your own certificate, please perform below steps

  • Login to the appliance using ‘khika’ user using your favourite ssh client
  • cd /opt/KHIKA/kibana/config
  • Open kibana.yml in ‘vi’ editor
  • Locate section ‘server.ssl.enabled’. It looks like below


Login4.jpg


The default self-signed certificates are installed in following directory: /opt/KHIKA/3rdpartyUnix/Apache24/conf/

Note that KHIKA supports PEM-Format SSL certificates. Please refer to the documentation of your certificate vendor to convert your certificates into the PEM format, if they are in any other format.

  • After you have the .crt (i.e. the certificate) and the .key (i.e. private key) files, copy them in /opt/KHIKA/3rdpartyUnix/Apache24/conf/ directory.
  • Change the filenames (and directory paths if you have copied the certificate and key anywhere else) if required in kibana.yml file
  • Make sure that the ‘server.ssl.certificate’ stanza points to the full path of the certificate and ‘server.ssl.key’ stanza points to the full path of the private keys.
  • After editing and saving kibana.yml, come to the command prompt. Enter cd /opt/KHIKA and fire command “./khika_appserver.sh stop”
  • Wait for some time (2 to 3 minutes)
  • Fire command ‘./khika_appserver.sh start’ from /opt/KHIKA directory
  • Connect using the fresh session of the browser
  • Login using default credentials (i.e. username = admin, password = admin).


Change the password

After logging in for the first time (default user=admin and password=admin), it is recommended to change the password. Steps are mentioned below :

Select “Configure” screen from the left pane


Pwd1.jpg


Click on “Users” tab


Pwd2.jpg


Click on “Change Password” button


Pwd3.jpg


Type the desired password in “New Password” and “Confirm Password” fields. Click on “Change password”


Pwd4.jpg


Creating a User Group

You must be an “admin” user and a user in “admin group” for managing Users and User Groups. A User Group is like a team, in which you can add/remove team members (Users) and assign roles to them. One single User Group is mapped to a Workspace. We can decide which users are a part of this group, and hence can get access to the data in this Workspace. User groups are primarily created to restrict access to Workspaces, and thus data in them. Following are the steps to create a new User Group :

In the “Configure” screen, click on “User Groups” tab.


Ug1.jpg


Click on “Create Group” button


Ug2.jpg


Type say, “network_team” for Group Name field and click on “Add”


Ug3.jpg


We have now successfully created a User Group. This can be mapped to a workspace. However, while creating a User Group itself, we can add Users to it as well. Creating Users, Creating User group, Creating Workspace and Mapping Workspace to User Group are dependent on each other.


Creating a Workspace

Workspace is a logical grouping of data sources clubbed together. Workspace consists of :

  • Data Aggregator – the collector component from where the data is to be pulled.
  • Adapters - data collection programs (or scripts) run by the Data Aggregator that convert the raw data to indexed normalised format.

A single Data Aggregator may have multiple Adapters under it. Only a user with “Admin” role can create a new Workspace. You may want to create multiple workspaces for separating data of multiple devices. When different user groups are assigned to each Workspace, each team has access to and can monitor its own separate devices and data. For example, if you have Linux and Windows servers you can make a separate workspace for Linux team and add Linux devices in it and a separate one for Windows workspace and add windows devices in it. Further if there are multiple locations like say Pune and Jamshedpur, you can create separate workspaces for Linux Pune and Linux Jamshedpur teams. Please Note : Multiple workspaces of a single location share one aggregator of that location. For creating a workspace, follow the steps as mentioned below :

In the “Configure” screen, select “Workspace” tab


Workspace1.jpg


Click on “Add Workspace” button


600px


Enter name of the Workspace as “Firewall” in the Workspace Name field. This should be an alpha-numeric string without white spaces. Enter Data Retention (time-to-live) period in days as 30 or 60 days (depending on how long you want to retain the data).

Note on Data Retention in KHIKA: - KHIKA stores data on the local disk. The amount of data that KHIKA can store is only limited by the amount of disk you have. Data can be categorized into two types:

  1. Raw/Log Data (raw messages converted into key-value pairs)
  2. Report Data (i.e. the summarized data derived from the raw logs)

Select the User Group in which you want to add the Workspace from the Group drop-down list.


Workspace3.jpg


Click on the “Node” Tab. Select “localhost” as the node here and click on “Add”. Data size field – you can keep it as default value for now.