Cloud-Ready

Kinetica is able to be easily deployed and scaled in a cloud environment making it cloud-ready. KAgent can be used to automatically provision as many instances as desired, install Kinetica, and link several clusters of instances together for high availability (if necessary). KAgent currently supports provisioning to the three major cloud infrastructure vendors:

By default, KAgent will provision new VMs into your public cloud account before installing Kinetica. If you already have VMs provisioned in an AWS, GCP, or Azure environment, you can use KAgent to install Kinetica on these machines as if they were on premise. However, note that these VMs should meet Kinetica's system requirements.

Supported Regions and Instances

If VMs are already provisioned within your preferred cloud vendor environment or you'd rather KAgent install to VMs you have manually provisioned (e.g., using the on premise installation path), Kinetica recommends the following instances and setup per vendor:

Important

If provisioning and installing via KAgent, the optimal storage for the Persist Tier will be automatically attached to the provisioned instances

VendorRecommended RegionsInstance TypesStorage Types
AWS
  • US East 1
  • US East 2
  • US West 1
  • US West 2

The KAgent installer contains the rest of the currently supported set of regions.

  • p2.xlarge, p2.8xlarge
  • p3.8xlarge

The KAgent installer contains the rest of the currently supported set of instance types.

Azure
  • Australia East
  • Canada Central
  • Central India
  • East US
  • East US 2
  • Japan East
  • Korea Central
  • North Central US
  • North Europe
  • South Central US
  • Southeast Asia
  • UK South
  • West Europe
  • West US 2

The KAgent installer contains the rest of the currently supported set of regions.

  • Standard_NC6s_v2, Standard_NC12s_v2, Standard_NC24s_v2
  • Standard_NC6s_v3, Standard_NC12s_v3, Standard_NC24s_v3
  • Standard_ND6s, Standard_ND12s, Standard_ND24s

The KAgent installer contains the rest of the currently supported set of instance types.

Note

Azure will automatically determine the the best storage depending on the type of instance provisioned

GCP

With GCP, regions control the types of GPUs available rather than the instance type itself. Because of this limitation, Kinetica recommends the following regions (if possible):

  • asia-east1-a, asia-east1-c
  • asia-northeast1-a, asia-northeast1-c
  • asia-northeast3-b, asia-northeast3-c
  • asia-south1-a, asia-south1-b
  • asia-southeast1-b, asia-southeast1-c
  • australia-southeast1-a, australia-southeast1-b australia-southeast1-c
  • europe-west1-b, europe-west1-d
  • europe-west2-a, europe-west2-b
  • europe-west3-b
  • europe-west4-a, europe-west4-b, europe-west4-c
  • northamerica-northeasteast1-a, northamerica-northeasteast1-b, northamerica-northeasteast1-c,
  • southamerica-east1-c
  • us-central1-a, us-central1-b, us-central1-c, us-central1-f
  • us-east1-b, us-east1-c, us-east1-d
  • us-east4-a, us-east4-b, us-east4-c
  • us-west1-a, us-west1-b
  • us-west2-b, us-west2-c

The KAgent installer contains the rest of the currently supported set of regions.

Kinetica's preferred GPUs can be attached to any of the following instances:

  • n1-standard-64
  • n1-highmem-32, n1-highmem-64
  • n1-ultramem-40

The KAgent installer contains the rest of the currently supported set of instance types.

Default Security

VMs will be provisioned in the cloud with the most restrictive security possible.

Port security is configured as follows.

PortsProtocolSourceDescription
AllAllIntra-clusterInternal node traffic
22TCPInternetSSH
8070TCPInternetAAW UI
8080-8082TCPInternetGAdmin, KAgent, Security Proxy
8088TCPInternetReveal
8443-8444TCPInternetGAdmin (HTTPS), Reveal (HTTPS)
9049TCPInternetetcd
9080TCPInternetLoki
9089-9091TCPInternetAlert Manager, Grafana, Prometheus
9191-9291TCPInternetDatabase API
9300TCPInternetHost Manager

Provider-specific rules are as follows:

  • AWS
    • Allow external access to external ports
    • Allow access to internal ports within the same security group
  • Azure
    • Allow external access to external ports
    • Allow access to internal ports within the same VPC
  • AWS
    • Allow external access to external ports
    • Allow access to internal ports within the same security group