Virtual Modular Sensor Provisioning and Performance
This article describes the resources required for the successful installation and operation of Stellar Cyber virtual modular sensors. Virtual modular sensors install as dedicated VMs with Stellar Cyber software pre-installed.
Refer to the following sections for details:
What Determines Sensor Performance?
Virtual modular sensor performance depends on the following key factors:
-
Allocated VM resources (CPU and Memory). Sensor performance scales with CPU and RAM.
-
Enabled features (Log Forwarder, Network Traffic, Sandbox, and IDS).
-
Traffic volume (both peak and sustained events per second, connections per second, and bandwidth usage).
More features, deeper inspection, and more traffic always require more CPU and RAM.
Sensor Provisioning Rules
Guarantee your virtual modular sensor performance by following these rules for sensor provisioning:
-
Use ≥2.1 GHz processors for validated performance.
-
Provision at least 1.5 times as much memory as the number of CPU cores to ensure stable performance. So, for example, if you provision 8 CPUs, you should provision at least 8 x 1.5 = 12GB of memory.
-
Provision sensor disk space using the rules in Provisioning Disk Space for Virtual Modular Sensors.
As a simple rule, more traffic and inspection depth require more CPU and memory.
Sensor Provisioning by Module
Stellar Cyber provides virtual modular sensors using specific modules. This section lists the provisioning you must provide to achieve the performance for your purchased module. See the sections below for details.
Stated specifications support the corresponding maximum network traffic inspection throughput. Performance may vary depending on your environment, configuration, and other variables.
Network-Module Sensor Specifications
The Network-Module sensor specifications assume a span port, local file assembly, packet forwarding, log forwarding, and Network Traffic. The Malware Sandbox and IDS features are not enabled.
Virtual machines for the Network-Module sensors must be provisioned as follows:
| Component | Network-Module-1G | Network-Module-10G |
|---|---|---|
| Virtual Cores (reserved) | 8 | 32 |
| RAM (GB) (reserved) | 16 | 64 |
| Maximum throughput (Gbps) (1 or 2 span ports) |
Up to 1.0 | Up to 10.0 |
| Log Forwarder Events/s | 7,000 | 10,000 |
Security-Module Sensor Specifications – IDS Only
The Security-Module IDS sensor specifications assume a span port, local file assembly, log forwarding, Network Traffic, and IDS. The Malware Sandbox feature is not enabled.
Virtual machines for the Security-Module sensors must be provisioned as follows:
| Component |
Security-Module-200M IDS |
Security-Module 500M IDS |
Security-Module 1G IDS | Security-Module 10G IDS |
|---|---|---|---|---|
| Virtual Cores (reserved) | ||||
| RAM (GB) (reserved) | ||||
| Maximum throughput (Mbps) (1 or 2 span ports) |
Up to 200 |
Up to 500 |
Up to 1,000 | Up to 10,000 |
| Log Forwarder Events/s |
Security-Module Sensor Specifications – IDS and Sandbox
The Security-Module sensor specifications assume a span port, local file assembly, log forwarding, Network Traffic, Malware Sandbox, and IDS.
Virtual machines for the Security-Module IDS sensors must be provisioned as follows:
| Component |
Security-Module-200M |
Security-Module-500M |
Security-Module-1G | Security-Module-10G |
|---|---|---|---|---|
| Virtual Cores (reserved) |
4 |
8 |
16 | 32 |
| RAM (GB) (reserved) |
8 |
16 |
64 | 64 |
| Maximum throughput (Mbps) (1 or 2 span ports) |
Up to 200 |
Up to 500 |
Up to 1,000 | Up to 10,000 |
| Log Forwarder Events/s |
1,500 |
1,500 |
7,000 | 10,000 |
