--- myst: html_meta: "description lang=en": "Deploy Kasm Workspaces sessions to specific geographic regions using deployment zones." "keywords": "Kasm, Deployment, Zones, Network, Configuration" "property=og:locale": "en_US" --- ```{title} Deployment Zones ``` ## Deployment Zones Deployment Zones are created to enable logical grouping of Kasm services. In large or distributed deployments, it may be desirable to route users to Kasm services that are closer geographically to improve the user experience. In other use cases, Deployment Zones might be defined for special network segments representing different tenants or security enclaves. Administrators can then leverage standard routing, DNS, load balancing, or other networking techniques to direct user traffic to a desired Zone. ```{figure} /images/zones/deployment_zones_diagram.png :align: center **Deployment Zones Diagram** ``` ### Capabilities Utilizing multiple deployment zones allows administrators to: - Prefer end-user sessions are provisioned in the Deployment Zone the user is connected to. - When a user connects to the Kasm UI, the server will attempt to provision the Kasm on Agents in the same Zone, only falling back to other Agent's in other Zone's if all Agents in the current zone are full or unavailable. - Restrict certain {term}`Workspaces ` to only provision on Agent's within a given Deployment Zone. See [Add/Edit Kasm Workspace](../workspaces.md#add-edit-workspaces) - This option is most useful if the Deployment Zones represent special network enclaves that only certain Workspaces and perhaps certain Users should be allowed to access. ### Configuring Deployment Zones #### Defining Zone Configurations Deployment Zones can be defined in the UI by an administrator. ```{figure} /images/zones/deployment_zones_list.webp :align: center **Zones List** ``` ```{figure} /images/zones/deployment_zones_config.webp :align: center **Create/Update Zone** ``` ```{eval-rst} .. table:: Zone Configuration Options :widths: 50 +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Zone Name | The Name given to the Zone | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Allow Origin Domain | Connections to Kasm sessions are restricted to authorized Origins. This value is the authorized origin domain. The default is $request_host$. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Upstream Auth Address | Connections to Kasm session are authenticated against a Kasm API server. This value is the address of the server. The default is proxy. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Load Balance Strategy | When a user requests a new Kasm session, the server can use several Load Balance Strategies to determine which Agent(s) to prioritize for the request. | | | The default value is **Least Load** | | | | | | **Least Load** | | | The system will prioritize the Agent(s) with the least consumed CPU/Memory resources. | | | **Most Load** | | | The system will prioritize the Agent(s) with the most consumed CPU/Memory resources. | | | **Least Kasms** | | | The system will prioritize the Agent(s) with the least number of existing Kasm sessions. | | | **Most Kasms** | | | The system will prioritize the Agent(s) with the most number of existing Kasm sessions. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Search Alternate Zones | When a user requests a Kasm session, the system will first search for available resources on Agents within the same Zone. When enabled, the server can also search | | | alternate Zones to satisfy the request if it can not be satisfied within the same Zone. Agents in the same Zone are always preferred over alternate Zones. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Proxy Connections | When disabled, the user will make a connection to Kasm session directly to the Kasm Agent where the Kasm session container resides. When enabled, | | | the connection to the Kasm session is proxied through another server | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Proxy Hostname | The location of the proxy server when Proxy Connections is enabled. The default is $request_host$. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Proxy Path | The base path to append to the Kasm connection when Proxy Connections is enabled. The default is /desktop. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Proxy Port | The port to use for the proxy server when Proxy Connections is enabled. The default is 0. | | | Kasm Workspaces will attempt to automatically determine the correct port from window.location.port | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Proxy RDP Local Client | When enabled, RDP connections made from native RDP clients are proxied through one or more Kasm Web App servers, to the Kasm RDP Gateway. This allows all requests | | Connections | to come through a single domain name. When disabled, RDP clients will connect directly to the Kasm RDP Gateway component, which is part of the Guac role. | | | This requires the Guac role servers to have a public IP address and resolvable hostname. This setting applies only when the zone setting | | | **Enable RDP HTTPS Gateway** is enabled. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | RDP HTTPS Proxy Hostname | The hostname/ip of a load balancer or proxy in front of the HTTPS based RDP Gateway component. By default it is $request_host$. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | RDP HTTPS Proxy Port | The port number of a load balancer or proxy in front of the HTTPS based RDP Gateway component. By default it is 443. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Prioritize Static Agents | Utilize fixed agents before using auto scaled [Docker Agents](../agent_settings.md). The default is enabled. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Restrict RDP Client IP | Require that the client's IP address be the same on the incoming RDP connection as API call that requested the session from the Kasm dashboard. | | Address | | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Enable RDP HTTPS Gateway | Use the HTTPS RDP Gateway protocol. When disabled, standard RDP over port 3389 is used. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Enable RDP HTTPS Gateway | Send HTTPS RDP connections through DLP (Data Loss Prevention). Enabling DLP has performance and scalability implications. Disabling DLP will disable many data | | DLP | loss prevention features enforced by Kasm, however, many of these features can be enforced by proper Group Policy in Windows. Disabling DLP will also break single | | | sign on. This setting applies only when the zone setting **Enable RDP HTTPS Gateway** is enabled. | +--------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------+ ``` ```{note} **\$request_host\$** referenced in several settings above can be used to automatically reference the domain/host used in the URL to access the Kasm deployment. For example if users accesses Kasm via {code}`https://east.kasm.server` , **\$request_host\$** will be {code}`east.kasm.server`. ``` #### Assigning Zone Configurations {term}`Agents ` are assigned the Zone of whichever manager they are currently checked in to. Once defined, the Kasm services need to be configured to be members of the given Zone. The Deployment Zone setting for API Servers (kasm_api, kasm_manager) is set their configuration file. The default zone is **default** ```bash grep zone_name /opt/kasm/current/conf/app/api.app.config.yaml zone_name: east ``` - Ensure all Kasm services are stopped ```Bash sudo /opt/kasm/bin/stop ``` - Edit the **zone_name** property in api.app.config.yaml ```Bash vi /opt/kasm/current/conf/app/api.app.config.yaml ``` - Restart the Kasm Services ```Bash sudo /opt/kasm/bin/start ```