Deployment Guide: Optional Setup Procedures

Document created by RSA Information Design and Development Employee on Apr 11, 2019Last modified by RSA Information Design and Development Employee on Sep 8, 2020
Version 19Show Document
  • View in full screen mode
 

You can deploy NetWitness Platform with the following options.

Analyst User Interface

Group Aggregation

New Health and Wellness Search

Hybrid Categories on Series 6 (R640) Hardware

NW Server Deployment on ESA Hardware

Second Endpoint Server

Warm Standby NW Server

Analyst User Interface

The Analyst User Interface (UI) gives you access to a subset of features in the NetWitness Platform UI that you can set up in individual locations when you deploy NetWitness Platform in multiple locations. It is designed to reduce latency and improve the performance that can occur when accessing all functionality from the Primary User Interface on the NW Server Host (Primary UI).

You can have can have multiple Analyst UI instances provisioned in the same manner as the other NW component hosts.

Features and Limitations

Each Analyst UI host:

  • Can be deployed to specific organizational groups. For example: the Americas, EMEA, APAC, Tier 1 Analysts, Tier 3 Analysts.
  • If Analyst UI hosts are deployed regionally, you have the capability of querying those regional brokers directly (less latency), instead of than having to route through the Primary UI.
  • Helps distribute load off the Primary UI.
  • Has its own Reporting Engine (RE).
  • If it becomes unavailable for any planned or unplanned reason, it will not affect the Primary UI or any other Analyst UI instances.
  • Provides the same pre-query filter verification, Data Privacy protection, and RBAC functionality as the Primary UI.
  • Points back to the primary NW Server for authentication and configuration.
  • Does not have access to any administrative functions. All administration functions take place on the Primary UI.
  • Does not allow you to create or manage Content (that is, ESA rules, app rules, feeds). All Content creation and management takes place on the Primary UI.

Use Case

Large environments that include Geo distribution with a single data center and multiple NW Servers require Analyst UI instances in all their NetWitness locations or managed entities.

For example, if an Analyst UI is deployed for the EMEA SOC team, analysts can query their EMEA NetWitness Platform hosts directly. If the EMEA team has Broker hosts and Concentrator hosts within the region, the Analyst UI can connect and query them instead of connecting back to Primary user Interface (Primary UI).

Deployment

You must install the Analyst UI service category on a dedicated host and you install it in the same manner as any component service category on a host.

See the "Task 2 - Install 11.5 on Other Component Hosts" in the RSA NetWitness Platform Installation Guides for instructions on how to install any component service. Go to the Master Table of Contents to find all RSA NetWitness Platform 11.x documents.

After you provision the Analyst UI host (that is after you run the nwsetup-tui for the component host designated for the Analyst UI), complete the following steps to install the Analyst UI service category on the provisioned host.

  1. Log in to NetWitness Platform and go to (Admin) > Hosts.
    The New Hosts dialog is displayed with the Hosts view grayed out in the background.

    Note: If the New Hosts dialog is not displayed, click Discover in the Hosts view toolbar.

  2. Select the host in the New Hosts dialog and click Enable.
    The New Hosts dialog closes and the host is displayed in the Hosts view.
  3. Select that host in the Hosts view (for example, Analyst UI) and click .
    The Install Services dialog is displayed.
  4. Select Analyst UI in Category and click Install.

  1. Configure NetWitness Platform for each Analyst UI instance.Go to the Master Table of Contents to find all RSA NetWitness Platform 11.x documents.
    1. Make sure that each Analyst UI instance is connected to the correct local Reporting Engine and has the appropriate Investigation parameters set. The Getting Started Guide for RSA NetWitness Platform describes the default Analyst UI Dashboard and how you manage dashboards.

      Note: You must add data sources to each Reporting Engine instance to execute Reports and Charts on an Analyst UI. See "Configure the Data Sources" in theReporting Engine Configuration Guide for RSA NetWitness Platform for instructions.

    2. Configure whether to normalize alerts for any Respond Server (NW Server or Analyst UI) by enabling or disabling alert normalization. "Configure Analyst UI for Respond Server Alert Normalization" in the NetWitness Respond Configuration Guide for RSA NetWitness Platform tells you how to configure Respond Server alert normalization for the Analyst UI.

Group Aggregation

You use Group Aggregation to configure multiple Archiver or Concentrator services as a group and share the aggregation tasks between them. You can configure multiple Archiver services or Concentrator services to efficiently aggregate from multiple Log Decoder services to improve query performance on the data:

  • Stored in the Archiver.
  • Processed through the Concentrator.

RSA Group Aggregation Deployment Recommendations

RSA recommends the following deployment for Group Aggregation:

  • 1 - 2 Log Decoders
  • 3 - 5 Archivers or Concentrators

Advantages of Using Group Aggregation

  • Increases the speed of RSA NetWitness Platform queries.
  • Improves the performance of aggregate queries (Count and Sum) on the environment.
  • Enhances investigation service performance.
  • Gives you the option of storing data for a longer duration for investigation purposes.

The following diagram illustrates Group Aggregation.

Group Aggregation Illustration

You can have any number of Archivers or Concentrators grouped together and form an aggregation group. The Archiver or Concentrator services in the group divide all the aggregated sessions between them based on the number of sessions defined in the Aggregate Max Sessions parameter.

For example, in an aggregation group containing two Archiver services or two Concentrator services with the Aggregate Max Sessions parameter set to 10,000, the services would divide the session between themselves as illustrated in the following table.

                     
Archiver 0 or Concentrator 0 Archiver 1 or Concentrator 1
1 - 9,99910,000 - 19,999
20,000 - 29,99930,000 - 39,999
40,000 - 49,99950,000 - 59,999

Configure Group Aggregation

Complete this procedure to configure multiple Archiver or Concentrator services as a group and share the aggregation tasks between them.

Prerequisites

Plan the network design for group aggregation. The following figure is an example of a group aggregation setup.

Group Aggregation Setup example

Ensure that you understand the Group aggregation parameters in the following table, and create a group aggregation plan.

                           
ParameterDescription

Group Name

It determines the group to which the Archiver or Concentrator belongs.
You can add any number of groups aggregating data from a Log Decoder. The Group Name parameter is used by the Log Decoder to identify which Archiver or Concentrator services are working together. All Archiver or Concentrator services in the group should have the same group name.

Size

It determines the number of Archiver or Concentrator services in the aggregation group.

Member Number

It determines the position of the Archiver or Concentrator in the aggregation group. For a group of size N, member number from 0 to N-1 must be set on each of the Archiver or Concentrators services in the aggregation group.
For example: If the size of the aggregation group is 2, the member number of one of the Archiver or Concentrator service should be set to 0 and the member number of the other Archiver or Concentrator should be set to 1.

Membership Mode

There are two membership modes:

  • New: Adding a new Archiver or Concentrator service as a member to the existing aggregation group or creating an aggregation group. The Archiver or Concentrator service does not aggregate any existing sessions from the service as other members of the group would have already aggregated all the sessions on the service. This Archiver or Concentrator service will only aggregate new sessions as they appear on the service.
  • Replace: Replacing an existing aggregation group member. The Archiver or Concentrator will begin aggregation from the oldest session available on the service it is aggregating from.

Note: The Membership Mode parameter has an effect only when no sessions have been aggregated from the service. After some sessions are aggregated, this parameter has no effect.

Set up Group Aggregation

This workflow shows the procedures you complete to configure group aggregation.

 

Complete the following steps to set up group aggregation.

  1. Configure multiple Archiver or Concentrator services in your environment. Make sure that you add the same Log Decoder as data source to all the services.
  2. Perform the following on all the Archiver or Concentrator services that you want to be part of aggregation group:

    1. Go to (Admin) > Services.
    2. Select the Archiver or Concentrator service, and select Actions menu > View > Config.

      The Service Config view of the Archiver or Concentrator is displayed.

    3. In the Aggregate Services section, select Log Decoder.
    4. Click Toggle Service to change the status of the Log Decoder to offline if it is online.
    5. Click Edit.

      The Edit Aggregate Service dialog is displayed.

      Edit Aggregate Service

    6. Click group_aggregation_button.png.

      The Edit Group Aggregation dialog is displayed.

      Edit Group Aggregation

    7. Select the Enabled checkbox and set the following parameters:

      • In the Group Name field, type the group name.
      • In the Size field, select the number of Archiver or Concentrator services in the aggregation group.
      • In the Member Number field, select the position of the Archiver or Concentrator in the aggregation group.
      • In the Membership Mode drop-down menu, select the mode.
    8. Click Save.
    9. In the Service Config view, click Apply.
    10. Perform Step b to Step i on all other Archiver or Concentrator services that need to be part of group aggregation.
  3. In the Aggregation Configuration section, set the Aggregate Max Sessions parameter set to 10000.

     

New Health and Wellness

New Health and Wellness is an advanced monitoring and alerting system that provides insights on the operational state of the host and services in your deployment, and helps identify potential issues.

System Requirements

The following tables list the memory, disk, and CPU recommended for the New Health and Wellness based on the size of the deployment.

Note: The recommended values might differ when you install and try the new features and enhancements.

Standalone Virtual Host

Minimum memory for a standalone virtual host is 16 GB.

Each NetWitness platform host writes 150 MB of New Health and Wellness metrics data into Elasticsearch data per day. For example, if you have 45 NetWitness Platform hosts then 6.6 GB of metrics data is written to Elasticsearch per day.

               
CPUMemory
4 cores 16 GB

Physical Host

                                 
Deployment SizeMemoryCPUDISK per day
Small (~5-10 hosts / 20-40 services)16 GB15% 1.5 GB
Medium (~150-200 hosts / 300- 400 services)18 GB15%29 GB
Large (~250-300 hosts / 500-600 services)22 GB15% 44 GB

Based on the resources available, you can deploy the 11.5 New Health and Wellness feature on any one of the following, listed in the order of preferred deployment method with most preferred first:

  • Standalone virtual host (Most preferred recommendation to ensure no performance impact on any other functionality of deployed nodes)
  • Physical host:
    • Broker
    • Admin Server
    • ESA

Installing New Health and Wellness enables all hosts in your deployment to start sending metrics to monitor New Health and Wellness. After you deploy New Health and Wellness , see the "Monitor New Health and Wellness " topic in the System Maintenance Guide for instructions on how to configure and use this feature.

Please direct any New Health and Wellness feedback to nw.health.wellness.feedback@rsa.com.

After you provision the New Health and Wellness host, complete the following steps to install the New Health and Wellness service category on the provisioned host.

  1. Log in to NetWitness Platform and go to (Admin) > Hosts.
    The New Hosts dialog is displayed with the Hosts view grayed out in the background.

    Note: If the New Hosts dialog is not displayed, click Discover in the Hosts view toolbar.

    Note: If you are not installing New Health and Wellness on a standalone virtual host ignore step 2.

  2. Select the host in the New Hosts dialog and click Enable.
    The New Hosts dialog closes and the host is displayed in the Hosts view.
  3. Select that host on which New Health and Wellness should be installed in the Hosts view (for example, New Health and Wellness) and click .
    The Install Services dialog is displayed.
    New Health and Wellness category
  4. Select New Health and Wellness in Category and click Install.
  5. Refresh all hosts to write to elastic search.

    1. SSH to the NW Server host.

    2. Run the following commands.
      nw-manage --refresh-host --host-all
      This may take few minutes for the changes to take effect based on the number of hosts in your deployment.

Note: (For Standalone Virtual host only) After you review your initial datastore configuration, you may determine that you need to add a new volume. For information on adding a new volume see “Add New Volume and Extend Existing File Systems” topic in the Virtual Host Installation Guide.

Note: After you have installed New Health and Wellness, for some reason, if you want to uninstall New Health and Wellness, you must refer to "Uninstall New Health and Wellness" in the Upgrade guide.

Hybrid Categories on Series 6 (R640) Hardware

You can install Hybrid Categories such as Log Hybrid and Network (Packet) Hybrid service categories on a Series 6 (R640) Physical host. This gives you the ability to attach multiple PowerVault external storage devices to the Series 6 (R640) Physical host.

NW Server Deployment on ESA Hardware

You now have the option to deploy the NW Server host on Series 6 Analytics hardware. The Series 6 Analytics Hardware has more memory and storage capacity than the standard Core appliance on which NW Server has typically been deployed. This results in better overall responsiveness and larger retention capacity for Report Engine.

Note: You can install the NW Server on ESA hardware, but you cannot co-locate any ESA services (categories) with the NW Server on this hardware.

Second Endpoint Server

Complete the following procedure to deploy a second Endpoint Server.

  1. Set up a new host in NetWitness Platform.
    • For a physical host, complete steps 1 to 16 in "Install RSA NetWitness Platform" under "Installation Tasks" in the Physical Host Installation Guide for NetWitness Platform 11.5.
    • For a virtual host, complete steps 1 to 6 in "Step 4. Install RSA NetWitness Platform" in the Virtual Host Installation Guide for NetWitness Platform 11.5.
    • Go to the Master Table of Contents to find all RSA NetWitness Platform 11.x documents.

  2. SSH to the host that you set up in step 1.
  3. Submit the following command string.
    mkdir -p /etc/pki/nw/nwe-ca

    Note: You do not need to modify permissions.

  1. Copy the following two files from the previously deployed endpoint server to the new/second endpoint server:
    /etc/pki/nw/nwe-ca/nwerootca-cert.pem
    /etc/pki/nw/nwe-ca/nwerootca-key.pem
  2. nstall Endpoint on the host.
    1. Log in to NetWitness Platform and go to (Admin) > Hosts.
      The New Hosts dialog is displayed with the Hosts view grayed out in the background.

      Note: If the New Hosts dialog is not displayed, click Discover in the Hosts view toolbar.

    2. Select the new host in the New Hosts dialog and click Enable.
      The New Hosts dialog closes and the host is displayed in the Hosts view.

    3. Select that host in the Hosts view (for example, Endpoint Server II) and click .
      The Install Services dialog is displayed.

    4. Select Endpoint in Host Type and click Install.

Warm Standby NW Server Host

The Warm Standby NW Server duplicates the critical components and configurations of your active NW Server host to increase reliability.

A secondary NW Server remains in the standby role and, when configured, receives backups of the primary NW Server in the active role at regular intervals. If the primary NW Server fails (goes offline), the fail-over procedure must be executed allowing the secondary NW Server to assume the active role.

In version 11.5 and later, we support a secondary NW Server that has a different IP address from the primary NW Server. Having the same IP address for both the primary NW Server and secondary NW Server is no longer necessary.

When you set up a secondary NW Server as a Warm Standby, a failure or scheduled switch from the primary NW Server to the secondary NW Server is referred to as a fail-over. You fail back to return to the normal operating state (that is, primary NW Server in the active role and the secondary NW Server in the standby role).

The following diagram illustrates the fail-over and fail-back process.

                 
1 Set up secondary NW Server as standby (initial setup). This is the normal operating state.
2 The primary NW Server fails over to the secondary NW Server. After the fail-over, get the primary NW Server back online and set it up in the standby role. This is a temporary operating state.
3 Fail the secondary NW Server back to the primary. The primary NW Server is back to the active role and secondary is back to the standby role. This is the normal operating state.

Note: When you set up the secondary NW Server, follow the same administrative procedures, for example, for upgrade and maintenance, as the procedures for the primary active NW Server.

Procedures

Complete the following task to set up a secondary NW Server in the standby role for fail-over:

Complete the following tasks when required to maintain high availability:

Planned Fail-Over Scenario

This scenario occurs when you schedule a fail over (see Planned Fail-Over under step 3 in the Fail Over primary NW Server to Secondary NW Server procedure). You should not need do anything after the fail-over completes.

Required Fail-Over Scenario without Hardware Replacement

This scenario occurs when the primary NW Server fails (see Required Fail-Over under step 3 in the Fail Over Primary NW Server to Secondary NW Server topic), but you are able to recover it easily without re-imaging (for example, the active NW Server has corrupt or insufficient RAM). You do not need to run the nwsetup-tui and you do not need to contact Customer Support (https://community.rsa.com/docs/DOC-1294) to reestablish correct licensing when:

  1. The active (primary NW Server) fails over to the Standby (secondary NW Server) and that secondary host temporarily assumes the role of the active NW Server.
  2. You fix the problem with the primary NW Server (for example, install new RAM) and fail back to it from the secondary host.

Required Fail-Over Scenario with Hardware Replacement

This scenario occurs when the active NW Server completely fails and the hardware requires replacement, for example you receive a Return Merchandise Authorization (RMA). You need to run reconfigure the host with the nwsetup-tui and contact Customer Support (https://community.rsa.com/docs/DOC-1294) to reestablish licensing. If you choose to rebuild the replacement host as a temporary standby (for example, until your scheduled fail-back occurs), you must answer "Yes" to the Standby Host Recovery Mode nw-setup-tui prompt when configuring this temporary standby for failing back (see step 4 in the Set Up Secondary NW Server in Standby Role procedure for the context of this prompt).

Set Up Secondary NW Server in Standby Role

  1. Before you install a secondary NW Server host for the standby role, make sure that:
    1. The primary NW Server is running 11.5.
    2. All component hosts are running 11.5
      If you are:
      • Installing NetWitness Platform 11.5, follow the instructions in the RSA NetWitness Platform Physical Host Installation Guide for Version 11.5.
      • Updating from 11.x to 11.5, follow the instructions in RSA NetWitness Platform Update Guide for Version 11.x to 11.5.
        Go to the Master Table of Contents to find all RSA NetWitness Platform 11.x documents.
  1. Create a base image on the secondary NW Server:
    1. Attach media (ISO) to the host.
      See the RSA NetWitness Platform Build Stick Instructions for more information.
      • Physical media - use the ISO to create bootable flash drive media the Etcher or another suitable imaging tool etch an Linux file system on the USB drive. See the RSA NetWitness PlatformBuild Stick Instructions for information on how to create a build stick from the ISO. Etcher is available at: https://etcher.io.
      • iDRAC installations - the virtual media type is:
        • Virtual Floppy for mapped flash drives.
        • Virtual CD for mapped optical media devices or ISO file.
    2. Log in to the host and reboot it.
    3. Select F11 (boot menu) during reboot to select a boot device and boot to the connected media.
      After some system checks during booting, the following Welcome to RSA NetWitness Platform 11.5 installation menu is displayed. The menu graphics will render differently if you use a physical USB flash media.

    4. Select Install RSA NetWitness Platform 11.5 (default selection) and press Enter.
      The Installation program runs and stops at the Enter (y/Y) to clear drives prompt that asks you to format the drives.

      Caution: You must respond y or Y to this prompt even if the host does not have an internal RAID configuration or the installation will fail.

    5. Type Y to continue.
      The default action is No, so if you ignore the prompt and it will select No in 30 seconds and will not clear the drives. The Press enter to reboot prompt is displayed.

      The system displays the all installation tasks it is performing. This can take a minute or so.After it completes the tasks, the installation program reboots the host.

      Caution: Do not reboot the attached media (media that contains the ISO file, for example a build stick).


    6. Log in to the host with the root credentials.
  1. Run the nwsetup-tui command.

    Note: 1.) When you navigate through the Setup program prompts, use the down and up arrows to move among fields, use the Tab key to move to and from commands (such as <Yes>, <No>, <OK>, and <Cancel>. Press Enter to register your command response and move to the next prompt.
    2.) The Setup program adopts the color scheme of the desktop or console you use access the host.
    3.) During the Setup program, when you are prompted for the network configuration of the host, be sure to specify the same network configuration that was used for the original installation of 11.x on this host (it must be exactly the same).

    This initiates the nwsetup-tui (Setup program) and the EULA is displayed.


  2. Tab to Accept and press Enter.
    The Is this the host you want for your 11.5 NW Server prompt is displayed.

    Your response to this prompt identifies a host as either the primary or secondary during a fresh install (and the selected response stays constant regardless of the current or future role, that is active or standby of the host).
  3. Tab to Yes and press Enter.
    The Install or Recover prompt is displayed.
  4. Tab to 3 Install (Warm Standby) and press Enter.
    The Standby Host Recovery Mode prompt is displayed.
  1. Tab to:
    • No and press Enter to set up a secondary NW Server with the standby role (most common scenario).
    • Yes and press Enter to set up a host that was previously used as a primary NW Server with the standby role so you can execute a fail-over and fail-back (less common scenario).

The NW Active Server IP Address prompt is displayed.

  1. Type the IP Address of the NW Server in the active role, tab to OK, and press Enter.
    The Host Name prompt is displayed


    Caution: If you include "." in a host name, the host name must also include a valid domain name.

  2. Press Enter if want to keep this name. If not edit the host name, tab to OK, and press Enter to change it.

    The Master Password prompt is displayed.

    Note: You must use the same Master and Deploy Admin credentials fot the Warm Standby NW Server Host that you used for the Active NW Server Host.

    The following list of characters are supported for Master Password and Deployment Password:

    • Symbols: ! @ # % ^ +
    • Lowercase Characters: a-z
    • Uppercase Characters: A-Z

    No ambiguous characters are supported for Master Password and Deployment Password. For example: space { } [ ] ( ) / \ ' " ` ~ ; : .< > -

  3. Type the Password, down arrow to Verify, retype the password, tab to OK, and press Enter.
    The Deployment Password prompt is displayed.

  4. Type in the Password, down arrow to Verify, retype the password, tab to OK, and press Enter.
    One of the following conditional prompts is displayed.
    • If the Setup program finds a valid IP Address for this host, the following prompt is displayed.

      Press Enter if you want to use this IP and avoid changing your network settings. Tab to Yes and press Enter if you want to change the IP configuration found on the host.
    • If you are using an SSH connection, the following warning is displayed.

      Note: If you connect directly from the host console, the following warning will not be displayed.


      Press Enter to close warning prompt.

    • If the Setup Program found an IP configuration and you chose to use it, the Update Repository prompt is displayed. Go to step 12 to and complete the installation.
    • If the Setup Program did not find an IP configuration or if you chose to change the existing IP configuration, the Network Configuration prompt is displayed.

  5. Tab to OK and press Enter to use Static IP.
    If you want to use DHCP, down arrow to 2 Use DHCP and press Enter.
    The Network Configuration prompt is displayed.

  6. Down arrow to the network interface you want, tab to OK, and press Enter. If you do not want to continue, tab to Exit.
    The following Static IP Configuration prompt is displayed.

  7. Type the configuration values (using the down arrow to move from field to field), tab to OK, and press Enter. If you do not complete all the required fields, an All fields are required error message is displayed (secondary DNS Server and Local Domain Name fields are not required). If you use the wrong syntax or character length for any of the fields, an Invalid <field-name> error message is displayed.

    Caution: If you select DNS Server, make sure that the DNS Server is correct and the host can access it before proceeding with the installation.

    The Update Repository prompt is displayed.

  8. Press Enter to choose the Local Repo on the NW Server.
    If you want to use an external repo, down arrow to External Repo, tab to OK, and press Enter.
    • If you select 1 The Local Repo (on the NW Server) in the Setup program, make sure that you have the appropriate media attached to the host (media that contains the ISO file, for example a build stick) from which it can install NetWitness Platform 11.5.0.0. If the program cannot find the attached media, you receive the following prompt.
    • If you select 2 An External Repo (on an externally-managed server), the UI prompts you for a URL. The repositories give you access to RSA updates and CentOS updates. Refer to "Appendix B. Create an External Repo" in the Physical Host Installation Guide for instructions on how to create this repo and its external repo URL so you can enter it in the following prompt.

      Enter the base URL of the NetWitness Platform external repo and click OK. The Start Install prompt is displayed.
      See "Set Up an External Repository with RSA and OS Updates" under "Hosts and Services Procedures" in the RSA NetWitness Platform Hosts and Services Getting Started Guide for instructions. Go to the Master Table of Contents to find all RSA NetWitness Platform 11.x documents.
      The Disable firewall prompt is displayed.
  9. Tab to No (default), and press Enter to use the standard firewall configuration. Tab to Yes, and press Enter to disable the standard firewall configuration.
    If you select Yes, confirm your selection(select Yes again) or select No to use the standard firewall configuration.

    The Start Install/Upgrade prompt is displayed.

  10. Press Enter to install 11.5 on the NW Server.
    When Installation complete is displayed, you have installed the 11.5 NW Server on this host.

    Note: Ignore the hash code errors similar to the errors shown in the following figure that are displayed when you initiate the nwsetup-tui command. Yum does not use MD5 for any security operations so they do not affect the system security.

  11. License the secondary NW Server.
    1. Log in to the secondary NW Server User Interface, click (Admin) > System > Info, and note the License Server ID under Version Information.

    2. SSH to the primary NW Server.
    1. Edit the /opt/netwitness/flexnetls/local-configuration.yaml file and add the back up hostid (that is, the License Server ID ).
      This is an example of the section of the local-configuration.yaml file before you add the License Server ID.
      # Hostid of the backup server, if in fail over configuration.
      #backup-hostid:

      This is an example of the section of the local-configuration.yaml file after you add the MAC address (for example, 000c2918c80d) of the Warm Standby NW Server Host.
      # Hostid of the backup server, if in fail over configuration.
      backup-hostid: "000c2918c80d"
    1. Restart the fneserver service.
      systemctl restart flexnetls-RSALM
    1. (Conditional) If your NetWitness Platform deployment is prohibited from accessing the Internet (Air Gap), you must:
      1. Download the capability request from NetWitness Platform User Interface.
      2. Upload the request to FNO.
      3. Upload the response from FNO to the NetWitness Platform User Interface.
  12. Schedule the backup of the primary NW Server and the copying of this backed-up data to the secondary NW Server.
    1. SSH to the primary NW Server.
    2. Submit the following commands.
      /opt/rsa/saTools/bin/schedule-standby-admin-data-sync -di <warm-standby-admin-server-ip>
    3. Note: If the Warm Standby server becomes active, and if it will be accessed by any NW host with a NAT IP address, the NAT IP address must be added to the command:
      /opt/rsa/saTools/bin/schedule-standby-admin-data-sync -di <warm-standby-admin-server-ip>-p<warm-standby-NAT-admin-server-ip>

      This backs up the primary NW Server data and copies the backup archive file to the secondary NW Server daily for future fail-over use. It also schedules the backup and copy to execute on a daily basis. You can display help for the schedule-standby-admin-data-sync script with the following command string.
      /opt/rsa/saTools/bin/schedule-standby-admin-data-sync –-help
      This returns the following help to which you can refer to customize the host data backup (such as backup frequency).
      Schedule Data Synch between AdminServer and Standby AdminServer
      Script also executes a synchronization each time.
      Usage:
      schedule-standby-admin-data-sync command [options]
      Commands:

      -h, --help Display Help
      -d, --dailySchedule daily data synchronization
      -w, --weekly                              Schedule weekly data synchronization
      -c, --custom <crontab formatted> Schedule custom data synchronization  i.e. to schedule for midnight on 1st and 10th of the month: '0 0 1,10 * *'
      -i, --standby-ip <IP address>          (required) IP address of standby NW Server
      -p, --standy-ip-public <NAT IP address>(optional) NAT-based IP address of standby NW Server
      -v, --verbose                   Enable verbose output


Fail Over Primary NW Server to Secondary NW Server with Same IP Address

Initially, the primary NW Server fails over to the secondary NW Server. When the primary NW Server is back up, the secondary NW Server fails over to the primary NW Server, and that is referred to as a fail-back. When it is possible for the secondary NW Server to have the same IP address as the primary NW Server after failover, complete the following procedure to fail over from the primary NW Server to the secondary NW Server.

  1. SSH to the secondary NW Server.

IMPORTANT: If you have installed New Health & Wellness on Admin Server, perform the following:
- Install New Health & Wellness on Standby NW server.
- Back up the Search category (New Health and Wellness ) from Primary NW server to standby NW server using the NRT:
nw-recovery-tool --export --dump-directory <Backup_directory_path> --category Search
You must manually copy files from Primary NW server to Standby NW server after running the above command.

  1.  Run the nw-failover script with the --make-active argument:
    nw-failover --make-active
  2.  Complete the following steps for planned and required fail-over.
    1.  SSH to the primary NW Server.
    2.  Run the fail-over script with the --make-standby argument to assign the standby role to the primary NW Server:
      nw-failover --make-standby
    3.  Shut down the primary NW Server.
    4. Note: If you have a catastrophic failure, you may need to provision a new host or re-image the primary NW Server and complete the Set Up secondary NW Server in Standby Role procedure for this host to create a new primary NW Server, so that you can fail back to it.

  3. Validate that the component hosts have connected to the new active NW Server by running the following command on the new active NW Server:
    nw-manage --check-hosts-status

  4. Note: Do not continue to the next step until all component hosts have successfully connected to the new active NW Server. Rerun nw-manage --check-hosts-status as needed to continue verification.

  5. Follow the IP address change procedures for the now-active NW Server in "Change Host Network Configuration" in the System Maintenance Guide. Go to the Master Table of Contents to find all RSA NetWitness Platform 11.x documents.

  6. Note: If the primary NW Server is going to remain online, you must update its IP address so that it no longer conflicts with the Warm Standby NW Server IP address when it is changed. Follow the IP address change procedures for the now-active NW Server in "Change Host Network Configuration" in the System Maintenance Guide. Go to the Master Table of Contents to find all RSA NetWitness Platform 11.x documents.

  7. Shut down the primary NW Server, or reboot the primary NW Server and set it up as the new secondary NW Server by completing the steps in Set Up Secondary NW Server in Standby Role for this host to create a new primary NW Server, so that you can fail back to this host.

IMPORTANT: After successful fail over to Standby NW server, restore the Search category (New Health & Wellness) using NRT:
nw-recovery-tool --import --dump-directory <Backup_directory_path> --category Search

Fail Over Primary NW Server to Secondary NW Server with Different IP Address

If your secondary NW Server will maintain a different IP address from your primary NW Server after a fail-over event, for example, if the secondary NW Server is located in a different data center from the primary NW Server, follow these steps to fail over from the primary NW Server to the secondary NW Server.

  1. SSH to the secondary NW Server.

IMPORTANT: If you have installed New Health & Wellness on Admin Server, perform the following:
- Install New Health & Wellness on Standby NW server.
- Back up the Search category (New Health and Wellness ) from Primary NW server to standby NW server using the NRT:
nw-recovery-tool --export --dump-directory <Backup_directory_path> --category Search
You must manually copy files from Primary NW server to Standby NW server after running the above command.

  1. Run the failover script:
    nw-failover --make-active
  2.  Complete the following steps for planned and required fail-over.
    1.  SSH to the primary NW Server.
    2.  Run the fail-over script with the --make-standby argument to assign the standby role to the primary NW Server:
      nw-failover --make-standby
    3.  Shut down the primary NW Server.
    4. Note: If you have a catastrophic failure, you may need to provision a new host or re-image the primary NW Server and complete the Set Up secondary NW Server in Standby Role procedure for this host to create a new primary NW Server, so that you can fail back to it.

  3. If you are running in a mixed-version environment, log in to each component host that is still on a version prior to 11.5 and execute the following:
    • netconfig --update-dns --dns <active-nw-server-ip-address>
    • sed -Ei 's/^master:.*/master: <active-nw-server-ip-address>/g' /etc/salt/minion
    • systemctl restart salt-minion
    • Note: If you have a component host that uses a NAT IP address to reach the NW Server, substitute the <NAT-IP-address> for the <active-nw-server-ip-address> in both bullet items above.

  4. Shut down the primary NW Server, or reboot the primary NW Server and set it up as the new secondary NW Server by completing the steps in Set Up Secondary NW Server in Standby Role for this host to create a new primary NW Server, so that you can fail back to this host.

IMPORTANT: After successful fail over to Standby NW server, restore the Search category (New Health & Wellness) using NRT:
nw-recovery-tool --import --dump-directory <Backup_directory_path> --category Search

Note: If the secondary NW Server had any custom certificates, you must re-apply them after failover. For information about how to re-apply custom certificates, see "(Optional) Use a Custom Server Certificate" in the System Security and User Management Guide. Go to the Master Table of Contents to find all RSA NetWitness Platform 11.x documents.

Note: After upgrading the NW Server host or a component host to 11.5, review the contents of the /etc/hosts.user file for any obsolete host entries. The /etc/hosts.user file contains system and user-generated entries that are not managed by NetWitness Platform. However, entries from /etc/hosts.user are merged with NetWitness Platform-generated host mappings to create and update /etc/hosts. To avoid conflicts with NetWitness Platform-generated mappings, and to avoid generating connectivity errors resulting from an IP address change, RSA recommends that you remove any entries in /etc/hosts.user that include a non-loopback IP address of a NetWitness Platform host. After updating /etc/hosts.user, you must refresh the system by running the following command:
nw-manage --refresh-host --host-key <ID, IP, hostname or display name of host>

Follow the steps in the sections that apply to your environment.

SSO

Update Configuration for Single Sign-On

Note: You must disable SSO configurations ONLY when NW Server IP is changed.

When the host network is configured with a new IP address, the SSO configurations also must be updated.

To do this:

  1. Disable the SSO configuration using nw-shell after failover from new IP.

    To resolve this issue you must disable SSO manually, using the following commands:

    1. SSH to admin server node.
    2. Connect to nw-shell.
    3. Connect to admin server service using the connect --service admin-server command.
    4. Log in to admin server using the login command.
    5. Enter the admin username and password.
    6. Execute the following commands:
      • cd /rsa/security/authentication/web/saml/sso-enabled
      • set false
      • logout
      • exit
      • systemctl restart rsa-nw-admin-server
        A view of the commands to disable SSO.
  2. Change the host IP address to the new IP.

  3. Generate the new metadata and reupload it in ADFS. For more information, see the "Configure SAML 2.0 provider settings for portals" topic in the Microsoft documentation.

For more information, see the "Troubleshooting" topic in the System Security and User Management Guide.

Reporting Engine

Update Configuration for Reporting Engine

Note: You must update the Reporting Engine configurations ONLY when NW Server IP is changed.

When the host network is configured with a new IP address, you must update and verify the Reporting Engin configurations. The hostname for NetWitness Platform configurations under the Output Actions must be updated with the new IP.

To manually configure the new IP, perform the following steps:

  1. Log in to NetWitness Platform.
  2. Navigate to (Admin) > Services > Reporting Engine > View > Config.

  3. Click the Output Actions tab.
  4. Add the new IP address in the Hostname field.
  5. Click Apply.

UCF

To enable UCF to communicate with NetWitness Platform:

  1. On the UCF server, execute the runConnectionManager.bat file (the same file that is used for adding connection details).

  2. Select Option #2, Edit endpoints.

  3. Select the NW Server connection from the options that are displayed.

  4. When you are prompted for Host Address (the old IP address is shown in parentheses) enter the new IP address.

    Note: Do not change any other setting.

PAM

If you have PAM configured, after the failover, you must configure the system again using the instructions in the "Configure PAM Login Capability" topic in the System Security and User Management Guide. Go to the Master Table of Contents to find all RSA NetWitness Platform 11.x documents.

ECAT

Update the following services:

Incident Message Broker

  1. Log in to the NetWitness Endpoint user interface and go to Configure > Monitoring and External Components Configuration > Incident Message Broker.
  2. Update the server Hostname and IP Address to the current active server and test the settings.

NetWitness Suite

  1. Log in to the NetWitness Endpoint user interface and go to Configure > Monitoring and External Components Configuration > Netwitness Suite.
  2. Update the server Hostname and IP address to the current active server and test settings.

Syslog Server Settings

If you are forwarding syslog messages to a NetWitness Platform Log Decoder, update the syslog server settings to point to the new IP address of the Log Decoder host.

  1. Log in to the NetWitness Endpoint user interface and go to Configure > Syslog Server.
  2. Select logdecoder, and in Server Hostname/IP, enter the new IP address of the Log Decoder host.

RSA NetWitness Orchestrator (By Demisto)

Update the Current Active NW Server to Fetch Respond Incidents and Alerts

  1. Log in to Orchestrator and go to Settings > server&services.
  2. Edit the RSA NetWitness V11.1 instance by updating the server URL to the current active NW Server to fetch respond incidents and alerts.

Update Component Hosts Acting as Data Sources

If you change the IP address of a component host, for example, a Concentrator, Network or Log Decoder, or Broker, that is acting as data source to the Orchestrator, update the following settings to point to the new IP address of the host.

  1. Log in to Orchestrator and go to Settings > server&services and select the component host.
  2. Enter the new IP address of the component host in Server URL and click Done.

Audit Logging

If you have changed the IP address of the NW Server, you must reconfigure audit logging. For instructions, see "Configure Global Audit Logging" in the System Configuration Guide.

Health and Wellness

If you have any Health and Wellness rules that contain IP addresses that have been changed, you must update those rules with the new IP addresses. For information about managing Health and Wellness rules, see "Monitor Health and Wellness using NetWitness Platform UI" in the System Maintenance Guide.

Malware Analysis

Source host IP address changes are not updated in the NetWitness Platform user interface for Malware Analysis continuous scan configurations. You must manually update this configuration in the Malware Analysis Config view > General > Continuous Scan Configuration and update the source host IP address to the new host IP address.

Windows Legacy Collection

On occasion, you may need to change the IP address of your Windows Legacy Collector. You may also need to edit any Destination Groups that you have configured.

Change WLC IP Address

The following procedure describes how to change the IP address for your system.

  1. Log onto the Windows Legacy Collector system and manually change the IP address on the system.
  2. In the UI, confirm that the Log Collector service corresponding to the WLC system shows up in error (Red). It might take some time for it to reflect the changed status.
  3. On the NetWitness Server, use the nw-manage utility to view the host information for the WLC using the following command:

    nw-manage --list-hosts

    Sample output from running the command is shown here:

    {
    "id" : "fdb8150c-e040-459e-8cc5-3c60ec2c65ae",
    "displayName" : "WLC-HOST-104",
    "hostname" : "10.101.216.102",
    "ipv4" : "10.101.216.102",
    "ipv4Public" : null
    } ]

    You use the value of "id" from your output in the following step.

  4. Use the nw-manage utility to change the IP address of the WLC. For the host-id argument, use the value for the "id" that you noted from step 3. For the ipv4 value, use the new IP Address to which you are changing.

    nw-manage --update-host --host-id "fdb8150c-e040-459e-8cc5-3c60ec2c65ae" --ipv4 10.101.216.105

  5. After you see the message that the previous command ran successfully, go to the NetWitness Server UI and verify that the WLC service is running without any errors.

Edit Destination Groups For Log Collectors and VLCs

The Windows Legacy Collector is often configured with Destination Groups to forward events to Log Collectors or Virtual Log Collectors. If the IP address of any such Destination LC or VLC is changed, the Windows Legacy Collector can no longer forward events. To remediate this, you must edit the Destination groups for the WLC, making sure to select the new LC or VLC IP Address.

 

Note: If you added any content to the /etc/hosts file on the primary server, the contents of that file are available under /var/netwitness/standby-data/unmanaged/etc on the failover server. You can manually copy those files to the /etc/hosts file on the failover server after the failover is complete.

Fail Back Secondary NW Server to Primary NW Server

After a fail-over from the primary NW Server to the secondary NW Server, you need to fail back to your original setup of the primary NW Server in the active role and the secondary NW Server in the standby role.

Essentially, you follow the same steps described under Fail Over Primary NW Server to Secondary NW Server to fail back to your original setup (that is primary NW Server-active and secondary NW Server-standby). The difference is that you now need to fail over from the secondary NW Server to the primary NW Server.

Previous Topic:The Basics
You are here
Table of Contents > Deployment Optional Setup Procedures

Attachments

    Outcomes