|Applies To||RSA Product Set: Security Analytics|
RSA Product/Service Type: Security Analytics log decoder, Security Analytics packet decoder, Security Analytics concentrator
RSA Version/Condition: 10.6, 11.x
NetWitness imposes a hard coded limit of <100,000 in the RSA NetWitness GUI.
|Resolution||The following 3 methods may be used to Extract PCAP/LOGS:|
Method 1: using REST API, restricts export to 1GB or less
Method 2: Using Curl command line, restricts export to 1GB or less
# curl -uadmin "http://<LOG_DECODER_IP>:50102/sdk/packets?render=logs%time1=<START_TIME>&time2=<END_TIME>"
# curl -uadmin "http://<PACKET_DECODER_IP>:50104/sdk/packets?render=pcap%time1=<START_TIME>&time2=<END_TIME>"
Method 3: Using SDK no published limitations
Once connected to the log concentrator, log in to the NwConsole, and connect to the concentrator service.
(Note: ssl is only used if ssl has been enabled on the appliance service. nws = ssl, nw = non-ssl)
> login localhost:50005:[ssl] admin [password]
> sdk open nw[s]://admin:[password]@[hostname]:50005
(Note: ssl is only used if ssl has been enabled on the appliance service. nws = ssl, nw = non-ssl.
Also if your password has a @ character the hostame will likely not connect, try creating a new service account user and password that does not have a @)
Once connected, issue the following command to begin the log extraction process:
> sdk content sessions=1-now render=logs dir=”/root/logs” where=”(time='2014-03-12 18:00:00'-'2014-03-12 18:30:00' && device.class = 'windows hosts' && user.dst = 'envisionrsa')” fileExt=.log append=arc_log_extract
sessions – the first session until now
render – generate the file as a "logs" or "pcap" for pckets
dir - location where the log file will be saved
where – the where query from step 3
fileExt – the extension that will be placed on the created log file
append – the name of the log file that will be created