Skip navigation
All Places > Products > RSA NetWitness Platform > RSA NetWitness Platform Online Documentation > Documents
Log in to create and rate content, and to follow, bookmark, and share content with other members.

NW Cfg: Troubleshooting System Configuration

Document created by RSA Information Design and Development Employee on Sep 14, 2017Last modified by RSA Information Design and Development Employee on Sep 9, 2020
Version 20Show Document
  • View in full screen mode
 

The topics in this section provide troubleshooting information for administrators who are configuring settings that apply across the system in NetWitness Platform.

Troubleshoot Global Audit Logging

This topic provides information about possible issues that NetWitness Platform users may encounter when implementing Global Audit Logging in NetWitness Platform. Look for explanations and solutions in this topic.

After you configure Global Audit Logging, you should test your audit logs to ensure that they show the audit events as defined in your audit logging template. If you cannot view the audit logs on your third-party syslog server or Log Decoder, or the audit logs do not appear as expected, look at the basic troubleshooting suggestions below. If you are still having issues, you can look at the advanced troubleshooting suggestions.  

Basic Troubleshooting

If you cannot view audit logs on a third-party syslog server or Log Decoder:

  • Verify that RabbitMQ is up and running.
  • Verify the syslog notification server configuration and make sure it is enabled.
    (This configuration is located at (Admin) > System > Global Notifications. Do not select Legacy Notifications.)
  • Check the Global Audit Logging configuration.

Configure Global Audit Logging and Verify Global Audit Logs provide instructions. If you are sending audit logs to a Log Decoder:

  • Ensure that the Log Decoder is aggregating on the Concentrator on the same host: 
    (Admin) > Services > (Select Concentrator) > > View > Config.
  • Verify that the latest CEF parser is deployed and enabled.
  • Check the audit logging notification template. You must use a CEF template and all logs feeding into the Log Decoder must use a CEF template.

If you are sending audit logs to a third-party syslog server, Ensure that the destination port configured for the third-party syslog server is not blocked by a firewall.

Advanced Troubleshooting

In order to use Global Audit Logging on your network, RabbitMQ must be functioning. 

For centralized audit logging, each of the NetWitness Platform services writes audit logs to rsyslog listening on port 50514 using UDP on the local host. The rsyslog plugin provided in the audit logging package adds additional information and uploads these logs to RabbitMQ. Logstash running on the NetWitness Server host aggregates audit logs from all of the NetWitness Platform services, coverts them to the required format, and sends them to a third-party syslog server or Log Decoder for investigation. You configure the format of the global audit logs and the destination used by Logstash through the NetWitness Platform user interface.  

Define a Global Audit Logging Configuration provides instructions.  

Verify the Packages and Services on the Hosts

NetWitness Platform Host

The following packages or services must be present on the NetWitness Server host:

  • rsyslog-8.4.1
  • rsa-audit-rt
  • logstash-5.6.4
  • rsa-audit-plugins
  • rabbitmq server

Services on a Host other than the NetWitness Platform Host

The following packages or services must be present on each of the NetWitness Platform hosts other than the NetWitness Server host:

  • rsyslog-8.4.1
  • rsa-audit-rt
  • rabbitmq server

Log Decoder

If you forward global audit logs to a Log Decoder, the following parser should be present and enabled:

  • CEF

Possible Issues

What if I perform an action on a service but audit logs do not reach the configured third-party syslog server or Log Decoder? 

The possible causes could be one or all of the following:

  • A service is not logging to the local syslog server.
  • Audit logs are not getting uploaded to RabbitMQ from the local syslog. 
  • Audit logs are not aggregated on the NetWitness Server host.
  • Aggregated logs on the NetWitness Server host are not being forwarded to the configured third-party syslog server or Log Decoder.
  • The Log Decoder is not configured to receive global audit logs in CEF format:
    • Log Decoder capture is not turned on
    • CEF Parser is not present
    • CEF Parser is not enabled

Possible Solutions

The following table provides possible solutions for the issues.

                                 
IssuePossible Solutions

A service is not logging to the local syslog server.

  • Ensure that rsyslog is up and running.
    You could use the following command:

    service rsyslog status

  • Ensure that rsyslog is listening on port 50514 using UDP.

    You could use the following command:

    netstat -tulnp|grep rsyslog

  • Ensure the application or component is sending audit logs to port 50514. Run the tcpdump utility on the local interface for port 50514.

    You could use the following command:

    sudo tcpdump -i lo -A udp and port 50514

See "Solution Examples" below to view the command outputs.

Audit logs are not getting uploaded to RabbitMQ from the local syslog.

  • Ensure that the rsyslog plugin is up and running.
    You could use the following command:

    ps -ef|grep rsa_audit_onramp

  • Ensure the RabbitMQ server is up and running.

    You could use the following command:

    service rabbitmq-server status

See "Solution Examples" to view the command outputs.

Audit logs are not aggregated on the NetWitness Server host.

  • Ensure Logstash is up and running.
    You could use the following commands:

    ps -ef|grep logstash
    service logstash status

  • Ensure the RabbitMQ server is up and running.

    You could use the following command:

    service rabbitmq-server status

  • Ensure the RabbitMQ server is listening on port 5672.

    You could use the following command:

    netstat -tulnp|grep 5672

  • Check for any errors generated at the Logstash level.

    You could use the following command for the location of the log files:

    ls -l /var/log/logstash/logstash.*

See "Solution Examples" to view the command outputs.

Aggregated logs on the NetWitness Server host are not being forwarded to the configured third-party syslog server or Log Decoder.

  • Ensure Logstash is up and running.
    You could use the following commands:

    ps -ef|grep logstash
    service logstash status

  • Check for any errors generated at the Logstash level.
    You could type the following command for the location of the log files:

    ls -l /var/log/logstash/logstash*

See "Solution Examples" below to view the command outputs.

  • Ensure that the destination service is up and running.
  • Ensure that the destination service is listening on the correct port using the correct protocol.
  • Ensure that the configured port on the destination host is not blocked.

Audit logs forwarded from the Logstash lead to parse failure at the Log Decoder.

  • Ensure that you are using an appropriate notification template.

    Audit Logs parsed by a Log Decoder must be in CEF format. The destination from which audit logs directly or indirectly make their way to the Log Decoder must also use a CEF Template.

  • The Notification Template must follow the CEF standard.

    Follow the steps in this guide to either use the default CEF template or create a custom CEF template following strict guidelines. Define a Template for Global Audit Logging provides additional information.

  • Verify the Logstash configuration.

Why can't we see the custom metadata in Investigation?

Usually, if a meta key is not visible in Investigation, it is not being indexed. If you need to use custom meta keys for Investigations and Reporting, ensure that the meta keys that you select are indexed in the table-map-custom.xml file on the Log Decoder. Follow the "Maintain the Table Map Files" procedure to modify the table-map-custom.xml file on the Log Decoder.

Ensure that the custom meta keys are also indexed in the index-concentrator-custom.xml on the Concentrator. "Edit a Service Index File" provides additional information.

The following figure shows an example table-map-custom.xml file in NetWitness Server ( (Admin) > Services > (select the Log Decoder) > >View > Config) with a custom meta url example highlighted.

Example of a table-map-custom.xml file in  ADMIN Services > Log Decoder > View > Config with a custom meta url example highlighted 

The url custom meta example is highlighted in the following code sample from the table-map-custom.xml file above:

 <mapping envisionName="url" nwName="url" flags="None" envisionDisplayName="Url"/> <mapping envisionName="protocol" nwName="protocol" flags="None" envisionDisplayName="Protocol"/><mapping envisionName="cs_devservice" nwName="cs.devservice" flags="None" envisionDisplayName="DeviceService" /><mapping envisionName="cs_paramkey" nwName="cs.paramkey" flags="None" envisionDisplayName="ParamKey" /><mapping envisionName="cs_paramvalue" nwName="cs.paramvalue" flags="None" envisionDisplayName="ParamValue" /><mapping envisionName="cs_operation" nwName="cs.operation" flags="None" envisionDisplayName="Operation" /><mapping envisionName="sessionid" nwName="log.session.id" flags="None" envisionDisplayName="sessionid" /><mapping envisionName="group" nwName="group" flags="None" envisionDisplayName="group" /><mapping envisionName="process" nwName="process" flags="None" envisionDisplayName="process" /><mapping envisionName="user_agent" nwName="user.agent" flags="None"/><mapping envisionName="info" nwName="index" flags="None"/> 

The following figure shows an example index-concentrator-custom.xml file in NetWitness Server ( (Admin) > Services > (select the Concentrator) > > View > Config) with a custom meta url example highlighted.

Example of an index-concentrator-custom.xml file in ADMIN Services >Concentrator > View > Config with a custom meta url example highlighted 

The url custom meta example is highlighted in the following code sample from the index-concentrator-custom.xml file above:

 <key description="Severity" level="IndexValues" name="severity" valueMax="10000" format="Text"/><key description="Result" level="IndexValues" name="result" format="Text"/><key level="IndexValues" name="ip.srcport" format="UInt16" description="SourcePort"/><key description="Process" level="IndexValues" name="process" format="Text"/><key description="Process ID" level="IndexValues" name="process_id" format="Text"/><key description="Protocol" level="IndexValues" name="protocol" format="Text"/><key description="UserAgent" level="IndexValues" name="user_agent" format="Text"/><key description="DestinationAddress" level="IndexValues" name="ip.dst" format="IPv4"/><key description="SourceProcessName" level="IndexValues" name="process.src" format="Text"/><key description="Username" level="IndexValues" name="username" format="Text"/><key description="Info" level="IndexValues" name="index" format="Text"/><key description="customdevservice" level="IndexValues" name="cs.devservice" format="Text"/> <key description="url" level="IndexValues" name="url" format="Text"/> <key description="Custom Key" level="IndexValues" name="cs.paramkey" format="Text"/><key description="Custom Value" level="IndexValues" name="cs.paramvalue" format="Text"/><key description="Operation" level="IndexValues" name="cs.operation" format="Text"/><key description="CS Device Service" level="IndexValues" name="cs.device" format="Text" valueMax="10000" defaultAction="Closed"/> 

Solution Examples

The following possible solution examples show the outputs of the example commands. See the above table for the complete listing of possible solutions.

Ensure that rsyslog is up and running

You can use the following command:

service rsyslog status

 

Ensure that rsyslog is listening on port 50514 using UDP

You can use the following command:

netstat -tulnp|grep rsyslog

 

Ensure that the application or component is sending audit logs to port 50514

The following figure shows the output of running the tcpdump utility on the local interface for port 50514.

You can use the following command:

sudo tcpdump -i lo -A udp and port 50514

 

Ensure that the rsyslog plugin is up and running

You can use the following command:

ps -ef|grep rsa_audit_onramp

 

Ensure the RabbitMQ server is up and running

You can use the following command:

service rabbitmq-server status

 

Ensure logstash is up and running

You can use the following commands:

ps -ef | grep logstash
service logstash status

 

Ensure the RabbitMQ server is listening on port 5672

For example, type the following command:

netstat -tulnp | grep 5672

 

Check for any errors generated at the Logstash level

You can type the following command for the location of the log files:

ls -l /var/log/logstash/logstash.*

 

See the Possible Solutions table above for the complete listing of issues and possible solutions.

Troubleshoot Issues identified in the NTP Settings Panel or Log Files Messages

This section provides troubleshooting information for issues identified by messages NetWitness Platform displays in the NTP Settings panel and log files.

                                                           
IssuePossible Solutions
Message

User Interface:  Unexpected error occurred. First check the logs then contact Customer Care to resolve error.
System Log:

Timestamp              Level  Message
yyyy-dd-mmThh:mm:ss:ms  ERROR  com.rsa.smc.sa.adm.exception.MCOAgent
                              Exception: No request sent, we did
                              not discover any nodes 

Possible Cause

Low level NetWitness Platform configuration is in error or supporting service is not running. 

Solution

Contact Customer Care.

Message

User Interface:  Specified an invalid Hostname syntax.

Possible Cause Tried to enter NTP server hostname that does not confirm to IP address or FQDN syntax.
Solution

Reenter hostname in using correct syntax.

Message

User Interface:  Specified NTP server that already exists.

Possible Cause Tried to enter NTP server hostname that is already defined in NetWitness Platform.
Solution

Enter hostname for an NTP server not configured in NetWitness Platform.

Message

User Interface:  Cannot reach NTP server hostname.  Please verify the server address and your firewall settings.

Possible Cause The server address or firewall settings may be in error.
Solution

Verify the server address and your firewall settings and correct them if required.

 

Troubleshoot Global Notifications

This topic provides information about possible issues that NetWitness Platform users may encounter when implementing Global Notifications in NetWitness Platform.

               
IssuePossible Solution
We are not receiving notifications that were configured for a service, but the service log file does not show any errors.

For any notification-related troubleshooting, check the integration-server log file in addition to the log file of the service creating the notification.

For example, when troubleshooting ESA rule notifications, check both the ESA Correlation service log files (/var/log/netwitness/correlation-server/correlation-server.log) AND the Integration-Server log files on the NetWitness Server (/var/log/netwitness/integration-server/integration-server.log).
If the integration-server.log file shows a failure when the Integration-Server attempts to send a notification to the notification server, you should check the notification server configuration in the Global Notifications settings ( (Admin) > System > Global Notifications > Servers tab).

Next Topic:References
You are here
Table of Contents > Troubleshooting System Configuration

Attachments

    Outcomes