ESM AdminGuide
ESM AdminGuide
ArcSight ESM
Software Version: 7.5
Administrator's Guide
Legal Notices
Copyright Notice
© Copyright 2001-2021 Micro Focus or one of its affiliates
Confidential computer software. Valid license from Micro Focus required for possession, use or copying. The
information contained herein is subject to change without notice.
The only warranties for Micro Focus products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.
Micro Focus shall not be liable for technical or editorial errors or omissions contained herein.
No portion of this product's documentation may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose other
than the purchaser's internal use, without the express written permission of Micro Focus.
Notwithstanding anything to the contrary in your license agreement for Micro Focus ArcSight software, you may
reverse engineer and modify certain open source components of the software in accordance with the license terms for
those particular components. See below for the applicable terms.
U.S. Governmental Rights. For purposes of your license to Micro Focus ArcSight software, “commercial computer
software” is defined at FAR 2.101. If acquired by or on behalf of a civilian agency, the U.S. Government acquires this
commercial computer software and/or commercial computer software documentation and other technical data subject
to the terms of the Agreement as specified in 48 C.F.R. 12.212 (Computer Software) and 12.211 (Technical Data) of the
Federal Acquisition Regulation (“FAR”) and its successors. If acquired by or on behalf of any agency within the
Department of Defense (“DOD”), the U.S. Government acquires this commercial computer software and/or
commercial computer software documentation subject to the terms of the Agreement as specified in 48 C.F.R.
227.7202-3 of the DOD FAR Supplement (“DFARS”) and its successors. This U.S. Government Rights Section 18.11 is in
lieu of, and supersedes, any other FAR, DFARS, or other clause or provision that addresses government rights in
computer software or technical data.
Trademark Notices
Adobe™ is a trademark of Adobe Systems Incorporated.
Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
Support
Contact Information
Phone A list of phone numbers is available on the Technical Support
Page: https://softwaresupport.softwaregrp.com/support-contact-
information
Page 3 of 250
Administrator's Guide
Page 4 of 250
Administrator's Guide
Page 5 of 250
Administrator's Guide
Page 6 of 250
Administrator's Guide
Page 7 of 250
Administrator's Guide
Page 8 of 250
Administrator's Guide
agentcommand 156
agents 157
agentsvc 157
agentup 157
aggregatorthreaddump 158
arcdt 158
archive 161
archivefilter 168
bleep 169
bleepsetup 170
changepassword 170
checklist 171
certadmin 171
configure-event-forwarding 173
console 174
consolesetup 175
correlationsetup 175
correlatorthreaddump 175
dcachesetup 176
deploylicense 176
downloadcertificate 177
exceptions 178
export_system_tables 179
flexagentwizard 180
groupconflictingassets 180
hardwareReport 181
import_system_tables 181
keytool 182
keytoolgui 183
kickbleep 184
listsubjectdns 184
logfu 184
managerinventory 188
manager-reload-config 189
managersetup 189
managerthreaddump 191
managerup 191
mbussetup 191
monitor 192
Page 9 of 250
Administrator's Guide
move_persistor_repo 192
netio 193
package 193
portinfo 195
reenableuser 196
refcheck 196
regex 196
replayfilegen 197
reposetup 197
resetpwd 198
resvalidate 198
searchindex 199
sendlogs 200
syncpreferip 201
tee 202
tempca 202
threaddumps 203
tproc 203
updaterepohostconfig 204
whois 204
zoneUpdate 205
CORR-Engine ArcSight Commands 209
Page 10 of 250
Administrator's Guide
Page 11 of 250
Administrator's Guide
web browser, some topics may not be formatted properly. Some interactive topics may not be present in this PDF version.
Those topics can be successfully printed from within the online help.
Page 12 of 250
Chapter 1: Starting and Stopping the
Manager and Components
Start the Manager from a command or console window. The remainder of this section provides
more information about command line options to start, shut down, configure, or reconfigure
ESM components.
Note: If your system is in distributed correlation mode, see the Release Notes for special
instructions.
Where <hostname> is the host name or IP address of the Manager that you specified when you
first configured ESM.
Chapter 1: Starting and Stopping the Manager and Components Page 13 of 250
Administrator's Guide
Chapter 1: Starting and Stopping the Manager and Components
ArcSight Console to also be running, so that you can see the status of the configured
SmartConnectors and view messages as they appear on the Console.
On Windows:
arcsight agents
On Linux:
./arcsight console
On Windows:
arcsight console
Note: The connection to the Manager cannot be re-established while the Manager is starting. In
some cases, a connection cannot be established without resetting one or both machines.
Clicking Retry may display connection exceptions while the Manager is starting again, or as the
connection is re-established.
References to ARCSIGHT_HOME
<ARCSIGHT_HOME> in the paths represents:
Blank lines and lines that start with a pound sign ( # ) are ignored. Use the pound sign for
comments.
Because the user properties file contains settings you specify to suit your environment, it is
never replaced by an upgrade. If an upgrade, such as a service pack or a version update,
changes any properties, it does so in the defaults file.
The following table lists the most important properties files. The paths are relative to
<ARCSIGHT_HOME>.
You can edit the properties using any text editor. Make sure you use one that does not add any
characters such as formatting codes.
If you configured the Console and SmartConnectors using default settings in the configuration
wizard, a user properties file is not created automatically for that component. If you need to
override a setting on such a component, use a text editor to create this file in the directory
specified in the above table.
When you edit a property on a component, you must restart the component for the new values
to take effect except for the dynamic Manager properties listed in the next section.
If you change a communication port, be sure to change both sides of the connection. For
example, if you configure a Manager to listen to a different port than 8443, be sure to
configure all the Manager’s clients (Consoles, SmartConnectors, and so on) to use the new port
as well.
TCP 8443 SmartConnectors, ArcSight Command Center, and ArcSight Console to Manager
communication
Dynamic Properties
When you change the following properties in the server.properties file on the Manager,
you do not need to start the Manager again for the changes to take effect:
l auth.auto.reenable.time
l auth.enforce.single.sessions.console
l auth.failed.max
l auth.password.age
l auth.password.age.exclude
l auth.password.different.min
l auth.password.length.max
l auth.password.length.min
l auth.password.letters.max
l auth.password.letters.min
l auth.password.maxconsecutive
l auth.password.maxoldsubstring
l auth.password.numbers.min
l auth.password.others.max
l auth.password.others.min
l auth.password.regex.match
l auth.password.regex.reject
l auth.password.unique
l auth.password.userid.allowed
l auth.password.whitespace.max
l auth.password.whitespace.min
l external.export.interval
l notification.aggregation.max_notifications
l process.execute.direct
l servletcontainer.jetty311.log
l servletcontainer.jetty311.socket.https.expirationwarn.days
l ssl.debug
l whine.notify.emails
l xmlrpc.accept.ips
After you make the change, you use the manager-reload-config command to load those
changes to the Manager. Every time the manager-reload-config command is successful, a
copy of the server.properties file it loaded is placed in <ARCSIGHT_HOME>/config/history
for backup purposes. The server.properties file in <ARCSIGHT_HOME>/config/history is
suffixed with a timestamp and does not overwrite the existing versions, as described in the
following example.
Example
Manager M1 starts successfully for the first time on September 26, 2013, at 2:45 p.m. A
backup copy of its server.properties file is written to <ARCSIGHT_HOME>/config/history
with this timestamp:
server.properties.2013_09_26_14_45_27_718
On September 27, 2013, the M1 administrator adds the following property to the
server.properties file:
notification.aggregation.max_notifications=150
When the administrator runs the manager-reload-config command at 1:05 p.m. the same
day, it runs successfully because this property can be loaded dynamically.
As soon as the updated server.properties file is loaded in M1’s memory, a backup copy of
the updated server.properties file is written to <ARCSIGHT_HOME>/config/history with
appropriate timestamp.
Now, <ARCSIGHT_HOME>/config/history contains these two backup files:
server.properties.2013_09_26_14_45_27_718
server.properties.2014_09_27_01_05_40_615
On September 28, 2014, the M1 administrator adds this property to the server.properties
file:
notification.aggregation.time_window=2d
As this property can be also loaded dynamically, similar to the previous change, after the
updated server.properties is loaded in M1’s memory, a backup copy of the
server.properties file is written to <ARCSIGHT_HOME>/config/history with appropriate
timestamp.
Now, <ARCSIGHT_HOME>/config/history contains these three backup files:
server.properties.2014_09_26_14_45_27_718
server.properties.2014_09_27_01_05_40_615
server.properties.2014_09_28_03_25_45_312
Note: The -diff option compares all server properties—default and user properties. For
all options available with the manager- reload- config command, see manager-reload-
config.
If this command fails with a warning, it means you are changing properties that require a
Manager restart. In that case, none of the property changes are applied, including ones that do
not require a restart. You can:
l Revert changes to properties that require you to stop the Manager and then start all services
and rerun the manager-reload-config command.
l Force an update of all properties using the –as option, as follows:
arcsight manager-reload-config -as
When you use the -as option, the properties that can be changed without starting the Manager
take effect immediately. The properties that require the Manager started again are updated in
the server.properties but are not effective until the Manager is started.
For example, if you change auth.password.length.min to 7 and search.enabled to false,
you get the above warning because only auth.password.length.min can be updated without
starting the Manager. If you force an update of the server.properties file,
auth.password.length.min is set to 7, but search.enabled continues to be set to true until
the Manager is started.
Note: Be careful in using the –as option to force reload properties. If an invalid static change is
made, it may prevent the Manager from starting up after it reboots.
l <ARCSIGHT_HOME>/config/proxy.rule.xml
l <ARCSIGHT_HOME>/config/rewriteProxy.rule.xml
Make sure to replace the references to port 9090 with an unused port number.
2. Stop the Manager by running the following command as user arcsight:
/etc/init.d/arcsight_services stop manager
This operation is performed during the Manager installation. As a result, only the owner of the
file, which must be the user that runs the Manager, may read or write to the file. For all other
users, access to the file is denied.
In the bin/scripts directory, edit the console.bat (Windows) or console.sh (Linux) and
modify the ARCSIGHT_JVM_OPTIONS -Xms and/or the -Xmx parameters for the memory usage
range of the Java Virtual Machine.
Note: Changing the key does not affect any currently attached files.
By default, Threat Detector limits its memory usage to about 4 GB of memory. However, if the
search for patterns involves too many transactions and events, the task can run out of memory
and abort. To control the memory limit indirectly, change the maximum number of
transactions and events the Threat Detector task can hold in memory. The settings for these
values are in the server.defaults.properties file in the config folder. Place the changed
versions in the server.properties file to supersede the default.
l patterns.transactionbase.max: The maximum transactions allowed in memory. If you
exceed this, these transactions are stored as a page file. The default is 10000.
You can edit the properties file using a regular text editor. After adding this property, stop and
start the manager for it to take effect.
Various Manager utilities write logging information to different sets of log files. Each of which
can consist of multiple files.
The number and size of log files are configurable, a typical setting is 10 files with 10
megabytes each. When a log file reaches a maximum size, it is copied over to a different
location. Depending on your system load, you may have to change the default settings. To
make changes to the logging configuration, change the log channel parameters. The default
log channel is called file.
For the main Manager log file, called server.log, the following server.properties settings
are used:
# Maximum size of a log file.
log.channel.file.property.maxsize=10MB
The first setting affects the size of each individual log file; the second affects the number of log
files created. The log file currently in use is always the one with no number appended to the
name. The log file with the largest number is the oldest. All log files are written to the
/opt/arcsight/var/logs/manager/default directory.
The Manager and its related tools write the following log files:
server.std.log* All output that the Manager prints on the console (if run in command line mode)
server.pulse.log* The Manager writes a line to this set of logs every ten seconds. Used to detect
service interruptions.
server.sql.log* If database tracing is enabled, the SQL statements are written to this set of log
files.
execproc.log* Log information about externally executed processes (only on some platforms)
serverwizard.log* Logging information from the managersetup command.
Correlator
correlator.log* The main correlator log.
correlator.pulse.log* The correlator writes a line to this set of logs every ten seconds. Used to detect
service interruptions.
correlator.status.log* Correlator status information, such as memory usage.
Aggregator
aggregator.log* The main aggregator log.
aggregator.pulse.log* The aggregator writes a line to this set of logs every ten seconds. Used to detect
service interruptions.
aggregator.status.log* Aggregator status information, such as memory usage.
Distributed Cache
dcache.log The main dcache log.
dcache.std.log Dcache status information, such as memory usage.
Repository
repo.log Miscellaneous information output by ZooKeeper.
repo.std.log ZooKeeper status information.
Distributed Correlation
Service Log Location
persistor /opt/arcsight/var/logs
correlators /opt/arcsight/var/logs/<correlator_serviceId>
aggregators /opt/arcsight/var/logs/<aggregator_serviceId>
repository /opt/arcsight/var/logs/<repo_serviceId>
To gather logs and diagnostic information for all or a selected set of components, do one of the
following:
l On the ArcSight Console, click Tools > SendLogs.
l Enter this command in <ARCSIGHT_HOME>/bin on the Console or Manager machine:
./arcsight sendlogs
The above action starts the Send Logs wizard. In the wizard screens, perform these steps:
Note: The Send Logs wizard remembers most of the choices you make when you run it for the
first time. Therefore, for subsequent runs, if you choose to use the previous settings, you do not
need to re-enter them.
1. Decide whether you want the wizard to gather logs only from the component on which you
are running it or from all components.
Choose either Use current settings to gather logs or Change/Review settings before
gathering logs.
If you select Use current settings to gather logs Logs for all components are gathered
thus: If this is the first sendlogs is run after installation, then all the logs are gathered. If
this is not the first time you have sendlogs has run, it uses the same setting as the previous
run.
a. Enter the Manager’s login information.
b. Go to the step Sanitize logs.
If you select Change/Review settings before gathering logs, you can to select the
components for which you want logs gathered.
Choose either Local Logs Only or Logs from other components (Requires Manager
credentials). These choices allow you to select whether you want only the local (the
component from where you ran the sendlogs command) logs selected or to select logs
from other components to be collected as well.
In case you do not have an incident number at this time, you can continue by entering a
meaningful name for the compressed file to be created. After you obtain the incident
number from Customer Support, you can rename the file with the incident number you
received.
4. Click Next to start the compression.
Note: Most of the values you entered during the first run of the Send Logs wizard are
retained. The next time you run this wizard, you need to enter only a few settings.
To run the ArcSight Console Setup program without the graphical user interface, type:
./arcsight consolesetup -i console
The email.tls.desired server property allows you to configure email for SMTP servers
configured to use Transport Layer Security (TLS).
If your SMTP server is configured to use TLS, you do not need to do anything because, by
default, this property is set to true.
If your SMTP server is not set to use TLS, then add the property email.tls.desired=false to
the sever.properties file. See Managing and Changing Properties File Settings, for
information on editing the sever.properties file.
If the TLS configurations do not match:
l SMTP server uses TLS and email.tls.desired=false, emails are sent without TLS.
l SMTP server does not useTLS and email.tls.desired=true, emails are not sent.
If emails fail for any reason, they are not re-sent.
Password Length
The simplest one is a minimum and, optionally, a maximum length of the password. The
following keys in server.properties affect this:
auth.password.length.min=6
auth.password.length.max=20
By default, the minimum length for passwords is six characters and the maximum length is 20
characters and can contain numbers and/or letters.
Configuring the above properties to a value of -1 sets the password length to unlimited
characters.
auth.password.userid.allowed=false
When this key is set to false (the default), a user cannot include their user name as part of the
password.
auth.password.letters.max=-1
auth.password.numbers.min=-1
auth.password.whitespace.min=0
auth.password.whitespace.max=0
auth.password.others.min=-1
auth.password.others.max=-1
The *.min settings can be used to enforce that each new password contains a minimum
number of characters of the specified type. The *.max settings can be used to limit the number
of characters of the given type that new passwords can contain. Letters are all letters from A-Z,
upper and lowercase, numbers are 0-9; "whitespace" includes spaces, etc.; "others" are all
other characters, including special characters such as #$%@!.
Additionally, the following server.properties key lets you restrict the number of consecutive
same characters allowed.
auth.password.maxconsecutive=3
For example, the default setting of 3 would allow "adam999", but not "adam9999" as a
password.
Furthermore, the following server.properties key enables you to specify the length of a
substring that is allowed from the old password in the new password.
auth.password.maxoldsubstring=-1
For example, if the value is set to 3 and the old password is "secret", neither "secretive" nor
"cretin" is allowed as a new password.
auth.password.regex.reject=
For more information on creating an expression for this property, see http://www.regular-
expressions.info/. The following are a few examples of regular expressions and a description of
what they mean.
l auth.password.regex.match= /^\\D.*\\D$/
Only passwords that do not start or end with a digit are accepted.
l auth.password.regex.match= ^(?=.*[A-Z].*[A-Z])(?=.*[a-z].*[a-z])(?=.*[0-
9].*[0-9])(?=.*[^a-zA-Z0-9].*[^a-zA-Z0-9]).{10,}$
Only passwords that contain at least 10 characters with the following breakdown are
accepted:
o At least two upper case letters
o At least two lower case letters
o At least two digits
o At least two special characters (no digits or letters)
l auth.password.regex.reject= ^(?=.*[A-Z].*[A-Z])(?=.*[a-z].*[a-z])(?=.*[0-
9].*[0-9])(?=.*[^a-zA-Z0-9].*[^a-zA-Z0-9]).{12,}$
The passwords that contain 12 characters with the following breakdown are rejected:
o At least two upper case letters
o At least two lower case letters
o At least two digits
o At least two special characters (no digits or letters)
Password Uniqueness
In some environments, it is also desirable that no two users use the same password. To enable
a check that ensures this, the following server.properties key can be used:
auth.password.unique=false
If set to true, the Manager checks all other passwords to make sure nobody is already using the
same password.
Note: This feature may not be appropriate for some environments as it allows valid users of the
system to guess other user’s passwords.
Changing Passwords
When you change or reset a user password, ESM does not terminate existing sessions that are
associated with that user. To terminate the existing user sessions, restart the Manager. For
more information, see Restarting the Manager - Stop the Manager and Start All Services.
auth.password.age=60
auth.password.age.exclude=username1,username2
This value is a comma-separated list of user names. The passwords of these users never expire.
The Manager can also keep a history of a user’s passwords to make sure that passwords are
not reused. The number of last passwords to keep is specified using the following key in
server.properties:
auth.password.different.min=1
By default, this key is set to check only the last password (value = 1). You can change this key to
keep up to last 20 passwords.
Change this to the desired number or to -1 if you do not wish user accounts to be disabled,
regardless of the number of failed log in attempts.
After a user account has been disabled, the Manager can be configured to automatically re-
enable it after a certain period of time. This reduces administrative overhead, while effectively
preventing brute force attacks. This mechanism is controlled by the following key in
server.properties:
auth.auto.reenable.time=10
This value specifies the time, in minutes, after which user accounts are automatically re-
enabled after they were disabled due to an excessive number of incorrect log ins. Set the
property key to -1 to specify that user accounts can only be re-enabled manually.
Change <days> to the number of days of inactivity allowed before the account is disabled.
Manager is running. Then, from the command line, run the following commands as user
arcsight:
cd <ARCSIGHT_HOME>/bin
./arcsight reenableuser <username>
where <username> is the name of the user you want to re-enable. After this procedure, the
user can log in again, using the unchanged password.
You can configure ESM to create the asset as long as it has either an IP address or a host name.
In server.properties, change scanner-
event.dynamiczone.asset.nonidentifiable.create from false to true. ESM discards
conflicts between an IP address and host name (similar IP address, but different host name
and/or MAC address).
Caution: Creating an asset if no host name is present can result in an inaccurate asset model.
Setting scanner-event.dynamiczone.asset.nonidentifiable.create to true means that
assets are created if the asset has an IP address or hostname.
This could lead to disabled assets or duplicated assets being created. Change this configuration
only if you are using a dynamic zone to host ostensibly static assets, such as long-lived DHCP
addresses.
Example Action taken if no conflicts Action taken if previous asset with similar information
Example Action taken if previous asset with similar information and preserve = true
Example Action taken if previous asset with similar information and preserve = true
You can reconfigure this naming scheme. For example, if you want the asset name for an asset
in a static zone to appear this way in the ArcSight Console:
myhost_1.1.1.1
to
$!destinationHostName_$destinationAddress
ArcSight SmartConnectors determine whether the Manager they are sending events to
supports compression.
Turbo Modes
When Turbo Mode is not specified (mode 3, Complete), all event data arriving at the
SmartConnector, including additional data, is maintained. Turbo Mode 2, Faster, eliminates the
additional custom or vendor-specific data, which is not required in many situations. Turbo
Mode 1, Fastest, eliminates all but a core set of event attributes, in order to achieve the best
throughput. Because the event data is smaller, it requires less storage space and provides the
best performance. It is ideal for simpler devices such as firewalls.
The Manager processes event data using its own Turbo Mode setting. If SmartConnectors
report more event data than the Manager needs, the Manager ignores the extra fields. On the
other hand, if the Manager is set to a higher Turbo Mode than a SmartConnector, the Manager
maintains fields that are not filled by event data. Both situations are normal in real-world
scenarios, because the Manager configuration reflects the requirements of a diverse set of
SmartConnectors.
Event data transfer modes are numbered (1 for Fastest, 2 for Faster, 3 for Complete), and
possible Manager-SmartConnector configurations are therefore:
1-1 Manager and SmartConnector in Fastest mode
1-2 SmartConnector sending more sensor data than Manager needs
1-3 SmartConnector sending more sensor data than Manager needs
2-1 SmartConnector not sending all data that Manager is storing*
2-2 Manager and SmartConnector in Faster mode
2-3 Default: Manager does not process additional data sent by SmartConnector
3-1 Manager maintains Complete data, SmartConnector sends minimum*
3-2 Manager maintains additional data, but SmartConnector does not send it
3-3 Manager and SmartConnector in Complete mode
*When the SmartConnector sends minimal data (Turbo Mode 1), the Manager can infer some
additional data, creating a 2-1.5 or a 3-1.5 situation.
Caution: Setting the Manager to send SNMP v3 traps is not FIPS compliant. This is because SNMP
v3 uses the MD5 algorithm. However, SNMPv1 and v2 are FIPS compliant.
Set this property to true in order to enable the SNMP trap sender.
snmp.trapsender.uri=
/All Filters/Arcsight System/SNMP Forwarding/SNMP Trap Sender
The system uses the filter specified by the URI (it should all be on one line) to decide whether
or not an event is forwarded. There is no need to change the URI to another filter. These
contents are locked and are overwritten when the contents are upgraded to the next version.
By default, the "SNMP Trap Sender" filter logic is Matches Filter (/All Filters/ArcSight
System/Event Types/ArcSight Correlation Events)—that is, only rules-generated events are
forwarded.
snmp.destination.host=
snmp.destination.port=162
The host name and the port of the SNMP listener that wants to receive the traps.
snmp.read.community=public
snmp.write.community=public
The SNMP community strings needed for the traps to make it through to the receiver. The read
community is reserved for future use, however, the write community must match the
community of the receiving host. This depends on your deployment environment and your
receiving device. Please consult your receiving device's documentation to find out which
community string to use.
snmp.version=1
snmp.fields=\
event.eventId,\
event.name,\
event.eventCategory,\
event.eventType,\
event.baseEventCount,\
event.arcsightCategory,\
event.arcsightSeverity,\
event.protocol,\
event.sourceAddress,\
event.targetAddress
These event attributes should be included in the trap. The syntax follows the SmartConnector
SDK as described in the Asset Model Import FlexConnector Developer's Guide. All the ArcSight
fields can be sent. The identifiers are case sensitive, do not contain spaces and must be
capitalized except for the first character. For example:
Service service
ArcSight SNMP
INTEGER INTEGER32
Address IP ADDRESS
BYTE INTEGER
This sends the Event Name field and the value of myvalue in the additional data list part of the
SNMP trap. Only the String data type is supported for additional data, therefore all additional
data values are sent as OCTET STRING.
Note: Only the assets belonging to the following categories are considered for aging:
l /Site Asset Categories/Scanned/Open Ports
l /Site Asset Categories/Scanned Vulnerabilities
asset.aging.excluded.groups.uris=/All Assets/MyAssets,/All
Assets/DontTouchThis
Note: When setting the asset.aging.excluded.groups.uris property keep in mind that the
assets in this group are not disabled, deleted or amortized.
#-----------------------------
# Asset aging
#-----------------------------
# Defines how many days can pass before a scanned asset is defined as old
# after this time the asset will be disabled
# Default value: disabled
asset.aging.daysbeforedisable = -1
Note that the default value -1 means that asset aging is turned off, not that assets will be
disabled.
The value is expressed in days that define how long an asset is allowed to age before it is
disabled. For example:
asset.aging.daysbeforedisable = <number of days>
means that after 4 days, assets will be considered old and disabled. Set this property to a
reasonable value that makes sense for your assets.
Deleting an Asset
To delete the asset instead of disabling it, set the property asset.aging.task.operation to
delete in server.properties file:
Verify that this property is set to delete for deletion of aging assets to occur.
the assets are not amortized. A "new" asset gets the full value while and "old" asset gets no
points. You can edit the AmortizeScan value (number of days) in the Manager’s
/config/server/ThreatLevelFormula.xml file:
<ModelConfidence>
<!-- Give 4 points each for whether the target asset has been scanned for
open port and vulnerabilities -->
<!-- This values can be amortized by the age of the asset -->
<!-- that means that the value will reduce constantly over time as the
asset age -->
<!-- ie if you set the value to be 120 on the day the assets are created
they receive the four points, by day 60 they'll receive 2 points and by day
120 they'll receive 0 points -->
</Sum>
</ModelConfidence>
Asset Age
(in days) AmortizeScan Value
0 4
60 2
120 0
240 0
Note: In-memory capacity changes made to arc_ session_ list must match sessionlist.max_
capacity in server.properties
If you update the in-memory capacity for the arc_session_list table to number other than
the default 500,000, the value you enter must match the value set for sessionlist.max_
capacity in server.properties .
2. Adjust Java Heap Memory Size using the Manager Configuration Wizard. Supporting
50,000 actors requires an additional 2 GB of Java heap memory in the Manager. An
additional 300 MB is needed for each category model you construct that uses 50,000
actors. This additional memory is not in use all the time, but is needed for certain
operations. The Manager Configuration Wizard is covered in Running the Manager
Configuration Wizard.
3. Re-start the Manager. See Restarting the Manager - Stop the Manager and Start All
Services for details.
4. Proceed with importing the actor model.
Note: The custom login message is not supported when you are using OSP or SAML2
authentication with the Command Center. You should configure your identity provider to display
the login banner.
3. To implement the changes, stop the Manager by running the following command as user
arcsight:
l rules.checkpoint.enabled=true
Use this property to set whether or not a rules engine checkpoint file is created. The default
is true. If this property is set to true, then the property rules.recovery.enabled should
also be set to true.
l rules.checkpoint.interval=300
This property sets the interval between checkpoints in seconds. The default is 300 seconds (5
minutes).
l rules.recovery.enabled=true
Use this property to specify if a checkpoint should be used when ESM starts. The default is
true.
l rules.recovery.time-limit=120
This property sets the time limit on loading events from the database. The default is 120
seconds (2 minutes). For example, if it takes longer than 2 minutes to load the events, the
system will stop event recovery at 2 minutes.
l rules.recovery.event-query-time-range=1800
This property sets the limit on how far in the past the system will go for events during
recovery. The default is 1800 seconds (30 minutes). You can increase this parameter value to
accomodate an extended system downtime, but prolonged recovery time can affect system
performance. Also, if you change the value of this parameter, you might find you need to
change the value of rules.recovery.time-limit=120 as well.
Note: The timeout can still occur even after you increase the time limit, due to overall system
load, high EPS, or a large number of rules to recover.
Where entries are a comma separated list of the elements that could be of one of the
following two forms:
l origin (for example, https://mycompany.com)
l key:::origin
In this example, the key is any string uniquely identifying the origin within the comma-
separated list. For the definition of origins, see http://tools.ietf.org/html/rfc6454.
Below is an example of allow.from.domains containing several entries. The first entry is
origin, while the second is key-value pair:
allow.from.domains=https://mycompany.com,microsoft:::https://microsoft.com
Third party applications that need to iframe Command Center pages should add the parameter
"origin" to URLs pointing to Command Center page and use that parameter to specify their
origin. For example:
https://host:8443/www/ui-
phoenix/com.arcsight.phoenix.PhoenixLauncher/?origin=microsoft#login
In that parameter the origin could be specified directly (https://microsoft.com) or with help of
the key (microsoft) from the above ESM configuration setting.
ESM uses "origin" parameter from HTTP request to lookup an entry in "allow.from.domains"
setting. If there is matching entry, then iframing is allowed for configured origin. If origin is
specified in the HTTP request, but is not presented in "allow.from.domains", the request will
fail with the exception "Not allowed request".
HTTP requests without "origin" parameter are handled by ESM the same way as before, so
there are no changes for regular Command Center sessions. Here iframing is not allowed to
prevent clickjacking vulnerability:
https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet
The implementation requires enabling cookies in the browser. It might also be needed to login
to Command Center without iframing from the browser once. Opening Command Center
directly creates browser's cookie for the target host. By default, the cookies for iframed pages
are not created.
For example, if the value of the property bytesInBytesOut.scaling.divider is 10, all bytes
in and bytes out values are divided by 10. By default, the data are not changed. If the values
after scaling are still larger than the maximum integer number(2^31-1), they are then rounded
to the maximum integer number, which is 2,147,483,647.
For forwarded events (Locality=forwarded), bytes in and bytes out values will not be changed
and scaling will not apply.
Notes for bytes in and bytes out behavior in relation to the different versions of
SmartConnectors:
l For SmartConnectors version 7.4.0.XXXX.0 and newer: These versions of SmartConnectors
send the Bytes In and Bytes Out field values as long numbers to ESM. If the property
value is more than 1, scaling will be applied. If a value of Bytes In or Bytes Out event
fields after scaling is more than the maximum integer value, it will be truncated to the
maximum integer value.
l For SmartConnectors version 7.3.0.XXXX.0 and older: These versions of SmartConnectors do
not support values for Bytes In and Bytes Out event fields that are larger than the
maximum integer value; in these cases, the entire event is dropped. For Bytes In and
Enabling Scaling for Bytes In and Bytes Out Event Fields Page 53 of 250
Administrator's Guide
Chapter 2: Basic Configuration Tasks
Bytes Out fields that have values less than the maximum integer value, data will be scaled
if the server property value is more than 1.
Change the IP protocol to IPv6 and change the host name to the appropriate IPv6 host
name.
8. Regenerate the Manager certificate.
9. As user root, start all services:
/etc/init.d/arcsight_services start all
To customize the product images on the ArcSight Command Center login page:
1. Create your own product image or images with your logo and product label, or have one
available. There are four images that you can customize on the login page:
2. Rename the product image file that you want to customize to the image name listed in the
table above. The image size must be as specified in the table.
3. Copy the customized images files to:
<ARCSIGHT_HOME>/arcsight-dm/dmapps/ui-phoenix-
1.<X.X>/dist/www/com.arcsight.phoenix.PhoenixLauncher/bannerImages.
4. Refresh the ArcSight Command Center to see the new product images.
Note: You cannot use an IPv6 address as a hostname. IPv4 addresses can be used as hostnames.
If you are using the Active Passive High Availability module, the procedure is different. See the
Active-Passive High Availability Module User's Guide for the proper procedure.
If you want to change the IP address of your machine after running the First Boot Wizard
successfully, follow these steps:
Note: Run the Manager setup command when logged in as user arcsight .
5. As user arcsight, run the Manager’s setup program from the <ARCSIGHT_HOME>/bin
directory:
./arcsight managersetup
a. Enter the new host name (that you set for your machine in the steps above), in the
Manager Host Name field when prompted by the wizard – and in every other field
where the old hostname is displayed.
b. Make sure to select the self-signed keypair option when prompted by the wizard and
enter the required information to generate the self-signed certificate containing the
new host name.
If you are in FIPS mode, you do not get an option to regenerate the keypair. In this case,
manually delete the keypair, regenerate it, and then go the next step to start all
services.
6. As user arcsight, start all services:
/etc/init.d/arcsight_services start all
Run this command about once a minute, until you see the line manager service available.
8. Import the Manager’s newly-generated certificate on all clients (Console and connectors)
that access the Manager. See Import a Certificate.
9. Test to ensure that:
l The clients can connect to the Manager.
l Peer configuration works as expected. If not, redo the peer configuration.
o postgresql
o execprocsvc
You can manage all cluster nodes from the persistor node. Tasks that you perform at the
node level affect that node only. When you import content packages into the persistor
system, the packages are propagated across the cluster. All database queries run on the
persistor node.
l Correlator
The correlator uses filters and rule conditions to discover the relationships between events.
You can have multiple instances of correlators.
l Aggregator
The aggregator summarizes or consolidates events with matching (or not matching) values
over a timeframe. You can have multiple instances of aggregators.
l Message bus data and message bus control (mbus_data and mbus_control)
mbus_data and mbus_control manage messaging in the cluster.
l Distributed cache (dcache)
The distributed cache is a shared data cache for the cluster.
l Repository (repo)
The repository contains cluster service status information and an index of cluster resources.
The repository is the shared information base for the cluster and central to cluster
operation.
For conceptual information about distributed correlation clusters, see ESM 101. For
information about cluster planning and installation, see the Installation Guide.
correlators, distributed cache, and repository) during installation. For more information,
see the Installation Guide.
Note: The message bus data and message bus control services are not added during
installation. You must configure these services later.
If a node needs configuration, the command prompts you for arcsight user password, so it
can log in and complete the setup.
For ease of setup, you can elect not to specify the host name, and in that case the setup is
performed on all cluster nodes.
Note: After you configure a cluster service, you must start all services from the persistor node.
For more information, see Starting Distributed Correlation Services.
As you add cluster services, ESM increments the instance IDs. For example, as you add
correlators, ESM numbers them as correlator1, correlator2, and so on. If you delete an
instance of a service (for example, correlator2), ESM increments the next instance of that
service by one. In this example, if you delete correlator2 and then add a new correlator
instance, ESM numbers that instance as correlator3. Because ESM identifies all cluster services
internally by the assigned instance ID, ESM does not re-use numbers.
You can add names to services to identify them for organization, as a reminder of the point of
adding the services, or other purposes that help you work with the cluster. These service names
do not replace the instance IDs that ESM provides, but exist in addition to those instance IDs.
Important: You must set up passwordless SSH on the persistor node in order to configure the
message bus data and message bus control services. If passwordless SSH is not implemented, the
mbussetup wizard will not perform any configuration. For information about setting up
passwordless SSH, see Setting Up Key-Based Passwordless SSH.
When you change message bus data or message bus control instances, ESM replaces all
instances of these services and you lose the data in the replaced instances. Also, ESM
increments the number in the name of the new instances. For example, assume that you have
a four-node cluster with the following message bus data and message bus control instances:
Node 1 - no message bus instances
Node 2 - mbus_data1, mbus_control1
Node 3 - mbus_data2, mbus_control2
Node 4 - mbus_data3, mbus_control3
If you change this cluster to add a message bus data instance to a new node 5, ESM increments
the existing instance IDs by one, based on the highest instance ID from the previous
configuration:
Node 1 - no message bus instances
Node 2 - mbus_data4, mbus_control4
Node 3 - mbus_data5, mbus_control5
Node 4 - mbus_data6, mbus_control6
Node 5 - mbus_data7
Unlike other services, you can only stop message bus control services from the persistor node.
When you run /etc/init.d/arcsight_services stop mbus_control<#> from the persistor
node, it will stop all instances of the message bus data service.
Caution: If you plan to install the High Availability module on the persistor node, do not configure
a message bus data instance on the persistor node. Otherwise, the cluster is likely to fail when
ESM swaps the primary and secondary systems.
To configure multiple message bus control and message bus data instances in a
cluster:
Configuring Message Bus Control and Message Bus Data Services Page 63 of 250
Administrator's Guide
Chapter 3: Configuring and Managing a Distributed Correlation Cluster
I want to add, delete, or change an a. Enter the number of mbus_data instances you want on each
instance node.
You need a minimum of three message bus data instances per
cluster.
b. Enter the number of mbus_control instances you want on
each node.
Add one or three instances of the message bus control service
per cluster.
6. If you added services or changed services (such as adding a friendly name for a service),
you must start the services in order for the configuration changes to take effect. For more
information, see Starting Distributed Correlation Services.
Configuring Message Bus Control and Message Bus Data Services Page 64 of 250
Administrator's Guide
Chapter 3: Configuring and Managing a Distributed Correlation Cluster
Note: correlationsetup operates on a per instance basis. You must configure instances
one at a time.
3. If the node did not previously include correlator or aggregator instances, after you exit the
wizard, complete the following steps:
a. As user arcsight, run the following command on the persistor node:
<ARCSIGHT_HOME>/bin/arcsight certadmin -list submitted
Review the output to verify that the certificates represent the cluster nodes. To view
the certificate details, use the -v option.
b. After you confirm that the certificate list is correct, run the following command:
Specify the cluster administration password that was provided when you installed ESM
on the persistor node.
c. Stop and start the ArcSight Manager so that it can read the certificates:
/etc/init.d/arcsight_services stop manager
You must start all of the services for the configuration changes to take effect.
4. If the node already included at least one correlator or aggregator instance, run the
following command to start the new instance:
/etc/init.d/arcsight_services start <correlator or aggregator ID>
Note: correlationsetup operates on a per instance basis. You must configure instances
one at a time.
Action Description
3. Run the following commands to stop and then start the modified instance:
/etc/init.d/arcsight_services stop <correlator or aggregator ID>
Note: dcachesetup operates on a per instance basis. You must configure instances one at a
time.
Action Description
Configure Common Settings Specify the interval at which to report that distributed cache
instances are running. The default is 180 seconds.
3. If you added a distributed cache instance, run the following command to start the instance:
/etc/init.d/arcsight_services start <distributed cache ID>
4. If you changed an existing distributed cache (such as adding a friendly name), run the
following commands to stop and then start the modified instance:
/etc/init.d/arcsight_services stop <distributed cache ID>
4. Run the following command to remove information repository records from non-
responsive distributed cache instances:
bin/arcsight dcache-repo-records -r dcache#
Configuring a Repository
By default, ESM creates a repository instance on the persistor node (the first node on which
you installed ESM in distributed correlation mode). After installation, you can configure three
repository instances. A cluster can have either one repository instance or three instances, with
one repository instance per node. Other numbers of repository instances are not supported.
The benefit of having multiple repository instances is that you have more than one place to
store cluster service status information (including certificate status and port assignments for
services); all repository instances work together to provide the repository service. If a node that
contains a repository becomes unavailable, the other instances of the repository will maintain
the cluster status information. The repository is central to cluster operation, and cluster
membership is based on the information in the cluster repository. If the repository is
unavailable, the cluster stops working.
When you change repository instances, ESM replaces all instances of the service and you lose
the data in the replaced instances. Also, ESM increments the number in the name of the new
instances.
Change the list of Information From the list of existing nodes, select two nodes to add a total of
Repository Instances three repositories. The initial repository instance was created during
installation.
You can specify different node locations to change the location of
instances. You might want to do this if the server on which the initial
instance of the repository is running is due to be taken offline or will
otherwise be unavailable.
Action Description
Change the TCP Port Range for Specify a range of ports to use for dynamic assignment to correlator
ESM Processes and aggregator services.
Enter the lowest port value and the highest port value. The lowest
value must be lower than the original lowest value, and the highest
value must be higher than the original highest value. For example, if
the original lowest value was 10000, and the original highest value
was 12000, then a valid set of new port designations would be the
lowest ESM server port at 9000, and the highest ESM server port at
14000. You can change the lowest value, the highest value, or both.
The lowest supported port value is 1024 and the highest supported
port value is 32767.
You specified the original range during installation and configuration
of the first cluster node (the persistor).
6. If you added or removed an information repository instance, ESM stops all of the instances
and you must run the following command to start them:
/etc/init.d/arcsight_services start repo
If a non-persistor node is not running the same version (major, minor, and patch) of ESM as the
persistor node, the services will not start on the non-persistor node. For information about
resolving this issue, see Why are services stopped or in a prolonged initializing state on non-
persistor nodes?.
Note: Perform the configuration steps that are described below on the persistor node of the
ESM cluster.
authority in the Administrator's Guide for the ArcSight Platform. You might need to contact the
Transformation Hub administrator to obtain the CA certificate if you do not have sufficient
privileges to access the Transformation Hub cluster.
If you have root access to the Transformation Hub cluster (version 3.x or later), you can obtain
the CA certificate as follows:
master=<master node host name or IP address>
Note: Optionally, you can copy forwarding.properties to a different file and edit that
file. If so, you must specify the file name when running the configure- event-
forwarding utility. Otherwise, configure- event- forwarding will read the default
forwarding.properties file.
The command output indicates whether the filter and connections to the forwarding
destination are valid.
4. If the settings in forwarding.properties are valid, run the following command to set the
configuration and save it in the information repository:
5. When you are ready to actively filter and forward events, run the following command to
enable event forwarding:
bin/arcsight configure-event-forwarding -enable
Note: ESM does not cache events when you disable distributed event forwarding. Events
that ESM ingests while forwarding is disabled will not be forwarded, even when you
subsequently enable forwarding. Events that ESM ingests after you enable forwarding will
be forwarded.
6. To view the current settings for distributed event forwarding, including whether it is
enabled or disabled, run the following command:
bin/arcsight configure-event-forwarding -print
If you modify the filter that distributed event forwarding uses, event forwarding automatically
detects the updated filter and begins using it to select events for forwarding as soon as you
save the filter update. Therefore, be cautious when modifying the filter.
Instead of modifying the filter, you can create a new filter and test it before you commit to
using it. When you are sure that the filter is correct, enter the new filter in the properties file,
and then run bin/arcsight configure-event-forwarding -validate <file> and
bin/arcsight configure-event-forwarding -commit <file> to apply the change to the
current configuration.
Note: When you disable backpressure, ESM will not slow the ingestion of events if event
forwarding cannot keep up with the rate at which events are being filtered for forwarding. The
lag might build up inside message bus to the point that the oldest unforwarded events are
dropped. Those events will not be forwarded.
Stop Services
To stop service by service type
For example:
/etc/init.d/arcsight_services stop logger_servers
For example:
/etc/init.d/arcsight_services stop correlator3
Note: You can specify a friendly name for a service, but when you stop services, you must use
the instance ID provided by the cluster.
If a service fails to stop, you will receive a message like this (for example, for the service
manager):
Start Services
To start service by service type
/etc/init.d/arcsight_services start <service type>
For example:
/etc/init.d/arcsight_services start dcache
will start all instances of the distributed cache service in the cluster.
To start a specific instance of a service type
/etc/init.d/arcsight_services start <instance_ID>
For example:
/etc/init.d/arcsight_services start correlator3
Note: You can specify a friendly name for a service, but when you start services, you must use
the instance ID provided by the cluster.
For example:
/etc/init.d/arcsight_services status repo
To check service status by node (run from the persistor node only)
/etc/init.d/arcsight_services statusByNode <hostname>
displays service status information grouped by node, and the status of the node. If a hostname
is specified, only services are listed; if not, all services on all hosts are listed. The process name
displays as well.
See "ArcSight_Services Command - Distributed Correlation Mode" on page 152 for details on
running arcsight_services.
In this diagram, the order of process start is indicated by the numbers below each process type.
As shown, the repository instances start first and the aggregator instances start last. The
arrows in the graphic point from clients to servers. Note that the processes are started in the
reverse direction of the arrows. The arrows indicate which processes to start. For instance, in
order to start an aggregator instance, besides that aggregator, all correlators, distributed
cache (dcache), manager, execprocsvc, logger_servers, postgresql, mysqld, mbus_data
(message bus data), and mbus_control (message bus control) are started.
The arrows also indicate when arcsight_services waits for servers to start before starting
clients. For instance, logger_servers do not start until mysqld and postgresql are running. By
contrast, requests to start aggregators usually immediately follow the request to start
correlators.
The following diagram illustrates processes stopping.
The stop order is roughly the reverse of the start order Client-server relationships remain the
same. However, more servers must wait for clients to stop before the server itself can stop to
ensure there is no data loss.
Monitoring the Cluster Using the Cluster View Dashboard Page 81 of 250
Administrator's Guide
Chapter 3: Configuring and Managing a Distributed Correlation Cluster
If, after working with the cluster, you find you need to extend the range of available ports, you
can do so using reposetup. See "Configuring Services in a Distributed Correlation Cluster" on
page 62 for details.
2. Using managersetup, change the authentication on the persistor node. See "Running the
Wizard" on page 138 for details on running managersetup.
3. Start all services on the cluster persistor node:
/etc/init.d/arcsight_services start all
About:
Each node in a cluster is identified either by host name or IP address. A single host may have
multiple host names and IP addresses. The procedures refer to the specific host name or
Following is an example of the returned information (your results may not match exactly, but
the versions should all be identical in all returned nodes):
[arcsight@n15-nnn-nnn-nnnn esm]$ /etc/init.d/arcsight_services version
Build versions:
myhost1:
esm: 7.0.0.XXXXX.0(BEXXXXX)
storage: 7.0.0.AAAAA.0(BLAAAAA)
process_management: 7.0.0-BBBBB
installer: 7.0.0-CCCCC
highavail: (HA2345)
myhost2:
esm: 7.0.0.XXXXX.0(BEXXXXX)
storage: 7.0.0.AAAAA.0(BLAAAAA)
process_management: 7.0.0-BBBBB
installer: 7.0.0-CCCCC
highavail: (HA2345)
myhost3:
esm: 7.0.0.XXXXX.0(BEXXXXX)
storage: 7.0.0.AAAAA.0(BLAAAAA)
process_management: 7.0.0-BBBBB
installer: 7.0.0-CCCCC
highavail: (HA2345)
In the above example, the nodes are identified by the host names myhost1, myhost2, and
myhost3. If the name(s) myhostn are changing to something else, then use the procedures in
this topic to apply the new host name in ESM.
Typically a single host may have multiple host names and IP addresses. If the host name or IP
Address shown above are to be changed, then you are required to perform the documented
procedure.
Initial steps:
On the persistor, log in as user arcsight and stop all services:
/etc/init.d/arcsight_services stop
Note: If the persistor is an HA setup, see the Active-Passive High Availability Module User's Guide.
If the persistor is an HA setup, as user arcsight, confirm the change to the HA subsystem by
running the command:
/usr/lib/arcsight/highavail/bin/arcsight firstBootWizard
The wizard should display the new information. Exit the wizard.
Enter the updated host names when prompted. This is only necessary if the host names
where one or more of the repository instances runs, has changed. It updates the repository
configuration so that the repository can be accessed using the new host names.
In most cases, this step will fail the first time it is run, because sshSetup needs to be run
again. The message will display a similar information:
6 errors were detected.
See /opt/arcsight/var/logs/misc/updaterepohostconfig.log for details.
2. Run
/opt/arcsight/services/init.d/arcsight_services sshSetup
This fixes the errors that caused updaterepohostconfig to fail. Note that the arcsight_
services in /etc/init.d is not used. It was removed when you ran remove_services.sh
on the persistor. Expect to see errors like:
ERROR: Information Repository is down.
Ignore such messages.
3. Run
<ARCSIGHT_HOME>/bin/arcsight updaterepohostconfig
but do not change host names at this point, since these have already been updated.
At the prompt to continue, enter yes.
4. If the persistor host name was also changed, run the command as user root:
<ARCSIGHT_HOME>/bin/setup_services.sh
This is necessary because in the command in the previous step started the local services.
6. Run
/etc/init.d/arcsight_services start repo
When prompted, enter the old and new host names for this node. Repeat the process on each
node. This updates the host names in the repository.
Even if you have already generated a new keypair outside of managersetup, you still need
to run the managersetup wizard to completion so that the newly generated certificate can
be submitted to the repository.
Pick an already configured correlator or aggregator, and select the current options.
Even if you have already generated a new keypair outside of correlationsetup, you
still need to run the correlationsetup wizard to completion (choosing any existing
instance) so that the newly generated certificate can be submitted to repository.
2. As user root, run the command
<ARCSIGHT_HOME>/bin/setup_services.sh
3. Run
/etc/init.d/arcsight_services stop all
This is necessary because local services were started by the previous step.
4. Run
/etc/init.d/arcsight_services start repo
Final steps:
Run these commands on the persistor as user arcsight.
1. Run
<ARCSIGHT_HOME>/bin/arcsight certadmin -list submitted
Review the output to verify that the certificates represent the cluster nodes that were
reconfigured. To view the certificate details, use the -v option.
2. After you ensure that the certificates are correct, run
<ARCSIGHT_HOME>/bin/arcsight certadmin -approveall
Specify the cluster administration password that was provided when you installed ESM on
the persistor node.
This approves newly-created certificates.
3. Run
/opt/arcsight/services/init.d/arcsight_services sshSetup
Select I want to add, delete, or change Message Bus Instances. When prompted for the
number of instances, make no changes.
The message confirms you did not make changes and you are prompted to continue.
Enter yes to continue.
5. Run
/etc/init.d/arcsight_services start
About:
You can change the Internet Protocol version (IP) of your cluster. You can change the cluster
preference from IPv4 to IPv6, or from IPv6 to IPv4. You first must run the Manager
Configuration wizard on the persistor node to select the IP preference, and then use the
syncpreferip utility to synchronize the cluster nodes with the choice of IP preference you
made on the persistor node.
Note: Passwordless SSH must be set up in order to be able to perform this task. See Setting Up
Key-Based Passwordless SSH for details.
All nodes in a distributed correlation cluster must have the same IP preference. When you
change the IP preference in a cluster, this change affects all nodes in the cluster. Note that all
nodes in the cluster will have the same Internet Protocol version when you have completed this
task.
See Running the Manager Configuration Wizard for details on starting the wizard.
2. Step through the wizard until it displays Preferred IP Version. Choose 0 for IPv4 or 1
for IPv6.
3. Continue through the wizard without making any other configuration changes.
After the wizard completes, you receive a message that your IP preference has changed.
For example:
NOTE:
The IP preference has changed from IPv4 to IPv6.
ESM is set up in distributed mode. Please run the 'arcsight syncpreferip'
tool on the persistor node to sync the IP preference across all nodes in
the cluster.
Exit the wizard.
This command synchronizes the IP preference for all of the nodes in the cluster to the
same IP preference you specified in the persistor node when you ran managersetup.
5. Stop and then start all services by running the following commands as user arcsight:
/etc/init.d/arcsight_services stop all
2. On the persistor node, run the configuration wizards and delete all services on the node
you want to remove. This may require reducing repository or message bus control from
three to one if there are no longer three nodes in the cluster. See "Configuring Services in
a Distributed Correlation Cluster" on page 62 for details on the cluster configuration
wizards.
3. If reposetup stopped the repository, run this command on the persistor:
/etc/init.d/arcsight_services start repo
Do not attempt to add the node back into the cluster using <ARCSIGHT_HOME>/bin/setup_
services.sh.
5. Uninstall ESM on the node. See the Installation Guide for details.
6. As user arcsight, run the information repository wizard to ensure that the node has been
removed. Select Remove a Node, and if you see that the node is still in the cluster, remove
it:
<ARCSIGHT_HOME>/bin/arcsight reposetup
Troubleshooting and Frequently Asked Questions for Distributed Correlation Page 91 of 250
Administrator's Guide
Chapter 3: Configuring and Managing a Distributed Correlation Cluster
Verify the version of ESM that is running on the node where services are not available. If the
node is not running the same version of ESM as the persistor node, upgrade the mismatched
node and then start the services.
How do I verify that the correlators, aggregators, and other services in my Page 92 of 250
Administrator's Guide
Chapter 3: Configuring and Managing a Distributed Correlation Cluster
I changed the friendly name for one of my correlators. Why is the change not Page 94 of 250
Chapter 4: SSL Authentication
ESM uses Secure Socket Layer (SSL) technology for communication between the Manager and
its clients, ArcSight Console, Transformation Hub, and SmartConnectors. It is not used between
the Manager and the database.
Note: TLS is based on SSL 3.0, so you can read this chapter to get a better understanding of how
TLS works as well.
SSL enables the Manager to authenticate its clients and communicate information over an
encrypted channel, thus providing the following benefits:
l Authentication: Ensuring that clients send information to an authentic server and not to a
machine pretending to be that server.
l Encryption: Encrypting information sent between the clients and the server to prevent
intentional or accidental modification.
By default, clients submit a valid user name and password to authenticate with the server;
however, these clients can be configured to use SSL client authentication.
Note that in the following topics in this chapter, for paths to commands on the Manager are:
l Interpret bin/arcsight as <ARCSIGHT_HOME>/bin/arcsight
l Interpret jre/bin/keytool as /opt/arcsight/java/esm/current/jre/bin/keytool
A keystore file is an encrypted repository on the SSL server that holds the SSL certificate and
the server’s private key. The following table lists the ESM component, the name of the
keystore on that component, and its location. Do not change the keystore file name.
Keystore password
Use a keystore password to encrypt the keystore file. Without this password, you cannot
open the keystore file. The default is password for the Manager and changeit for the
ArcSight Console’s client keystore. The default password for the key pair for any component
is the same as for the component’s keystore.
You specify a keystore password when creating a key pair, which is discussed in later
sections of this chapter. The password is obfuscated and stored in the ESM component’s
*.properties file. The following table lists the property name where the obfuscated
keystore passwords are stored.
Keystore Property File Property Name
The *.defaults.properties file contains the default truststore password for each ESM
component (By default this password is changeit). Use a truststore password to encrypt a
truststore file. Without this password, you cannot open the truststore file. The password is in
clear text. To change or obfuscate it, use the changepassword command.
The following table lists the property name where the obfuscated truststore passwords are
stored.
Truststore Property File Property Name
Cipher suites are set as a comma-delimited list. During the SSL handshake, the endpoints
provide these lists as the cipher suites that they can accept, in descending order of preference.
The SSL negotiation process chooses one of the cipher suites and that cipher suite is used for
the entire communication session between these two components. To limit cipher suites, it is
sufficient to restrict the list of enabled cipher suites on one side only (for example, on the
Manager side).
With client-side authentication, the server requests the client’s certificate when it sends its
certificate to the client. The client sends its certificate along with the encrypted session key.
Certificate Types
There are three types of SSL certificates:
l CA-signed
l Self-signed
Note: We recommend that you use bin/arcsight keytool , which does not require the X
Window system. Using the keytoolgui interface requires that the X Window system be
installed on your system, and only works in a non-FIPS implementation. Using the X Window
system is not preferred on the Manager machine. Also, note that the X Window system is not
present on an appliance. The command keytoolgui is not supported on the Mac, so for
managing the keystore and certificates and so on, on a Mac, use bin/arcsight keytool . The
command keytoolgui is not supported in FIPS mode, so for managing the keystore and
certificates, use bin/arcsight keytool .
command lines. The command bin/arcsight keytool provides default values for the
following parameters based on the value of the -store parameter:
l -keystore
l -storetype
l -storepass
l -keypass
l -srckeystore
l -srcstoretype
l -srcstorepass
l -destkeystore
l -deststoretype
l -deststorepass
The parameter store can take one of the following values:
l managercerts
l managerkeys
l clientcerts
l clientkeys
Note: These keywords are convenience names to refer to the truststores and keystores. The
actual names of the truststores and keystores are different.
The default values for the various store types are described below:
managercerts
Description Truststore for the Manager
The truststore that holds all the SSL certificates that are trusted by the Manager,
when the Manager acts as a server.
For example, when the Manager acts as a server to clients like the Console,
ArcSight Command Center, and Connectors, the SSL certificates for clients like the
Console and Connectors need to be present in this truststore for client
authentication to work when client authentication is enabled on the Manager .
managerkeys
Description Keystore for the Manager
The keystore that holds the Manager’s private key, when the Manager acts as a
server.
clientcerts
Description Truststore for the Console
On an ESM installation, this truststore holds all the SSL certificates that are trusted
by the command line tools. The Manager’s SSL certificate must be present in this
truststore for the command line tools to be able to connect to the Manager
successfully.
Additionally, this truststore holds all certificates trusted by the Manager when the
Manager acts as a client. For example, when the Manager connects to
Transformation Hub as a client, Transformation Hub's SSL certificate needs to be in
this truststore in order for the Manager to connect to the Transformation Hub
successfully.
clientkeys
Description Keystore for the Console
On an ESM installation, this keystore holds the private key for the command line
tools and private keys for the Manager when it acts as a client. This is required to
enable client authentication from a client to a server:
l For the command line tools, the server is the Manager.
l For the Manager, it connects as a client to Transformation Hub, and the
Transformation Hub acts as the server.
Parameters ending in storetype default to JKS in the non-FIPS case, and BCFKS for FIPS. Default
values for parameters ending in pass can be found by looking up the password property in the
configuration file. Default values for keystore parameters are found by looking up the keystore
property in the configuration file. Sometimes it is not defined there, in which case the FIPS or
non-FIPS default is used, depending on the case.
The following sections present bin/arcsight keytool command lines that are exactly
formed to perform the task mentioned in the section. Use only those options to perform the
documented tasks.
The command jre/bin/keytool can also be used for the SSL certificate tasks. For details on
jre/bin/keytool, see online vendor documentation. Various vendors have their own version
of keytool. Note that if you use keytool -h to view Help you will see options that are not
covered in this documentation. The keytool examples presented in this guide do not display all
possible keytool options. Refer to the keytool documentation online for the meaning of
parameters.
To use keytoolgui:
1. Start keytoolgui from the component from which you want to export the key pair. To do
so, run the following command from the component’s <ARCSIGHT_HOME>/bin directory:
./arcsight keytoolgui
To use keytoolgui:
1. Start keytoolgui from the component to which you want to import the key pair. To do so,
run the following command from the component’s <ARCSIGHT_HOME>/bin directory.
./arcsight keytoolgui
Export a Certificate
You can use bin/arcsight keytool to export a certificate.
Use of bin/arcsight keytool (which runs from the command line in a terminal window) is
recommended. Using the keytoolgui interface requires that the X Window system be installed
on your system. Also, the X Window system is not present on ESM on an appliance.
To use keytoolgui:
1. Start keytoolgui from the component from which you want to export the certificate. To
do so, run the following command from the component’s
<ARCSIGHT_HOME>/bin directory.
./arcsight keytoolgui
Import a Certificate
You can use bin/arcsight keytool to import a certificate.
Use of bin/arcsight keytool (which runs from the command line in a terminal window) is
recommended. Using the keytoolgui interface requires that the X Window system be installed
on your system. Also, the X Window system is not present on ESM on an appliance.
To use keytoolgui:
1. Start keytoolgui from the component into which you want to import the certificate. To
do so, run the following command from the component’s <ARCSIGHT_HOME>/bin
directory:
./arcsight keytoolgui
Could not establish a trust path for the certificate. The certificate information will
now be displayed after which you may confirm whether or not you trust the
certificate.
Click OK.
8. The Certificate details are displayed. Click OK.
9. You see the message Do you want to accept the certificate as trusted?. Click Yes.
10. Enter an alias for the Trusted Certificate you just imported and click OK.
Typically, the alias Name is same as the fully qualified host name (for example
devgroup.topco.com).
11. You see the message Trusted Certificate Import Successful.. Click OK.
12. Save the truststore file.
Creating a Keystore
You can use /jre/bin/keytool to create a keystore.
Using the keytoolgui is not preferred, and the interface requires that the X Window system
be installed on your system. Also, the X Window system is not present on ESM on an appliance.
Note: Generally, you will only need to create the non-FIPS keystore for a client. Also, keystores
are created automatically when you generate a keypair to add to a keystore. If a keystore does
not exist, it gets created automatically when the first item is put into it.
The abbreviations in the command below denote the following fields: cn = Common Name, ou
= Organizational Unit, o = Organization, and c = Country.
The command generates a new self-signed certificate with ALIAS_NAME in the specified
keystore PATH_TO_KEYSTORE.
Example for a new keystore:
/opt/arcsight/java/esm/current/jre/bin/keytool -genkeypair -keystore
config/keystore.client -storetype JKS -storepass password -dname "cn=John
Smith, ou=ArcSight, o=MF, c=US" -alias testKey -validity 365
Specify all the options in the above example using the appropriate values for your installation.
As a separate operation, either before or after you run the genkeypair command, you have to
set the values for the keystore location, keystore type, and password in the
client.properties file. This file is in <ARCSIGHT_HOME>/config. The Console uses this file to
access the keystore during authentication.
The client.properties file works as an override for the client.defaults.properties file.
(You do not edit the default properties file because it is overwritten at upgrade time.) Set these
properties in client.properties, as follows:
l ssl.keystore.path= Set this value if it differs from the default in
client.defaults.properties. It must be the same as the path specified in the -keystore
option in the command example, above.
l ssl.keystore.type= Set this value if it differs from the default in
client.defaults.properties. It must be the same as the type specified in the -
storetype option in the command example, above.
l ssl.keystore.password=Set this value if it differs from the default in
client.defaults.properties. It must be the same as the password specified in the -
storepass option in the command example, above. The default is blank (no password), but
having a password is recommended.
However, if you plan to encrypt the password (also recommended), there is no need to set it
manually in this file. You specify it and encrypt it using the changepassword command,
next.
To set an encrypted password, run the following command:
arcsight changepassword -f config/client.properties -p ssl.keystore.password
This command prompts you for the actual password, adds it to the client.properties file, and
encrypts it. It must be the same as the password specified in the -storepass option in the
command example, above.
To use keytoolgui:
1. Start keytoolgui from the component into which you want to import the certificate. To
do so, run the following command from the component’s <ARCSIGHT_HOME>/bin
directory.
./arcsight keytoolgui
This creates a key valid starting yesterday (to avoid problems with clock skew between
servers), and expiring in about one year. Make sure the cn value matches that of the External
ID of the user you log in as.
Note: Micro Focus strongly recommends the use of RSA keys with a keysize of 2048 as client
keys. Some browsers have known issues with elliptic curve keys.
About the only time you should need to change the manager key is if you change the hostname
of the manager. You should never need to create a manager key in non-FIPS mode;
managersetup will take care of that. Instructions for creating a manager key for FIPS mode
are given below.
Before adding a new manager key, be sure to delete the old one. It has the alias mykey.
For FIPS 140-2 create a RSA 2048 key:
<ARCSIGHT_HOME>/bin/arcsight keytool -store managerkeys -genkeypair -dname
"cn=myhost.mydomain.com, ou=ArcSight, o=MF, c=US" -keyalg rsa -keysize 2048 -
alias mykey -startdate -1d -validity 366
The cn value must be the ESM hostname for all manager keys - regardless of the type.
Note: FIPS Suite B requires elliptic curve keys. The minimum length for 128 bit is 256 bits, and for
192 bits it is 384 bits. Some browsers will not work with elliptic curve keys longer than 384 bits.
So 384 bits, as shown below is a good choice for FIPS Suite B.
You specify the validity of the certificate with the -validity <number_of_days> option. The
value that you provide with -validity calculates the number of days that the certificate is
valid starting from the current time.
To use keytoolgui:
1. Start keytoolgui from the component into which you want to import the certificate. To
do so, run the following command from the component’s <ARCSIGHT_HOME>/bin
directory:
./arcsight keytoolgui
To use keytoolgui:
1. Start keytoolgui from the component from which you want to export the certificate. To
do so, run the following command from the component’s <ARCSIGHT_HOME>/bin
directory:
./arcsight keytoolgui
password.
4. Double-click the certificate whose details you want to view. Details include valid date
range, and other information about the certificate.
For the Manager certificate you can also use the tempca -i command.
Delete a Certificate
You can use bin/arcsight keytool to delete a certificate from the keystore.
Use of bin/arcsight keytool (which runs from the command line in a terminal window) is
recommended. Using the keytoolgui interface requires that the X Window system be installed
on your system. Also, the X Window system is not present on ESM on an appliance.
Note: Key pairs also have passwords. ESM expects that these passwords will be the same as the
keystore passwords, so both must be changed.
Note: Steps to create a self-signed key pair may be different for a new Manager installation
as the Configuration Wizard is launched automatically during the installation process.
b. In the Manager Configuration Wizard, select Replace with new Self-Signed key pair
and click Next.
c. Enter information about the SSL certificate and click Next.
d. Enter the SSL keystore password for the certificate and click Next. Remember this
password. You will use it to open the keystore.
e. Continue through the Configuration Wizard.
The Configuration Wizard does these three SSL-related things:
l It replaces the Manager’s keystore at, <ARCSIGHT_HOME>/config/jetty/keystore,
with the one created using this procedure.
l It generates the selfsigned.cer certificate file in the <ARCSIGHT_
HOME>/config/jetty directory.
l It overwrites the existing Manager truststore file,
/opt/arcsight/java/esm/current/jre/lib/security/cacerts, with one
containing the new self-signed certificate to the Manager’s truststore file. The new
cacerts file contains the information about the Trusted Certificate Authority (CA)
that signed your self-signed certificate.
The self-signed certificate does not take effect until the Manager and clients are
restarted later in this procedure.
2. If you are running ESM in distributed mode, complete the following:
a. Run the following command:
./arcsight certadmin -list submitted
Review the output to verify that the Manager certificate is listed. To view the
certificate details, use the -v option.
b. After you confirm that the Manager certificate is correct, run the following command:
./arcsight certadmin -approveall
Specify the cluster administration password that was provided when you installed ESM
on the persistor node.
3. Export the Manager’s certificate from
/opt/arcsight/java/esm/current/jre/lib/security/cacerts.
4. Copy the Manager’s certificate to each machine from which clients connect to the
Manager.
5. On those clients, import the Manager’s certificate to the
/opt/arcsight/java/esm/current/jre/lib/security/cacerts directory. See Import
a Certificate.
Note: Make sure you have imported the Manager’s certificate to all existing clients before
proceeding further. Otherwise, after you perform the next steps, only clients with the new
Manager’s certificate can connect to the Manager.
6. Stop and start all services so that the new self-signed certificate will take effect:
/etc/init.d/arcsight_services stop
/etc/init.d/arcsight_services start
Note: Steps to create a self-signed key pair may be different for a new Manager installation
as the Configuration Wizard is launched automatically during the installation process.
b. In the Manager Configuration Wizard, select Replace with new Self-Signed key pair
and click Next.
c. Enter information about the SSL certificate and click Next.
d. Enter the SSL keystore password for the certificate and click Next. Remember this
password. You will use it to open the keystore.
e. Continue through the Configuration Wizard.
The Configuration Wizard does these three SSL-related things:
l It replaces the Manager’s keystore at, <ARCSIGHT_
HOME>/config/jetty/keystore, with the one created using this procedure.
l It generates the selfsigned.cer certificate file in the <ARCSIGHT_
HOME>/config/jetty directory.
l It overwrites the existing Manager truststore file,
/opt/arcsight/java/esm/current/jre/lib/security/cacerts, with one
containing the new self-signed certificate to the Manager’s truststore file.
The new cacerts file contains the information about the Trusted Certificate
Authority (CA) that signed your self-signed certificate.
The self-signed certificate does not take effect until the Manager and clients are
restarted later in this procedure.
2. If you are running ESM in distributed mode, complete the following:
a. Run the following command:
./arcsight certadmin -list submitted
Review the output to verify that the Manager certificate is listed. To view the
certificate details, use the -v option.
b. After you confirm that the Manager certificate is correct, run the following command:
./arcsight certadmin -approveall
Specify the cluster administration password that was provided when you installed ESM
on the persistor node.
3. Copy the selfsigned.cer file from each Manager to the
/opt/arcsight/java/esm/current/jre/lib/security directory on one of your clients.
The certificate files all have the same name. Rename each one so they do not overwrite
another on the client. For example, rename the certificate file from ManagerA to
SelfSigned_MgrA.cer.
4. On that client, use the keytool or keytoolgui command to import certificates into the
truststore (cacerts):
The keytool command is preferred. Using the keytoolgui interface requires that the X
Window system be installed on your system. Note that using the X Window system is not
preferred, but if you have it installed and want to use it, you can use keytoolgui. The X
Window system is not present on ESM on an appliance. See "Import a Certificate" on
page 107 for details on using keytool.
To use the keytoolgui command:
a. In <ARCSIGHT_HOME>/bin, run this command:
./arcsight keytoolgui
5. Stop and start all services so that the new self-signed certificate will take effect:
/etc/init.d/arcsight_services stop
/etc/init.d/arcsight_services start
To use keytoolgui:
1. On the Manager machine, run this command to launch keytoolgui in <ARCSIGHT_
HOME>/bin:
./arcsight keytoolgui
The command creates signing request using the PKCS#10 format for a certificate with alias
<ALIAS_NAME> from keystore_path. Here <storepass> is keystore password, and <keypass> is a
password for the specified alias. No need to be specified for empty values. As a result the
command creates a file <testkey.csr> that should be sent to certificate authority (CA).
After verifying the information you sent, the CA electronically signs the certificate using its
private key and replies with a certification response containing the signed certificate (cer-file).
To use keytoolgui:
1. In keytoolgui , right-click the mykey alias name and select Generate CSR to create a
Certificate Signing Request.
2. Choose a path and filename, and click Generate.
After you enter a file name, the CSR file is generated in the current working directory.
3. Send the CSR to the selected Certificate Authority (CA).
After verifying the information you sent, the CA electronically signs the certificate using its
private key and replies with a certification response containing the signed certificate.
f. Click OK to finish.
Before proceeding, make sure the name of the issuer that signed your certificate exists as a
Trusted CA in cacerts.
Follow these steps to import the signed certificate:
1. If the returned file has the .CER or .CRT file extension, save it to the <ARCSIGHT_
HOME>/config/jetty directory and skip to Step 4.
2. If it has a different extension, use a text editor to copy and paste the text string to a file.
Include the lines "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----", and make
or use keytoolgui:
./arcsight keytoolgui
6. Click File->Open keystore and select the keystore (keystore.request) you saved in Step 7
of Create a Key Pair for a CA-Signed Certificate. Provide the password you used to save the
keystore in that step.
7. Right-click the key pair you created at the beginning of the process and named mykey in
Step 6 of Create a Key Pair for a CA-Signed Certificate.
8. Select Import CA Reply from the menu.
9. Select the CA reply certificate file you saved in <ARCSIGHT_HOME>/config/jetty and
click Import.
If the CA reply file contains a chain of certificates, keytool tries to match the reply’s root
CA to an existing Trusted Certificate in your cacerts truststore. If this operation fails, the
Certificate Details dialog appears for manual verification. Acknowledge the certificate by
clicking OK and answering Yes to the subsequent challenge. Answer No if the certificate is
not trustworthy for some reason.
After the key pair you generated has been updated to reflect the content of the CA reply,
the keystore named keystore.request contains both the private key and the signed
certificate (in the alias mykey).
10. Select File > Save. The keystore is now ready for use by the Manager.
11. Copy <ARCSIGHT_HOME>/config/jetty/keystore.request to <ARCSIGHT_
HOME>/config/jetty/keystore.
12. For successful reconfiguration and Manager startup, enter the keystore passwords into the
appropriate properties file.
Enter the password into the esm.properties file for the Manager using the following
command:
arcsight changepassword -f <ARCSIGHT_HOME>/config/esm.properties -p
server.privatekey.password
After entering this command, the system displays the previous password as asterisks and
asks you to enter and then confirm your new password. These commands enter the
password into the properties file in an encrypted format.
13. If your Manager clients trust the CA that signed your server certificate, go to Start the
Manager Again (Restart the Manager).
Otherwise, perform these steps to update the client’s cacerts (truststore):
Note: Also perform these steps on the Manager to update the Manager’s cacerts so that
Manager clients such as the archive command can work.
a. Obtain a root certificate from the CA that signed your server certificate and copy it to
your client machine. (you got this in Import the CA Root Certificate.)
b. For one client, use keytoolgui to import the certificate into the truststore (cacerts):
i. In <ARCSIGHT_HOME>/bin, run this command:
./arcsight keytoolgui
Delete the existing manager certificate from the manager's client truststore. To delete a
certificate from the truststore, start keytoolgui and navigate to the certificate, right-
click on the certificate, and select Delete.
For bin/arcsight keytool:
bin/arcsight keytool -store clientcerts -delete -alias <hostname>
Then add the new certificate by exporting it and importing it. See Export a Certificate and
Import a Certificate.
Or, the commands for bin/arcsight keytool:
bin/arcsight keytool -store managerkeys -exportcert -alias mykey -file
mykey.cer
The Manager may fail to start if the password of the Key pair does not match the password
of the keystore, which is encrypted in esm.properties. If you do not remember the
keystore password, run the Manager setup wizard and change the password of your
existing keystore.
2. Restart all clients.
3. To verify that the new certificate is in use:
a. From the command line navigate to <ARCSIGHT_HOME> and enter the command:
arcsight tempca -i
The output shows which CA issuer signed the SSL CA-signed certificate, certificate type,
status of a validation of the certificate, and so on.
b. Point a web browser to https://<manager_hostname>:8443 to test it.
Start the Manager Again (Restart the Manager) Page 125 of 250
Administrator's Guide
Chapter 4: SSL Authentication
For SmartConnectors, run the tempca script using the following command:
./arcsight agent tempca -rc
Signed Certificate, or Using a CA-Signed SSL Certificate section (depending on the type of
certificate you are importing) for steps on how to import the certificate.
Since the common name (CN) for the new certificate is the same as the old certificate, you
cannot have both of them in the truststore, cacerts.
To configure HSTS:
1. Ensure that your environment meets the following prerequisites:
l The Manager has a fully-qualified domain name (FQDN).
l A CA-signed certificate is correctly installed on the Manager. Ensure that the Subject
Alternative Name (SAN) in the certificate for the Manager contains a DNS entry pointing
to the ESM hostname. For example:
X509v3 Subject Alternative Name: DNS:myESM.myCompany.com
l The browser can access the Manager using the FQDN, and the browser trusts the CA
that signed the certificate for the Manager.
2. Restart the Manager.
Note: Client-side authentication could be helpful when you want to establish connection from a
client to ESM always under the same user account. That eliminates the need to provide
username/password. If it’s what you need use the following instructions and once the client
certificate is created, select "SSL Client Only Authentication" mode for that client, and create
ArcSight User (in ESM) with externalID matching CN from client certificate. Do not forget to
secure access to this certificate. If keystore with the certificate is stolen, it could be used to
access ESM from other clients.
Setting up SSL Client-Side Authentication on ArcSight Console- Self-Signed Page 128 of 250
Administrator's Guide
Chapter 4: SSL Authentication
2. Run consolesetup to select the desired client authentication method. For more
information, see the Installation Guide.
3. Export the Console’s certificate:
<ARCSIGHT_HOME>/bin/arcsight keytool -exportcert -store clientkeys -alias
testkey –file console.cer
4. Copy the Console’s certificate to the manager machine, and import it into the Manager’s
truststore:
bin/arcsight keytool -importcert –store managercerts -alias testkey -file
console.cer
Setting up SSL Client-Side Authentication on ArcSight Console- CA-Signed Page 129 of 250
Administrator's Guide
Chapter 4: SSL Authentication
4. Create a Signing Request by following the steps in Send for the CA-Signed Certificate and
Import the CA-Signed Certificate.
5. Send a request to the certificate authorities. Example for keytool command line to
create a certificate request:
<ARCSIGHT_HOME>/bin/arcsight keytool -certreq -store clientkeys -alias
testkey –file config/testkey.csr
6. Follow the steps in Import the CA Root Certificate. Import the CA Root Certificate into
both the Console's and the Manager truststore.
7. After receiving a response, enter it into the client keystore. Example for keytool command
line:
<ARCSIGHT_HOME>/bin/arcsight keytool -importcert –store clientkeys -alias
testkey -file /tmp/signedcert.cer
Setting Up Client-Side Authentication for ArcSight Command Center Page 130 of 250
Administrator's Guide
Chapter 4: SSL Authentication
The above command creates a new file config/consolekey.p12 with keystore of the type
PKCS12 and stores there a private key for alias consolekey from client's keystore file
config/keystore.client.
2. Use keystore config/consolekey.p12 that contains Console's private key to import the
certificate into internal browser's keystore.
2. Create a client SSL configuration text file in the user/agent directory and name it
agent.properties for a connector. The contents of this file (whether client or agent)
should be as follows:
auth.null=true
ssl.client.auth=true
cac.login.on=false
ssl.keystore.path=config/keystore.client
ssl.keystore.password=<client.keystore_password>
Note: Make sure that this password is identical to the password that you set for
/config/keystore.client when creating it.
4. Import the CA’s certificate of the client’s certificate (in case you are using CA-signed
certificate) or the client’s certificate itself (in case you are using a self-signed certificate)
into the Manager’s truststore, /config/jetty/truststore.
Example command for keytool command line:
l For "Password Based Authentication," in the client.properties file, remove the properties
auth.null, ssl.client.auth, and osp.client.auth.
l For "SSL Client Only Authentication," in the client.properties file, set auth.null and
ssl.client.auth to true and set osp.client.auth to false.
l For "Password and SSL Client Based Authentication," in the client.properties file, set
auth.null and osp.client.auth to false and set ssl.client.auth to true.
Setting Up Client-Side Authentication for Utilities on the ESM Server Page 132 of 250
Administrator's Guide
Chapter 4: SSL Authentication
l For "Password or SSL Client Based Authentication," in the client.properties file, set
auth.null and osp.client.auth to false and set ssl.client.auth to optional.
l For "OSP Client Only Authentication," in the client.properties file, set osp.client.auth
to true and remove the auth.null and ssl.client.auth properties.
8. Additionally, in a FIPS installation, you must import the manager certificate into the client
keystore. This is done automatically for you in default mode.
Export the certificate with this command:
bin/arcsight keytool -store managerkeys -exportcert -alias mykey -file
mykey.cer
Setting Up Client-Side Authentication for Utilities on the ESM Server Page 133 of 250
Administrator's Guide
Chapter 4: SSL Authentication
SSL Client
truststore C:\arcsight\Console\current\jre\lib\security\cacerts
Type JKS
Demo CA trusted no
Trusted CA DigiCert Assured ID Root CA [digicertassuredidrootca]
Trusted CA TC TrustCenter Class 2 CA II [trustcenterclass2caii]
.
.
.
Demo CA
keystore C:\arcsight\Console\current\config\keystore.tempca
Exiting...
Sample Output for Verifying SSL Certificate Use Page 135 of 250
Administrator's Guide
Chapter 4: SSL Authentication
Note: Before you enable client-side authentication, make sure that you log in to the Console and
create a new user or modify an existing user such that you set the user’s external_id to the
one specified in the certificate created on the Console. The external id should be set to the users
name set as the CN (Common Name) setting when creating the certificate.
You must enable SSL client authentication as described in the previous section to use digitally-
signed user certificates for user authentication.
To configure the Manager to use user certificates, do the following:
1. On the Console, make sure that External ID field in the User Editor for every user is set to a
value that matches the CN in their user certificate.
2. Restart the system you are configuring.
3. Restart the Consoles.
When you start the Console, the user name and password fields are grayed out. Simply select
the Manager to which you want to connect and click OK to log in.
Verify that the Manager has stopped by running the following command (as user arcsight):
/etc/init.d/arcsight_services status all
The Manager Configuration Wizard establishes parameters required for the Manager to start
up when you reboot.
1. Select either Run manager in default mode or Run manager in FIPS mode. For
information on FIPS, see Configuration Changes Related to FIPS
2. You can enter Manager Host Name, Manager Port, and Physical Location. To change
the hostname or IP address for your Manager host, enter the new one. The Manager host
name that you enter appears on the Manager certificate. If you change the host name, be
sure to regenerate the Manager’s certificate in by selecting Replace with the new Self-
Signed key pair in the screen that allows you to select key pair options (make a note of this
if you change your host name). We recommend that you do not change the Manager Port
number.
The IP Version selection (IPv4 or IPv6) appears if you have a dual-stack machine, such as
an appliance. If you see this option, your selection has the following effects:
l It controls what IP Address is used by third party software if a hostname is given. for
example, the e-mail server in Manager Setup.
l It sets the preferred IP version to choose if there are multiple IP addresses available for
the different IP versions.
l It controls which IP Address is tried on the peering page if a hostname is specified.
l It controls whether an IPv4 or IPv6 Address is chosen for the manager asset.
3. If you would like to replace your license file with a new one, select Replace current
license file. Otherwise, accept the default option of Keep the current license file.
If you selected Replace the current license file. you are prompted for the new one.
4. Select the Java Heap memory size. The Java Heap memory size is the amount of memory
that ESM allocates for its heap. (Besides the heap memory, the Manager also uses some
additional system memory.)
5. Select a key pair option. The Manager controls SSL certificate type for communications
with the Console, so the wizard prompts you to select the type of SSL certificate that the
Manager is using. If you changed the Manager host name in the first or second step above,
select Replace with new Self-Signed key pair, otherwise select Do not change anything.
If you selected Replace with new Self-Signed key pair, you are prompted to enter the
password for the SSL key store and then details about the new SSL certificate to be issued.
6. Accept the Logger JDBC URL and Database Password defaults.
7. If Transformation Hub is part of your ESM implementation, select whether to set up the
connection to it.
8. If you are running in distributed correlation mode, select whether to forward Avro events
to Transformation Hub.
9. If you selected to set up a connection to Transformation Hub, provide the following
information:
a. Specify the host name and port information for the nodes in Transformation Hub.
Include the host and port information for all worker nodes. Use a comma-separated list
(for example: <host>:<port>,<host>:<port>).
Note: You must specify the host name and not the IP address.
Transformation Hub can only accept IPv4 connections from ESM.
If the Kafka cluster is configured to use SASL/PLAIN authentication, ensure that you
specify the port configured in the cluster for the SASL_SSL listener.
b. Specify the topics in Transformation Hub from which you want to read. These topics
determine the data source.
For more information, see the Administrator's Guide for the ArcSight Platform.
Note: You can specify up to 25 topics using a comma- separated list (for example:
topic1,topic2). ESM will read Avro- format events from any topic where the name
contains "avro" in lower case. For example, th-arcsight-avro .
c. To import the Transformation Hub root certificate to ESM's client truststore, complete
the following:
i. On the Transformation Hub master node, run the following command to generate
the ca.crt root certificate in the /tmp folder:
/opt/arcsight/kubernetes/scripts/cdf-updateRE.sh > /tmp/ca.crt
ii. Copy the Transformation Hub root certificate to a local folder on the ESM server.
iii. In the managersetup wizard, provide the path to the certificate.
The wizard imports the Transformation Hub root certificate into ESM's client
truststore.
Note: If you need to manually import the certificate in FIPS mode, use the following
command on the ESM server:
/opt/arcsight/manager/bin/arcsight keytool - store clientcerts -
importcert -file <path to ca.crt>/ca.crt -alias <aliasname>
d. If the Kafka cluster is not configured to use SASL/PLAIN authentication, leave the
authentication type as None. If the Kafka cluster is configured to use SASL/PLAIN
authentication, select SASL/PLAIN as the authentication type.
e. If you selected SASL/PLAIN as the client authentication type, specify the user name and
password for authenticating to Kafka.
f. If you specified an Avro topic or selected to forward Avro events, specify the host name
and port for connecting to the Schema Registry in the format <host name:port>.
Transformation Hub runs a Confluent Schema Registry that producers and consumers
use to manage compatibility of Avro-format events.
The wizard uses this information to connect to the Schema Registry, read the Avro
schemas for the Avro topics that you specified, and verify that the topics contain Avro
events that are compatible with ESM. If ESM cannot retrieve the Avro schemas for the
Avro topics that you specified and compare them to the schema that is packaged with
ESM, or if incompatible schemas are detected, the wizard generates warning messages
but allows you to continue. In some cases, you might already know that Transformation
Hub will use a compatible schema when the Manager is running.
Caution: You must set up notification and specify notification recipients in order to receive
system warnings. The importance of this step is sometimes overlooked, leading to
preventable system failures.
If you choose External SMTP Server, additional options are requested, to which the
following steps apply:
a. Enter the name of the outbound SMTP Server to use for notifications.
b. Enter the From Address that the Manager is to place in the From field of outgoing
emails.
c. Enter the Error Notification Recipients as a comma-separated list of email addresses
to which the Manager should send error notifications.
Emails are sent when the system detects the following occurrences:
l The subsystem status is changed. The email shows the change and who did it.
l The report has been successfully archived.
l The account password has been reset.
l The Archive report generation fails.
l There are too many notifications received by a destination.
l The event archive location has reached the cap space. It will ask you to free up some
space by moving the event archives to some other place.
l The user elects to email the ArcSight Console settings.
l The user sends partition archival command.
l An archive fails because there is not enough space.
l The Connection to the database failed.
d. Select Use my server for notification acknowledgements.
e. Enter the SMTP server and account information. This includes the incoming email
server and the server protocol, and the username and password for the email account
to be used.
15. The Manager can automatically create an asset when it receives an event with a new
sensor or device information.The default, Enable Sensor Asset Creation, ensures that
assets are automatically created. If you want to disable this feature, select Disable Sensor
Asset Creation.
16. You have completed the Manager setup program. Start all services by running the
following as user arcsight:
/etc/init.d/arcsight_services start all
Authentication Details
The authentication options enable you to select the type of authentication to use when logging
into the Manager.
Caution: In order to use PKCS#11 authentication, note that PKCS#11 authentication is not
supported with Radius, LDAP and Active Directory authentication methods.
By default, the system uses its own, built-in authentication, but you can specify third party,
external authentication mechanisms, such as RADIUS Authentication, Microsoft Active
Directory, or LDAP.
Password-Based Authentication
Password-based authentication requires users to enter their User ID and Password when
logging in. You can select the built-in authentication or external authentication.
Built-In Authentication
This is the default authentication when you do not specify a third party external authentication
method.
If you selected this option, you are done.
Parameter Description
Authentication Which authentication protocol is configured on your RADIUS server: PAP, CHAP, MSCHAP, or
Protocol MSCHAP2.
RADIUS Server Specify the port on which the RADIUS server is running. The default is 1812.
Port
RADIUS Specify the RADIUS shared secret string used to verify the authenticity and integrity of the
Shared Secret messages exchanged between the Manager and the RADIUS server.
Parameter Description
Enable SSL Whether the Active Directory Server is using SSL. The default is True (SSL enabled on the AD
server).
No further SSL configuration is required for the AD server.
Whether you selected SSL earlier for communications with the Console is irrelevant. Certificate
type is set on the AD server side, not the manager.
Active Specify the port to use for the Active Directory Server. If the AD server is using SSL (Enable
Directory SSL=true), use port 636. If SSL is not enabled on the AD server, use port 389.
Port
Search Base Search base of the Active Directory domain; for example, DC=company, DC=com.
User DN Distinguished Name (DN) of an existing, valid user with read access to the Active Directory. For
example, CN=John Doe, CN=Users, DC=company, DC=com.
The CN of the user is the "Full Name," not the user name.
Allowed Comma-separated list of Active Directory group names. Only users belonging to the groups listed
User Groups here will be allowed to log in.
You can enter group names with spaces.
Configuring AD SSL
If you are using SSL between the Manager and your authentication server, you must ensure
that the server’s certificate is trusted in the Manager’s trust store
/opt/arcsight/java/esm/current/jre/lib/security/cacerts, whether the
Parameter Description
Enable SSL Whether the LDAP Server is using SSL. The default is True (SSL enabled on the LDAP server).
No further SSL configuration is required for the LDAP server.
Whether you selected SSL earlier for communications with the Console is irrelevant. Certificate
type is set on the LDAP server side, not the manager.
LDAP Specify the port to use for the LDAP Server. If the LDAP server is using SSL (Enable SSL=true), use
Server Port port 636. If SSL is not enabled on the LDAP server, use port 389.
Specify any user who exists in LDAP to test the server connection.
Enter a valid Distinguished Name (DN) of a user (and that user’s password) that exists on the
LDAP server; for example, CN=John Doe, OU= Engineering, O=YourCompany. This information
is used to establish a connection to the LDAP server to test the validity of the information you
entered in the previous panel.
Note: LDAP groups are not supported. Therefore, you cannot allow or restrict logging into the
Manager based on LDAP groups.
If you configure your Manager to use LDAP authentication, ensure that you create users on the
Manager with their Distinguished Name (DN) information in the external ID field. For example,
CN=John Doe, OU= Engineering, O=YourCompany.
Specify the user name used to log in to the Manager and the External ID name to which it is
mapped on the LDAP server.
Note: Using PKCS#11 provider as your SSL Client Based authentication method within this option
is not currently supported.
Password Based and SSL Client Based Authentication Page 147 of 250
Administrator's Guide
Chapter 5: Running the Manager Configuration Wizard
The value of the claim received is mapped to the ESM External Id of a user to identify the user
within ESM.
Note: The ArcSight Platform comes configured to send the email address.
With this authentication method, you need to provide the following information:
l Host name and port of the OSP server
l Tenant name that you specified for the OSP
With this authentication method, when a user logs in to the ArcSight Console, the OSP Client
Login button is automatically enabled. Upon clicking the button, the user is redirected through
the OSP to the configured identity provider’s authentication mechanism. After authentication is
established, the user is redirected back through the OSP, which extracts the ‘email’ claim value
from the authentication information. The console uses the email value to identify the ESM user
via their external ID. The ArcSight Console OSP Client Login button opens the browser that is
specified in the bin/arcsight consolesetup program to communicate with OSP.
ArcSight Command Center automatically redirects users to begin the authentication process
and follows the same authentication flow described above.
Note: Micro Focus recommends running only one console instance per workstation at a time.
Otherwise, authentication will not work as expected. For example:
l If a console instance is running and you have authenticated to the console, if you open a
second console instance the same user that is logged in to the first instance is logged in to the
second instance.
l If you open two instances of the console before you authenticate, two browser sessions are
opened for OSP login and the login attempt will fail. You must close all consoles and browser
windows before you attempt to log in again.
If you select this method, when you register a connector with ESM, specify the ESM user
credentials and not the OSP credentials.
Run the applicable command to import the certificate into the clientcerts keystore on the
ArcSight Consoles. If you are running Windows, run the following command:
<console installation path>\current\bin>arcsight.bat keytool -import –file
<certificate file location> -store clientcerts -alias <alias_name>
l Either the SAML2 metadata URL or the location of the SAML2 metadata file to be uploaded
l Location of the certificate that the external identity provider uses for signing SAML2
requests
With this authentication method, when a user logs in to the ArcSight Console, the OSP Client
Login button is automatically enabled. Upon clicking the button, the user is redirected through
the OSP to the configured SAML2 identity provider’s authentication mechanism. After
authentication is established, the user is redirected back through the OSP, which extracts the
‘email’ claim value from the SAML2 assertion. The console uses the email value to identify the
ESM user via their external ID. The ArcSight Console OSP Client Login button opens the browser
that is specified in the bin/arcsight consolesetup program to communicate with OSP.
ArcSight Command Center automatically redirects users to begin the authentication process
and follows the same authentication flow described above..
Note: Micro Focus recommends running only one console instance per workstation at a time.
Otherwise, authentication will not work as expected. For example:
l If a console instance is running and you have authenticated to the console, if you open a
second console instance the same user that is logged in to the first instance is logged in to the
second instance.
l If you open two instances of the console before you authenticate, two browser sessions are
opened for OSP login and the login attempt will fail. You must close all consoles and browser
windows before you attempt to log in again.
If you select this method, when you register a connector with ESM, specify the ESM user
credentials and not the OSP credentials.
Service Actions start Start the specified component, and any components it
depends on.
stop Stop the specified component and any components
that depend on it.
status This provides a service status value:
/etc/init.d/arcsight_services start
/etc/init.d/arcsight_services start
ArcSight Commands
To run an ArcSight command script on a component, open a command window and switch to
the <ARCSIGHT_HOME> directory. The arcsight commands run using the file (on Windows) or
arcsight.sh in <ARCSIGHT_HOME>\bin. The general syntax is as follows:
In general, commands that accept a path, accept either a path that is absolute or relative to
<ARCSIGHT_HOME>. Running the command from <ARCSIGHT_HOME> and prefixing it with
bin/ enables you to use the shell’s capabilities in looking for relative paths.
Not all parameters are required. For example, username and password may be a parameter
for certain commands, such as the Manager and Package commands, but the username and
password are only required if the command is being run from a host that does not also host the
Manager.
ACLReportGen
This command generates a report on ACLs either at the group level or at the user level. By
default, the generated report is placed in the
<ARCSIGHT_HOME>/ACLReports directory.
Distributed Correlation Cluster Only: You can only run this command on a persistor node.
ACLReportGen
Applies to Manager
Parameters Optional:
-config The primary configuration file (config/server.defaults.properties).
<config>
-mode <mode> Mode in which this tool is run to generate the ACLs report. Supported modes
are grouplevel and userlevel . The default value is grouplevel .
-h Help
agent logfu
This command runs a graphical SmartConnector log file analyzer.
agent logfu
Applies to SmartConnectors
Parameters -a SmartConnector log, which is required. For other parameters, see the
description of the logfu command for the Manager.
agent tempca
This command allows you to inspect and manage temporary certificates for a SmartConnector
host machine.
agent tempca
Applies to SmartConnectors
Parameters For parameters, see the description of the tempca command for the Manager.
agentcommand
This command allows you to send a command to SmartConnectors.
agentcommand
Applies to SmartConnectors
agentcommand, continued
Parameters -c Valid parameters are restart , status , or terminate .
agents
This command runs all installed ArcSight SmartConnector on the host as a standalone
application.
agents
Applies to SmartConnectors
Syntax agents
Parameters None
agentsvc
This command installs an ArcSight SmartConnector as a service.
agentsvc
Applies to SmartConnectors
agentup
This command allows you to verify the current state of a SmartConnector. It returns 0 if the
SmartConnector is running and accessible, and returns 1 if it is not.
agentup
Applies to SmartConnectors
Syntax agentup
Parameters None
aggregatorthreaddump
This command applies to ESM in distributed mode. Run this command on the node where the
aggregator is configured.
The command runs a script to dump current threads from a specified aggregator instance. The
threads go into /opt/arcsight/var/logs/aggregator<instanceid>/aggregator.std.log.
aggregatorthreaddump
Applies to aggregator
Syntax aggregatorthreaddump
Examples To run:
bin/arcsight aggregatorthreaddump aggregator1
arcdt
This command allows you to run diagnostic utilities such as session wait times, and thread
dumps about your system, which can help Customer Support analyze performance issues on
your components.
Distributed Correlation Cluster Only: You can only run this command on a persistor node.
arcdt
Applies to Manager
arcdt, continued
Parameters diagnostic_utility Utilities you can run are:
runsql —Run SQL commands contained in a file that is
specified as a parameter of this command.
Required Parameter:
-f <sqlfile> —The file containing the sql statements to
be executed.
Optional Parameters:
-fmt <format> —The format the output should be
displayed in (where relevant), choices are html or text
-o <outputfile> —File name to save output to. ()
arcdt, continued
-fmt <format> — The format the output should be
displayed in (where relevant), choices are: html/text
(text)
-o <outputfile> — File name to save output to. ()
If not done correctly, you might get no result querying the ArcSight.events table from
arcdt. For example, to run SQL to query events for a specific time period, follow the steps
below:
1. Create a file such as 1.sql in /tmp/ containing this SQL:
"select * from arcsight.events where arc_deviceHostName = 'host_name'
limit 2;"
2. Run arcdt and pass the created SQL file as parameter, and also specify the time period to
examine.
./arcsight arcdt runsql -f /tmp/1.sql -type EndTime -ss <start time> -se
<end time>
The result will be empty if there are no events in the specified time period.
archive
This command imports or exports resources (users, rules, and so on) to or from one or more
XML files. Generally, there is no need to use this command. The Packages feature in the
ArcSight Console is more robust and easier to use for managing resources.
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators.
archive
Descript
ion
archive, continued
-conflict <conflictpolicy> The policy to use for conflicts resolution. Possible
policies are:
default : Prompts user to resolve import
conflicts.
force : Conflicts are resolved by the new
overwriting the old.
overwrite : Merges resources, but does not
perform any union of relationships.
-exportaction <exportaction> The action to assign to each resource object
exported. Export actions are:
insert : Insert the new resource if it doesn’t exist
(this is the default).
update : Update a resource if it exists.
archive, continued
-pkcs11 Use this option when authenticating with a
PKCS#11 provider. For example,
arcsight archive -m <hostname> -pkcs11
-f <file path>
archive, continued
-xtyperef <excludeTypeRefs> The types to exclude during export (there is no
effect during import). This is the same as -xtype ,
except it also excludes all references of the given
type. These must include only valid type names
such as Group, Asset, and ActiveChannel.
-xuri <excludeURIs> The URIs to exclude during export. No effect
during import. Resources for which all possible
URIs are explicitly excluded are not exported.
Resources which can still be reached by a URI that
is not excluded are still exported.
-xurichildren <excludeURIchildren> The URIs to exclude during export (there is no
effect during import). These exclusions are such
that all URIs for the children objects must be
included in the set before the object will be
excluded. In other words, they can still be
exported if they can be reached through any path
that is not excluded.
Make sure that the archive tool client can trust the Manager's SSL certificate. See SSL
Authentication for information on managing certificates.
From the <ARCSIGHT_HOME>/bin/ directory, you can enter the command, arcsight archive
-h to get help.
Note: Ordinarily, you should use the packages feature to archive and import resources. For more
information about packages and how to use them, see the "Managing Packages" topic in ArcSight
Console Online Help. Also, see package.
You can use the archive command line tool to import and export resources. It is useful for
managing configuration information, for example, importing asset information collected from
throughout your enterprise. You can also use this tool to archive resources so you can restore it
after installing new versions of this system.
The archive command automatically creates the archive files you specify, saving resource
objects in XML format. This documentation does not provide details on the structure of archive
files and the XML schema used to store resource objects for re-import into the system.
Generally it is easier to use packages.
This command displays a resource in the archive menu list of resources only if the user running
the utility has top-level access to the resource. Access is different for each mode.
Remote Mode
In remote mode, you can import or export from either a Manager or ArcSight Console
installation and can perform archive operations while the Manager is running.
arcsight archive -u Username -m Manager [-p Password] -f Filename
[-i | -sort] [-q] ...
Caution: The cacerts file on the Manager host must trust the Manager's certificate. You may have
to update cacerts if you are using demo certificates by running:
arcsight tempca –ac
You do not need to run the above command if you run the archive command from the Console.
When you run the archive utility in the remote mode, it runs as the user specified in the
command line. However, even users with the highest privilege level (administrator) do not
have top level access to, for example, the user resource (All Users). Thus, the User resource
does not show up in the list of resources. You can export users with the -uri option, but if you
want to use the -u option, use the Standalone mode.
To export user resources, you can use the -uri option and specify a user resource to which you
have direct access. For example:
arcsight archive -u <username> -m <manager_hostname> -format exportuser -f
exportusers.xml -uri "/All Users/Administrators/John"
Standalone Mode
In standalone mode, from the computer where the Manager is installed, you can connect
directly to the database to import or export resource information, however, the Manager must
be shut down before you perform archive operations.
Caution: Do not run the archive tool in standalone mode against a database currently in use by a
Manager as it is possible to corrupt the database.
The basic syntax for the archive command in standalone mode is the following:
arcsight archive -standalone -f Filename [-i | -sort] [-q] ...
Note: Both remote and standalone archive commands support the same optional arguments.
Note that the standalone mode only works from the archive command found in the Manager
installation, and does not work remotely. For example:
arcsight archive -standalone -format exportuser -f exportusers.xml
Note: If the Manager is running, you must specify archive commands in remote mode,
entering your user name, password, and Manager name to connect to the Manager. To run
the archive command in standalone mode, accessing resources directly from the ArcSight
Database, enter
-standalone rather than -u <username> -p <password> -m <manager> .
Note: If the Manager is running, you must specify archive commands in remote mode,
entering your user name, password, and Manager name to connect to the Manager. To run
the archive command in standalone mode, accessing resources directly from the database,
enter -standalone rather than -u <username> -p <password> -m <manager> .
Before performing the import operation, you are prompted for a password to log in to the
Manager.
For exporting:
arcsight archive -f <file name>
Before performing the import operation, you are prompted for a password to log in to the
Manager and use a series of text menus to pick which Resources are archived.
For scheduled/batch importing:
arcsight archive -i -q -format preferarchive
Note: You can specify multiple URI resources with the URI parameter keyword by separating
each resource with a space character, or you can repeat the URI keyword with each resource
entry.
archivefilter
This command changes the contents of the archive. The archivefilter command takes a source
archive xml file as input, applies the filter specified and writes the output to the target file.
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators.
archivefilter
Appli Manager
es to
archivefilter, continued
-uri <regex> Regular expression to represent all of the URIs to
include. This is the URI of the archival object
-xe <element_list> Elements to exclude
-xextid <regex> Regular expression to represent all of the external
IDs to exclude
-xgroup <types> The group types to exclude.
-xuri <regex> Regular expression to represent all of the URIs to
exclude
-h Help
Exam To include any resources, for example all Active Channels, whose attributes contain the URI specified by
ples the –relateduri option:
arcsight archivefilter -source allchannels.xml -f t0.xml -relateduri "/All
Active Channels/ArcSight Administration/"
To include any resources whose parent URI matches the URI specified by the –uri option:
arcsight archivefilter -source allchannels.xml -f t0.xml -uri "/All Active
Channels/ArcSight Administration/.*"
To exclude resources whose parent URI matches the URI specified by the –xuri option:
arcsight archivefilter -source allchannels.xml -f t0.xml -xuri "/All Active
Channels/.*"
To include all the resources that contain either URIs specified by the two –relateduri Parameters:
arcsight archivefilter -source allchannelsFilter.xml -f t0.xml -relateduri "/All
Active Channels/ArcSight Administration/" -relateduri .*Monitor.*
bleep
This command is an unsupported stress test to supply a Manager with security events from
replay files (see replayfilegen). Replay files containing more than 30,000 events require a
lot of memory on the bleep host.
Do not run bleep on the Manager host. Install the Manager on the bleep host and cancel the
configuration wizard when it asks for the Manager’s host name.
Run arcsight tempca –ac on the bleep host if the Manager under test is using a demo
certificate.
Create the file config/bleep.properties using the descriptions in
bleep.defaults.properties.
bleep
Applies to Manager
-h Help
Examples To run:
arcsight bleep
bleepsetup
This command runs a wizard to create the bleep.properties file.
bleepsetup
Applies to Manager
Syntax bleepsetup
Examples To run:
arcsight bleepsetup
changepassword
This command changes obfuscated passwords in properties files. The utility prompts for the
new password at the command line.
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators.
changepassword
Description This command changes obfuscated passwords in properties files. The utility prompts for the new
password at the command line.
Applies to Manager
Examples To run:
arcsight changepassword
checklist
This command is the ArcSight Environment Check. Used internally by the installer to see if you
have the correct JRE and a supported operating system.
This can run from the Manager.
certadmin
This command only applies to ESM in distributed correlation mode. Run this command on the
persistor node.
The command starts a tool that shows all certificates based on status: Submitted, Approved, or
Revoked. Use this command to approve or revoke SSL certificates that are used by the
aggregator, correlator, and persistor services. The command uses an internal certificate
administrator user that you configure in the First Boot Wizard when you start a cluster.
You can run this command from the command line or use the -i option to run it interactively.
The following table describes the command syntax and parameters:
certadmin
Syn certadmin [-approve | -approveall | -changepassword | -count | -help | -i | -
tax importcert <file> | -init | -list <status> | -recoverpassword | -revert | -revoke]
[-id <id>] [-v]
Par -approve -id <id> Approves the certificate of the specified ID and then
am changes the status from Submitted to Approved
ete
rs
certadmin, continued
-approveall Approves all certificates currently in Submitted
status
-changepassword Changes the certificate administrator password
Note: This is different from the Manager- level
changepassword command that applies to
obfuscated passwords in ESM properties files.
You can also use the -id parameter to limit the list.
certadmin, continued
-recoverpassword Generates a Technical Support password recovery
request
-revert -id <id> Reverts any previously approved or revoked entry
for the specified ID
-revoke -id <id> Revokes one submitted entry for the specified ID
-v Specifies to display verbose output
configure-event-forwarding
This command only applies to ESM in distributed correlation mode. Run this command on the
persistor node.
The command starts a tool that allows you to validate and commit to the information
repository the properties that you set for distributed event forwarding. For more information
about configuring distributed event forwarding, see Forwarding Events in Distributed
Correlation Mode.
Note: If the destination topic contains "avro" in lower case, such as th- arcsightavro , ESM
sends the event in Avro format.
configure-event-forwarding, continued
-h,--help Prints this message
-print,--printCommitted Prints the current committed configuration of
event forwarding
-validate <file> Validates the settings in the specified properties
file
<ARCSIGHT_
HOME>/config/forwarding.properties is the
default file value.
console
This command runs the ArcSight Console.
console
Applies to Console
-debug
-i
-imageeditor
-p <password> Password
-redirect
-relogin
-slideshow
consolesetup
This command runs the ArcSight Console Configuration Wizard to reconfigure an existing
installation.
consolesetup
Applies to Console
correlationsetup
This command applies to ESM in distributed mode. It allows you to setup correlation and
aggregation services in a distributed correlation environment. This command is described in
the topic Configuring Services in a Distributed Correlation Cluster.
correlatorthreaddump
This command applies to ESM in distributed mode. Run this command on the node where the
correlator is configured.
The command runs a script to dump current threads from a specified correlator instance. The
threads go into /opt/arcsight/var/logs/correlator<instanceid>/correlator.std.log.
correlatorthreaddump
Applies to correlator
Syntax correlatorthreaddump
Parameters <correlatorinstanceid>
Examples To run:
bin/arcsight correlatorthreaddump correlator1
dcachesetup
This command applies to ESM in distributed mode. It allows you to setup distributed cache
services in a distributed correlation environment. This command is described in the topic
Configuring Services in a Distributed Correlation Cluster.
deploylicense
This command is the recommended method for replacing or adding ArcSight Manager
licenses. After the command successfully completes, ESM immediately applies the changes and
you do not have to restart the Manager.
deploylicense
Applies to Manager
If you do not specify this Console is the preferred mode of operation and the only
parameter, ESM will use swing mode available on an appliance. In console mode, you
mode. answer configuration questions in a terminal window. Do
not specify other options with console mode.
If you receive the following error message after you run
deploylicense , use console mode:
Could not initialize class
sun.awt.X11GraphicsEnvironment
l swing
Swing mode allows you to answer configuration questions
in a graphical user interface. Do not specify other options
with swing mode.
l silent
Specify silent with the -f option to allow ESM to read
the configuration from a file that you created with the
recordui mode or the -g option. Only specify the -f
option with silent mode.
l recordui
Use this mode to answer configuration questions in a
graphical user interface and record the configuration in a
file for use with silent mode on other systems. Do not
specify other options with recordui mode.
-f <file> Name of the file to use with silent mode
deploylicense, continued
-g Generates sample properties for use with silent mode
ESM sends the sample properties to stdout , but you can
redirect the output to a file. You can then edit the output file
with your own configuration information for use with the -f
option in silent mode.
-h Displays the Help for the deploylicense command
downloadcertificate
This command runs a wizard for importing certificates from another server.
Note:This command is not supported in FIPS mode. To import or export certificates in FIPS mode,
use the keytool command. For more information, see "keytool" on page 182.
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators.
This command is primarily for downloading a certificate from one ESM server to a Console to
facilitate communications between them. When you run this command it prompts you for:
l Host name (or IP address) of the server to download from
l Port number
l Path to the keystore to which to download the certificate
This is typically /opt/arcsight/java/esm/current/jre/lib/security/cacerts
l Keystore password
l A new alias (name) for the certificate you are downloading
downloadcertificate
Applies to Manager
Syntax downloadcertificate
-g Generate sample
properties file for
–i silent mode
Examples To run:
arcsight downloadcertificate
exceptions
This command allows you to search for logged exceptions in ArcSight log files.
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators.
exceptions
Applies to Manager, Console, SmartConnectors
The path to the log file must be specified relative to the current working directory.
exceptions, continued
-u Specify a mail subject line addition, that is, details in
the log.
-n Group exceptions for readability.
-l Show only exceptions that have no explanation.
-p Suppress the explanations for the exceptions.
Example To run:
arcsight exceptions /opt/arcsight/var/logs/manager/default/server.log*
export_system_tables
This command exports your database tables. On completion, the command generates two files:
a temporary parameter file and the actual database dump file, which is placed in <ARCSIGHT_
HOME>/tmp.
For best results stop the Manager before running this command.
Distributed Correlation Cluster Only: You can only run this command on a persistor node.
export_system_tables
Applies to Manager
export_system_tables, continued
<DBname> Name of the CORR-Engine from which you are
exporting the system tables
-s Include session list tables
Examples To run:
/etc/init.d/arcsight_services stop manager
Trend resources are exported, but not trend data from running them. After you import, re-run the
trends to generate new data.
When you are done, stop the manager and start all the services.
Stop the Manager:
/etc/init.d/arcsight_services stop manager
flexagentwizard
This command generates simple ArcSight FlexConnectors.
flexagentwizard
Applies to SmartConnectors
Syntax flexagentwizard
Parameters None
Examples To run:
arcsight flexagentwizard
groupconflictingassets
This command groups asset resources with common attribute values (the Group Conflicting
Attribute Assets Tool). Assets can have conflicting IP addresses or host names within a zone.
groupconflictingassets
Applies to Manager
Syntax groupconflictingassets
groupconflictingassets, continued
Parameters -c Clean (delete the contents of) the group to receive links to assets before
starting. (Default: false)
-o <name> Name for group to receive links to assets which have conflicting attributes.
(Default: "CONFLICTING ASSETS")
-p <password> Password
-h Help
Examples To run:
arcsight groupconflictingassets
hardwareReport
This command can be run on any node where ESM is installed. If you run it on a persistor node,
it reports the hardware on each node in the cluster. If you run it on a non-persistor node or a
compact mode installation, it reports the hardware on that specific node.
This command does not have any parameters.
import_system_tables
This command imports database tables. The file you import from must be the one that export_
system_tables utility created. This utility looks for the dump file you specify in <ARCSIGHT_
HOME>/tmp/.
For best results stop the Manager before running this command.
import_system_tables
Applies to Manager
Paramete <arcsight_user> The database username, as set when you ran the
rs first-boot wizard.
<password> Password for the database, as set when you ran
the first-boot wizard.
import_system_tables, continued
<DBname> This is the name of the CORR-Engine, and it is
always arcsight .
<dump_file_name> Use arcsight_dump_system_tables.sql ,
which is the name the system gave this dump file
when you exported it. If you specify no path, the
file is located in <ARCSIGHT_HOME>/tmp/ . To
specify a different path, use an absolute path. Do
not specify a relative path.
Note:
Trend resources are exported, but not trend data from running them. After you import, re-run the
trends to generate new data.
When you are done, stop the manager and start all the services.
Stop the Manager:
/etc/init.d/arcsight_services stop manager
keytool
This command runs the Java Runtime Environment keytool utility to manage key stores.
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators.
keytool
Applies to Manager, Console, SmartConnectors
keytool, continued
Parameters -store <name> (Required) The specific store can be
managerkeys, managercerts, clientkeys,
clientcerts, ldapkeys, or ldapcerts.
(original parameters) All parameters supported
by the JRE keytool utility are passed along. Use
arcsight keytool
–help For a list of parameters and arguments. Also, use
the command keytool without arguments or
the arcsight prefix for more-detailed help.
The parameters for this command are actually sub-commands and many of them have their own
sub-commands or parameters. To see all the possible sub-commands use -help followed by the
sub-command for which you want to see all sub sub commands or parameters.
For example, if you have a keystore called "managecerts," you could type keytool -help -
store managecerts to see a list of all 16 additional subcommands. Then you could run:
keytoolgui
This command runs a graphical user interface command for manipulating key stores and
certificates. It is recommended that you use bin/arcsight keytool.
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators, as well as on the persistor node.
Note: Using keytoolgui requires that the X Window System be installed on your system. The X
Window System is not present on ESM on an appliance. Also, keytoolgui is not supported on
FIPS.
keytoolgui
Applies to Manager, Console
Syntax keytoolgui
Parameters None
Examples To run:
arcsight keytoolgui
kickbleep
This command runs a simple, standardized test using the bleep utility.
kickbleep
Applies to Manager
Syntax kickbleep
Examples To run:
arcsight kickbleep
listsubjectdns
This commmand displays subject distinguished names (DN) from a key store.
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators.
listsubjectdns
Applies to Manager, SmartConnectors
Syntax listsubjectdns
logfu
This command runs a graphical tool for analyzing log files. It generates an HTML report
(logfu.html) and, in SmartConnector mode, includes a graphic view of time-based log data.
Logfu pinpoints the time of the problem and often the cause as well.
Note: Using logfu requires that the X Window system be installed on your system. The X
Window system is not present on ESM on an appliance.
Running logfu
1. Open a command or shell window in <ARCSIGHT_HOME>/logs/default. This refers to the
logs directory under the ArcSight installation directory. Note that logfu requires an X
Windows server on Unix platforms.
2. It is recommended that you increase the log size before executing the logfu command by
running:
export ARCSIGHT_JVM_OPTIONS=" -Xms1024m -Xmx1024m -
Djava.security.policy=$ARCSIGHT_HOME/config/agent/agent.policy"
4. Right-click in the grid and select Show Plot/Event Window from the context menu.
5. Check at least one attribute (such as Events Processed) to be displayed.
Working with logfu
The initial logfu display is an empty grid; loading large log files can take a few minutes (a 100
MB log might take 5 or 10 minutes). After log files are scanned, their information is cached (in
files named data.*), which makes subsequent log file loading faster. If something about the log
changes, however, you must manually delete the cache files to force logfu to reprocess the
log.
Right-click the grid and choose Show Plot/Event Window from the context menu. Select what
to show on the grid from the Plot/Event Window that appears.
The tree of possible items to display is divided into Plot (attributes that can be plotted over
time, like events per second) and Event (one-time events, like exceptions, which are shown as
vertical lines). Check items to display.
Because SmartConnectors can talk to multiple Managers and each can be configured to use
multiple threads for events, the Plot hierarchy includes nodes for each SmartConnector and
each Manager. Within the SmartConnector, threads are named E0, E1, and so on. Each
SmartConnector has one heartbeat thread (H0) as well. Different types of SmartConnector
(firewall log SmartConnector, IDS SNMP SmartConnector, and so on) have different attributes
to be plotted.
The interactive Chart uses sliders to change the view. Hovering over a data point displays
detailed information. There are two horizontal sliders; one at the top of the grid, one
underneath. The slider at the top indicates the time scale. Drag it to the right to zoom in, or
widen the distance between time intervals (vertical lines). The slider at the bottom changes the
interval between lines—anywhere from 1 second at the far left to 1 day at the far right. The
time shown in the grid is listed below the bottom slider:
Showing YY/MM/DD HH:MM:SS – YY/MM/DD HH:MM:SS (Interval= X)
Click anywhere in the grid area and drag a green rectangle to zoom in, changing both the
vertical and horizontal scales. Hold the Ctrl key as you drag to pan the window in the vertical
or horizontal direction, and hold both the Shift and Ctrl keys as you drag to constrain the pan
to either vertical or horizontal movement. When you are panning, only sampled data is shown,
but when you stop moving, the complete data fills in. You can change this by unchecking
Enable reduced data point rendering by right-clicking and selecting Preferences. You can
change the rendering back to the default behavior by right-clicking and selecting Enable fast
rendering.
For each attribute being plotted, a colored, vertical slider appears on the right of the grid. This
slider adjusts the vertical (value) scale of the attribute plotted.
By default, data points are connected by lines. When data is missing, these lines can be
misleading. To turn off lines, uncheck Connect dots by right-clicking and selecting
Preferences.
After you have specified attributes of interest, scaled the values, centered and zoomed the
display to show exactly the information of concern, right-click and select Save as JPG to create
a snapshot of the grid display that you can print or email. The size of the output image is the
same as the grid window, so maximize the window to create a detailed snapshot, or reduce the
window size to create a thumbnail.
To return to a previous data view, right-click and select Bring to Front, Send to Back, Undo
Zoom, or Zoom out, depending on context. Use Auto Scale to fit data into the grid. Go to
allows you to display the specific log file line that cooresponds to a data point. Reset clears all
checked attributes and empties the grid.
logfu Analysis Example - Peak Event Volume
In this example, a SmartConnector is sending 10 events per second (EPS) to the Manager, but is
later sending 100, then 500, then 1000 EPS before dropping back down to 10. Logfu lets you
plot the SmartConnector’s EPS over time; in this case the result is a peak in event volume.
When you plot the Manager’s receipt of these events, you might see that it keeps up with the
SmartConnector until 450 EPS or so. You notice that the Manager continues consuming 450 EPS
even as the SmartConnector’s EPS falls off. This is because the Manager is consuming events
that were automatically cached.
By plotting the estimated cache size, you can see that the SmartConnector experienced a peak
event volume and the cache stepped in to make sure that the Manager did not lose events,
even when it could not keep up with the SmartConnector.
Use the vertical sliders on the right to give each attribute a different scale to keep the peak EPS
from the SmartConnector from obscuring the plot of the Manager’s EPS.
logfu Analysis Example - SmartConnector Down
In this example, a Check Point SmartConnector that was down for almost seven days. Logfu
plotted the event stream from the SmartConnector and it was flat during the seven days,
pinpointing the outage as well as the time that the event flow resumed. By overlaying Check
Point Log Rotation events on the grid, it became clear that the event outage started with a Log
Rotation and that event flow resumed coincident with a Log Rotation.
Further investigation revealed what had happened: the first Check Point Log Rotation failed
due to lack of disk space, which shut down event flow from the device. When the disk space
problem had been resolved, the customer completed the Log Rotation and event flow resumed.
If the Manager suddenly stops seeing events from a SmartConnector, logfu can help
determine whether the SmartConnector is getting events from the device. Another common
complaint is that not all events are getting through. logfu has a plot attribute called ZFilter
(zone filter) that indicates how many raw device events are being filtered by the
SmartConnector. Events processed (the number of events sent by the device) minus ZFilter
should equal Sent (the number of events sent to the Manager).
logfu
Applies to Manager (See also agent logfu.)
-l <timespec> Analyze only the specified time (Format: <time>{smhd}) Examples: 1d = one
day, 4h = four hours
logfu, continued
-noplot Skip the plotting
-t <timestamp> To time
managerinventory
This command displays configuration information about the installed Manager.
managerinventory
Applies to Manager
Syntax managerinventory
-append Append to the output file rather than create a new one and overwrite any
existing one
-h Help
Examples To run:
arcsight managerinventory
manager-reload-config
This command loads the server.defaults.properties and server.properties files on the
Manager.
manager-reload-config
Applies to Manager
Parameters -diff Displays the difference between the properties the Manager is currently
using and the properties that this command loads
-as Forces the command to load properties that can be changed without
stopping and starting the Manager. The properties that require a Manager
restart are updated in the server.properties but are not effective
until the Manager is stopped and all services are started.
To view the differences between the properties the Manager is currently using and the properties
that this command loads:
arcsight manager-reload-config -diff
managersetup
This command allows you to configure the manager by launching the Manager Configuration
Wizard. You can launch the wizard in console mode by using the -i console option while
running the command in a terminal window. Run it without any option to launch the wizard in
the graphical user interface mode when you have the X Window system installed and wish to
use it. For more information about using the wizard, see Running the Manager Configuration
Wizard. The options are all optional.
Note that using the X Window system (to run the Manager Configuration Wizard) is not
preferred, but if you have it installed and want to use it, you do not have to use the -i
console option. The X Window system is not present on ESM on an appliance.
If issues occur while running the Manager Configuration Wizard, this command logs
troubleshooting information in a log file:
/opt/arcsight/var/logs/manager/default/serverwizard.log
Distributed Correlation Cluster Only: You can only run this command on a configured
persistor node.
managersetup
Applies to Manager
Parameters -i <mode> console -- you answer configuration questions in a terminal window. Use no
other options. This is the preferred mode of operation, and the only mode
available for ESM on an appliance. Use the -i console mode if you get this error
when you attempt to run in the Manager Configuration Wizard: Could not
initialize class sun.awt.X11GraphicsEnvironment .
swing -- You answer the same questions in a graphical user interface. Use no
other options.
silent -- Followed by the -f option, the configuration is read from a file that was
created by the recordui mode or the -g option.Use no other options besides -f .
recordui -- You provide a file path and name and then answer questions in
GUI mode while configuring this system. Your configuration is recorded in the
specified file for use with the silent mode on some other system. Use no other
options.
Blank (no -i option at all) means Swing mode.
-f <file> The name of the file to use when running in –i silent mode.
-g Generate sample properties for –i silent mode. The sample properties are sent
to stdout , but you can redirect this output to a file. If you edit the file to provide
your own configuration information, you can use it as the file in the -f option in
silent mode.
managerthreaddump
This command runs a script to dump the Manager's current threads. The threads go into
manager/logs/default/server.std.log. Do not inadvertently add a space between
manager and threaddump, doing so causes the Manager to restart. Specify this file when
running threaddumps, which provides a convenient HTML file with links to all the thread
dumps in a summary format.
Distributed Correlation Cluster Only: You can only run this command on a persistor node.
managerthreaddump
Applies to Manager
Syntax managerthreaddump
Parameters None
Examples To run:
arcsight managerthreaddump
managerup
This command gets the current state of the Manager. Returns 0 if the Manager is running and
reachable. Returns 1 if it is not.
Distributed Correlation Cluster Only: You can only run this command on a persistor node.
managerup
Applies to Manager
Syntax managerup
Parameters None
mbussetup
This command applies to ESM in distributed mode. It allows you to setup message bus services
in a distributed correlation environment. This command is described in the topic Configuring
Services in a Distributed Correlation Cluster.
monitor
This command is used with the Network Management Systems.
monitor
Applies to Manager
Syntax monitor
-out <file> Output filename for management service information. Default is stdout
-p <pwd> Password
Examples To run:
arcsight monitor
move_persistor_repo
This command checks for an information repository instance on the persistor node. If an
instance exists, it tries to move this instance to another node without an information repository
instance.
This command is useful for APHA persistors because APHA persistors perform better if they do
not have an information repository instance on the persistor node.
move_persistor_repo
Applies to Information Repository
Syntax move_persistor_repo
Parameters none
Examples To run:
arcsight move_persistor_repo
netio
This command is a simple network throughput measurement utility.
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators.
netio
Applies to Manager
Syntax netio
-s Server mode
Examples To run:
arcsight netio
package
This command imports or exports resources (users, rules, and so on) to or from one or more
XML files (.arb files).
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators.
Use this command instead of the archive command. See the ArcSight Console User's Guide for
information about performing these and other functions from the ArcSight Console.
package
Ap Manager, Database, Console
plie
s to
Par -action <action> Creates a new package based upon one or more
am packages that you specify. The possible actions
ete include bundle , convertarchives , export ,
rs import , install , uninstall . The default is
export
package, continued
-config <file> The primary configuration file to use. Default is
config/server.defaults.properties
-convertbaseuri <baseuri> The base URI for packages that are converted from
archives. This option is only used in conjunction with
the –actionconvertarchives option
-f <path> The location of the package .arb bundle file. File
name paths can be absolute or relative. Relative
paths are relative to <ARCSIGHT_HOME>
-m <manager> The Manager to communicate with
-p <password> The password with which to log in to the Manager.
A password is not needed and not used in
standalone mode, because the connection is made
using the stored database account. Password is
required otherwise.
-package <packagerefs> The URI(s) of the package(s). This option is used in
conjunction with –action install and –action
uninstall in order to list which packages to
operate upon
-pc <privateConfig> This configuration file overrides the
server.defaults.properties file. The default
location is config/server.properties
-pkcs11 Use this option when authenticating with a PKCS#11
provider. For example,
arcsight package -m <hostname> -pkcs11 -
f <file path>
-port <port> The port to use for communication. The default port
used is 8443
-source <sourcefile> The source file. This is used in conjunction with the
–f command which specifies an output file
package, continued
-u <username> The user name used for logging in to the Manager
-standalone Operate directly on the Database not the Manager
To install a package:
arcsight package –action install –package "/All Packages/Personal/Mypackage" –u
username –p password –m managername
To uninstall a package:
arcsight package –action uninstall –package "/All Packages/Personal/Mypackage" –
standalone –config /config/server.defaults.properties –pc
/config/server.properties
To export a package:
arcsight package –action export –package "/All Packages/Personal/Mypackage" –f
packagebundle.arb –u username –p password –m managername
To export packages in a standalone mode (directly from the database) Make sure that the Manager is not
running:
arcsight package –action export –package "/All Packages/Personal/Mypackage" –f
packagebundle.arb –u username –p password –standalone –config
server.default.properties –pc server.properties
In the above example, chnpkg.xml , filterpkg.xml , and rulepkg.xml files are extracted from their
respective packages and are bundled in one package bundle called myPkgNew.arb .
portinfo
This command runs a script used by the portinfo tool of the Console. Displays common port
usage information for a given port.
portinfo
Applies to Console
Examples To run:
arcsight portinfo
reenableuser
This command re-enables a disabled user account.
Distributed Correlation Cluster Only: You can only run this command on a persistor node.
reenableuser
Applies to Manager
refcheck
This command is a resource reference checker.
Distributed Correlation Cluster Only: You can only run this command on a persistor node.
refcheck
Applies to Manager
Syntax refcheck
Parameters None
Examples To run:
arcsight refcheck
regex
This command is a graphical tool for regex-based FlexConnectors.
regex
Applies to SmartConnectors
Syntax regex
Parameters None
Examples To run:
arcsight regex
replayfilegen
This command runs a wizard for creating security event data files ("replay files") that can be
run against a Manager for testing, analysis, or demonstration purposes.
Note: This is a client side command only and should executed from the Console’s <ARCSIGHT_
HOME>/bin directory. If GUI mode is setup, it defaults to GUI mode. If GUI mode is not setup, it
defaults to console mode.
replayfilegen
Applies to Console
reposetup
This command applies to ESM in distributed mode. It allows you to setup information
repository services in a distributed correlation environment. This command is described in the
topic Configuring Services in a Distributed Correlation Cluster.
resetpwd
This command runs a wizard to reset a user’s password and optionally notify the user of the
new password by e-mail.
Note: If GUI mode is setup, it defaults to GUI mode. If GUI mode is not setup, it defaults to
console mode.
Distributed Correlation Cluster Only: You can only run this command on a persistor node.
resetpwd
Applies to Manager
Syntax resetpwd
resvalidate
This command checks for whether there are any invalid resources in the database. The utility
generates two reports called validationReport (with .xml and .html extensions) that are
written to the directory from which you run the resvalidate command. Make sure you stop
the Manager before you run this command. If you have more than 50,000 actors you should
first increase your Java heap size to 8 GB before running this command.
Distributed Correlation Cluster Only: You can only run this command on a persistor node.
resvalidate
Applies to Manager, Database
Syntax resvalidate
resvalidate, continued
Parameters -excludeTypes Resource type to exclude from being checked; for example, Rule ,
<exclude_resource_ DataMonitor
names>
If specifying multiple resource types to exclude, use comma to separate
them.
Resource type – Rule,DataMonitor (comma separated)
-out <output_dir> Output directory for validation report. If none is specified, the report is
placed in the directory from which you run the resvalidate command
-persist [false | If a resource is found to be invalid, whether to mark it invalid or only
true] report it as invalid. For example, a rule depends on a filter that is missing.
When you run the resvalidate command and –persist=false , the
rule is reported as invalid but not marked invalid. However if –
persist=true , the rule is marked as invalid.
Default: persist=true .
Examples In general, if you need to run the resource validation script, run it twice: the first time with '-
persist true' (default) to validate and fix invalid resources, and the second time with '-persist false'
to generate a correct report:
arcsight resvalidate
searchindex
This command creates or updates the search index for resources.
If you provide the credentials for the Manager, it automatically associates with the newly
created or updated index. However, if you do not specify any credentials, manually configure
the Manager to use the updated index.
The searchindex command must be deployed on the machine where the ESM Manager is
installed.
Distributed Correlation Cluster Only: You can only run this command on a persistor node.
searchindex
Applies to Manager
searchindex, continued
Parameters -a <action> Possible actions: create , update , or regularupdate . The -a parameter is
required.
create —Creates a new search index.
update —Updates all resources in the index that were touched since the
last daily update was run. Although "update" is a scheduled task that runs
daily, you can run it manually.
regularupdate —Updates all resources in the index that were touched
since the last regular update was run. Although "regular update" is a
scheduled task that runs every 5 minutes, you can run it manually.
-t <time> Time stamp that indicates starting when the resources should be updated
Examples To run:
arcsight searchindex –a <action>
For example,
arcsight searchindex -a create
Note: If you get an error in the server log for the searchindexutility that says
outofmemoryError , you can increase the cap on the Java heap size. Go to your environment
variables and increase the value for the variable called ARCSIGHT_SEARCH_INDEX_UTILITY_JVM_
OPTIONS.
Set the variable like the following example:
ARCSIGHT_ SEARCH_ INDEX_ UTILITY_ JVM_ OPTIONS="- Xms512m - Xmx8192m"
export ARCSIGHT_SEARCH_INDEX_UTILITY_JVM_OPTIONS
Xms is the initial Java heap size. Xmx is the maximum. The above values are the defaults.
When that variable is set, it takes priority over the default settings as well as ARCSIGHT_JVM_
OPTIONS.
sendlogs
This command runs a wizard to sanitize and save ArcSight log files so that you can send them to
customer support for analysis, if they instruct you to do so. Log files are under
/opt/arcsight/var/logs for both distributed and compact modes. Logs larger then 1GB are
skipped in all cases. When listing hostnames to sanitize, the hostnames must be comma-
separated.
You can run sendlogs from the ArcSight Console, the Manager command line, or in the
context of log retrieval in the ArcSight Command Center.
The sendlogs local log collects log files for:
l ArcSight Console
l Connectors (when selected and running)
l Manager (from all nodes if running distributed mode)
l DBMS (CORR-Engine)
l Analytic files (for example, thread dumps)
l ArcSight Command Center (Manager logs and Logger configuration and log files)
The sendlogs Local Logs Only functionality is available if you run sendlogs from command
line or from the ArcSight Console as an administrative user; it is not available if you run
sendlogs as a non-administrative user. Also, if you are not logged in as a non-administrative
user, you can choose only the sanitizer mode.
Note: The sendlogs command does not send the log files.
Note: For ESM in distributed mode , run this command only on the persistor node. Running
sendlogs from a non-persistor node in a cluster is not supported.
For distributed mode (and when run from the persistor node) the sendlogs local log will collect
all cluster logs, except for:
l DBMS (CORR-Engine)
l Analytic files (for example, thread dumps)
sendlogs
Applies to Manager, Database, Console
Syntax sendlogs
syncpreferip
This command sychronizes the IP preference of cluster nodes with the choice you make on the
persistor node when you run managersetup. See Changing the Internet Protocol Version in a
Distributed Correlation Environment for details on changing the IP preference.
Distributed Correlation Cluster Only: You can only run this command as user arcsight on a
persistor node.
syncpreferip
Applies to Manager
tee
This command displays the output of a program and simultaneously writes that output to a file.
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators.
tee
Applies to Manager
Syntax -f <filename>
Examples To run:
arcsight tempca -i | arcsight tee -f sslinfo.txt
tempca
Syntax tempca
-ap Create demo SSL key pair and add it to the Manager key store
-dc Dump/export the demo CA’s certificate to a file (demo.crt ) for browser import
tempca, continued
-i Display summary of current SSL settings
-nc No chain: Do not include certificate chain (option for creation of a demo key pair)
-rc Reconfigure not to trust demo certificates. Removes the demo CA’s certificate from
the client truststore
-rp Remove pair’s current key pair from the Manager key store
-v Validity of the new demo certificate in days (Default: 365)
<days>
Examples To run:
arcsight tempca
threaddumps
This command extracts and reformats thread dumps from the file to which you wrote the
thread dumps in the managerthreaddump command
(manager/logs/default/server.std.log). The output is an html file in the bin directory
from which you run this command. It provides a list of links to all the thread dumps in a
summary format.
Distributed Correlation Cluster Only: You can run this command on a cluster node that is
running instances of aggregators and correlators.
threaddumps
Applies to Manager
Examples To run:
arcsight threaddumps
tproc
This command is a standalone Velocity template processor.
tproc
Applies to Manager
Syntax tproc
-Dname=value Defines
-v Verbose mode
Examples To run:
arcsight tproc
updaterepohostconfig
This command applies to distributed correlation mode only.
This command prompts for new hostnames corresponding to old hostnames in the distributed
correlation cluster and makes changes to the configuration.
updaterepohostconfig
Applies to Manager
whois
This command is used by the whois command of the console
whois
Applies to Console
whois, continued
-s <host> Name or address of ‘whois’ server
Examples To run:
arcsight whois
zoneUpdate
This command updates IPv4 and IPV6 address allocations and dark space information that are
provided in the periodic Zone Update Subscription Package, contained in the Zone_Updates_
<version>.zip file. Then, at the command line, run the zoneUpdate command to apply the
zone updates. Use of this command is optional. You can use zoneUpdate after a successful
Manager installation or upgrade. This command is available from the command line only, and
has no GUI functionality.
Distributed Correlation Cluster Only: Run this command from the persistor node only.
Running zoneUpdate requires an ESM administrator login and password. While the process is
running, do not use the same administrator account to access the ArcSight Console or ArcSight
Command Center for other administrative tasks. Allow up to 50 minutes or longer for a first-
time zone update, depending on the manager workload and the number of assets assigned to
the global network. Subsequent incremental updates should not take as long. While
zoneUpdate is running, other ESM administrators and users may access the Console or
Command Center.
zoneUpdate performs these actions in the Global network:
esm.manager.disable.resource.move=true
Refer to "Editing Properties Files" on page 17 for details on editing the server.properties
file.
Recommendations
l Allocate assets to the local network only and that the Global network does not contain assets.
Also, zones that have categories assigned to them, and then are removed and reinstalled as
part of the zone update process lose the category assignments. Do not assign categories to
the system zones.
l Perform a full system database table backup (export_system_tables) and export the
current ArcSight Network package before using zoneUpdate, to ensure that you have a
usable snapshot of your network model. If the zone update process is interrupted or a
problem occurs and you must revert your data, be sure to use this backup to restore your
ArcSight resources before attempting to run zoneUpdate again.
l Run zoneUpdate during non-peak system time.
Running zoneUpdate
Note: Zone Groups belonging to Regional Internet Registries (RIR) that contain more than 1000
zones will place their corresponding zones in subgroups, each group containing up to 950 zones,
to enable you to better manage those zones, and content related to them, from within the
ArcSight Console.
You are prompted for the ESM user's password. Be sure to enter the correct password.
zoneUpdate uses the entered password several times, and temporarily locks you out if you use
the wrong password. If this happens, you can reenable the user or wait for the user to be
reenabled automatically.
Running zoneUpdate can take longer than 50 minutes, depending on Manager workload and
the number of assets assigned to the Global network. zoneUpdate will print its progress while
it processes zone data. The information is also written to zoneUpdate.log in Manager's log
directory.
Warning: Do not interrupt or kill zoneUpdate after the process starts. Allow zoneUpdate to
complete, and then make a determination of the condition of your zones and whether to install
another version of the Zone Update Subscription package.
Asset Zoning
Assets that were zoned in the Global network before you run zoneUpdate will be zoned after
the command completes.
Asset Ranges
Asset ranges are not auto-zoned by zoneUpdate. Asset ranges will be unzoned by the running
of the zoneUpdate; you must manually rezone asset ranges after you run zoneUpdate if you
had asset ranges in the Global network.
For example, if you had an asset range in Zone A in a previous version of ESM, the asset range
is unzoned after you run zoneUpdate. For this example, suppose Zone A was split into two
zones, Zone A and Zone B, and after upgrade your asset range spans the last part of Zone A and
first part of Zone B. In this case, the asset range becomes unzoned. To recover zoning, you must
open each unzoned asset range resource and map it to the correct zone, or split it into two
asset ranges that map to the new Zones A and B.
zoneUpdate
Appl Manager
ies
to
-h Help
To run a CORR-Engine ArcSight command script, open a command window and switch to the
/opt/arcsight/logger/current/arcsight/logger/bin directory. These arcsight
commands run using the file arcsight.sh in that location. The general syntax is as follows:
arcsight <command_name> [parameters]
configbackup
Description The configbackup command backs up certain essential configuration information such as search
settings and the configuration of archives (not the archives themselves). It places this backup in a
file called configs.tar.gz which you can find in
/opt/arcsight/logger/current/arcsight/logger/tmp/configs .
Applies to CORR-Engine
Parameters none
Example To run:
/opt/arcsight/logger/current/arcsight/logger/bin/arcsight configbackup
Make sure you are familiar with these guidelines before you create a backup file:
The configbackup command creates the configs.tar.gz file, which you must then copy to a
safe location.
Make a note of the following, which must match exactly on the machine to which you restore:
l Operating system and version
l Path to the archive locations for each storage group
l ESM version
l MySQL password
disasterrecovery
Descriptio This command restores the data backed up using the configbackup command.
n
Applies to CORR-Engine
Parameter start
s
Example To run:
/etc/init.d/arcsight_services stop logger_servers
cp ~/configs.tar.gz /opt/arcsight/logger/current/backups/configs.tar.gz
/opt/arcsight/logger/current/arcsight/logger/bin/arcsight disasterrecovery
start
Make sure you are familiar with these guidelines before you restore a backup file:
l When you restore this data, the existing data is deleted.
This command restores the specific settings that were current at the time the backup was
taken. Any configuration settings that were updated between the time of the backup and the
time of the restore are lost.
This includes event data. The assumption is that you are restoring this configuration to a
new, clean installation with no event data, or at least none that needs to be preserved.
Restore the content to a machine where the following characteristics are exactly the same
as the backup machine:
l The version of ESM must be the same .
l The version of the operating system (and the time zone to which it is set) must be the same.
l The archive locations for the backed-up storage groups must already exist and be the same.
l The MySQL password must be the same.
exportdatausage
Description ESM keeps track of event counts and size from each connector. Use this command to export this
event data as a comma-separated values (CSV) file. You can use this information to track the event
throughput by connector.
Note: This command has to be run from a different location than the other arcsight commands.
Run it from:
/opt/arcsight/logger/current/arcsight/logger/bin
Applies to CORR-Engine
exportdatausage, continued
Syntax exportdatausage <path/file>
Optional <path/file> Specify the path and name of the CSV file to which to
Parameter export the usage data. It can be a relative or absolute
path. You do not need to specify the .csv extension.
If you do not specify this parameter, the data is displayed
on screen.
General Troubleshooting
Rule action does not populate variables such as $message and $deviceCustomString(s) in
correlated events
When a rule fires, it passes the correlated event to notifier for email notification. The rule
engine automatically populates some of the fields in the correlated event, such the name or
agent-related fields. Note that not all fields are populated. To populate fields with base event
values, the fields must be aggregated fields.
Note: If the aggregation threshold is greater than 1, the rule will not fire until all conditions,
including aggregation condition, are matched.
For example, if you want to populate the $message and $deviceCustomString5 fields, you can
modify the rule to add these two fields to the "aggregate only if these fields are identical" list.
Note: You must add the fields to the "aggregate only if these fields are identical" list. If you add
them to the rule action notification's subject, they will not be passed into email notification.
If you forward the original correlated base event while including the setevent field
requirements for $deviceCustomString1 - $deviceCustomString5, the forwarded event
populates only the base event ID. It does not populate all the fields on the base event. To
ensure the forwarded event populates all base event fields, include aggregation settings in the
rule.
This applies to variables such as $message and $deviceCustomString(s), but the forwarded
event populates other variables, such as $name, without aggregation.
You changed your File system format from XFS to EXT4 or back and now you have
problems.
Both XFS and EXT4 file system formats are supported during installation. However, ESM
configures itself to the file system upon which it is first installed; you therefore cannot change
file system type after installation, even during an upgrade. Roll your file system back to what it
was before.
Your license expired and you cannot start the ArcSight Command Center to specify a new
license file.
Run the arcsight managersetup command as documented in Running the Manager
Configuration Wizard.
Report is empty or missing information
Check that the user running the report has inspect (read) permission for the data being
reported.
Running a large report crashes the Manager
A very large report (for example, a 500 MB PDF report) might require so much virtual machine
(VM) memory that it can cause the Manager to crash and restart. To prevent this scenario, you
can set up the Manager to expose a special report parameter for generating the report in a
separate process. The separate process has its own VM and heap, so the report is more likely
to generate successfully. Even if the memory allocated is still not enough, the report failure
does not crash the Manager.
This option must be set up on the Manager to expose it in the Console report parameters list.
The steps are as follows:
1. On the Manager in the server.properties file, set
report.canarchivereportinseparateprocess=true. This makes a new report
parameter available on the Console.
2. Save the server.properties file.
3. Stop the Manager:
/etc/init.d/arcsight_services stop manager
4. On the ArcSight Console, open the report that you want to run in a separate process in the
Report Editor, and click the Parameters tab. Set the parameter Generate Report In
Separate Process to true.
5. Run the report. The report should run like a normal report, but it does not consume the
resources of the Manager VM.
Note: Use this parameter only if you experience a Manager crash when running large
reports such as the ones that contain tables with more than 500,000 rows and 4 or 5
columns per row.
You can also set the number of threads to use, as follows (the default if you do not use this
property is four threads):
rules.replay.numthreads=<number of threads to use>
Some Central European, Cyrillic, and Asian language fonts do not display properly when
generating reports in PDF
This problem occurs because some Central European, Cyrillic, or Asian language fonts that are
TrueType fonts are not supported directly by versions of Adobe Reader earlier than version 8.0.
In order to work around this, each TrueType font must be mapped to an OpenType font
supported in Adobe Reader 8.0. ArcSight provides this mapping in the <ARCSIGHT_
HOME>/i18n/server/reportpdf_config_<locale>.properties file. You have the option to
change the default mapping of any TrueType font to the OpenType font by modifying the
respective font mapping in this file.
To work around this issue:
1. Install a localized Adobe Reader 8.0 depending on the language of your platform on your
Manager machine. This version of the Adobe Reader installs the OpenType fonts by
default.
2. Edit the server.properties file as follows:
a. Set report.font.truetype.path property to point to the directory that contains the
TrueType and OpenType font. Use ":" as a path separator in Unix. On Unix platforms,
the TrueType font path may differ depending on the specific Unix platform, but it is
typically /usr/lib/font. The CIDFont directory is always the same relative to the
Adobe Reader installed directory. So, the default directory would be
/usr/lib/font:<adobe_reader_dir>/Resource/CIDFont.
b. Set report.font.cmap.path property to point to Adobe Reader’s CMap directory. On
Unix, the CMap path is relative to the Adobe Reader installation -- <adobe_reader_
dir>/Resource/CMap.
E-mail notification doesn’t happen
Note: The timeout can still occur even after you increase the time limit, due to overall system
load, high EPS, or a large number of rules to recover.
For details on editing the server.properties file, see Editing Properties Files.
Manager uses decoupled process execution on UNIX-based systems
On UNIX-based systems, Manager uses decoupled process execution to perform specific tasks,
for example, to run a very large report. Decoupled process execution uses a stand-alone
process executor (instead of using "in process" or "direct process" execution) and sends
commands to be executed via the file system. The process executor uses the <ARCSIGHT_
HOME>/tmp directory, so restrict system level access for this directory.
The process executor is used, by default, on all Unix platforms. The Manager scripts ensure
that the process executor runs as a daemon before the Manager is started. This has some
implications with regards to troubleshooting Manager startup and runtime problems. The
Manager, if configured to use the process executor, does not start unless it detects the
presence of a running process executor. The process executor runs within its own watchdog,
like the Manager, so if the process stops for any reason, it restarts automatically. The process
executor is transparent to users regarding how the Manager is started or stopped.
The stdout and stderr of the executed process are written into the following two files:
<ARCSIGHT_HOME>/tmp/[commandfile-name].stdout
<ARCSIGHT_HOME>/tmp/[commandfile-name].stderr
Time spread calculations might consume a lot of CPU time, especially if Threat Detector has
been running for a long time. To determine whether the Time Spread feature is degrading
performance, check the system.log for the start and end times of the Threat Detector
process. If the process is taking longer than expected and causing issues in your environment,
you can disable the Time Spread feature.
To disable the Time Spread feature, add the property
patterns.timeSpreadCalculation=False to the Manager’s server.properties file.
If this many consecutive "accumulate" (not refresh) runs fail for any reason, the system
automatically disables the trend. The check is always performed after any accumulate query
run fails. After the threshold is reached, any remaining queries to be executed by this task
are skipped. If this setting is absent or 0, the checking mechanism is turned off.
If a trend or query is stopped because of any of the above reasons, an audit event reflects
this.
Troubleshooting checklist after stopping the Manager and starting all services
l Use the Console Trend Editor to manually disable any trends that you do not need or that you
notice have excessive query times. Disabling these trends helps reduce scheduler and
database contention.
l As trend data gathering tasks wake up, the trend attempts to fill in the gaps for missing
intervals. Depending on the size of the gaps, this may take some time before the trends
catch up.
l A trend does not usually re-run any previously failed runs. If you want to re-run a particular
time, you need to manually request it from the Trend Editor.
Disable trend on high-throughput systems
If your system environment typically processes a very large number of events per second (EPS)
(such as more than 1000 EPS or 100 million events per day), we recommend that you manually
disable the following trend:
/All Trends/ArcSight Administration/ESM/User Access/ArcSight User Login
Trends – Hourly (Installed by default)
For a trend that queries an entire day and runs once a day, this would allow for more than a
month’s worth of data to be queried. The data must be present on the system, however, or the
query returns no results (but it does not fail).
SmartConnectors Troubleshooting
My device is not one of the listed SmartConnectors
ArcSight offers an optional feature called the FlexConnector Development Kit which may
enable you to create a custom SmartConnector for your device.
ArcSight can create a custom SmartConnector. Contact Customer Support.
My device is on the list of supported products, but it does not appear in the
SmartConnector Configuration Wizard
Your device is likely served by a Syslog sub-connector of either file, pipe, or daemon type.
Device events are not handled as expected
Check the SmartConnector configuration to make sure that the event filtering and aggregation
setup is appropriate for your needs.
SmartConnector not reporting all events
Check that event filtering and aggregation setup is appropriate for your needs.
Some Event fields are not showing up in the Console
Check that the SmartConnector’s Turbo Mode and the Turbo Mode of the Manager for the
specific SmartConnector resource are compatible. If the Manager is set for a faster Turbo
Mode than the SmartConnector, some event details are lost.
SmartConnector not reporting events
Check the SmartConnector log for errors. If the SmartConnector cannot communicate with the
Manager, it caches events until its cache is full.
If you can log in from some Console machines but not others, focus on any recent network
changes and any configuration changes on the Console host in question.
Console cannot connect to the Manager
If you start an ArcSight Console that could previously connect to the Manager with no trouble,
but now it can’t, see if the error is similar to:
"Couldn't connect to manager - improper authorization setup between client and manager."
If so, it’s likely that the manager has been reconfigured in such a way that it now has a new
certificate. Especially if the Console asked you to accept a new certificate when you started it.
To fix this, find and delete the certificate that the Console was using before, and then manually
import another certificate from the Manager.
Console reports out of memory
If your ArcSight Console is so busy that it runs out of memory, change the memory settings in
the console.bat or console.sh file. This file (for Windows or Linux, respectively) is located in
the directory in which you installed the ArcSight Console, in Console/current/bin/scripts.
Find the line that starts with set ARCSIGHT_JVM_OPTIONS=
Find the parameter –Xmx512m (Xmx controls the maximum JVM memory).
Change the value to 1024: –Xmx1024m.
Restart the Console for the new setting to take effect.
Acknowledgement button is not enabled
The Acknowledgement button is enabled when there are notifications to be acknowledged and
they are associated with a destination that refers to the current user. To enable the button, add
the current user to the notification destination.
The grid view of live security events is not visible
To restore the standard grid view of current security events, select Active Channels from the
Navigator drop-down menu. Double-click Live, found at /Active channels/Shared/All
Active channels/ArcSight System/Core/Live
Internal ArcSight events appear to warn users of situations such as low disk space for the
ArcSight Database. If you are not sure how to respond to a warning message, contact Customer
Support.
The Manager Status Monitor reports an error
The Console monitors the health of the Manager and the ArcSight Database. If a warning or an
error occurs, the Console may present sufficient detail for you to solve the problem. If not,
report the specific message to Customer Support.
Console logs out by itself
Check the Console log file for any errors. Log in to the Console. If the Console logs out again,
report the error to Customer Support.
Duplicate audit events or rule actions after a crash recovery
When you stop ESM, it takes a checkpoint of the rules engine so that it knows where it stopped.
If ESM crashes in such a way that it cannot take a checkpoint (power failure, for example), it
returns to the last checkpoint when it restarts, and replays events from there. Any actions that
occurred between that checkpoint and the ESM crash will therefore be repeated. Repeated
actions that generate audit events generate duplicate audit events.
You should investigate repeated actions that do not duplicate well. For example, if an action
adds an item to an Active List, that item’s counter will be incremented. If the action runs a
command, it will run it again, and so on.
You can reduce duplicates by including a rule condition that checks if the relevant entry is
already in the active list.
Case data fields appear blank
A number of case fields accept up to 4,000 bytes. However, if you fill too many such fields to
the maximum, then you can exceed the limit and the fields can appear blank when you view
the case.
This is because of a database limitation on the size of a row (a case, for example), which is
about 8k bytes. For large fields, only 768 bytes are stored in the row, along with a 20 byte
pointer to the rest, which is stored outside the table. This enables you to have considerably
more than 8K of data, but you can still exceed the limit for the database row for a resource.
As a guideline, keep the number of large fields in a case (or other resource with large fields)
below ten. The data in the smaller fields contributes to the total, so if you still encounter the
problem, consider them as well.
Hostname Shown as IPv6 Address in Dashboard
This can occur due to a mismatch between the system hostname, the network configuration,
and your environment's name resolution. Review your system's hosts file and DNS
configuration, as well as the addresses found in the DNS for the system hostname.
Manager Troubleshooting
Can’t start Manager
The Manager provides information on the command console which may suggest a solution to
the problem. Additional information is written to <ARCSIGHT_
HOME>/logs/default/server.std.log.
asset.aging.daysbeforedisable=4
asset.aging.task.operation=delete
asset.aging.task.maxassetsprocess=500
asset.aging.task.maxassetsload=500
asset.aging.task.period=Hourly
asset.aging.task.minute=0
Notes:
- For the property asset.aging.daysbeforedisable note that the default value of -1
means that asset aging is turned off, not that assets will be disabled and deleted. The value
for asset.aging.daysbeforedisable is expressed in days that define how long an asset
is allowed to age before it is disabled and deleted.
- For the deletion of aged assets to work properly, verify that the
asset.aging.task.operation property is set to delete.
- Set the properties asset.aging.task.maxassetsprocess and
asset.aging.task.maxassetsload to the same value. The value depends on your
hardware and system load. The higher the number specified, the faster the asset deletion
will occur. We recommend starting with the value 500 for these two properties, and after
the number of assets falls to around 100,000, you can try increasing these properties to
1000.
2. In the server.defaults.properties file, verify the value of the property
dbconmanager.provider.logger.pool.maxcheckout. If the value is less that 3600, add
this line to the server.properties file:
dbconmanager.provider.logger.pool.maxcheckout=3600
3. Monitor the progress of the asset deletion. When the desired asset limit it reached, stop
the process by deleting the properties you added to the server.properties file
(asset.aging.daysbeforedisable, asset.aging.task.operation,
asset.aging.task.maxassetsprocess, asset.aging.task.maxassetsload,
asset.aging.task.period, asset.aging.task.minute, and
dbconmanager.provider.logger.pool.maxcheckout).
The property settings described above are not standard configurations. In the future,
monitor the number of assets in groups and do not let them exceed the recommended
maximum of 10,000 resources for any resource group.
Switching between daylight savings and standard time can skip a scheduled task
l If the trigger time for a particular scheduled task run happens to fall during the transition
time from DST to ST or vice versa, the interval for that particular run gets thrown off. The
interval calculation for subsequent scheduled runs are not affected.
l Currently, there are four time zones that are not supported in ESM:
o Kwajalein
o Pacific/Kwajalein
o Pacific/Enderbury
o Pacific/Kiritimati
These time zones fall in two countries, Marshall Islands and Kiribati.
Possible solutions include eliminating unnecessary trends, if any, avoid running too many at the
same time, and trim queries to return more refined data sets. If the problem persists, try
increasing the value of sort_temp_limit in /opt/arcsight/logger/data/mysql/my.cnf.
For information about creating queries, trends, and reports, see the ArcSight Console User's
Guide.
If increasing the sort_temp_limit is insufficient, and the following circumstance applies,
there are two additional remedies.
Excessive temporary file space gets used when Group By (or sorting) is performed on the Event
table. If you use Group By (or sorting), use the ArcSight substring function on varchar/string
event fields to minimize the data manipulation during grouping. You can use existing local or
global variables to achieve this behavior and replace the existing field in the query with the
variable. For information, refer to the "Reference Guide" chapter in the ArcSight Console
User's Guide.
If the file space usage is still not satisfactory, you can convert the character set automatically
to Latin which uses less space. To do so, set the event.query.charset.conversion property
to 1 in the /opt/arcsight/manager/config/server.properties file to convert the existing
character set to latin1. Alternatively, set the property to 2 for conversion to binary and then to
Latin (to minimize conversion error for non-English character set). The default value of this
property is 0 (zero).
If you use this conversion on multi-byte character sets, it will truncate the characters to single-
byte Latin characters, which is likely to render them meaningless. Only use this approach if it’s
appropriate.
A FATAL message "The original archive has: <hash value> , and the files have:
<different hash value>"
and/or
An ERROR message "supplementalhash computed from data files does not match
hash in metadata"
ESM does not periodically scan for hash mismatches, as the archives may even be moved to
external storage, outside of ESM's view. When an archive is moved back and re-activated, it is
checked.
SSL Troubleshooting
Cannot connect to the SSL server: IO Exception in the server logs
Causes:
The SSL server may not be running.
l A firewall may be preventing connections to the server.
Resolutions:
l Ensure that the SSL server is running.
l Ensure that a firewall is not blocking connections to the server.
Cannot connect to the SSL server
The hostname to which the client initiates an SSL connection should exactly match the
hostname specified in the server SSL certificate that the server sends to the client during the
SSL handshake.
Causes:
l You may be specifying Fully Qualified Domain Name (FQDN) when only hostname is
expected, or the other way around.
l You may be specifying IP address when hostname is expected.
Resolutions:
l Type exactly what the server reports on startup in server.std.log ("Accepting
connections at http://...")
l For Network Address Translation (NAT) or multi-homed deployments, use hosts file to point
client to correct IP.
PKIX exchange failed/could not establish trust chain
Cause:
Issuer cannot be found in trust store, the cacerts file.
Resolution:
Import issuer’s certificate (chain) into the trust store.
Issuer certificate expired
Cause:
The certificate that the SSL server is presenting to the client has expired.
Resolution:
Import the latest issuer’s certificate (chain) into the trust store.
Cannot connect to the Manager: exception in the server log
Cause:
If you replaced the Manager’s key store, it is likely that the old key store password does not
match the new password.
Resolution:
Make sure the password of the new key store matches the old key store. If you do not
remember the current key store’s password, run the Manager Configuration Wizard on the
Manager to set the password of the current key store to match the new key store’s password.
Certificate is invalid
Cause:
The timestamp on the client machine might be out of the bounds of the validity range specified
on the certificate.
Resolution:
Make sure that the current time on the client machine is within the validity range on the
certificate. To check the certificate’s valid date range see View Certificate Details From the
Store.
l -dtype <dtype>
Specify the type of destination. File means a local path and Hadoop means a path to a
Hadoop system.
Optional Parameters:
l -format <format>
Specify the format as cef (common event format), csv (comma-separated values), or
keyvalue (key-value pairs).
- The default is keyvalue.
- Use all lower case letters.
- If you use the CSV format, the file name extension in -dpath must be csv, gz, or bz2.
- If you use keyvalue or CEF formats, the file extension must be txt, gz, or bz2.
l -columns <columns>
List the CEF column names to include in the transfer. Separate column names with spaces.
The default is all columns.
l -start <start>
Specify the start of the range of events to transfer as a time (mm/dd/yyyy hh:mm:ss) or by
event ID. The default is yesterday at this time ($NOW-1d). The time format is for a 24-hour
clock. That is, hh is 00 - 24.
l -end <end>
Specify the end of the range of events to transfer as a time (mm/dd/yyyy hh:mm:ss) or by
event ID. The default is the time specified by $NOW. The time format is for a 24-hour clock.
That is, hh is 00 - 24.
l -qtype <qtype>
Specify the type of entries you used in -start and -end. For times, the parameters can be
EndTime or ManagerReceiptTime (the default). For event IDs use EventId.
l -sg "<storageGroup>"
Specify one or more storage groups, in double quotes, and separated by a space. If omitted,
events in all storage groups are transferred.
l -threads <threads>
Specify the number of threads to use for the transfer. The default is 5. See "Threads" on the
next page.
l --h
Help
Examples:
arcsight event_transfer -dpath <***path***> -dtype Hadoop -sg "storage group
1" "storage group 2"
Note:
l The -start , -end , and -qtype parameters must be of the same type: either event ID or time.
If you mix them up, the tool cannot tell and you get unexpected results.
l The command parameters are case sensitive; use them as shown.
Using the Event Data Transfer Tool Command Page 230 of 250
Administrator's Guide
Appendix C: Event Data Transfer Tool
Threads
The number of threads selected for the transfer affects the rate of transfer in events per
second (EPS). Tests have shown that increasing the number of threads increases throughput,
but at some point, more threads actually reduce EPS due to resource limitations. The point at
which this occurs depends on the number of processors and the amount of other work on that
machine. The default of five threads should be satisfactory in most cases.
If you increase to 10 threads you need 6 GB of memory available and another 3 GB for each
additional 10 threads. The memory used for this process is controlled by a line in a script used
by the Event_Transfer command. You can edit the DirectMemorySize value in the file,
/opt/arcsight/logger/current/arcsight/logger/config/
event_transfer/eventdatatransfertool_config.sh.
Data Compression
You can specify a Hadoop compression codec by using the file name extension or suffix that
corresponds to that codec. Compression occurs before the data is transferred. The compression
Suffix Codec
.bz2 Bzip2Codec
.gz GzipCodec
The Bzip2Codec appears to have better compression, but the GzipCodec appears to provide a
higher EPS value for transfer to the Hadoop system. For more information on these
compression codecs, refer to your Hadoop documentation. The event_transfer command
removes the CORR-Engine compression and then applies the Hadoop compression before, but
as part of, the transfer.
If you do not specify a codec-specific file extension, the data is not compressed. Without
Hadoop compression, the data in Hadoop is larger than the archive size in the CORREngine.
This is because the CORR-Engine data is uncompressed when it is transferred to the Hadoop
cluster and the Hadoop file format is larger.
This event migration tool does not transfer Binary Large Object (BLOB) or Character Large
Object (CLOB) data.
Transfer Failures
If the transfer fails, you must delete all the data that was transferred in the attempt, before
you retry the operation.
The number of files transferred depends on the number of threads used.
File names can be identified by their timestamp.
Transfer Performance
Whether transferring data to Hadoop impacts normal ESM performance depends on how many
events you transfer, which event columns you opt to transfer, how often you transfer data, and
the number of threads used for data transfer.
However, there is no way to recommend settings that will work in all environments. Try various
settings until you settle on the ones that work best for you.
Transferring data to Hadoop is somewhat slower than transferring data to the local machine,
but the difference is minimal.
Column Names
The column (field) names assigned in Hadoop are the Common Event Format (CEF) names. For
a description of the CEF field names, refer to the document entitled Implementing ArcSight
Common Event Format (CEF), which is available on
https://community.softwaregrp.com/t5/ArcSight-Product-Documentation/ct-p/productdocs.
Appendix D: Creating Custom E-mails Using Velocity Templates Page 234 of 250
Administrator's Guide
Appendix D: Creating Custom E-mails Using Velocity Templates
Compared_Value is a string or an integer. For string comparison, enclose the value in double
quotes (" ").
#parse ("Informative.vm")
#end
#end
After you have created the secondary templates, you can edit the Email.vm template to insert
conditions that call those templates.
As shown in the example below, insert a condition to call Snort.vm if the deviceProduct in
the generated event matches "Snort".
#if( $introspector.getDisplayValue($event, "deviceProduct") == "Snort" )
#parse("Snort.vm")
#else
#parse("Informative.vm")
#end
Threat Details
Severity: 2
------------------------------------------------------------------
Source Details
Source Port: 0
------------------------------------------------------------------
Target Details
------------------------------------------------------------------
Template: /home/arcsight/arcsight/Manager/config/notifications/Snort.vm
------------------------------------------------------------------
How to Respond
1) Reply to this email. Make sure that the notification ID listed in this
message is present in your reply)
2) Login to the ArcSight Console and click on the notification button on the
status bar
FIPS Default
l TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
l TLS_RSA_WITH_AES_128_GCM_SHA256
Note: These are the same cipher suites as are used for non-FIPS mode.
FIPS Suite B
In 192 bit mode, the following 192-bit cipher suites are supported.
l TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
In 128 bit mode,the following 128-bit cipher suites are supported.
l TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
l TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
Note: When completing the procedures in Using a CA- Signed SSL Certificate , follow the
instructions for using the keytool command.
2. Copy /opt/arcsight/logger/userdata/logger/user/logger/keystore.bcfks to
/opt/arcsight/logger/userdata/logger/user/logger/keystore.bcfks.old.
This creates a backup copy of the keystore.bcfks that you can revert to if there are
problems with the certificate import.
3. Import the root certificate (and intermediate certificate, if necessary) to the following
location (this example uses the alias rootCA):
Note: In the following procedures, for any property where you specify TLS versions to
support , you can specify a single version or multiple versions. Use a comma-separated list to
specify multiple versions. For example:
ssl.protocols=TLSv1.1,TLSv1
To generate a new key pair after changing the Manager host name:
1. Delete the existing Manager key pair:
bin/arcsight keytool -store managerkeys -delete -alias mykey
Generating a New Key Pair When Changing a Manager Host Name for FIPS Page 243 of 250
Administrator's Guide
Appendix E: Configuration Changes Related to FIPS
days>
3. If you are using External SAML2 Client Only Authentication, run the migrate_fips_osp_
keystore script to update the keystore that the OSP uses:
/opt/arcsight/manager/bin/arcsight migrate_fips_osp_keystore
4. Stop the Manager and start all services so the Manager can start using the self-signed
certificate:
/etc/init.d/arcsight_services stop manager
Note: The -srcstorepass and -deststorepass options are not necessary if the <old
managercerts password> matches the managerkeys password. If you have not changed
these passwords, both passwords will be changeit .
If you have not changed the old password, the <old managerkeys password> will be
password. When asked to overwrite the existing keystore, select Yes.
6. If you are using External SAML2 Client Only Authentication, run the migrate_fips_osp_
keystore script to update the keystore that the OSP uses:
/opt/arcsight/manager/bin/arcsight migrate_fips_osp_keystore
Note: If you receive the message: Warning: Custom SSL keystore properties for client are
detected, manual configuration may be necessary. , check the values in
console/client.properties . Make sure the value of ssl.keystore.password
matches that of ssl.truststore.password , and that the value of ssl.keystore.path
matches that of ssl.truststore.path . If the paths do not match, complete the steps in
Changing Keystore/Truststore Passwords. It is much simpler to change the password of the
truststore, since the truststore does not contain keys.
4. If config/keystore.client exists, this indicates that SSL client certificates are in use.
Run the following command to migrate them to the FIPS keystore:
bin/arcsight keytool -importkeystore -store clientkeys -srckeystore
config/keystore.client -srcstoretype JKS
Converting Connectors
For information about configuring Connectors for FIPS mode, see the SmartConnector
Configuration Guide for each SmartConnector.
Note: Key pairs also have passwords. ESM expects that these passwords will be the same as the
keystore password, so you must change both.
/opt/arcsight/manager/bin/arcsight migrate_fips_osp_keystore
Note: The keytool -keypasswd command is not needed, as there are no keys in the truststore.