NetIQ Sentinel 7.1.0.1 Readme

September 2013

Sentinel 7.1.0.1 provides several enhancements and resolves specific previous issues. This document outlines why you should install this hotfix.

Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable inputs. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the Sentinel Community Support Forums, our community Web site that also includes product notifications, blogs, and product user groups.

For more information about this hotfix and for the latest readme, see the Sentinel 7.1 Documentation Web site. To download this hotfix, visit the Novell Patch Finder Web site.

1.0 What’s New?

The following sections outline the enhancements provided and the issues resolved in this hotfix:

1.1 Enhancements

This hotfix includes the following enhancements:

Availability of the Distinct Operator in Free-form Correlation Rules

Sentinel now provides the Distinct operator in free-form correlation rules, which considers only the unique values in events. You can use the operator to differentiate scans versus flood type attacks. In flood type attacks the overall quantity is important, with scans the overall unique information disseminated is important.

The following are some examples where you can use the Distinct operator:

Example 1 You want a rule to trigger if five events have unique source IP addresses but the same destination IP address within a 10 second period. You can create a free-form rule as follows:

trigger(5,10, discriminator(e.dip, distinct e.sip)

Example 2 You want a rule to trigger if three severity 5 events occur from distinct combination of initiator IP addresses and initiator users within a 60 second period. You can create a free-form rule as follows:

filter(e.sev = 5) flow trigger(3, 60, discriminator(distinct e.sip, distinct e.sun))

Example 3 You want a rule to trigger if three severity 5 events occur from the same initiator IP address but distinct initiator users within a 60 second period. You can create a free-form rule as follows:

filter(e.sev = 5) flow trigger(3, 60, discriminator(e.sip, distinct e.sun))

Example 4 You want a rule to trigger if three severity 5 events occur from the same initiator user but distinct initiator IP addresses within a 60 second period. You can create a free-from rule as follows:

filter(e.sev = 5) flow trigger(3, 60, discriminator(distinct e.sip, e.sun))

Enhancements in Correlated Event Name and Message

This hotfix improves the usability of correlated events by providing detailed information about correlation rules that generated the event. The default correlated events display the rule name and description as the event name and message respectively. For custom correlated events, you can customize the event name and message by adding the correlation rule name, description, ID, and the rule as parameters in the Send E-mail and Generate Custom Correlation Event actions.

Enhancement in the Collection User Interface

While the Collector Manager is backing up a large amount of data, the Health status for the Collector Manager now displays the Warning icon to indicate that data backup is in progress. The Warning icon is displayed only in the following scenarios:

  • the total backed up bytes >= 1 MB

  • the total backed up messages >= 50

  • the total backed up bytes or backed up messages increased in the last interval

Enhancement in Range Maps

Range maps no longer restrict the range entries to be a number range. Range maps now support IPv4 ranges in the form of an individual IP address (10.0.0.1), a range (10.0.0.1-10.0.0.5), or a subnet (10.0.0.0/24.)

Microsoft SQL 2012 and Microsoft SQL 2008 R2 Support

Sentinel 7.1.0.1 now supports synchronizing event data to Microsoft SQL 2012 and Microsoft SQL 2008 R2 databases.

Inclusion of Net-SNMP Package in Appliance

Sentinel appliance now includes Net-SNMP package for the SNMP software, which allows you to monitor the hardware performance and failures.

Inclusion of iSCSI Client Modules in Appliance

The Sentinel server appliance now includes iSCSI client modules, which help you mount remote iSCSI mass storage to serve as primary or secondary storage for Sentinel.

1.2 Software Fixes

Sentinel 7.1.0.1 provides software fixes for the following issues. For the list of software fixes and enhancements in previous releases, see the Sentinel 7.1 Documentation Web site.

The Status of Raw Data Files is Not Consistent

Issue: When a raw data file is in the archived state and new events arrive to the same file, the status of the file changes to compressed. (BUG 832606)

Fix: The status of the raw data file now does not change from archived to compressed even when new events arrive.

Database User Password in Clear Text in the .pgpass File

Issue: Sentinel stores the database user password in clear text in the .pgpass file. (BUG 830331)

Fix: Sentinel no longer uses the .pgpass file. It now links the database user with the OS user (novell) by using the peer authentication option provided by PostgreSQL.

Changes to Customer Variable Names Do Not Reflect in the Web Interface

Issue: The Sentinel Web interface does not reflect changes made to customer variable names in the Sentinel Control Center. (BUG 831184)

Fix: The Sentinel Web interface now reflects changes made to customer variable names when you refresh the browser or when you log out log in again to the Web interface.

The Event Source Management Interface Does Not Display All the Nodes

Issue: The Event Source Management (ESM) interface does not display all nodes even after you refresh the interface. (BUG 830091)

Fix: The ESM console now displays all the nodes correctly.

Sentinel Displays a Long Negative Number if the Port Number is Not Available

Issue: If the port number is not provided by the Collector, Sentinel displays a long negative number for the port number in the Web interface. (BUG 831121)

Fix: If the Collector does not provide the port number, Sentinel does not display the port number in the Sentinel Web interface.

Some Correlation Rules Initiate a Large Number of Simultaneous Searches

Issue: Some correlation rules generate a large number of correlated events. As a result, Sentinel services initiate multiple simultaneous searches to get the list of events that generated the correlated events. These simultaneous searches consume all open files and causes Sentinel to run out of memory. (BUG 825992)

Fix: This hotfix improves the system availability by limiting the number of simultaneous searches to five.

Correlated Event Names and Messages Are Not Intuitive

Issue: Correlated event names and messages do not explain why they were correlated. (BUG 829602)

Fix: Correlated events now display the correlation rule name and rule description as the event name and message respectively.

Raw Data Files Have Incorrect File Extension

Issue: Raw data files are written in the gzip format but the extension of the files on the filesystem is .zip. (BUG 830718)

Fix: The new raw data files have .gz extension.

Incorrect Reference to the Sentinel Plug-Ins Web Site

Issue: The Web site for Sentinel Plug-ins in Web console > Collection > Event Sources is referred to as “Sentinel Content” instead of “Sentinel Plug-ins.” (BUG 815048)

Fix: The Web site is now referred to as “Sentinel Plug-ins.”

2.0 System Requirements

You can upgrade to Sentinel 7.1.0.1 from Sentinel 7.0 or later.

For information about hardware requirements, supported operating systems, and browsers, see Meeting System Requirements in the NetIQ Sentinel 7.1 Installation and Configuration Guide.

3.0 Upgrading to Sentinel 7.1.0.1

Download the hotfix from the Novell Patch Finder Web site. For information about upgrading to Sentinel 7.1.0.1, see “Upgrading Sentinel” in the NetIQ Sentinel 7.1 Installation and Configuration Guide.

If you upgrade Sentinel from 7.0 to 7.1.0.1 and your Sentinel installation is in a non-default location, run the following commands as the novell user:

ln -s
"$RPM_INSTALLATION_PREFIX/opt/novell/sentinel/3rdparty/activemq/activemq-all-5.4.2.jar"
"$RPM_INSTALLATION_PREFIX/opt/novell/sentinel/lib/activemq-all-5.4.2.jar"

Where $RPM_INSTALLATION_PREFIX is the location of the Sentinel installation.

3.1 Upgrading the Appliance

When you upgrade the appliance from Sentinel 7.0.1 or earlier, the upgrade fails in WebYaST because the vendor name for the patch has changed from Novell to NetIQ. You must upgrade the appliance by using the zypper patch command.

To upgrade the appliance by using zypper:

  1. Back up your configuration, then create an ESM export. For more information, see Backing Up and Restoring the Data in the NetIQ Sentinel 7.0.1 Administration Guide.

  2. Log in to the appliance console as the root user.

  3. Run the following command:

    /usr/bin/zypper patch
    
  4. Enter 1 to accept the vendor change from Novell to NetIQ.

  5. Enter Y to proceed.

  6. Enter yes to accept the license agreement.

  7. Restart the Sentinel appliance.

3.2 Upgrading Sentinel High Availability

When you upgrade Sentinel in a high availability setup, first upgrade the passive nodes in the cluster, then upgrade the active cluster node.

Prerequisite

Ensure that the .pgpass file is available in all the cluster nodes. The upgrade installer requires the .pgpass file to authenticate the Sentinel database. If the .pgpass file is not available on the cluster node, copy the.pgpass file located at /home/novell from the active cluster node.

Upgrading Sentinel High Availability

  1. Enable the maintenance mode on the cluster:

    crm configure property maintenance-mode=true
    

    Maintenance mode helps you to avoid any disturbance to the running cluster resources while you update Sentinel. You can run this command from any cluster node.

  2. Verify whether the maintenance mode is active:

    crm status
    

    The cluster resources should appear in the unmanaged state.

  3. Upgrade the passive cluster node:

    1. Stop the cluster stack:

      rcopenais stop
      

      Stopping the cluster stack ensures that the cluster resources remain accessible and avoids fencing of nodes.

    2. Log in as root to the server where you want to upgrade Sentinel.

    3. Extract the install files from the tar file:

      tar xfz <install_filename>
      
    4. Run the following command in the directory where you extracted the install files:

      ./install-sentinel --cluster-node
      
    5. After the upgrade is complete, restart the cluster stack:

      rcopenais start
      

      Repeat Step 3 for all passive cluster nodes.

  4. Upgrade the active cluster node:

    1. Back up your configuration, then create an ESM export.

      For more information about backing up data, see Backing Up and Restoring Data in the NetIQ Sentinel 7.1 Administration Guidehttps://www.netiq.com/documentation/sentinel71/s71_admin/data/bookinfo.html#bookinfo.

    2. Stop the cluster stack:

      rcopenais stop
      

      Stopping the cluster stack ensures that the cluster resources remain accessible and avoids fencing of nodes.

    3. Log in as root to the server where you want to upgrade Sentinel.

    4. Run the following command to extract the install files from the tar file:

      tar xfz <install_filename>
      
    5. Run the following command in the directory where you extracted the install files:

      ./install-sentinel 
      
    6. After the upgrade is complete, start the cluster stack:

      rcopenais start
      
  5. Disable the maintenance mode on the cluster:

    crm configure property maintenance-mode=false
    

    You can run this command from any cluster node.

  6. Verify whether the maintenance mode is inactive:

    crm status
    

    The cluster resources should appear in the Started state.

  7. (Optional) Verify whether the Sentinel upgrade is successful:

    rcsentinel version
    

4.0 Known Issues

NetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issue is currently being researched. If you need further assistance with any issue, please contact Technical Support.

4.1 Upgrade Installations of Sentinel 7.1.0.1 Do Not Include the ISO 27000 Series Solution Pack

Issue: Upgrade installations of Sentinel 7.1.0.1 do not include the ISO 27000 Series Solution Pack. (BUG 828317)

Workaround: Download and install the ISO 27000 Series Solution Pack from the Sentinel Plug-ins Web site.

4.2 Cannot Verify the Integrity of New Raw Data Files

Issue: After you upgrade to Sentinel 7.1.0.1, when you try to verify the integrity of newly created raw data files, Sentinel displays the Cannot verify the integrity of .open or .log files. The files might be in use error.

Workaround: There is no workaround at this time.

4.3 Raw Data Files Are in ZIP Format

Issue: Raw data files created prior to Sentinel 7.1 have the .zip extension format. (BUG 832108)

Workaround: Open the raw data files by using utilities such as WinZIP, WinRAR, or 7z.

4.4 Sentinel Services Restart While Performing the Nessus Vulnerability Scan

Issue: If the Sentinel Control Center is already running when you perform the Nessus vulnerability scan, the Sentinel services restart. (BUG 839447)

Workaround: Close the Sentinel Control Center before performing the Nessus vulnerability scan.

5.0 Contact Information

Our goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you.

For detailed contact information, see the Support Contact Information Web site.

For general corporate and product information, see the NetIQ Corporate Web site.

For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and product user groups.