You connect to IBM®
QRadar® on Cloud through a data gateway.
You can install the data gateway in Microsoft Azure
Government Cloud.
Before you begin
Ensure that your appliance meets the data gateway system requirements. See System requirements for data gateways.
Schedule a maintenance window for this task and ensure that users do not deploy changes while the
data gateway is being added to your deployment.
Ensure that you have the full host name of the Console that you connect to through your gateway
appliance.
About this task
For any issues with QRadar
software, engage IBM Support. If you experience any problems
with Microsoft Azure infrastructure, refer to Microsoft Azure Support documentation. If IBM Support determines that your issue is caused by the Microsoft Azure infrastructure, you must contact Microsoft for support to resolve the underlying issue with the Microsoft Azure infrastructure.
You must use static private and public IP addresses.
Data gateways must be installed one at a time. If you are installing more than
one data gateway, wait until you complete installation of one before you install the next one.
Procedure
- Go to the Microsoft Azure Government
Cloud Marketplace
(https://portal.azure.us/#blade/Microsoft_Azure_Marketplace/MarketplaceOffersBlade/selectedMenuItemId/)
and search for
QRadar
.
- Select QRadar SIEM (BYOL).
- Click Create to create an instance for the
data gateway.
- Configure VM settings.
- Enter a name.
Note: The VM name must be eight characters or fewer.
- Click Change size and ensure that your VM meets the minimum
system requirements.
- Enter an ssh user name.
- Choose a SSH public key or
Password.
For more information on how to create and use an SSH public-private key pair for Linux® VMs in Azure, see Microsoft documentation.
- Configure the Azure networking firewall rules to allow access only from your internal
infrastructure CIDR ranges.
- Click .
- Click Advanced.
- Select the network security group that you created in the previous
step.
- Click the default-allow-ssh rule.
- In the edit pane, select IP addresses from the
Source list.
- In the Source IP addresses/CIDR ranges field, enter the address
range of the IP addresses that are allowed to access the VM.
- Enter ports 22 and 443 in the Destination port ranges
field.
- Click Save.
- Click OK.
- On the Settings tab, click
OK.
- Click Review + Create.
- Click Create to deploy the instance.
- When your VM is deployed in Azure, set the private and public IP addresses to
static:
- Click Go to resource.
- Click the public IP address.
- Set the Assignment to
Static.
- Click Save.
- Click Overview.
- Click the Associated to link.
- Click IP configurations.
- In the list of IP configurations, click the configuration row where the
Type is set to Primary.
- Set the Private IP address assignment to
Static.
- Click Save.
- To display the SSH connection information for the public IP address of the virtual
appliance:
- Click Virtual Macines >
<virtual_machine_name>.
- Click Connect.
- Log in to your virtual machine.
- Type the following command:
- Upgrade the data gateway to the same version of QRadar as your Console.
- Log in to the Console.
- To find the version of QRadar that the Console is at,
click the navigation menu (
), and
then click About.
- Download the SFS file for the version of QRadar that the Console is at
from Fix
Central (https://www.ibm.com/support/fixcentral).
- Copy the software update SFS file to your data gateway.
- If you have disconnected from your ssh session, use
ssh to log back in to your data gateway.
- On your data gateway, move the SFS file to the /storetmp
directory by typing the following command:
sudo mv <version_number>_QRadar_patchupdate-<full_version_number>.sfs /storetmp
- Open the superuser shell by typing the following command:
- Create the /media/updates directory by typing the following
command:
- Mount the SFS file by typing the following command:
mount -o loop -t squashfs /storetmp/<version_number>_QRadar_patchupdate-<full_version_number>.sfs /media/updates
- Run the software update installer by typing the following command:
- Use the QRadar on Cloud Self Serve app to generate a
token for your data gateway and allowlist the data gateway's IP address. For more information, see
Access management to the console.
- After you receive your token:
- If you have disconnected from your ssh session, use
ssh to log back in to your data gateway.
- Because the appliance restarted after the previous step, open the superuser shell
again by typing the following command:
- To mitigate a known issue with an intermittent connection, type the following command
on the newly added data gateway:
mkdir /etc/systemd/system/tunnel-monitor.service.d/; printf "[Service]\nExecStart=\nExecStart=/bin/true\n" > /etc/systemd/system/tunnel-monitor.service.d/override.conf; chmod 644 /etc/systemd/system/tunnel-monitor.service.d/override.conf; systemctl daemon-reload
- To finish the initial data gateway setup, type the following command:
/opt/qradar/bin/setup_qradar_host.py mh_setup interactive -p
- Exit the superuser shell by typing the following command: