Release Notes
Abstract
This technical note contains installation instructions, new features, and includes a resolved issues list for the release of QRadar Incident Forensics 7.3.1 Patch 3 (7.3.1.20180327211425) ISO. These instructions are intended for administrators who are upgrading from QRadar Incident Forensics 7.2.8 Patch 1 or later to QRadar Incident Forensics 7.3.1 Patch 3 using an ISO file.
Content
About this upgrade
These instructions are intended to assist administrators to update appliances from QRadar Incident Forensics 7.2.8 to 7.3.1 Patch 3 by using an ISO file. For more information, see the QRadar Incident Forensics Installation Guide.
QRadar Incident Forensics 7.3.1 Patch 3 uses an ISO file to update to the latest software version. A minimum of QRadar Incident Forensics 7.2.8 Patch 1 (or later) is required to be able to upgrade to QRadar Incident Forensics 7.3.1 Patch 32.
Administrator notes
- You must be on QRadar Incident Forensics 7.2.8 Patch 1 or later to upgrade to QRadar Incident Forensics 7.3.1 Patch 3.
- The upgrade from QRadar Incident Forensics 7.2.8 Patch 1 to QRadar Incident Forensics 7.3.1 Patch 3 will use an .ISO file. In the past, ISOs were for new appliance installations only, but QRadar Incident Forensics 7.3.1 Patch 3 is an exception to this rule because of the Red Hat kernel update requirements.
- Utilities or custom scripts that power users created for their QRadar Incident Forensics deployment should be copied off the system. During the 7.3.1 Patch 3 update, a warning is displayed that only data in /store will be preserved. After the appliance reboots, any scripts, 3rd party accounts, or utilities in /tmp, or /, or /root are deleted. This does not impact any ISO files that were initially mounted by using /root because this cleanup occurs later in the installation procedure.
Current QRadar Incident Forensics Version | Upgrades to QRadar Incident Forensics 7.3.1 Patch 3? |
QRadar Incident Forensics 7.2.6 (any patch level) or earlier | No |
QRadar Incident Forensics 7.2.7 (any patch level) | No |
QRadar Incident Forensics 7.2.8.0 | No |
QRadar Incident Forensics 7.2.8 Patch 1 or later | Yes, use these release notes to complete this process. |
QRadar Incident Forensics 7.3.0 (any patch version) | See the QRadar 7.3.1 Patch 3 SFS Release Notes for more information. The QRadar SFS file can update an existing 7.3.0 Incident Forensics install to version 7.3.1 Patch 3. |
QRadar Incident Forensics 7.3.1 | See the QRadar 7.3.1 Patch 3 SFS Release Notes for more information. The QRadar SFS file can update an existing 7.3.0 Incident Forensics install to version 7.3.1 Patch 3. |
Figure 1: If you have installed QRadar 7.2.8 or later, you are not required to install each ISO release to update to QRadar 7.3.1 Patch 3.
The QRadar Incident Forensics 7.3.1 Patch 3 ISO (20180202182152) can upgrade QRadar Incident Forensics 7.2.8 Patch 1 (7.2.8.20161207001258) and later to QRadar Incident Forensics 7.3.1 Patch 3. However, this document does not cover all the installation messages and requirements, such as changes to memory requirements or browser requirements for QRadar Incident Forensics. If you are on a version of QRadar Incident Forensics earlier than QRadar Incident Forensics 7.2.8 Patch 1, you can upgrade to QRadar Incident Forensics 7.2.8 Patch 10 before proceeding to install the QRadar Incident Forensics 7.3.1 Patch 3 ISO.
Before you upgrade
Ensure that you take the following precautions:
- Back up your data before you begin any software upgrade and verify that you have recent configuration backups that match your existing Console version. If required, take an on demand configuration backup before you begin. For more information about backup and recovery, see the QRadar Administration Guide.
- All appliances in the deployment must be at the same software and patch level in the deployment.
- Verify that all changes are deployed on your appliances. The update cannot install on appliances that have changes that are not deployed.
- A QRadar Incident Forensics 7.3.1 ISO is available to upgrade from QRadar Incident Forensics 7.2.8 Patch 1 or install a new appliance or virtual machine. To complete a new install, review the QRadar Incident Forensics Installation Guide.
- To avoid access errors in your log file, close all open user interface sessions.
- If you are unsure of the IP addresses or hostnames for the appliances in the deployment, run the utility /opt/QRadar/support/deployment_info.sh to get a .CSV file that contains a list of IP addresses for every managed host.
- If you are unsure of how to proceed when reading these instructions or the documentation, it is best to ask before you start your upgrade. To ask a question in our forums, see: https://ibm.biz/qradarforums.
Part 1. Staging files and pretesting your appliance
It is important to pretest your deployment to ensure that you will not experience unexpected issues when you update to QRadar Incident Forensics 7.3.1 Patch 3. A pretest is a common precaution to locate potential issues. The pretest does not restart services and can be completed without scheduled downtime. The pretest typically takes between 3 to 5 minutes to complete on each appliance. If for some reason your SSH session is disconnected, you can reconnect to the remote host using screen.
Procedure
The pretest should be completed on all hosts before you attempt to upgrade to QRadar Incident Forensics 7.3.1 Patch 3.
- You must install the QRadar Console with 7.3.1 before you begin this procedure.
- Download the QRadar Incident Forensics 7.3.1 Patch 3 ISO (5.5 GB) from the IBM Fix Central website: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm%2FOther+software%2FIBM+Security+QRadar+Incident+Forensics&fixids=7.3.1-QRADAR-QIFFULL-20180327211425&source=SAR&function=fixId&parent=IBM%20Security
- Use SSH to log in to your Console as the root user.
- Open an SSH session to the QRadar Incident Forensics appliance.
- Type the following command: screen
- To make the directory for the update, type: mkdir -p /media/cdrom
- To verify you have enough space (5.5 GB) in /root or /var/log for the ISO on all appliances, type:
df -h /root /var/log | tee diskchecks.txt
- Best directory option: /root
It is available on all appliance types, is the best option to host the ISO file. - 2nd best directory option: /var/log
This directory is available on all appliances, but there might not be the required space available. - DO NOT USE: /tmp, /store/tmp, or /store/transient for your ISO upgrade. These directories are partitioned as part of the upgrade; you cannot use them as storage locations or mount points for the ISO file.
If the disk check command fails, retype the quotation marks from your terminal, then re-run the command. This command returns the details to both the command window and to a file on the Console named diskchecks.txt. Review this file to ensure that all appliances have at minimum 5.5 GB of space available in a directory to copy the ISO before attempting to move the file to a managed host. If required, free up disk space on any host that fails to have less that 5.5 GB available.
Reminder: Any utilities or custom scripts that you have created for QRadar Incident Forensics should be copied off the system. During the 7.3.1 update, a warning is displayed that only data in /store will be preserved. Scripts, 3rd party utilities in /tmp, or /, or /root will be deleted during the upgrade.
- If there is not 5.5GB of space in /root or /var/log, make directory space for the ISO file.
- Using WinSCP or SCP, copy the ISO to the /root or /var/log directory on the QRadar Incident Forensics Console with 5.5 GB of disk space for the ISO file.
- To mount the ISO, type the following command: mount -o loop /root/Rhe764forensics7_3_1_20180327211425.stable-7-3-1.iso /media/dvd"
- To pretest the Console appliance, type: /media/dvd/setup -t
The pretest output is written to the command window. Review this output after the pretest completes. - Use SSH to open an SSH session to the other appliances in your deployment. QRadar Incident Forensics Support recommends that you run the pretest to identify issues before the update begins.
- To pretest the managed host, type: /media/dvd/setup -t
Results
If an appliance in your deployment fails the pretest, you can take the recommended action from the pretest utility. The issue must be resolved before the update to 7.3.1 begins to prevent downtime for specific appliances. If there are messages you do not understand or want to discuss further, you can use our forums: https://ibm.biz/qradarforums.
Part 2. Installing the QRadar Incident Forensics 7.3.1 Patch 3 ISO
These instructions guide you through the process of upgrading an existing QRadar Incident Forensics install at 7.2.8 Patch 1 or later to QRadar Incident Forensics software version 7.3.1 Patch 3. The update on the Console must be completed first before you attempt to update QRadar Incident Forensics 7.3.1 Patch 3.
Procedure
You must complete: Staging files and pretesting your deployment before you begin the installation steps listed below.
- Use SSH to log in to the Console as the root user.
NOTE: When you log in, the SSH session should display 7.3.1 as the Console's version. This verifies that the QRadar Console has been updated to 7.3.1, which is required before you update your Incident Forensics appliance. - Open an SSH session to the QRadar Incident Forensics appliance.
- To run the ISO installer, type the following command: /media/dvd/setup
Important: Upgrading from QRadar Incident Forensics 7.2.8 Patch 1 or later to QRadar Incident Forensics 7.3.1 Patch 3 can take 1 to 2 hours to complete on the appliance.
Results
A summary of the ISO installation advises you of any issues. If there are no issues, use SSH to log in to managed hosts and start the installer on each host to run the setup in parallel.
Part 3. Installation wrap-up
- After all hosts are updated, send an email to your team to clear their browser cache before logging in to the QRadar Incident Forensics SIEM interface.
- To unmount the /media/dvd directory, type: umount /media/dvd
- Delete the ISO from the appliance.
- Review any static routes or customized routing. As mentioned in the administrator notes, all routes were removed and will need to be reconfigured after the upgrade completes.
- Review any iptable rules configured because the interface names changed in QRadar Incident Forensics 7.3.1 Patch 1 due to the Red Hat Enterprise 7 operating system updates. Any iptables rules that use Red Hat 6 interface naming conventions must be updated.
Resolved issues for QRadar Incident Forensics 7.3.1 Patch 3
Some APAR links in the table below might take 24 hours to display properly after a software release is posted to IBM Fix Central.
Product | Component | Number | Description |
---|---|---|---|
QRADAR INCIDENT FORENSICS | SECURITY BULLETIN | CVE-2018-1418 | IBM QRadar Incident Forensics, as found in IBM QRadar SIEM, is vulnerable to an authentication bypass leading to remote command injection |
QRADAR | SECURITY BULLETIN | CVE-2017-1724 | IBM QRadar SIEM is vulnerable to cross-site scripting |
QRADAR INCIDENT FORENSICS | SECURITY BULLETIN | CVE-2017-1723 | IBM QRadar Incident Forensics, as used in IBM QRadar SIEM, is vulnerable to authenticated path traversal |
QRADAR | SECURITY BULLETIN | CVE-2017-1722 | IBM QRadar SIEM is vulnerable to SQL Injection |
QRADAR INCIDENT FORENSICS | SECURITY BULLETIN | CVE-2017-1721 | IBM QRadar Incident Forensics, as found in IBM QRadar SIEM, is vulnerable to remote code execution |
QRADAR | SECURITY BULLETIN | CVE-2014-3576 | IBM QRadar SIEM contains vulnerable components and libraries |
QRADAR | SECURITY BULLETIN | CVE-2011-4314 | IBM QRadar SIEM contains vulnerable components and libraries |
QRADAR | SECURITY BULLETIN | CVE-2016-4970 | IBM QRadar SIEM contains vulnerable components and libraries |
QRADAR | SECURITY BULLETIN | CVE-2015-5262 | IBM QRadar SIEM contains vulnerable components and libraries |
QRADAR | SECURITY BULLETIN | CVE-2016-3092 | QRadar SIEM contains vulnerable components |
QRADAR | SECURITY BULLETIN | CVE-2015-0250 | IBM QRadar SIEM contains vulnerable components |
QRADAR | SECURITY BULLETIN | CVE-2016-9878 | IBM QRadar SIEM contains vulnerable components and libraries |
QRADAR | SECURITY BULLETIN | CVE-2015-5262 | IBM QRadar SIEM contains vulnerable components and libraries |
QRADAR | SECURITY BULLETIN | CVE-2017-1624 | IBM QRadar SIEM is vulnerable to incorrect permission assignment. |
QRADAR | SECURITY BULLETIN | CVE-2017-1733 | IBM QRadar SIEM is vulnerable to information exposure through log files. |
QRADAR | SECURITY BULLETIN | CVE-2017-12163 | Open Source Samba as used in IBM QRadar SIEM is vulnerable to information exposure. |
QRADAR | SECURITY BULLETIN | CVE-2017-12629 | Open Source Apache Solr as used in IBM QRadar Incident Forensics is vulnerable to arbitrary code execution. |
QRADAR | SEARCH | IJ00857 | RESOURCE LEAK IN ARIEL CAN CAUSE QUERY PROCESSING TO STOP |
QRADAR | REPORTS | IV98739 | CHANGES MADE TO CUSTOM COLUMN DEFINITION LAYOUT IN LOG/FLOW ACTIVITY DO NOT PERSIST |
QRADAR | SEARCH | IV95449 | USING THE 'UPDATE' BUTTON ON A LOG ACTIVITY SEARCH PAGE THE DAY OF A DST (TIME) CHANGE MOVES THE START/END TIME ONE HOUR |
QRADAR | SEARCH | IV91635 | QUICK SEARCHES CANNOT BE REMOVED FROM THE QUICK SEARCH LIST |
QRADAR | REPORTS | IJ01012 | A REPORT RUN AGAINST A LOG ACTIVITY SAVED AQL SEARCH MAY BE GENERATED WITH AN ERROR. |
QRADAR | REPORTS | IJ00416 | LOG AND NETWORK ACTIVITY EXPORTS TO CSV DISPLAY INCORRECT COLUMN NAMES |
QRADAR | REPORTS | IJ00066 | TABLE REPORTS USING ACCUMULATED AQL DATA DISPLAY INCORRECT COLUMNS |
QRADAR | EVENT DATA | IJ03379 | EVENT DATA PROCESSED INTO SPILLOVER CAN SOMETIMES FAIL TO PARSE WHEN PROCESSED BY THE REGULAR QRADAR PIPELINE |
QRADAR | API SEARCH | IV98260 | API SEARCHES USING A COMPLETED ARIEL SEARCH CAN SOMETIMES RETURN WITH AN ERROR 500 |
QRADAR | REPORTS | IJ03534 | SOME GLOBAL VIEWS NOT WORKING AS EXPECTED AFTER UPGRADING TO 7.3.1.X CAUSING NO DATA IN DASHBOARDS AND FAILED REPORTS |
QRADAR | KERNEL | IJ00141 | DISK MAINTENANCE DELETES /STORE/ARIEL/FLOWS (RECORDS AND PAYLOADS) DIRECTORY ON DATANODES THAT RECEIVE EVENTS ONLY |
QRADAR NETWORK INSIGHTS | FLOW COLLECTION | IJ04056 | PORT BASED APPLICATION MAPPINGS ARE IGNORED WHEN USING QRADAR NETWORK INSIGHTS |
QRADAR NETWORK INSIGHTS | FORENSICS | IJ00952 | QNI DECAPPER STOPPED BECAUSE OF A RHEL OUT OF MEMORY FUNCTION |
QRADAR | HIGH AVAILABILITY | IJ03342 | NETFLOW TRAFFIC CONTAINING SUPERFLOWS CAN SOMETIMES REPORT INCORRECT FIRST/LAST PACKET TIME |
QRADAR | APPLICATION INSTALL | IJ02076 | QRADAR APPS INSTALLED ON AN APPNODE CAN SOMETIMES FAIL TO LOAD/OPEN/INSTALL |
QRADAR | APPLICATION INSTALL | IJ01144 | APPS THAT TAKE LONGER THAN 8 MINUTES TO INSTALL MAY BE STOPPED BY THE MARATHON HEALTH CHECK REGARDLESS OF THE APP HEALTH CHECK |
QRADAR | APPLICATION INSTALL | IJ00207 | QRADAR APPLICATIONS CAN FAIL TO INSTALL OR UPGRADE WHEN THERE IS INSUFFICIENT FREE SPACE IN /TMP |
QRADAR | USER INTERFACE | IV99511 | LOG SOURCE GROUP WINDOW CAN SOMETIMES FAIL TO LOAD WHEN GREATER THAN 1000 LOG SOURCES EXIST IN A GROUP |
QRADAR | INSTALL/UPGRADE | IJ03213 | QRADAR SYSTEMS BUILT AT 7.2.2.-7.4 CAN FAIL TO UPGRADE TO 7.3.1.X WITH A 'TA_DSM_INFO' VIOLATES FOREIGN KEY ERROR |
QRADAR | DSM EDITOR | IJ00975 | A SESSION LEAK IN TOMCAT MAY OCCUR WHEN USING THE DSM EDITOR |
QRADAR | HIGH AVAILABILITY | IV94966 | XX48 HIGH AVAILABILITY APPLIANCES CAN BECOME UNRESPONSIVE DURING DRBD SYNCRONIZATION WHEN CONFIGURED WITH CROSSOVER |
QRADAR | HIGH AVAILABILITY | IJ03669 | UPGRADE TO QRADAR 7.3.X CAN FAIL ON HIGH AVAILABILITY (HA) SYSTEMS WITH 'ERROR EXECUTING 30-CHECKPARTITIONS.SH' |
QRADAR | INSTALL/UPGRADE | IJ03410 | QRADAR PATCH PRETEST CAN FAIL WHEN A DEPLOYMENT HAS MORE THAN NINE (9) NAT IDS |
QRADAR | INSTALL/UPGRADE | IJ02095 | VIS CAN FAIL TO START DURING UPGRADE TO QRADAR 7.3.0.X |
QRADAR | INSTALL/UPGRADE | IJ01522 | QRADAR UPGRADE FROM 7.2.8.X TO 7.3.0.X CAN SOMETIMES FAIL ON APPLIANCES WITH BONDED INTERFACES |
QRADAR | INSTALL/UPGRADE | IJ01120 | FACTORY REINSTALL FAILS ON QRADAR APPLIANCES THAT HAVE BEEN UPGRADED FROM 7.2.8 TO 7.3.0 |
QRADAR | INSTALL/UPGRADE | IJ00999 | UPGRADING TO QRADAR 7.3.0 MAY LEAD TO A 4GB ISO AND OTHER FILES IN /STORETMP |
QRADAR | INSTALL/UPGRADE | IJ00902 | STATIC ROUTES CONFIGURED IN QRADAR 7.2.8 ARE REMOVED DURING AN UPGRADE TO 7.3.0 |
QRADAR | INSTALL/UPGRADE | IJ00882 | AFTER A 7.3.0 UPGRADE, SERVICES MAY FAIL TO START ON THE APPLIANCE AFTER A REBOOT |
QRADAR | LICENSING | IV99772 | 'THE NUMBER OF CONFIGURED LOG SOURCES IS APPROACHING OR HAS REACHED THE LICENSE LIMIT' SYSTEM EVENTS |
QRADAR | LICENSING | IV97442 | 'THE EPS OR FPM LICENSE POOL IS OVER-ALLOCATED. PLEASE CONTACT YOUR ADMINISTRATOR' MESSAGE ON LOG/NETWORK ACTIVITY TAB |
QRADAR | USER INTERFACE | IJ01488 | QRADAR'S TOMCAT PROCESS CAN RUN OUT OF AVAILABLE FILE HANDLES CAUSING USER INTERFACE STABILITY/FUNCTIONALITY ISSUES |
QRADAR | DATABASE | IV85442 | THE X-FORCE SCASERVER PROCESS CAN FAIL TO START DUE TO DATABASE FILE CORRUPTION AFTER AN UPDATE |
QRADAR VULNERABILITY MANAGER | SCAN POLICY | IV98247 | CLICKING 'SAVE' AFTER EDITING A SCAN POLICY CAN APPEAR TO HANG AND NOT SAVE SUCCESSFULLY |
QRADAR VULNERABILITY MANAGER | REPORTS | IV95105 | REPORTS CREATED FROM VULNERABILITY SCAN PROFILES CAN SOMETIMES BE BLANK |
QRADAR VULNERABILITY MANAGER | INSTALL/UPGRADE | IJ04398 | PATCH/UPGRADE TO QRADAR 7.3.1 PATCH 2 CAN HANG FOR AN EXTENDED PERIOD OF TIME (HOURS) WITH "VULN_MAP_ASSET_MV DOES NOT EXIST" |
QRADAR VULNERABILITY MANAGER | SCAN PROFILE | IJ00368 | SAVING A SCAN PROFILE CAN TAKE LONGER THAN EXPECTED |
QRADAR | API | IV98655 | REFERENCE SETS THAT CONTAIN LARGE DATASETS THAT ARE LOADED VIA THE API CAN SOMETIMES CAUSE UI INSTABILITY/INACCESSABILITY |
QRADAR | USER INTERFACE | IV98452 | EMAIL RESPONSE USING CUSTOM EMAIL TEMPLATE DISPLAYS A TEMPLATE STRING CODE INSTEAD OF 'N/A' FOR NULL CUSTOM PROPERTIES |
QRADAR | CUSTOM EVENT PROPERTIES | IJ02479 | CUSTOM EVENT PROPERTIES ASSIGNED TO A LOG SOURCE ARE NOT VISIBLE IN SEARCH FILTER FOR NON-ADMIN USER |
Where do I find more information?
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
swg27050924