This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Community Blog
Subscribe to the official NetWitness Community blog for information about new product features, industry insights, best practices, and more.
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
  • NetWitness Community
  • Blog
  • Health & Wellness uses an old IP for connecting to a device - How to Resolve

Health & Wellness uses an old IP for connecting to a device - How to Resolve

XavierTrepanier
Employee XavierTrepanier
Employee
Options
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Printer Friendly Page
  • Report Inappropriate Content
‎2018-04-30 01:01 PM

Health and Wellness leverages RabbitMQ to be able to collect the actual status of any components of the RSA Netwitness platform. After changing an IP on a component the Health and Wellness keep communicating with the previous IP. To be able to resolve this issue you need to do the following:

 

Open your browser and log in to the RabbiMQ Management interface: https://IP_of_your_head_unit:15671

Log in using the deploy_admin account 

pastedImage_1.png

 

When logged in, go to the Admin Tab

rabbitMQ-1.PNG

 

And in the Admin Tab, Select the Federation Upstreams on the right 

 

rabbitMQ-2.PNG

 

Identify the wrong upstream and take note of the virtual host, URI, Expires and the Name of this upstream

 

Create a new upstream and enter the right information for the URI, with the new IP, the Name, the Virtual Host and the Expires:

 

rabbitMQ-3.PNG

 

When adding this new upstream, it will match the upstream name and automatically replace the one with the wrong information.

 

And now the device is in a ready state and the health status changed from RED to GREEN

rabbitMQ-4.PNG

  • Alert
  • Health and Wellness
  • netwintess
  • NetWitness
  • NW
  • NWP
  • rabbitmq
  • RSA NetWitness
  • RSA NetWitness Platform
2 Likes
3 Comments
RichardB
RichardB Frequent Contributor
Frequent Contributor
  • Mark as Read
  • Mark as New
  • Bookmark
  • Permalink
  • Print
  • Report Inappropriate Content
‎2019-07-29 06:04 AM
‎2019-07-29 06:04 AM

Thanks a lot for this guide. There is a CLI procedure for this that might be easier to use. The commands need to be run on the NetWitness server:

 

1. List all upstream parameters:

# rabbitmqctl list_parameters -p /rsa/system
Listing runtime parameters
federation-upstream     carlos-upstream-e583a899-8640-4568-88c1-09655784a9fd    {"uri":"amqps://10.1.2.3:5671?auth_mechanism=external","expires":3600000}
federation-upstream     carlos-upstream-d8a76073-88c1-4831-8640-1401b5a38b3b    {"uri":"amqps://10.1.2.4:5671?auth_mechanism=external","expires":3600000}
federation-upstream     carlos-upstream-132a7cbb-3adb-16cf-b969-00eb3353a067    {"uri":"amqps://10.1.2.5:5671?auth_mechanism=external","expires":3600000}

2. Update one of the hosts to a new IP address:

# rabbitmqctl set_parameter -p /rsa/system federation-upstream carlos-upstream-132a7cbb-3adb-16cf-b969-00eb3353a067 '{"uri":"amqps://10.9.8.7:5671?auth_mechanism=external","expires":3600000}'
Setting runtime parameter "carlos-upstream-132a7cbb-3adb-16cf-b969-00eb3353a067" for component "federation-upstream" to "{\"uri\":\"amqps://10.9.8.7:5671?auth_mechanism=external\",\"expires\":3600000}"
0 Likes
RichardB
RichardB Frequent Contributor
Frequent Contributor
  • Mark as Read
  • Mark as New
  • Bookmark
  • Permalink
  • Print
  • Report Inappropriate Content
‎2019-12-06 08:55 AM
‎2019-12-06 08:55 AM

If you have any NetWitness appliances behind NAT the RabbitMQ config needs to be fixed every time the node-zero is upgraded. With lots of appliances this gets old pretty fast. One of my collegues wrote a script to automate the process:

#!/usr/bin/env bash

# Script to set the correct IP addresses in Health&Wellness
# To be executed as 'root' user on the nw-node-zero.

# ---------------------------------------------------------------------------

declare -r IP_LIST="/tmp/ip_list.txt"
declare -r RM_LIST="/tmp/rm_list.txt"

declare LINE UUID ITEM

declare -A nodes names

# ---------------------------------------------------------------------------

echo "Querying nodes and IP addresses, please wait...."

upgrade-cli-client --list > ${IP_LIST}

while read LINE
do
        UUID=$(echo $LINE | awk '{print substr($2,4,length($2)-4)}')
        nodes[${UUID}]="$(echo $LINE | awk '{print substr($3,6,length($3)-6)}')"
        names[${UUID}]="$(echo $LINE | awk '{print substr($4,6,length($4)-6)}')"
done < ${IP_LIST}

# ---------------------------------------------------------------------------

echo "Obtaining current rabbitMQ information...."

rabbitmqctl list_parameters -p /rsa/system > ${RM_LIST}

while read -u3 LINE
do
        if [[ ${LINE} != +(*upstream*) ]]
        then
                continue
        fi

        for ITEM in ${!nodes[@]}
        do
                if [[ ${LINE} = +(*${ITEM}*) ]]
                then
                        if [[ ${LINE} != +(*${nodes[$ITEM]}*) ]]
                        then
                                read -p "Setting system '${names[$ITEM]}' to IP address ${nodes[$ITEM]}. Is this correct (y/n)? " ANSWER
                                if [[ ${ANSWER} = "y" ]]
                                then
                                        rabbitmqctl set_parameter -p /rsa/system federation-upstream carlos-upstream-${ITEM} '{"uri":"amqps://'${nodes[${ITEM}]}':5671?auth_mechanism=external","expires":3600000}'
                                fi
                        fi
                fi
        done
done 3< ${RM_LIST}

# ---------------------------------------------------------------------------

echo "Cleaning up!"

rm -f ${IP_LIST}
rm -f ${RM_LIST}

exit

# ---------------------------------------------------------------------------

2 Likes
RichardB
RichardB Frequent Contributor
Frequent Contributor
  • Mark as Read
  • Mark as New
  • Bookmark
  • Permalink
  • Print
  • Report Inappropriate Content
‎2020-10-26 11:42 AM
‎2020-10-26 11:42 AM

Since NetWitness 11.5 RabbitMQ is using the salt id of the nodes so the above manual fix is no longer needed. Additionally, NAT IP addresses are now officially supported. See System Maintenance: Manage Custom Host Entries 

0 Likes

You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.

  • Comment
Latest Articles
  • FirstWatch Threat Spotlight: HAVOC C2
  • FirstWatch Threat Spotlight – BlueSky Ransomware
  • Advanced HTTP and TLS Concepts (Video)
  • Using NetWitness to Detect Command and Control: SILENTTRINITY C2
  • FirstWatch Threat Spotlight – Remcos RAT
  • FirstWatch Threat Spotlight: The LockBit Conundrum - A Glimpse into Ransomware Warfare
  • Content Hygiene – Application Rule Alert Mapping Updates
  • Microsoft Azure Log Analytics workspace integration with Netwitness
  • FirstWatch Threat Spotlight: Cryptonite Ransomware
  • Deployment Inventory (Serial Numbers)
Labels
  • Announcements 64
  • Events 8
  • Features 11
  • Integrations 12
  • Resources 67
  • Tutorials 32
  • Use Cases 29
  • Videos 118
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.