IBM Support

Release of the QRadar Incident Forensics 7.3.1 Patch 3 ISO (7.3.1.20180327211425)

Release Notes


Abstract

This technical note contains installation instructions, new features, and includes a resolved issues list for the release of QRadar Incident Forensics 7.3.1 Patch 3 (7.3.1.20180327211425) ISO. These instructions are intended for administrators who are upgrading from QRadar Incident Forensics 7.2.8 Patch 1 or later to QRadar Incident Forensics 7.3.1 Patch 3 using an ISO file.

Content

About this upgrade


These instructions are intended to assist administrators to update appliances from QRadar Incident Forensics 7.2.8 to 7.3.1 Patch 3 by using an ISO file. For more information, see the QRadar Incident Forensics Installation Guide.

QRadar Incident Forensics 7.3.1 Patch 3 uses an ISO file to update to the latest software version. A minimum of QRadar Incident Forensics 7.2.8 Patch 1 (or later) is required to be able to upgrade to QRadar Incident Forensics 7.3.1 Patch 32.

Administrator notes
  1. You must be on QRadar Incident Forensics 7.2.8 Patch 1 or later to upgrade to QRadar Incident Forensics 7.3.1 Patch 3.
  2. The upgrade from QRadar Incident Forensics 7.2.8 Patch 1 to QRadar Incident Forensics 7.3.1 Patch 3 will use an .ISO file. In the past, ISOs were for new appliance installations only, but QRadar Incident Forensics 7.3.1 Patch 3 is an exception to this rule because of the Red Hat kernel update requirements.
  3. Utilities or custom scripts that power users created for their QRadar Incident Forensics deployment should be copied off the system. During the 7.3.1 Patch 3 update, a warning is displayed that only data in /store will be preserved. After the appliance reboots, any scripts, 3rd party accounts, or utilities in /tmp, or /, or /root are deleted. This does not impact any ISO files that were initially mounted by using /root because this cleanup occurs later in the installation procedure.

  4. Current QRadar Incident Forensics VersionUpgrades to QRadar Incident Forensics 7.3.1 Patch 3?
    QRadar Incident Forensics 7.2.6 (any patch level) or earlierNo
    QRadar Incident Forensics 7.2.7 (any patch level)No
    QRadar Incident Forensics 7.2.8.0No
    QRadar Incident Forensics 7.2.8 Patch 1 or laterYes, use these release notes to complete this process.
    QRadar Incident Forensics 7.3.0 (any patch version)See the QRadar 7.3.1 Patch 3 SFS Release Notes for more information. The QRadar SFS file can update an existing 7.3.0 Incident Forensics install to version 7.3.1 Patch 3.
    QRadar Incident Forensics 7.3.1See the QRadar 7.3.1 Patch 3 SFS Release Notes for more information. The QRadar SFS file can update an existing 7.3.0 Incident Forensics install to version 7.3.1 Patch 3.



Figure 1: If you have installed QRadar 7.2.8 or later, you are not required to install each ISO release to update to QRadar 7.3.1 Patch 3.

The QRadar Incident Forensics 7.3.1 Patch 3 ISO (20180202182152) can upgrade QRadar Incident Forensics 7.2.8 Patch 1 (7.2.8.20161207001258) and later to QRadar Incident Forensics 7.3.1 Patch 3. However, this document does not cover all the installation messages and requirements, such as changes to memory requirements or browser requirements for QRadar Incident Forensics. If you are on a version of QRadar Incident Forensics earlier than QRadar Incident Forensics 7.2.8 Patch 1, you can upgrade to QRadar Incident Forensics 7.2.8 Patch 10 before proceeding to install the QRadar Incident Forensics 7.3.1 Patch 3 ISO.

Before you upgrade


Ensure that you take the following precautions:

  • Back up your data before you begin any software upgrade and verify that you have recent configuration backups that match your existing Console version. If required, take an on demand configuration backup before you begin. For more information about backup and recovery, see the QRadar Administration Guide.
  • All appliances in the deployment must be at the same software and patch level in the deployment.
  • Verify that all changes are deployed on your appliances. The update cannot install on appliances that have changes that are not deployed.
  • A QRadar Incident Forensics 7.3.1 ISO is available to upgrade from QRadar Incident Forensics 7.2.8 Patch 1 or install a new appliance or virtual machine. To complete a new install, review the QRadar Incident Forensics Installation Guide.
  • To avoid access errors in your log file, close all open user interface sessions.
  • If you are unsure of the IP addresses or hostnames for the appliances in the deployment, run the utility /opt/QRadar/support/deployment_info.sh to get a .CSV file that contains a list of IP addresses for every managed host.
  • If you are unsure of how to proceed when reading these instructions or the documentation, it is best to ask before you start your upgrade. To ask a question in our forums, see: https://ibm.biz/qradarforums.

Part 1. Staging files and pretesting your appliance


It is important to pretest your deployment to ensure that you will not experience unexpected issues when you update to QRadar Incident Forensics 7.3.1 Patch 3. A pretest is a common precaution to locate potential issues. The pretest does not restart services and can be completed without scheduled downtime. The pretest typically takes between 3 to 5 minutes to complete on each appliance. If for some reason your SSH session is disconnected, you can reconnect to the remote host using screen.

Procedure
The pretest should be completed on all hosts before you attempt to upgrade to QRadar Incident Forensics 7.3.1 Patch 3.

  1. You must install the QRadar Console with 7.3.1 before you begin this procedure.
  2. Download the QRadar Incident Forensics 7.3.1 Patch 3 ISO (5.5 GB) from the IBM Fix Central website: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm%2FOther+software%2FIBM+Security+QRadar+Incident+Forensics&fixids=7.3.1-QRADAR-QIFFULL-20180327211425&source=SAR&function=fixId&parent=IBM%20Security

  3. Use SSH to log in to your Console as the root user.
  4. Open an SSH session to the QRadar Incident Forensics appliance.
  5. Type the following command: screen
  6. To make the directory for the update, type: mkdir -p /media/cdrom
  7. To verify you have enough space (5.5 GB) in /root or /var/log for the ISO on all appliances, type:
    df -h /root /var/log | tee diskchecks.txt
    • Best directory option: /root
      It is available on all appliance types, is the best option to host the ISO file.
    • 2nd best directory option: /var/log
      This directory is available on all appliances, but there might not be the required space available.
    • DO NOT USE: /tmp, /store/tmp, or /store/transient for your ISO upgrade. These directories are partitioned as part of the upgrade; you cannot use them as storage locations or mount points for the ISO file.

      If the disk check command fails, retype the quotation marks from your terminal, then re-run the command. This command returns the details to both the command window and to a file on the Console named diskchecks.txt. Review this file to ensure that all appliances have at minimum 5.5 GB of space available in a directory to copy the ISO before attempting to move the file to a managed host. If required, free up disk space on any host that fails to have less that 5.5 GB available.

      Reminder: Any utilities or custom scripts that you have created for QRadar Incident Forensics should be copied off the system. During the 7.3.1 update, a warning is displayed that only data in /store will be preserved. Scripts, 3rd party utilities in /tmp, or /, or /root will be deleted during the upgrade.

  8. If there is not 5.5GB of space in /root or /var/log, make directory space for the ISO file.
  9. Using WinSCP or SCP, copy the ISO to the /root or /var/log directory on the QRadar Incident Forensics Console with 5.5 GB of disk space for the ISO file.
  10. To mount the ISO, type the following command: mount -o loop /root/Rhe764forensics7_3_1_20180327211425.stable-7-3-1.iso /media/dvd"
  11. To pretest the Console appliance, type: /media/dvd/setup -t
    The pretest output is written to the command window. Review this output after the pretest completes.
  12. Use SSH to open an SSH session to the other appliances in your deployment. QRadar Incident Forensics Support recommends that you run the pretest to identify issues before the update begins.
  13. To pretest the managed host, type: /media/dvd/setup -t

    Results
    If an appliance in your deployment fails the pretest, you can take the recommended action from the pretest utility. The issue must be resolved before the update to 7.3.1 begins to prevent downtime for specific appliances. If there are messages you do not understand or want to discuss further, you can use our forums: https://ibm.biz/qradarforums.


Part 2. Installing the QRadar Incident Forensics 7.3.1 Patch 3 ISO


These instructions guide you through the process of upgrading an existing QRadar Incident Forensics install at 7.2.8 Patch 1 or later to QRadar Incident Forensics software version 7.3.1 Patch 3. The update on the Console must be completed first before you attempt to update QRadar Incident Forensics 7.3.1 Patch 3.

Procedure
You must complete: Staging files and pretesting your deployment before you begin the installation steps listed below.

  1. Use SSH to log in to the Console as the root user.

    NOTE: When you log in, the SSH session should display 7.3.1 as the Console's version. This verifies that the QRadar Console has been updated to 7.3.1, which is required before you update your Incident Forensics appliance.
  2. Open an SSH session to the QRadar Incident Forensics appliance.
  3. To run the ISO installer, type the following command: /media/dvd/setup

    Important: Upgrading from QRadar Incident Forensics 7.2.8 Patch 1 or later to QRadar Incident Forensics 7.3.1 Patch 3 can take 1 to 2 hours to complete on the appliance.


Results
A summary of the ISO installation advises you of any issues. If there are no issues, use SSH to log in to managed hosts and start the installer on each host to run the setup in parallel.


Part 3. Installation wrap-up

  1. After all hosts are updated, send an email to your team to clear their browser cache before logging in to the QRadar Incident Forensics SIEM interface.
  2. To unmount the /media/dvd directory, type: umount /media/dvd
  3. Delete the ISO from the appliance.
  4. Review any static routes or customized routing. As mentioned in the administrator notes, all routes were removed and will need to be reconfigured after the upgrade completes.
  5. Review any iptable rules configured because the interface names changed in QRadar Incident Forensics 7.3.1 Patch 1 due to the Red Hat Enterprise 7 operating system updates. Any iptables rules that use Red Hat 6 interface naming conventions must be updated.



Resolved issues for QRadar Incident Forensics 7.3.1 Patch 3


Some APAR links in the table below might take 24 hours to display properly after a software release is posted to IBM Fix Central.
Resolved issues in QRadar 7.3.1 Patch 3
Product Component Number Description
QRADAR INCIDENT FORENSICSSECURITY BULLETINCVE-2018-1418IBM QRadar Incident Forensics, as found in IBM QRadar SIEM, is vulnerable to an authentication bypass leading to remote command injection
QRADARSECURITY BULLETINCVE-2017-1724IBM QRadar SIEM is vulnerable to cross-site scripting
QRADAR INCIDENT FORENSICSSECURITY BULLETINCVE-2017-1723IBM QRadar Incident Forensics, as used in IBM QRadar SIEM, is vulnerable to authenticated path traversal
QRADARSECURITY BULLETINCVE-2017-1722IBM QRadar SIEM is vulnerable to SQL Injection
QRADAR INCIDENT FORENSICSSECURITY BULLETINCVE-2017-1721IBM QRadar Incident Forensics, as found in IBM QRadar SIEM, is vulnerable to remote code execution
QRADARSECURITY BULLETINCVE-2014-3576IBM QRadar SIEM contains vulnerable components and libraries
QRADARSECURITY BULLETINCVE-2011-4314IBM QRadar SIEM contains vulnerable components and libraries
QRADARSECURITY BULLETINCVE-2016-4970IBM QRadar SIEM contains vulnerable components and libraries
QRADARSECURITY BULLETINCVE-2015-5262IBM QRadar SIEM contains vulnerable components and libraries
QRADARSECURITY BULLETINCVE-2016-3092QRadar SIEM contains vulnerable components
QRADARSECURITY BULLETINCVE-2015-0250IBM QRadar SIEM contains vulnerable components
QRADARSECURITY BULLETINCVE-2016-9878IBM QRadar SIEM contains vulnerable components and libraries
QRADARSECURITY BULLETINCVE-2015-5262IBM QRadar SIEM contains vulnerable components and libraries
QRADARSECURITY BULLETINCVE-2017-1624IBM QRadar SIEM is vulnerable to incorrect permission assignment.
QRADARSECURITY BULLETINCVE-2017-1733IBM QRadar SIEM is vulnerable to information exposure through log files.
QRADARSECURITY BULLETINCVE-2017-12163Open Source Samba as used in IBM QRadar SIEM is vulnerable to information exposure.
QRADARSECURITY BULLETINCVE-2017-12629Open Source Apache Solr as used in IBM QRadar Incident Forensics is vulnerable to arbitrary code execution.
QRADARSEARCHIJ00857RESOURCE LEAK IN ARIEL CAN CAUSE QUERY PROCESSING TO STOP
QRADARREPORTSIV98739CHANGES MADE TO CUSTOM COLUMN DEFINITION LAYOUT IN LOG/FLOW ACTIVITY DO NOT PERSIST
QRADARSEARCHIV95449USING THE 'UPDATE' BUTTON ON A LOG ACTIVITY SEARCH PAGE THE DAY OF A DST (TIME) CHANGE MOVES THE START/END TIME ONE HOUR
QRADARSEARCHIV91635QUICK SEARCHES CANNOT BE REMOVED FROM THE QUICK SEARCH LIST
QRADARREPORTSIJ01012A REPORT RUN AGAINST A LOG ACTIVITY SAVED AQL SEARCH MAY BE GENERATED WITH AN ERROR.
QRADARREPORTSIJ00416LOG AND NETWORK ACTIVITY EXPORTS TO CSV DISPLAY INCORRECT COLUMN NAMES
QRADARREPORTSIJ00066TABLE REPORTS USING ACCUMULATED AQL DATA DISPLAY INCORRECT COLUMNS
QRADAREVENT DATAIJ03379EVENT DATA PROCESSED INTO SPILLOVER CAN SOMETIMES FAIL TO PARSE WHEN PROCESSED BY THE REGULAR QRADAR PIPELINE
QRADARAPI SEARCHIV98260API SEARCHES USING A COMPLETED ARIEL SEARCH CAN SOMETIMES RETURN WITH AN ERROR 500
QRADARREPORTSIJ03534SOME GLOBAL VIEWS NOT WORKING AS EXPECTED AFTER UPGRADING TO 7.3.1.X CAUSING NO DATA IN DASHBOARDS AND FAILED REPORTS
QRADARKERNELIJ00141DISK MAINTENANCE DELETES /STORE/ARIEL/FLOWS (RECORDS AND PAYLOADS) DIRECTORY ON DATANODES THAT RECEIVE EVENTS ONLY
QRADAR NETWORK INSIGHTSFLOW COLLECTIONIJ04056PORT BASED APPLICATION MAPPINGS ARE IGNORED WHEN USING QRADAR NETWORK INSIGHTS
QRADAR NETWORK INSIGHTSFORENSICSIJ00952QNI DECAPPER STOPPED BECAUSE OF A RHEL OUT OF MEMORY FUNCTION
QRADARHIGH AVAILABILITYIJ03342NETFLOW TRAFFIC CONTAINING SUPERFLOWS CAN SOMETIMES REPORT INCORRECT FIRST/LAST PACKET TIME
QRADARAPPLICATION INSTALLIJ02076QRADAR APPS INSTALLED ON AN APPNODE CAN SOMETIMES FAIL TO LOAD/OPEN/INSTALL
QRADARAPPLICATION INSTALLIJ01144APPS THAT TAKE LONGER THAN 8 MINUTES TO INSTALL MAY BE STOPPED BY THE MARATHON HEALTH CHECK REGARDLESS OF THE APP HEALTH CHECK
QRADARAPPLICATION INSTALLIJ00207QRADAR APPLICATIONS CAN FAIL TO INSTALL OR UPGRADE WHEN THERE IS INSUFFICIENT FREE SPACE IN /TMP
QRADARUSER INTERFACEIV99511LOG SOURCE GROUP WINDOW CAN SOMETIMES FAIL TO LOAD WHEN GREATER THAN 1000 LOG SOURCES EXIST IN A GROUP
QRADARINSTALL/UPGRADEIJ03213QRADAR SYSTEMS BUILT AT 7.2.2.-7.4 CAN FAIL TO UPGRADE TO 7.3.1.X WITH A 'TA_DSM_INFO' VIOLATES FOREIGN KEY ERROR
QRADARDSM EDITORIJ00975A SESSION LEAK IN TOMCAT MAY OCCUR WHEN USING THE DSM EDITOR
QRADARHIGH AVAILABILITYIV94966XX48 HIGH AVAILABILITY APPLIANCES CAN BECOME UNRESPONSIVE DURING DRBD SYNCRONIZATION WHEN CONFIGURED WITH CROSSOVER
QRADARHIGH AVAILABILITYIJ03669UPGRADE TO QRADAR 7.3.X CAN FAIL ON HIGH AVAILABILITY (HA) SYSTEMS WITH 'ERROR EXECUTING 30-CHECKPARTITIONS.SH'
QRADARINSTALL/UPGRADEIJ03410QRADAR PATCH PRETEST CAN FAIL WHEN A DEPLOYMENT HAS MORE THAN NINE (9) NAT IDS
QRADARINSTALL/UPGRADEIJ02095VIS CAN FAIL TO START DURING UPGRADE TO QRADAR 7.3.0.X
QRADARINSTALL/UPGRADEIJ01522QRADAR UPGRADE FROM 7.2.8.X TO 7.3.0.X CAN SOMETIMES FAIL ON APPLIANCES WITH BONDED INTERFACES
QRADARINSTALL/UPGRADEIJ01120FACTORY REINSTALL FAILS ON QRADAR APPLIANCES THAT HAVE BEEN UPGRADED FROM 7.2.8 TO 7.3.0
QRADARINSTALL/UPGRADEIJ00999UPGRADING TO QRADAR 7.3.0 MAY LEAD TO A 4GB ISO AND OTHER FILES IN /STORETMP
QRADARINSTALL/UPGRADEIJ00902STATIC ROUTES CONFIGURED IN QRADAR 7.2.8 ARE REMOVED DURING AN UPGRADE TO 7.3.0
QRADARINSTALL/UPGRADEIJ00882AFTER A 7.3.0 UPGRADE, SERVICES MAY FAIL TO START ON THE APPLIANCE AFTER A REBOOT
QRADARLICENSINGIV99772'THE NUMBER OF CONFIGURED LOG SOURCES IS APPROACHING OR HAS REACHED THE LICENSE LIMIT' SYSTEM EVENTS
QRADARLICENSINGIV97442'THE EPS OR FPM LICENSE POOL IS OVER-ALLOCATED. PLEASE CONTACT YOUR ADMINISTRATOR' MESSAGE ON LOG/NETWORK ACTIVITY TAB
QRADARUSER INTERFACEIJ01488QRADAR'S TOMCAT PROCESS CAN RUN OUT OF AVAILABLE FILE HANDLES CAUSING USER INTERFACE STABILITY/FUNCTIONALITY ISSUES
QRADARDATABASEIV85442THE X-FORCE SCASERVER PROCESS CAN FAIL TO START DUE TO DATABASE FILE CORRUPTION AFTER AN UPDATE
QRADAR VULNERABILITY MANAGERSCAN POLICYIV98247CLICKING 'SAVE' AFTER EDITING A SCAN POLICY CAN APPEAR TO HANG AND NOT SAVE SUCCESSFULLY
QRADAR VULNERABILITY MANAGERREPORTSIV95105REPORTS CREATED FROM VULNERABILITY SCAN PROFILES CAN SOMETIMES BE BLANK
QRADAR VULNERABILITY MANAGERINSTALL/UPGRADEIJ04398PATCH/UPGRADE TO QRADAR 7.3.1 PATCH 2 CAN HANG FOR AN EXTENDED PERIOD OF TIME (HOURS) WITH "VULN_MAP_ASSET_MV DOES NOT EXIST"
QRADAR VULNERABILITY MANAGERSCAN PROFILEIJ00368SAVING A SCAN PROFILE CAN TAKE LONGER THAN EXPECTED
QRADARAPIIV98655REFERENCE SETS THAT CONTAIN LARGE DATASETS THAT ARE LOADED VIA THE API CAN SOMETIMES CAUSE UI INSTABILITY/INACCESSABILITY
QRADARUSER INTERFACEIV98452EMAIL RESPONSE USING CUSTOM EMAIL TEMPLATE DISPLAYS A TEMPLATE STRING CODE INSTEAD OF 'N/A' FOR NULL CUSTOM PROPERTIES
QRADARCUSTOM EVENT PROPERTIESIJ02479CUSTOM EVENT PROPERTIES ASSIGNED TO A LOG SOURCE ARE NOT VISIBLE IN SEARCH FILTER FOR NON-ADMIN USER





Where do I find more information?



[{"Product":{"code":"SSUK44","label":"IBM Security QRadar Incident Forensics"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"Documentation","Platform":[{"code":"PF016","label":"Linux"}],"Version":"7.3.1","Edition":"All Editions","Line of Business":{"code":"LOB24","label":"Security Software"}}]

Document Information

Modified date:
17 June 2018

UID

swg27050924