Download Print this page

Juniper STRM 2008.2 - RESTORING YOUR DATA 6-2008 Troubleshooting Tips

Restoring your data
Hide thumbs Also See for STRM 2008.2 - RESTORING YOUR DATA 6-2008:

Advertisement

Quick Links

Before You Begin
Release 2008.2
J
N
UNIPER
T
ECHNICAL
R
Y
ESTORING
OUR
J
2008
UNE
If you are using STRM 2008.1 and above, you can schedule the backup of your
configuration information and data using the STRM Administration Console. The
data portion of the backup includes all offenses (including targets and attacker
information), asset data, event category information, vulnerability data, event data,
and flow data located on STRM.
You can restore your configuration information using the STRM interface, however,
you must use the procedures in this document to restore your flow, event, or
reporting data. This document includes:
Before You Begin
Restoring Your Data
Troubleshooting Tips
Caution: If the current configuration of your STRM system differs from the
configuration that existed at the time the data was backed up, your system may
experience some gaps in information once the data is restored. For example, if the
recovered data includes device information from a device that no longer exists, the
interface will not display information regarding this removed device.
Each managed host in your deployment, including the STRM Console, Flow
Processors, and Event Processors create backup files in the
directory.
Note: Your system may also include a mount /store/backup from an external SAN
or NAS service, which allows for long term off-line retention of data, as often
required for compliancy regulations, such as, HIPPA and PKI.
Before you restore the data, consider the following:
Locate the managed host on which the data is backed up (Console, Flow
Processor, or Event Processor).
Backup files are saved using the following format:
backup.<name>.<hostname>_<host ID>.<target date>.<backup
type>.<timestamp>.tgz
ETWORKS
N
OTE
D
ATA
STRM
/store/backup/

Advertisement

loading

Summary of Contents for Juniper STRM 2008.2 - RESTORING YOUR DATA 6-2008

  • Page 1 STRM UNIPER ETWORKS ECHNICAL ESTORING 2008 If you are using STRM 2008.1 and above, you can schedule the backup of your configuration information and data using the STRM Administration Console. The data portion of the backup includes all offenses (including targets and attacker information), asset data, event category information, vulnerability data, event data, and flow data located on STRM.
  • Page 2: Restoring Your Data

    Where: is the name associated with the backup. <name> is the name of the STRM system hosting the backup file. <hostname> is the identifier for the STRM system. <host ID> is the date that the backup file was created. <target date> is the type of backup.
  • Page 3 Restoring Your Data backup.scheduled.csd6_2.23_04_2008.db.1209006090148.tgz backup.test.csd6_2.10_03_2008.config.1205160090172.tgz desc/ Extract the files you wish to restore. Step 5 Note: Make sure the extraction command includes the P option, which ensures the files are extracted to their original directory. tar -zxPf /store/backup/backup.<name>.<hostname>._<host ID>.<target date>.<backup type>.<timestamp>.tgz For example: tar -zxPf backup.scheduled.csd9_2.31_03_2008.data.1207033304942.tgz...
  • Page 4 payload_flows~0_0~eb8d3826c5724b01~b56774a558286d05 payload_flows~10_0~ecfb94ded5814c4d~9c5d33d0ec9ec0a6 payload_flows~1_0~94fca21391be44ea~bd32d5dbe8c6a60a payload_flows~11_0~4d98ae53d2354d41~bde1b8f0684e3829 payload_flows~12_0~2c45af65412c41c6~af424b6b3e5c2e48 payload_flows~13_0~388fe28e9484859~8ca4462103a72bfb payload_flows~14_0~3e2c90e566d442ca~b7bb031ae09876db payload_flows~15_0~d382f047a5164281~b2d99a661a9a8e28 payload_flows~16_0~3e18d2a93a1746ca~914d4395a0756c4b payload_flows~17_0~13383fec3302441f~b237970768894b79 payload_flows~18_0~dcaa5df8d3764c65~a125bd6ca4cd3b76 payload_flows~19_0~d1ea417c7faf4551~869ef92249918994 Verify the restored data is now available: Step 7 Log into the STRM interface. Click the Event Viewer or Flow Viewer tab. Select Search > Edit Search from the drop-down list box. The search window appears.
  • Page 5: Troubleshooting Tips

    Ensure all proper file permissions are correctly configured. Typically, files are restored with the original permissions. However, if the files are owned by root, this may cause issues. If this is the case, adjust the files permissions using the commands. For assistance, please contact Juniper Networks chown chmod Customer Support.
  • Page 6 Copyright Notice Copyright © 2008 Juniper Networks, Inc. All rights reserved. Juniper Networks and the Juniper Networks logo are registered trademarks of Juniper Networks Inc. in the United States and other countries. All other trademarks, service marks, registered trademarks, or registered service marks in this document are the property of Juniper Networks or their respective owners.

This manual is also suitable for:

Strm