Splunk® User Behavior Analytics

Install and Upgrade Splunk User Behavior Analytics

This documentation does not apply to the most recent version of Splunk® User Behavior Analytics. For documentation on the most recent version, go to the latest release.

Upgrade a single node AMI or OVA installation of Splunk UBA

Perform the following steps to upgrade a single node AMI or OVA installation of Splunk UBA.

Upgrading to Splunk UBA version 5.3.0 on an AMI or OVA also requires you upgrade to Ubuntu version 20.04..


Prerequisites

Complete the following steps to ensure your system is correctly set up for upgrading Splunk UBA:

  1. Confirm you meet the Upgrade Splunk UBA prerequisites.
  2. Make sure the correct hadoop ports are open. See, Inbound networking port requirements.
  3. Ensure you Verify Postgres Collate and Ctype values.
  4. If you have enabled the integration that sends UBA audit data to Splunk Enterprise Security (ES), preserve the associated certificate before upgrading.
    Use the following command to export the certificate:
    . /opt/caspida/bin/CaspidaCommonEnv.sh
    sudo keytool -exportcert -alias "splunk es" -keystore $JAVA_HOME/lib/security/cacerts -rfc -file ~/splunk-es_cacert.pem
    For more info on sending audit data to ES see, Send Splunk UBA audit events to Splunk ES in the Send and Receive Data from the Splunk Platform manual.
  5. If you have enabled validation of the SSL certificate from Splunk ES, export the SSL certificate used for validating datasources from the Splunk Enterprise platform:
    . /opt/caspida/bin/CaspidaCommonEnv.sh
    sudo keytool -exportcert -alias "SplunkESRootCA" -keystore $JAVA_HOME/lib/security/cacerts -rfc -file ~/SplunkESRootCA.pem
    
  6. For 1, 3, 5, 7, and 10 node deployments, run the following command from the Management node. For 20 and 20XL node deployments, run the following command from from the Management node and Node 2:
    psql -d caspidadb -c "UPDATE rulepackages SET version = 0 WHERE namespace LIKE 'secteam.%';"

Single server upgrade steps

The Splunk UBA AMI and OVA images use Ubuntu as the operating system. Ensure that Splunk UBA is running before you upgrade then perform the following tasks to upgrade Splunk UBA on a single server with Ubuntu operating system.

  1. Stop all the caspida services.
    /opt/caspida/bin/Caspida stop-all
  2. Archive the previous UBA release. Replace <old-uba-version> with your version of UBA:
    sudo mkdir -p /var/vcap/release_archives
    sudo mv /opt/caspida /var/vcap/release_archives/caspida-<old-uba-version>
    sudo mkdir -p /opt/caspida && sudo chown caspida:caspida /opt/caspida
    sudo chown caspida:caspida /var/vcap/release_archives
    sudo chown caspida:caspida /var/vcap/release_archives/caspida-<old-uba-version>
  3. Download the latest UBA branch build splunk-uba-software-upgrade-package_530.tgz and untar the UBA bits to /home/caspida directory:
    $ tar xvzf /home/caspida/splunk-uba-software-upgrade-package_530.tgz
    Splunk-UBA-Platform-5.3.0-20230810-11068359.tgz
    Splunk-UBA-Platform-5.3.0-20230810-11068359.tgz.md5sum
    uba-ext-pkgs-5.3.0.tgz
    uba-ext-pkgs-5.3.0.tgz.md5sum
    
  4. Untar the UBA 5.3.0 Platform build inside the /opt/caspida/ folder:
    tar xvzf /home/caspida/Splunk-UBA-Platform-5.3.0-20230810-11068359.tgz -C /opt/caspida
  5. If you are upgrading from UBA version 5.2.0 and you are on Ubuntu 20.04, there is no need to upgrade Ubuntu. Proceed directly to step 9.

  6. Update the package information.
    sudo apt-get update
  7. Remove the grub-pc package, then reinstall. This is done because there is an existing Ubuntu upgrade bug that is avoided with a clean install of this package.
    1. Remove by purging the grub-pc package:
      sudo apt-get purge grub-pc -y
    2. Reinstall grub-pc package:
      sudo apt-get install grub-pc -y 
    3. When the interactive prompt comes up to choose a disk, select your BOOT disk if known. If BOOT disk is not known, select all disk choices.

      Failure to choose the correct disk will result in it not being able to boot up.

  8. Reboot the system:
    sudo reboot

  9. Upgrade from Ubuntu 18.04 to Ubuntu 20.04 using these steps:
    1. Install the newest available versions of all packages and reboot. Run the following commands:
      sudo apt-get update
      sudo apt-get dist-upgrade
      sudo reboot
      
    2. Run the following command to upgrade to Ubuntu 20.04:
      sudo /opt/caspida/upgrade/utils/upgrade_ubuntu.sh -t 20.04
      
    3. Reboot the system:
      sudo reboot
  10. Set or update the following environment variable for PostgreSQL in the /etc/default/locale file:
    Change the LANG value to en_US.UTF-8
  11. Run the following command to source /etc/default/locale:
    source /etc/default/locale
  12. Run the UBA upgrade script, using the path to your archived UBA from step 2. Migrate your configurations in a tmux shell just in case your SSH connection breaks.

    The path-to-prev-uba-archive might be /var/vcap/release_archives/caspida- depending on your archived UBA version number.

    $ tmux
    $ /opt/caspida/upgrade/utils/upgrade_uba.sh -p <path-to-prev-uba-archive> -e /home/caspida/uba-ext-pkgs-5.3.0.tgz
    The command installs the new Splunk UBA software, restarts Splunk UBA, and then restarts the data sources.

If you have previously imported an output connector certificate, re-import the certificate. See, Configure the Splunk platform to receive data from the Splunk UBA output connector in the Send and Receive Data from the Splunk Platform manual.

Apply security patches on Ubuntu

The Splunk UBA AMI and OVA images use Ubuntu as the operating system. Perform the following tasks to apply the latest security patches to your Ubuntu operating system:

Applying the security patches can take up to one hour.

  1. Log in to the Splunk UBA server as the caspida user.
  2. Run the following command to stop Splunk UBA and all services:
    /opt/caspida/bin/Caspida stop-all
  3. Run the following commands to install the latest unattended-upgrades package:
    sudo apt update
    sudo apt install unattended-upgrades
    

    If you see the following prompt, select keep the local version currently installed:

    What do you want to do about modified configuration file 50unattended-upgrades?
  4. Run the following command:
    sudo apt autoremove
  5. Edit the /etc/apt/apt.conf.d/50unattended-upgrades file and un-comment the following line:

    Skip this step if you have previously applied security patches to your Ubuntu environment following these instructions.

    "${distro_id}:${distro_codename}-security";
    Leave all other lines commented out.
  6. Run the following command:
    sudo unattended-upgrade -d
  7. Edit the /etc/init.d/zookeeper-server file and change su to runuser in all of the following lines:

    Skip this step if you have previously applied security patches to your Ubuntu environment following these instructions.

    Before:

    su -s /bin/bash zookeeper -c "${DAEMON_SCRIPT} start"
    su -s /bin/bash zookeeper -c "${DAEMON_SCRIPT} stop"
    su -s /bin/bash zookeeper -c "zookeeper-server-initialize $*"
    

    After:

    runuser -s /bin/bash zookeeper -c "${DAEMON_SCRIPT} start"
    runuser -s /bin/bash zookeeper -c "${DAEMON_SCRIPT} stop"
    runuser -s /bin/bash zookeeper -c "zookeeper-server-initialize $*"
    
  8. Reboot the system:
    sudo reboot
  9. Run the following command to start Splunk UBA and all services:
    /opt/caspida/bin/Caspida start-all

Re-import the certificate used for sending UBA audit events to Splunk ES

If you have enabled the integration that sends UBA audit data to Splunk Enterprise Security (ES), and you preserved the associated certificate in the Before you begin step, you can now re-import that certificate. Use the following command to re-import the certificate:

. /opt/caspida/bin/CaspidaCommonEnv.sh
sudo keytool -import -alias "splunk es" -keystore $JAVA_HOME/jre/lib/security/cacerts -rfc -file ~/splunk-es_cacert.pem

Re-import the SSL certificate used for validating datasources from the Splunk Enterprise platform

If you have enabled the integration that sends UBA audit data to Splunk Enterprise Security (ES), use the following command to re-import the SSL certificate:

. /opt/caspida/bin/CaspidaCommonEnv.sh
sudo keytool -import -alias "SplunkESRootCA" -keystore $JAVA_HOME/jre/lib/security/cacerts -file ~/SplunkESRootCA.pem

For more information on SSL certificate validation, see Configure flag to enable or disable Splunk SSL certificate validation.

Troubleshoot the Ubuntu upgrade

While upgrading Ubuntu some environment specific issues can arise. See the following known issues and how to work around them.

Snapd

You might encounter the following error message if snapd is in an unexpected state:

FileNotFoundError: [Errno 2] No such file or directory: 'snap'

Workaround steps:

  1. Remove and purge the snapd package:
    sudo apt purge snapd
  2. Reinstall the snapd package:
    sudo apt install snapd
  3. Re-run the upgrade_ubuntu.sh script.


Next steps

You can Verify a successful upgrade of Splunk UBA.

By default, the caspida user is given ALL access in /etc/sudoers during Splunk UBA installation and upgrade. If you want to restrict sudo access for the caspida user after Splunk UBA is upgraded, see Restrict sudo access for the caspida account.

Last modified on 11 April, 2024
Upgrade Splunk UBA prerequisites   Upgrade a single node RHEL installation of Splunk UBA

This documentation applies to the following versions of Splunk® User Behavior Analytics: 5.3.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters