Introduction Overview This guide explains how to install the Stealthwatch Data Store as part of a Stealthwatch System deployment. It describes the Stealthwatch System components and how they are placed in the system, especially in relation to the Data Store.
Data Store Concepts and Architecture Data Store Concepts and Architecture The Stealthwatch Data Store provides a central repository to store your network's telemetry, collected by your Stealthwatch Flow Collectors. The Data Store is comprised of a cluster of Data Nodes, each containing a portion of your data, and a backup of a separate Data Node's data.
Page 9
Data Store Concepts and Architecture Stealthwatch Data Store Deployment Architecture In a Stealthwatch deployment without a Data Store, one or more Flow Collectors ingests and deduplicates data, performs analysis, and reports data and results directly to the SMC. To resolve user-submitted queries, including graphs and charts, the SMC queries all of the managed Flow Collectors.
Page 10
Data Store Concepts and Architecture In a Stealthwatch deployment with a Data Store, the Data Store cluster sits between your SMC and Flow Collectors. One or more Flow Collectors ingests and deduplicates flows, performs analysis, and reports data and results directly to the Data Store, distributing it roughly equally to all of the Data Nodes.
Page 11
SMC. Use the Stealthwatch Web App to monitor and configure your Stealthwatch installation if you deploy a Data Store. The Stealthwatch Desktop Client is incompatible with a Data Store. If you configure your SMC for use with a Data Store, you cannot use the ETA Cryptographic Audit or Host Classifier apps.
Page 14
100Mbps/1Gbps/10 Gbps copper interface as eth0 You can also deploy Flow Sensors and UDP Directors for your Stealthwatch deployment. Because these appliances do not communicate directly with the Data Store, you do not need to configure them for use with a Data Store.
Page 16
Data Nodes must be able to reach SMC, all Flow Collectors, and each Data Node Note that you must obtain a Flow Rate (FPS) Smart License for your overall Stealthwatch deployment. Currently, the Data Store does not support deploying spare Data Nodes as automatic replacements if a primary Data Node goes down.
NOC. If the Data Store goes down due to loss of power or hardware failure, you run an increased risk of data corruption and data loss. Cisco recommends installing your Data Nodes with constant uptime in mind.
CIMC. Data Store Communications Ports The following diagram shows an example Stealthwatch architecture, with the communication ports that should be opened. See the table for the ports associated with each callout.
Page 22
The following lists the communication ports to open on your firewall to deploy the Data Stealthwatch x2xx Series (with Data Store) Appliance Installation Store. See the Guide for additional communication ports to open for your overall Stealthwatch deployment. From (Client) To (Server)
Stealthwatch with a Data Store Deployment Overview Stealthwatch with a Data Store Deployment Overview The following describes the high-level steps for deploying Stealthwatch with a Data Store: SMC Configuration for Use with a Data Store - Deploy and configure your SMC, then install the latest version and rollup patch before you proceed.
Data Store Installation Data Store Installation If you plan on purchasing a Stealthwatch Data Store, contact Cisco Professional Services for assistance with placement, deployment, and configuration within and as part of your overall Stealthwatch deployment. Contact Cisco Support for more information.
Page 32
After the wizard finalizes Data Store setup, check the Central Management inventory to verify that all appliances are Up. Your Stealthwatch deployment with a Data Store is complete. Assign the...
(such as flow statistics), so we limit the flow interface statistics retention period to seven (7) days maximum by default. You can use the Stealthwatch REST API to change the flow interface statistics retention period: to a different number of days, up to 3000, or store the data as long as possible, until the Data Store reaches maximum capacity.
Page 39
After you update the retention settings, you do not need to restart any Stealthwatch appliance or the Data Store. The settings take effect after a few minutes. However, when you change the flow interface statistics retention to a longer period, you must wait for the difference of time to expire before the data being stored corresponds exactly to the retention settings.
Data Store Installation Next Steps Data Store Installation Next Steps After you deploy and configure your Stealthwatch deployment for use with a Data Store: Report Builder App: Install the Stealthwatch Report Builder app on your SMC to run reports on your Stealthwatch deployment, and to view Data Store storage release notes statistics.
If the backup test fails to resolve, review the debug log files in the directory, resolve the root cause, then test the backup again. /tmp/vbr Contact Cisco support for assistance if you cannot resolve the issue. Enter and press Enter to backup the Data vbr -t backup -c config.ini...
If you have existing SMCs or Flow Collectors that you configured for use without a Data Store, and you want to add them to a Stealthwatch deployment, you must RFD the appliances first, configure the appliances for use with a Data Store, and add them to your deployment.
Page 58
Node to recover. What to Do Next Data Review Cisco's recommendations for supplying power to your Data Nodes in Store Deployment Requirements and Considerations Data Store Does Not Start After Power Failure: If multiple Data Nodes lose power unexpectedly, and the Data Store database goes down, it may not automatically restart after you restore power to the affected Data Nodes.
Configuring Network Settings Using First Time Setup Mounting Your Appliance You can mount Stealthwatch appliances directly in a standard 19'' rack or cabinet, any other suitable cabinet, or on a flat surface. When mounting an appliance in a rack or cabinet, follow the instructions included in the rail mounting kits.
For detailed specification information about each appliance, refer to Stealthwatch Specification Sheets The Cisco x2xx hardware all use the same UCS platform, UCSC-C220-M5SX, except for the Flow Collector 5210 DB, which uses UCSC-C240-M5SX. The variations in appliances are in NIC cards, processor, memory, storage and RAID.
Page 73
Data If you are configuring a Data Store-compatible SMC or Flow Collector, go to Store-Compatible Appliances (SMC 2210, FC 4210) If you are configuring any other Stealthwatch appliance, start with step 1. Procedure Log in to the System Configuration program: If you are configuring a Data Node or Data Store-compatible appliance, type...
Collector, see information on the supported SFP+ and BASE-T ports. If you are configuring a Data Node, go to Data Node Configuration If you are configuring any other Stealthwatch appliance besides Data Store- General Stealthwatch Appliance Configuration compatible appliances, see Procedure...
Page 77
Stealthwatch deployment to store Firepower event information. Your Flow Collector will ingest Firepower event information and send it to the Data Store for storage. You can then query this Firepower event information from your Stealthwatch Management Console or Firepower Management Center.
You must RFD the appliance if you select the wrong choice. Enable this only if you plan to use Stealthwatch for Security Analytics and Logging On Prem to store your Firepower event information. Select to disable Security Analytics and Logging On Prem. You can ingest NetFlow on your Flow Collector.
Page 79
Appendix B. Stealthwatch Hardware Installation Data If you are configuring a Data Store-compatible SMC or Flow Collector, go to Store-Compatible Appliances (SMC 2210, FC 4210) If you are configuring any other Stealthwatch appliance besides Data Store- compatible appliances, see General Stealthwatch Appliance Configuration Procedure...
On the System Configuration menu, select and press If you change the trusted hosts list from the defaults, make sure each Stealthwatch appliance is included in the trusted host list for every other Stealthwatch appliance in your deployment. Otherwise, the appliances will not be able to communicate with each other.
SMC Failover If you have more than one Stealthwatch Management Console (SMC), you can set up an SMC failover pair so that one of them serves as backup console to the other. Use the Appliance Setup Tool to configure each individual SMC.
, and complete the 5. Confirm Appliance Status procedures through If you don't have another appliance to set up, go to the Stealthwatch System Configuration Guide for more information on how to complete Appliance Stealthwatch Data Store Deployment Configurations. Alternatively, return to the Overview to review the deployment process.
Page 91
Copyright Information Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this https://www.cisco.com/go/trademarks URL: . Third-party trademarks mentioned are the property of their respective owners.
Need help?
Do you have a question about the Stealthwatch and is the answer not in the manual?
Questions and answers