Migrate the Central Manager
This procedure walks you through migrating the ASMS Central Manager (CM) to a new appliance (virtual, physical, or cloud-based). Migration is initiated from the source Central Manager itself.
You may want to do this while in the process of decommissioning end-of-life appliances or moving up to the cloud.
Important: This process breaks HA/DR clusters. You’ll need to rebuild them after migration.
Preparation Steps Before Migration
Do the following:
-
Verify identical ASMS version and build on both source and target appliances.
-
Ensure valid licenses match between appliances – including support for routers or no routers as applicable.
-
Check system specifications:
Important: We recommend you consult with AlgoSec Support with any disk space issue you may encounter.
-
Target machine must meet System requirements.
-
Verify how much storage is being used on the /data partition on the source machine. You must have at least the same amount of storage plus another 5% free on the target machine's /data partition.
-
Source /root partition must be healthy. Required free disk space on target /root depends on usage on source.
-
-
Validate port availability – ensure required ports are open between source and target. For more information, see Required port connections.
-
Back up your environment – take a VM snapshot or physical backup of the source CM.
-
Disable analysis and monitoring jobs:
-
Document and delete scheduled analyses. For details, see Schedule analysis.
-
Turn off real-time monitoring and device polling in Administration. For details, see Configure real-time monitoring.
-
-
Remove or migrate SSL certificate passphrase:
You can either:
-
Remove it by creating a passphrase script (sslpassphrase) and updating ssl.conf accordingly.
-
Copy it to the new appliance using rsync, then update and verify it on the target.
To remove the SSL certificate pass phrase:
-
On the CLI, enter the following script to print the pass phrase:
echo -e '#!/bin/bash\necho "Enter your SSL Passphrase here"' > /etc/httpd/conf.d/sslpassphrase
chmod 700 /etc/httpd/conf.d/sslpassphrase
-
Configure httpd to use the pass phrase script by entering the following:
-
Edit /etc/httpd/conf.d/ssl.conf
-
Change text from:
SSLPassPhraseDialog builtin
to:
SSLPassPhraseDialog exec:/etc/httpd/conf.d/sslpassphrase
-
-
Check that httpd starts without having to enter a pass phrase. Enter:
/etc/init.d/httpd restart
To copy the SSL certificate pass phrase:
-
Log in to Source as root user.
-
Run the commands:
PASSP=`grep SSLPassPhraseDialog /etc/httpd/conf.d/ssl.conf | grep -v builtin | cut -f2 -d\:` ; chmod a+x $PASSP
PFILE=`echo ${PASSP##*/}` ; echo $PFILE -
Copy the CLI printed output.
In this case, httpd-ssl-pass-dialog.
-
Run the following replacing the actual Target IP:
rsync -rtu $PASSP <TARGET_IP>:/usr/libexec/ -
Enter password when prompted.
-
-
Log in to Target as root user and enter the following replacing the string you copied from step 1:
\cp -rpv /usr/libexec/httpd-ssl-pass-dialog{,.BACKUP_COPY} ; \cp -rpv /usr/libexec/<Copied string from step 1> /usr/libexec/httpd-ssl-pass-dialogFor Example, if the copied string is <httpd-ssl-pass-dialog>, the command will be:
\cp -rpv /usr/libexec/httpd-ssl-pass-dialog/usr/libexec/httpd-ssl-pass-dialog
-
Verification: Restart httpd and ensure httpd starts up:
service httpd restart
-
Sync Reports
Reports are pulled from the peer node.
Important: You can only sync reports from one peer. If you try to sync from more than one, data will be overwritten.
Note: his is the most time-consuming step of the migration process.
-
Sync reports from peer nodes (optional but recommended to minimize downtime):
-
On the CLI, connect to the target Central Manager administration interface via SSH and log in as root. For details, see Connect to and Utilize the Administration Interface.
-
In the main menu, enter 16 to migrate ASMS units.
-
Enter option 3 -Sync reports from peer node.
-
Migrate the Central Manager
-
Initiate migration from the source Central Manager:
On source CM, connect as root:
- In the main menu, enter 16 to migrate ASMS units.
- Enter 1 to migrate a Central Manger.
- Enter the IP address and root password of the target machine that will host the new Central Manager.
-
Resolve any issues found by the prerequisite checker.
You may run the check without continuing migration (n to abort if needed).
If the prerequisite checks find issues, see Resolve migration prerequisite check issues.
-
If all checks pass, confirm migration by typing y. This breaks HA/DR clusters and begins the migration.
Post-Migration: HA/DR and Distributed Architecture
-
Rebuild DR cluster from the new CM:
-
On the new CM, connect as root:
-
In the Administration Interface, enter 13- HA/DR Setup.
-
Enter 1 to build an HA cluster or 2 to build DR cluster.
-
Follow the prompts and confirm.
-
-
Verify cluster health and rebuild the cluster:
-
On the new CM, connect as root:
-
In the Administration Interface, enter 17-System health.
-
Enter 1-Check services status.
-
In the Administration Interface, enter 17- HA/DR Setup.
-
Enter 1-Build HA cluster.
-
-
Rebuild distributed architecture:
In ASMS interface, go to the Administration Menu:
Note: In the following steps, you’ll be prompted to run Option 15: Configure Distributed Architecture in each link. You only need to run Option 15 after deleting the load units.
-
Add new LDU appliances. See Add or edit Load Units.
-
Add new RA appliances. See Add or edit Remote Agents
-
Delete old LDUs. See Delete Load Units or Remote Agents.
-
-
Migrate remote agents (RA). See Relocate devices
-
Delete old RAs. See Delete Load Units or Remote Agents.
Final Clean-up and Validation
Note: Remote Agents connected to the Central Manager will be automatically reconnected to the new Central Manager.
-
Enable real-time monitoring again. For details, see Configure real-time monitoring.
-
Run manual AFA analysis on all devices and groups. See Run a manual AFA analysis.
-
Old (Source) CM: We recommend that you do not use the source machine after migrating without resetting it to factory settings.
All services on the source machine are disabled.
For more details, see Install ASMS on a repurposed AlgoSec hardware appliance.
â See also:
