Available Commands in the Sensor CLI Access Window
This topic summarizes the commands available in the Sensor CLI Access window available from the System | DATA SOURCE MANAGEMENT | Sensors | Sensors page. See the following sections for details:
- 
                                                    Arguments for the "show" command in the Sensor CLI Access Window 
- 
                                                    Arguments for the "set" Command in the Sensor CLI Access Window 
Refer to Using the Sensor CLI for a summary of how to display and use the Sensor CLI Access window.
Sensor CLI Access Command Types 
                                            The following types of commands are available in the Sensor CLI Access window:
- 
                                                    show – See the settings and statuses for different options on the sensor. 
- 
                                                    set – Enable and configure options on the sensor. 
- 
                                                    unset – Disable options on the sensor. 
- 
                                                    copy – Copy specified trace files or support files. 
- 
                                                    exec – Execute a specified JSON task. 
You can use the ? or help parameter with any of these commands to see the available commands of the corresponding type. For example:
- 
                                                    set ? or set help 
You can also use the ? with a specific command to see its available arguments. For example:
mysensor > set ntp ?
<NTP server> Specify NTP server name or IP address
The Sensor CLI Access window supports copy-and-paste functionality. 
The tables below summarize the available arguments for the show/set commands.
Additional Commands for IDS PCAP Capture
Refer to Capturing Trace Files for IDS Signature Matches  for information on the CLI commands used with the IDS PCAP Capture feature. Additional copy captured_pcap and copy live_pcap commands are available to copy trace files to either the DP or an external host for further analysis.
Arguments for the "show" command in the Sensor CLI Access Window
You can use the show command with any of the arguments listed and described in the table below.
Some of the show commands return a hardcoded maximum number of entries (for example, 128 for the show metalist command). In situations such as this, you can add the all parameter to ensure that the CLI returns all available entries in paged output. For example, the show metalist all command returns all entries across a set of pages, each of which has a maximum of 128 entries.
| show command | description | 
|---|---|
| aflow | Shows AFIX AFlow Information. | 
| aggregator | Shows information on Data Aggregators used by the sensor, if any. Also reports CM Controller IP address and connection status. | 
| asset | Shows asset information. | 
| cm | Shows CM Controller IP address and connection status. | 
| customer_log | Shows information on Customer Log Parsers, if applied. | 
| data-port-ip | Shows MAC and IP address for sensor data port(s) (where data is ingested by the sensor). | 
| disk-monitor | Shows actions being taken to limit disk usage. | 
| dns | Shows the IP address of the sensor's DNS server. | 
| dpi | Shows deep packet inspection information, including the categorization for different applications. Note that the output for this command can be lengthy. Use the all parameter to see all entries in paged output (for example, show dpi all). | 
| drop | Shows information on the number of packets dropped by the sensor broken out by Rx and Tx and interface. | 
| flood | Shows syn flood detection information. | 
| gateway | Shows the IP address of the sensor's default gateway. | 
| ids | Shows the status of the IDS PCAP capture feature on the Modular Sensor. When enabled, this feature captures trace files to the Sensor's storage when an IDS signature match is detected. The show ids output reports whether the IDS PCAP feature is enabled, and, if enabled, the filenames of any saved PCAP files so you can copy them off of the device for further analysis. This command only provides output when used with a virtual 6.0.0+ Modular Sensor with the IDS feature enabled in its Sensor Profile.  Refer to Capturing Trace Files for IDS Signature Matches for more information on enabling and configuring the IDS PCAP feature. | 
| interface | Shows equivalent output of the Linux ifconfig command with status, packets, drops, and bytes Rx and Tx broken out by interface. | 
| ipfix | Shows information on AFIX IPFIX classification engines. | 
| json | Shows information on AFIX JSON metadata transfer. | 
| logcollector | Shows information on the configuration of and records sent by different log collectors. | 
| logforwarder | Shows information on logs received and forwarded. Also indicates whether specific log forwarding features (such as the HTTP JSON Parser, forwarding to an external server, or TLS log forwarding) are enabled, as well as the number of workers provisioned for the sensor by the system. If you are using a custom log forwarder certificate with the TLS log forwarding feature, its name is displayed here, as well.  | 
| loglevel | Shows the log level for different Stellar Cyber modules. Note that you can also set the log level for different modules from the CLI Access window using the set loglevel command; see the table below. | 
| maltrace | Shows detailed statistics on malware sandbox usage, including the total number of IDS events broken out by the number of events buffered by the sensor and the number already sent to the DP. Note: The 5.3.0 sensor improves its approach to sending IDS events to the DP and sends them as soon as they are received, only buffering events when the sensor cannot reach the DP. Because of this, you may notice that the values reported in the Output buffering section of the show maltrace output for Buffered and Outputed are smaller than those reported in previous releases. That happens because the 5.3.0 sensor is not buffering as many events, sending them to the DP immediately, instead.  | 
| memory | Shows information on control and data plane memory availability and usage. | 
| metalist | Shows information on the black list of metadata applications (traffic explicitly excluded from ingestion/evaluation in the sensor profile). Note that the output for this command can be lengthy. The following tips can help you see the entries that interest you: 
 | 
| mtu | Shows the current Maximum Transmission Unit (MTU) setting for each interface on the sensor.  | 
| mirror | Shows information on configured traffic mirroring. | 
| module | Modular Sensors only. Shows which modular features are enabled on a modular sensor (for example, log collector, aggregator, Tenable scanner, and so on), as well as its current CPU, RAM, and disk provisioning. | 
| module request | Modular Sensors only. Shows the amount of CPU, RAM, and disk required to support different combinations of modular sensor features. | 
| netstat | Modular Sensors only. Shows standard netstat output for the modular sensor's management port.  The syntax is as follows: 
 
 | 
| nic | Lists the NICs installed in the sensor along with their names, driver names, driver versions, firmware versions, and bus information. | 
| ntp | Lists the configured NTP servers for this sensor in order of use. | 
| packet | Shows packet processing settings, including slicing and deduplication. | 
| process | Shows detailed information on internal AFIX process mapping, including NUMA register mapping. | 
| proxy | Shows information on proxies configured for the sensor, if any. | 
| receiver | Shows information on the configured data receiver for the sensor, including the following: 
 This command is supported for Windows Server Sensors as of the 6.2.0 release.  | 
| ring | Shows information on the AFIX ring. | 
| route | Shows static route table entries. | 
| rules | Shows information on configured maltrace rules. | 
| scan | Shows detailed scan information on sensor. | 
| service | Provides the service to AppID mapping for the sensor, including the NUMA register for each. Note that the output for this command can be lengthy. Use the all parameter to see all entries in paged output (for example, show service all). | 
| session | Provides a session table for the sensor listing ongoing sessions and their NUMA mappings and summary statistics. You can filter this command by source/destination IP addresses and ports using the following syntax: show session [source ip [port]] [dest ip [port]] | 
| system | Shows the status of key Stellar Cyber services on the sensor, including service uptime. If a given service is down, you can use the restart service <service_name> command to restart it. This command is supported for Windows Server Sensors as of the 6.2.0 release.  | 
| tech-support | Not supported. | 
| tenable | Available if tenable nessus is enabled in the sensor profile. Shows status of the scanner. | 
| thread | Shows information on CPU threads. | 
| time | Shows system time. | 
| top | Shows top resource usage by process. | 
| upgrade | Shows report on upgrades for this sensor. | 
| userapp | Shows information on user-defined applications for this sensor. Note that the output for this command can be lengthy. The following tips can help you see the entries that interest you: 
 | 
| version | Shows the sensor software version, license status, features, platform, basic configuration settings, and sensor up time. Note that values for some of these options can also be seen in the Sensor List, depending on which fields you add to the display. Note: The statistics displayed by the show version command can vary depending on your sensor type and version. The statistics listed below are current for the latest sensor software version. Note: Windows Server Sensors show only the following fields in their show version output – AOS Version, Product Model, License Status, Product EngineID, Internal ID, Running Mode, Running Feature, Aggregator, CM Controller,, Ctrl Plane Status, Platform OS, and Platform Type. 
 | 
| vtep | Shows interfaces available for use as a VXLAN tunnel destination. | 
| vxlan | Shows Information on VXLAN tunnel configuration. | 
| whitelist | Shows information on whitelist configuration. | 
Arguments for the "set" Command in the Sensor CLI Access Window
You can use the set command with any of the arguments listed and described in the table below. If you need help on command syntax, type set <command> ? to see the context-sensitive help.
| set command | description | ||||||
|---|---|---|---|---|---|---|---|
| afix-ring-size | Lets you configure the AFIX ring buffer size. AFIX is used on the sensor to extract flow and metadata information from sessions. Must be a specified as a power of 2 with a default size of 8192. | ||||||
| aggregator | Lets you specify the IP address of the aggregator for the sensor, if any. | ||||||
| cm | Lets you set the IP address to reach the management interface of the Data Processor from the sensor or aggregator. For a DP cluster, this is the IP address of the DL-master's management interface. For a single DP deployment, this is simply the DP's management IP address. You can supply either an IP address or a hostname. Running this command from the Sensor CLI Access window can be useful when migrating sensors from one DP to another. Note: Using this command from the Sensor CLI Access window disconnects the sensor from its current DP. Because of this, you need to manually close the Sensor CLI Access window once the disconnection occurs. The syntax is as follows:set cm <cm_addr> [safe | force] 
 Stellar Cyber strongly recommends that you always use the  | ||||||
| hostname | Lets you specify the hostname for the sensor. You can also specify hostnames in the Sensor List. | ||||||
| ids pcap | Enables and configures the IDS PCAP capture feature on the Modular Sensor. When enabled, this feature captures trace files to the Sensor's storage when an IDS signature match is detected. Refer to Capturing Trace Files for IDS Signature Matches for more information on enabling and configuring the IDS PCAP feature. | ||||||
| interface <ifn_name> | Lets you set IP configuration for a sensor interface by name, including its IP address, default gateway, and DNS server. Start by using show interface to get the name of the interface you want to configure. For example, to configure the management interface, you would use set interface management <arguments>. The syntax is as follows:set interface <ifn_name> 
 | ||||||
| ldap-metadata | Lets you enable the Metadata Summarization feature. You can turn off the feature with  | ||||||
| logforwarder | Lets you configure the logforwarder feature. | ||||||
| loglevel | Lets you set the log level for different modules. The syntax is as follows:set loglevel <service> <level> You can also set the loglevel timeout with the following command:set loglevel timeout <timeout value in minutes> Stellar Cyber recommends that you only change the log level for modules while working with Custom Success personnel. If you do decide to change log levels, a good way to start is by checking the current log levels with the show log level command. The default log level for all modules is info. The available modules (services) for which you can set the log level are as follows: 
 The available log levels are as follows, from least to most severe: 
 As an example, you can set the log level for aella_flow to warning with the following command: 
 When you specify a log level, Stellar Cyber records events of the specified severity and above. So, for example, if you specify a log level of error, only events with a severity of error and critical are logged. The log level setting also directly affects the quantity of events logged. For example, if you specify a log level of debug for a service, all events for that module are logged, regardless of severity. Log Level TipsKeep in mind the following tips when making changes to the log level: 
 | ||||||
| malware_upload | Lets you configure the malware upload feature. Refer to Forwarding Malware to an External HTTPS Server for details. | ||||||
| mtu | Lets you set the MTU for a specified interface. The syntax is as follows: set mtu <mtu_value> <ifn_name(s)> You can specify multiple interfaces in a single command. For example, the following command sets the MTU to 5500 bytes for eth0, eth1, and eth2:Sensor> set mtu 5500 interface eth0,eth1,eth2 
 | ||||||
| ntp | Lets you specify an NTP server for the sensor. The syntax is as follows:set ntp <ntp server name or address> Specifying an NTP server does not configure a time zone for the sensor. During installation, the timezone for a sensor is automatically set to UTC+0. Since the logs for some security products may only include the local time without a timezone, Stellar Cyber recommends that you set the sensor timezone to the same timezone as your security product. Set the time zone for a sensor from the Sensor List. Refer also to Best Practices for NTP and Timezones . | ||||||
| password | Lets you change the password for the sensor. | ||||||
| proxy | Lets you specify an HTTP proxy for the sensor. The syntax is as follows:set proxy http://[username:password@]<proxy_ip>[:<proxy_port>] Note: The CLI prevents you from entering non-printable characters as part of the username or password for the proxy, as well as the proxy itself. | ||||||
| receiver | Lets you change the receiver configured for the sensor in its sensor profile. | ||||||
| smb-meta-profile | Lets you toggle the SMB Reduction feature. Enabling this option reduces the amount of metadata collected for SMB commands. This is especially helpful in increasing your compression ratio if your network has a great deal of SMB traffic. If you enable this, metadata is only collected for: 
 | ||||||
| time | Lets you set the system date and time in  | ||||||
| token | Lets you apply a token to a sensor in a SaaS installation. The syntax is as follows: 
 | 
Arguments for the "unset" Command in the Sensor CLI Access Window
You can use the unset command with any of the arguments listed and described in the table below. If you need help on command syntax, type unset <command> ? to see the context-sensitive help.
| set command | description | 
|---|---|
| aggregator | Lets you remove aggregator settings from the sensor. | 
| dns | Lets you remove DNS settings from the sensor. | 
| ldap-metadata | Lets you disable the Metadata Summarization feature. | 
| logforwarder | Lets you unset logforwarder settings. | 
| malware_upload | Lets you remove malware_upload settings. | 
| ntp | Lets you remove the configured NTP settings. | 
| password | Lets you remove the configured password from the sensor, resetting it to its default of aella/changeme. | 
| proxy | Lets you remove the configured HTTP proxy for the sensor. | 
Other Commands in the Sensor CLI Access Window
The table below lists other commands available in the Sensor CLI Access window.
| command | description | 
|---|---|
| restart service <service_name> | Restarts the specified sensor service.  To use this command, start by running the  | 
| copy | 
Sensor Management Commands in Local CLI
This section describes some useful sensor management commands that are only available in the sensor's local CLI.
Factory Resetting a Sensor 
                                            Under some circumstances, you may want to reset a sensor to its factory settings before it was associated with a specific DP using either the set cm command or a token. You can do this with the factory_reset command.
Keep in mind the following when using the factory_reset command:
- 
                                                    The factory_reset command is only available from the sensor's local CLI. It is not available from the DP in the Sensor CLI Access window. 
- 
                                                    The factory_reset command removes all configuration settings except basic network settings, allowing easy re-enrollment with a DP. 
- 
                                                    You must confirm the factory_reset when prompted before it is executed. 
Uninstalling a Server Sensor 
                                            You can uninstall both Linux and Windows Server Sensors from the sensor's local CLI with the uninstall command.
The uninstall command is not available for Modular Sensors.




