| Description | This article describes how to migrate FortiSIEM data from one system to another when ClickHouse is used as the online storage backend. |
| Scope | FortiSIEM. |
| Solution |
This guide focuses on ClickHouse-based deployments. The same methodology can be adapted for other storage types; however, ClickHouse is the primary scope of this document.
Requirements: Both the source and target FortiSIEM systems must meet the following requirements:
Migration steps:
The CMDB backup is located on the source FortiSIEM at:
/data/archive/cmdb/
The CMDB backup file must be copied to the /tmp directory on the target FortiSIEM.
For example: phoenixdb_202X-XX-XXTXX-XX-XX.
Before restoring the CMDB, capture the existing system configuration values on the target system.
psql -U phoenix -d phoenixdb -c "select id,value, property from ph_sys_conf" > ph_sys_conf_orig.txt
To view the captured file:
cat ph_sys_conf_orig.txt
Run the following commands and securely store the output.
Each command returns a password that must be saved in case the FortiSIEM system needs to be reverted during or after the process.
phLicenseTool --showSvnPassword
systemctl stop crond.service
/opt/phoenix/deployment/db_restore.sh /tmp/phoenixdb_xxxxx
Replace x.x.x.x with the Target FortiSIEM IP address.
psql -U phoenix -d phoenixdb
update ph_sys_server set ip_addr='x.x.x.x' where id=1; exit
phxctl start
https://x.x.x.x/phoenix/licenseUpload.jsf
Optional: restore GUI access (test user):
If GUI access is unavailable after migration, a temporary administrative user can be created using the following command:
psql -U phoenix phoenixdb -f /opt/phoenix/deployment/add-super-admin.sql
Credentials:
This step removes email configuration from the default notification templates.
psql -U phoenix phoenixdb exit
Navigate to:
Admin -> Settings -> Cluster Config.
Password synchronization:
db_password=`phLicenseTool --showDatabasePassword`
phtools --start phQueryMaster
phLicenseTool --showDatabasePassword
su admin
Add:
Save the file and exit.
Run the following commands:
/opt/glassfish/bin/asadmin --user admin --passwordfile /tmp/passwd.txt change-admin-password
/opt/glassfish/bin/asadmin --user admin --passwordfile /tmp/passwd.txt update-password-alias phdbpwd
exit
Hostname and SSH keys:
configFSM.sh
Admin SSH key.
su - admin
HA user SSH key:
cat /home/pghauser/.ssh/id_rsa.pub
Redis and ClickHouse Cleanup:
cat /opt/phoenix/config/phoenix_config.txt | grep redis_auth=
redis-cli -p 6666 -a <redis_password>
keys '*clickhouse*'
del "cache:phDataManager:clickhouseQuery:21192"
/opt/phoenix/phscripts/clickhouse/cleanup_clickhouse.sh
Navigate to Admin -> Settings -> ClickHouse Cluster.
phLicenseTool --showRedisPassword
Files to update:
/opt/phoenix/config/phoenix_config.txt
/opt/node-rest-service/ecosystem.config.js /opt/phoenix/redis/bin/redis_ops.sh /opt/phoenix/redis/conf/6666.conf
killall -9 phClickHouseMonitor
(This is a single code block. Copy the entire snippet and paste it on the target system.)
for f in /opt/node-rest-service/ecosystem.config.js \ /opt/phoenix/redis/bin/redis_ops.sh \ /opt/phoenix/redis/conf/6666.conf \ /opt/phoenix/config/phoenix_config.txt \ /opt/phoenix/config/svnlite.properties; do cp "$f" "${f}_orig" done
/opt/phoenix/deployment/jumpbox/ph_update_dr_configs.py
service httpd restart systemctl restart postgresql-$(postgres -V | awk '{print $3}' | cut -d. -f1).service
rm -f /opt/phoenix/redis/conf/6666.conf cd /opt/phoenix/redis/bin/ ./redis_ops.sh stop ./redis_ops.sh start
su admin pm2 restart all exit
Monitor logs:
tail -f /opt/phoenix/log/phoenix.log | grep -i redis
Redis connection is healthy
Once this message appears consistently, Redis synchronization is complete.
Some legacy ClickHouse nodes from the source system may still appear in the CMDB, and errors may be encountered when attempting to delete them.
psql -U phoenix -d phoenixdb
ALTER TABLE ph_device disable TRIGGER ALL;
DELETE FROM ph_device
ALTER TABLE ph_device enable TRIGGER ALL;
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.