Merge pull request #5233 from Security-Onion-Solutions/hotfix/2.3.70

Hotfix/2.3.70
This commit is contained in:
Mike Reeves
2021-08-23 09:28:07 -04:00
committed by GitHub
7 changed files with 86 additions and 49 deletions

1
HOTFIX
View File

@@ -1 +1,2 @@
CURATOR

View File

@@ -1,18 +1,18 @@
### 2.3.70 ISO image built on 2021/08/17 ### 2.3.70-CURATOR ISO image built on 2021/08/20
### Download and Verify ### Download and Verify
2.3.70 ISO image: 2.3.70-CURATOR ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.70.iso https://download.securityonion.net/file/securityonion/securityonion-2.3.70-CURATOR.iso
MD5: F048FABC7FD2D0E1A8B02381F115D1E0 MD5: E0F7882E37B1B6BC4F9A6C8FD6F213F6
SHA1: DF6D20FEF13CDC1B19309D2A1178D6E5D25FDA6F SHA1: 82E1204BAD9489B275A083A642F175E352F9A332
SHA256: B193FFD7EE69958A8E257117149DCFB2125C5772FBFA6003AD80FD1CC129E571 SHA256: 147CA7F5082273EDCC32EF6322D86A04CCB2E96B3A7F0B01EFA8A029BD84C3D7
Signature for ISO image: Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70.iso.sig https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70-CURATOR.iso.sig
Signing key: Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO: Download the signature file for the ISO:
``` ```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70.iso.sig wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70-CURATOR.iso.sig
``` ```
Download the ISO image: Download the ISO image:
``` ```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.70.iso wget https://download.securityonion.net/file/securityonion/securityonion-2.3.70-CURATOR.iso
``` ```
Verify the downloaded ISO image using the signature file: Verify the downloaded ISO image using the signature file:
``` ```
gpg --verify securityonion-2.3.70.iso.sig securityonion-2.3.70.iso gpg --verify securityonion-2.3.70-CURATOR.iso.sig securityonion-2.3.70-CURATOR.iso
``` ```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below: The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
``` ```
gpg: Signature made Tue 17 Aug 2021 10:52:17 PM EDT using RSA key ID FE507013 gpg: Signature made Fri 20 Aug 2021 01:23:59 PM EDT using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>" gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature! gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner. gpg: There is no indication that the signature belongs to the owner.

View File

@@ -4,6 +4,7 @@
{% set VERSION = salt['pillar.get']('global:soversion', 'HH1.2.2') %} {% set VERSION = salt['pillar.get']('global:soversion', 'HH1.2.2') %}
{% set IMAGEREPO = salt['pillar.get']('global:imagerepo') %} {% set IMAGEREPO = salt['pillar.get']('global:imagerepo') %}
{% set MANAGER = salt['grains.get']('master') %} {% set MANAGER = salt['grains.get']('master') %}
{% set REMOVECURATORCRON = False %}
{% if grains['role'] in ['so-eval', 'so-node', 'so-managersearch', 'so-heavynode', 'so-standalone', 'so-manager'] %} {% if grains['role'] in ['so-eval', 'so-node', 'so-managersearch', 'so-heavynode', 'so-standalone', 'so-manager'] %}
{% from 'elasticsearch/auth.map.jinja' import ELASTICAUTH with context %} {% from 'elasticsearch/auth.map.jinja' import ELASTICAUTH with context %}
{% from "curator/map.jinja" import CURATOROPTIONS with context %} {% from "curator/map.jinja" import CURATOROPTIONS with context %}
@@ -88,36 +89,6 @@ curdel:
- group: 939 - group: 939
- mode: 755 - mode: 755
so-curatorcloseddeletecron:
cron.present:
- name: /usr/sbin/so-curator-closed-delete > /opt/so/log/curator/cron-closed-delete.log 2>&1
- user: root
- minute: '*'
- hour: '*'
- daymonth: '*'
- month: '*'
- dayweek: '*'
so-curatorclosecron:
cron.present:
- name: /usr/sbin/so-curator-close > /opt/so/log/curator/cron-close.log 2>&1
- user: root
- minute: '*'
- hour: '*'
- daymonth: '*'
- month: '*'
- dayweek: '*'
so-curatordeletecron:
cron.present:
- name: /usr/sbin/so-curator-delete > /opt/so/log/curator/cron-delete.log 2>&1
- user: root
- minute: '*'
- hour: '*'
- daymonth: '*'
- month: '*'
- dayweek: '*'
so-curator: so-curator:
docker_container.{{ CURATOROPTIONS.status }}: docker_container.{{ CURATOROPTIONS.status }}:
{% if CURATOROPTIONS.status == 'running' %} {% if CURATOROPTIONS.status == 'running' %}
@@ -152,12 +123,77 @@ so-curator_so-status.disabled:
file.comment: file.comment:
- name: /opt/so/conf/so-status/so-status.conf - name: /opt/so/conf/so-status/so-status.conf
- regex: ^so-curator$ - regex: ^so-curator$
# need to remove cronjobs here since curator is disabled
{% set REMOVECURATORCRON = True %}
{% else %} {% else %}
delete_so-curator_so-status.disabled: delete_so-curator_so-status.disabled:
file.uncomment: file.uncomment:
- name: /opt/so/conf/so-status/so-status.conf - name: /opt/so/conf/so-status/so-status.conf
- regex: ^so-curator$ - regex: ^so-curator$
{% endif %} {% endif %}
{% else %}
delete_so-curator_so-status:
file.line:
- name: /opt/so/conf/so-status/so-status.conf
- match: ^so-curator$
- mode: delete
# need to remove cronjobs here since curator is disabled
{% set REMOVECURATORCRON = True %}
{% endif %}
{% if REMOVECURATORCRON %}
so-curatorcloseddeletecron:
cron.absent:
- name: /usr/sbin/so-curator-closed-delete > /opt/so/log/curator/cron-closed-delete.log 2>&1
- user: root
so-curatorclosecron:
cron.absent:
- name: /usr/sbin/so-curator-close > /opt/so/log/curator/cron-close.log 2>&1
- user: root
so-curatordeletecron:
cron.absent:
- name: /usr/sbin/so-curator-delete > /opt/so/log/curator/cron-delete.log 2>&1
- user: root
{% else %}
so-curatorcloseddeletecron:
cron.present:
- name: /usr/sbin/so-curator-closed-delete > /opt/so/log/curator/cron-closed-delete.log 2>&1
- user: root
- minute: '*'
- hour: '*'
- daymonth: '*'
- month: '*'
- dayweek: '*'
so-curatorclosecron:
cron.present:
- name: /usr/sbin/so-curator-close > /opt/so/log/curator/cron-close.log 2>&1
- user: root
- minute: '*'
- hour: '*'
- daymonth: '*'
- month: '*'
- dayweek: '*'
so-curatordeletecron:
cron.present:
- name: /usr/sbin/so-curator-delete > /opt/so/log/curator/cron-delete.log 2>&1
- user: root
- minute: '*'
- hour: '*'
- daymonth: '*'
- month: '*'
- dayweek: '*'
{% endif %} {% endif %}
# Begin Curator Cron Jobs # Begin Curator Cron Jobs

View File

@@ -3,13 +3,13 @@
{% set TRUECLUSTER = salt['pillar.get']('elasticsearch:true_cluster', False) %} {% set TRUECLUSTER = salt['pillar.get']('elasticsearch:true_cluster', False) %}
{% do CURATOROPTIONS.update({'manage_sostatus': True}) %} {% do CURATOROPTIONS.update({'manage_sostatus': True}) %}
# don't start the docker container if searchnode and true clustering is enabled or curator disabled via pillar or true cluster not enabled and manager # don't start the docker container if curator is disabled via pillar
{% if not ENABLED or (TRUECLUSTER and grains.id.split('_')|last == 'searchnode') or (not TRUECLUSTER and grains.id.split('_')|last == 'manager') %} {% if not ENABLED or grains.id.split('_')|last == 'manager'%}
{% do CURATOROPTIONS.update({'start': False}) %} {% do CURATOROPTIONS.update({'start': False}) %}
{% do CURATOROPTIONS.update({'status': 'absent'}) %} {% do CURATOROPTIONS.update({'status': 'absent'}) %}
{% if (TRUECLUSTER and grains.id.split('_')|last == 'searchnode') or (not TRUECLUSTER and grains.id.split('_')|last == 'manager') %} {% if grains.id.split('_')|last == 'manager' %}
{% do CURATOROPTIONS.update({'manage_sostatus': False}) %} {% do CURATOROPTIONS.update({'manage_sostatus': False}) %}
{% endif %}%} {% endif %}
{% else %} {% else %}
{% do CURATOROPTIONS.update({'start': True}) %} {% do CURATOROPTIONS.update({'start': True}) %}
{% do CURATOROPTIONS.update({'status': 'running'}) %} {% do CURATOROPTIONS.update({'status': 'running'}) %}

View File

@@ -1,6 +1,6 @@
{ {
"manint": "{{ salt['pillar.get']('host:mainint', '') }}",
{%- if grains.role in ['so-standalone', 'so-eval', 'so-sensor', 'so-heavynode', ] %} {%- if grains.role in ['so-standalone', 'so-eval', 'so-sensor', 'so-heavynode', ] %}
"monint": "{{ salt['pillar.get']('sensor:interface', '') }}" "monint": "{{ salt['pillar.get']('sensor:interface', '') }}",
{% endif -%} {%- endif %}
"manint": "{{ salt['pillar.get']('host:mainint', '') }}"
} }

View File

@@ -189,13 +189,13 @@ base:
{%- if KIBANA %} {%- if KIBANA %}
- kibana - kibana
{%- endif %} {%- endif %}
- curator
{%- if ELASTALERT %} {%- if ELASTALERT %}
- elastalert - elastalert
{%- endif %} {%- endif %}
{%- if FILEBEAT %} {%- if FILEBEAT %}
- filebeat - filebeat
{%- endif %} {%- endif %}
- curator
- utility - utility
- schedule - schedule
{%- if FLEETMANAGER or FLEETNODE %} {%- if FLEETMANAGER or FLEETNODE %}

Binary file not shown.