mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 17:22:49 +01:00
Refactor rules location
This commit is contained in:
@@ -38,7 +38,6 @@
|
|||||||
'hydra',
|
'hydra',
|
||||||
'elasticfleet',
|
'elasticfleet',
|
||||||
'elastic-fleet-package-registry',
|
'elastic-fleet-package-registry',
|
||||||
'suricata.manager',
|
|
||||||
'utility'
|
'utility'
|
||||||
] %}
|
] %}
|
||||||
|
|
||||||
|
|||||||
@@ -90,7 +90,7 @@ suridir:
|
|||||||
|
|
||||||
suriruledir:
|
suriruledir:
|
||||||
file.directory:
|
file.directory:
|
||||||
- name: /opt/so/conf/suricata/rules
|
- name: /opt/so/rules/suricata
|
||||||
- user: 940
|
- user: 940
|
||||||
- group: 939
|
- group: 939
|
||||||
- mode: 775
|
- mode: 775
|
||||||
@@ -118,12 +118,10 @@ suridatadir:
|
|||||||
- mode: 770
|
- mode: 770
|
||||||
- makedirs: True
|
- makedirs: True
|
||||||
|
|
||||||
# salt:// would resolve to /opt/so/rules/nids because of the defined file_roots and
|
|
||||||
# not existing under /opt/so/saltstack/local/salt or /opt/so/saltstack/default/salt
|
|
||||||
surirulesync:
|
surirulesync:
|
||||||
file.recurse:
|
file.recurse:
|
||||||
- name: /opt/so/conf/suricata/rules/
|
- name: /opt/so/rules/suricata/
|
||||||
- source: salt://suri/
|
- source: salt://suricata/rules/
|
||||||
- user: 940
|
- user: 940
|
||||||
- group: 940
|
- group: 940
|
||||||
- show_changes: False
|
- show_changes: False
|
||||||
|
|||||||
@@ -36,7 +36,7 @@ so-suricata:
|
|||||||
- /opt/so/conf/suricata/suricata.yaml:/etc/suricata/suricata.yaml:ro
|
- /opt/so/conf/suricata/suricata.yaml:/etc/suricata/suricata.yaml:ro
|
||||||
- /opt/so/conf/suricata/threshold.conf:/etc/suricata/threshold.conf:ro
|
- /opt/so/conf/suricata/threshold.conf:/etc/suricata/threshold.conf:ro
|
||||||
- /opt/so/conf/suricata/classification.config:/etc/suricata/classification.config:ro
|
- /opt/so/conf/suricata/classification.config:/etc/suricata/classification.config:ro
|
||||||
- /opt/so/conf/suricata/rules:/etc/suricata/rules:ro
|
- /opt/so/rules/suricata:/etc/suricata/rules:ro
|
||||||
- /opt/so/log/suricata/:/var/log/suricata/:rw
|
- /opt/so/log/suricata/:/var/log/suricata/:rw
|
||||||
- /nsm/suricata/:/nsm/:rw
|
- /nsm/suricata/:/nsm/:rw
|
||||||
- /nsm/suricata/extracted:/var/log/suricata//filestore:rw
|
- /nsm/suricata/extracted:/var/log/suricata//filestore:rw
|
||||||
|
|||||||
@@ -1,30 +0,0 @@
|
|||||||
{% from 'allowed_states.map.jinja' import allowed_states %}
|
|
||||||
{% if sls in allowed_states %}
|
|
||||||
|
|
||||||
surilocaldir:
|
|
||||||
file.directory:
|
|
||||||
- name: /opt/so/saltstack/local/salt/suricata
|
|
||||||
- user: socore
|
|
||||||
- group: socore
|
|
||||||
- makedirs: True
|
|
||||||
|
|
||||||
ruleslink:
|
|
||||||
file.symlink:
|
|
||||||
- name: /opt/so/saltstack/local/salt/suricata/rules
|
|
||||||
- user: socore
|
|
||||||
- group: socore
|
|
||||||
- target: /opt/so/rules/nids/suri
|
|
||||||
|
|
||||||
refresh_salt_master_fileserver_suricata_ruleslink:
|
|
||||||
salt.runner:
|
|
||||||
- name: fileserver.update
|
|
||||||
- onchanges:
|
|
||||||
- file: ruleslink
|
|
||||||
|
|
||||||
{% else %}
|
|
||||||
|
|
||||||
{{sls}}_state_not_allowed:
|
|
||||||
test.fail_without_changes:
|
|
||||||
- name: {{sls}}_state_not_allowed
|
|
||||||
|
|
||||||
{% endif %}
|
|
||||||
0
salt/suricata/rules/PLACEHOLDER
Normal file
0
salt/suricata/rules/PLACEHOLDER
Normal file
@@ -74,7 +74,6 @@ base:
|
|||||||
- sensoroni
|
- sensoroni
|
||||||
- telegraf
|
- telegraf
|
||||||
- firewall
|
- firewall
|
||||||
- suricata.manager
|
|
||||||
- healthcheck
|
- healthcheck
|
||||||
- elasticsearch
|
- elasticsearch
|
||||||
- elastic-fleet-package-registry
|
- elastic-fleet-package-registry
|
||||||
@@ -105,7 +104,6 @@ base:
|
|||||||
- firewall
|
- firewall
|
||||||
- sensoroni
|
- sensoroni
|
||||||
- telegraf
|
- telegraf
|
||||||
- suricata.manager
|
|
||||||
- healthcheck
|
- healthcheck
|
||||||
- elasticsearch
|
- elasticsearch
|
||||||
- logstash
|
- logstash
|
||||||
@@ -140,7 +138,6 @@ base:
|
|||||||
- sensoroni
|
- sensoroni
|
||||||
- telegraf
|
- telegraf
|
||||||
- backup.config_backup
|
- backup.config_backup
|
||||||
- suricata.manager
|
|
||||||
- elasticsearch
|
- elasticsearch
|
||||||
- logstash
|
- logstash
|
||||||
- redis
|
- redis
|
||||||
@@ -174,7 +171,6 @@ base:
|
|||||||
- sensoroni
|
- sensoroni
|
||||||
- telegraf
|
- telegraf
|
||||||
- backup.config_backup
|
- backup.config_backup
|
||||||
- suricata.manager
|
|
||||||
- elasticsearch
|
- elasticsearch
|
||||||
- logstash
|
- logstash
|
||||||
- redis
|
- redis
|
||||||
@@ -204,7 +200,6 @@ base:
|
|||||||
- sensoroni
|
- sensoroni
|
||||||
- telegraf
|
- telegraf
|
||||||
- firewall
|
- firewall
|
||||||
- suricata.manager
|
|
||||||
- pcap
|
- pcap
|
||||||
- elasticsearch
|
- elasticsearch
|
||||||
- elastic-fleet-package-registry
|
- elastic-fleet-package-registry
|
||||||
|
|||||||
Reference in New Issue
Block a user