mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 17:22:49 +01:00
Merge branch 'dev' of https://github.com/Security-Onion-Solutions/securityonion into dev
This commit is contained in:
@@ -1,6 +1,7 @@
|
|||||||
{% set ISAIRGAP = salt['pillar.get']('global:airgap', 'False') %}
|
{% set ISAIRGAP = salt['pillar.get']('global:airgap', 'False') %}
|
||||||
{% import_yaml 'firewall/portgroups.yaml' as portgroups %}
|
{% import_yaml 'firewall/portgroups.yaml' as portgroups %}
|
||||||
{% set portgroups = portgroups.firewall.aliases.ports %}
|
{% set portgroups = portgroups.firewall.aliases.ports %}
|
||||||
|
{% set TRUE_CLUSTER = salt['pillar.get']('elasticsearch:true_cluster', False) %}
|
||||||
|
|
||||||
role:
|
role:
|
||||||
eval:
|
eval:
|
||||||
@@ -42,6 +43,11 @@ role:
|
|||||||
- {{ portgroups.redis }}
|
- {{ portgroups.redis }}
|
||||||
- {{ portgroups.minio }}
|
- {{ portgroups.minio }}
|
||||||
- {{ portgroups.elasticsearch_node }}
|
- {{ portgroups.elasticsearch_node }}
|
||||||
|
heavy_node:
|
||||||
|
portgroups:
|
||||||
|
- {{ portgroups.redis }}
|
||||||
|
- {{ portgroups.minio }}
|
||||||
|
- {{ portgroups.elasticsearch_node }}
|
||||||
self:
|
self:
|
||||||
portgroups:
|
portgroups:
|
||||||
- {{ portgroups.syslog}}
|
- {{ portgroups.syslog}}
|
||||||
@@ -135,6 +141,12 @@ role:
|
|||||||
- {{ portgroups.minio }}
|
- {{ portgroups.minio }}
|
||||||
- {{ portgroups.elasticsearch_node }}
|
- {{ portgroups.elasticsearch_node }}
|
||||||
- {{ portgroups.beats_5644 }}
|
- {{ portgroups.beats_5644 }}
|
||||||
|
heavy_node:
|
||||||
|
portgroups:
|
||||||
|
- {{ portgroups.redis }}
|
||||||
|
- {{ portgroups.minio }}
|
||||||
|
- {{ portgroups.elasticsearch_node }}
|
||||||
|
- {{ portgroups.beats_5644 }}
|
||||||
self:
|
self:
|
||||||
portgroups:
|
portgroups:
|
||||||
- {{ portgroups.syslog}}
|
- {{ portgroups.syslog}}
|
||||||
@@ -219,6 +231,11 @@ role:
|
|||||||
- {{ portgroups.redis }}
|
- {{ portgroups.redis }}
|
||||||
- {{ portgroups.minio }}
|
- {{ portgroups.minio }}
|
||||||
- {{ portgroups.elasticsearch_node }}
|
- {{ portgroups.elasticsearch_node }}
|
||||||
|
heavy_node:
|
||||||
|
portgroups:
|
||||||
|
- {{ portgroups.redis }}
|
||||||
|
- {{ portgroups.minio }}
|
||||||
|
- {{ portgroups.elasticsearch_node }}
|
||||||
self:
|
self:
|
||||||
portgroups:
|
portgroups:
|
||||||
- {{ portgroups.syslog}}
|
- {{ portgroups.syslog}}
|
||||||
@@ -303,6 +320,11 @@ role:
|
|||||||
- {{ portgroups.redis }}
|
- {{ portgroups.redis }}
|
||||||
- {{ portgroups.minio }}
|
- {{ portgroups.minio }}
|
||||||
- {{ portgroups.elasticsearch_node }}
|
- {{ portgroups.elasticsearch_node }}
|
||||||
|
heavy_node:
|
||||||
|
portgroups:
|
||||||
|
- {{ portgroups.redis }}
|
||||||
|
- {{ portgroups.minio }}
|
||||||
|
- {{ portgroups.elasticsearch_node }}
|
||||||
self:
|
self:
|
||||||
portgroups:
|
portgroups:
|
||||||
- {{ portgroups.syslog}}
|
- {{ portgroups.syslog}}
|
||||||
@@ -425,6 +447,11 @@ role:
|
|||||||
elasticsearch_rest:
|
elasticsearch_rest:
|
||||||
portgroups:
|
portgroups:
|
||||||
- {{ portgroups.elasticsearch_rest }}
|
- {{ portgroups.elasticsearch_rest }}
|
||||||
|
{% if TRUE_CLUSTER %}
|
||||||
|
search_node:
|
||||||
|
portgroups:
|
||||||
|
- {{ portgroups.elasticsearch_node }}
|
||||||
|
{% endif %}
|
||||||
self:
|
self:
|
||||||
portgroups:
|
portgroups:
|
||||||
- {{ portgroups.syslog}}
|
- {{ portgroups.syslog}}
|
||||||
|
|||||||
@@ -1,6 +1,29 @@
|
|||||||
[
|
[
|
||||||
{ "name": "actionHunt", "description": "actionHuntHelp", "icon": "fa-crosshairs", "link": "/#/hunt?q=\"{value}\" | groupby event.module event.dataset", "target": "" },
|
{ "name": "actionHunt", "description": "actionHuntHelp", "icon": "fa-crosshairs", "target": "",
|
||||||
{ "name": "actionPcap", "description": "actionPcapHelp", "icon": "fa-stream", "link": "/joblookup?esid={eventId}", "target": "" },
|
"links": [
|
||||||
{ "name": "actionGoogle", "description": "actionGoogleHelp", "icon": "fab fa-google", "link": "https://www.google.com/search?q={value}", "target": "_blank" },
|
"/#/hunt?q=\"{value}\" | groupby event.module event.dataset"
|
||||||
{ "name": "actionVirusTotal", "description": "actionVirusTotalHelp", "icon": "fa-external-link-alt", "link": "https://www.virustotal.com/gui/search/{value}", "target": "_blank" }
|
]},
|
||||||
|
{ "name": "actionCorrelate", "description": "actionCorrelateHelp", "icon": "fab fa-searchengin", "target": "",
|
||||||
|
"links": [
|
||||||
|
"/#/hunt?q=\"{:log.id.fuid}\" OR \"{:log.id.uid}\" OR \"{:network.community_id}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:log.id.fuid}\" OR \"{:log.id.uid}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:log.id.fuid}\" OR \"{:network.community_id}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:log.id.uid}\" OR \"{:network.community_id}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:log.id.fuid}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:log.id.uid}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:network.community_id}\" | groupby event.module event.dataset"
|
||||||
|
]},
|
||||||
|
{ "name": "actionPcap", "description": "actionPcapHelp", "icon": "fa-stream", "target": "",
|
||||||
|
"links": [
|
||||||
|
"/joblookup?esid={:soc_id}",
|
||||||
|
"/joblookup?ncid={:network.community_id}"
|
||||||
|
]},
|
||||||
|
{ "name": "actionGoogle", "description": "actionGoogleHelp", "icon": "fab fa-google", "target": "_blank",
|
||||||
|
"links": [
|
||||||
|
"https://www.google.com/search?q={value}"
|
||||||
|
]},
|
||||||
|
{ "name": "actionVirusTotal", "description": "actionVirusTotalHelp", "icon": "fa-external-link-alt", "target": "_blank",
|
||||||
|
"links": [
|
||||||
|
"https://www.virustotal.com/gui/search/{value}"
|
||||||
|
]}
|
||||||
]
|
]
|
||||||
@@ -1,6 +1,29 @@
|
|||||||
[
|
[
|
||||||
{ "name": "actionHunt", "description": "actionHuntHelp", "icon": "fa-crosshairs", "link": "/#/hunt?q=\"{value}\" | groupby event.module event.dataset", "target": "" },
|
{ "name": "actionHunt", "description": "actionHuntHelp", "icon": "fa-crosshairs", "target": "",
|
||||||
{ "name": "actionPcap", "description": "actionPcapHelp", "icon": "fa-stream", "link": "/joblookup?esid={eventId}", "target": "" },
|
"links": [
|
||||||
{ "name": "actionGoogle", "description": "actionGoogleHelp", "icon": "fab fa-google", "link": "https://www.google.com/search?q={value}", "target": "_blank" },
|
"/#/hunt?q=\"{value}\" | groupby event.module event.dataset"
|
||||||
{ "name": "actionVirusTotal", "description": "actionVirusTotalHelp", "icon": "fa-external-link-alt", "link": "https://www.virustotal.com/gui/search/{value}", "target": "_blank" }
|
]},
|
||||||
|
{ "name": "actionCorrelate", "description": "actionCorrelateHelp", "icon": "fab fa-searchengin", "target": "",
|
||||||
|
"links": [
|
||||||
|
"/#/hunt?q=\"{:log.id.fuid}\" OR \"{:log.id.uid}\" OR \"{:network.community_id}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:log.id.fuid}\" OR \"{:log.id.uid}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:log.id.fuid}\" OR \"{:network.community_id}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:log.id.uid}\" OR \"{:network.community_id}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:log.id.fuid}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:log.id.uid}\" | groupby event.module event.dataset",
|
||||||
|
"/#/hunt?q=\"{:network.community_id}\" | groupby event.module event.dataset"
|
||||||
|
]},
|
||||||
|
{ "name": "actionPcap", "description": "actionPcapHelp", "icon": "fa-stream", "target": "",
|
||||||
|
"links": [
|
||||||
|
"/joblookup?esid={:soc_id}",
|
||||||
|
"/joblookup?ncid={:network.community_id}"
|
||||||
|
]},
|
||||||
|
{ "name": "actionGoogle", "description": "actionGoogleHelp", "icon": "fab fa-google", "target": "_blank",
|
||||||
|
"links": [
|
||||||
|
"https://www.google.com/search?q={value}"
|
||||||
|
]},
|
||||||
|
{ "name": "actionVirusTotal", "description": "actionVirusTotalHelp", "icon": "fa-external-link-alt", "target": "_blank",
|
||||||
|
"links": [
|
||||||
|
"https://www.virustotal.com/gui/search/{value}"
|
||||||
|
]}
|
||||||
]
|
]
|
||||||
@@ -215,14 +215,6 @@ scanners:
|
|||||||
priority: 5
|
priority: 5
|
||||||
options:
|
options:
|
||||||
tmp_directory: '/dev/shm/'
|
tmp_directory: '/dev/shm/'
|
||||||
'ScanMmbot':
|
|
||||||
- positive:
|
|
||||||
flavors:
|
|
||||||
- 'vb_file'
|
|
||||||
- 'vbscript'
|
|
||||||
priority: 5
|
|
||||||
options:
|
|
||||||
server: 'strelka_mmrpc_1:33907'
|
|
||||||
'ScanOcr':
|
'ScanOcr':
|
||||||
- positive:
|
- positive:
|
||||||
flavors:
|
flavors:
|
||||||
|
|||||||
@@ -1883,7 +1883,7 @@ set_initial_firewall_policy() {
|
|||||||
;;
|
;;
|
||||||
'HEAVYNODE')
|
'HEAVYNODE')
|
||||||
ssh -i /root/.ssh/so.key soremote@"$MSRV" sudo $default_salt_dir/salt/common/tools/sbin/so-firewall includehost sensor "$MAINIP"
|
ssh -i /root/.ssh/so.key soremote@"$MSRV" sudo $default_salt_dir/salt/common/tools/sbin/so-firewall includehost sensor "$MAINIP"
|
||||||
ssh -i /root/.ssh/so.key soremote@"$MSRV" sudo $default_salt_dir/salt/common/tools/sbin/so-firewall --apply includehost search_node "$MAINIP"
|
ssh -i /root/.ssh/so.key soremote@"$MSRV" sudo $default_salt_dir/salt/common/tools/sbin/so-firewall --apply includehost heavy_node "$MAINIP"
|
||||||
ssh -i /root/.ssh/so.key soremote@"$MSRV" sudo $default_salt_dir/pillar/data/addtotab.sh sensorstab "$MINION_ID" "$MAINIP" "$num_cpu_cores" "$random_uid" "$MNIC" "$filesystem_root" "$filesystem_nsm" "$INTERFACE"
|
ssh -i /root/.ssh/so.key soremote@"$MSRV" sudo $default_salt_dir/pillar/data/addtotab.sh sensorstab "$MINION_ID" "$MAINIP" "$num_cpu_cores" "$random_uid" "$MNIC" "$filesystem_root" "$filesystem_nsm" "$INTERFACE"
|
||||||
ssh -i /root/.ssh/so.key soremote@"$MSRV" sudo $default_salt_dir/pillar/data/addtotab.sh nodestab "$MINION_ID" "$MAINIP" "$num_cpu_cores" "$random_uid" "$MNIC" "$filesystem_root" "$filesystem_nsm"
|
ssh -i /root/.ssh/so.key soremote@"$MSRV" sudo $default_salt_dir/pillar/data/addtotab.sh nodestab "$MINION_ID" "$MAINIP" "$num_cpu_cores" "$random_uid" "$MNIC" "$filesystem_root" "$filesystem_nsm"
|
||||||
;;
|
;;
|
||||||
|
|||||||
Reference in New Issue
Block a user