transition pcap

This commit is contained in:
m0duspwnens
2024-03-11 12:20:28 -04:00
parent a55e04e64a
commit 907cf9f992
5 changed files with 16 additions and 13 deletions

View File

@@ -1,7 +1,10 @@
{% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %} {% from 'vars/globals.map.jinja' import GLOBALS %}
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %} {% if GLOBALS.pcap_engine == "TRANSITION" %}
{% import 'bpf/macros.jinja' as MACROS %} {% set PCAPBPF = "ip and host 255.255.255.1 and port 1" %}
{% else %}
{{ MACROS.remove_comments(BPFMERGED, 'pcap') }} {% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %}
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %}
{% set PCAPBPF = BPFMERGED.pcap %} {% import 'bpf/macros.jinja' as MACROS %}
{{ MACROS.remove_comments(BPFMERGED, 'pcap') }}
{% set PCAPBPF = BPFMERGED.pcap %}
{% endif %}

View File

@@ -15,9 +15,9 @@ global:
regexFailureMessage: You must enter either ZEEK or SURICATA. regexFailureMessage: You must enter either ZEEK or SURICATA.
global: True global: True
pcapengine: pcapengine:
description: Which engine to use for generating pcap. Options are STENO and SURICATA. description: Which engine to use for generating pcap. Options are STENO, SURICATA or TRANSITION.
regex: ^(STENO|SURICATA)$ regex: ^(STENO|SURICATA|TRANSITION)$
regexFailureMessage: You must enter either STENO or SURICATA. regexFailureMessage: You must enter either STENO, SURICATA or TRANSITION.
global: True global: True
ids: ids:
description: Which IDS engine to use. Currently only Suricata is supported. description: Which IDS engine to use. Currently only Suricata is supported.

View File

@@ -9,7 +9,7 @@
{% set surimeta_filestore_index = [] %} {% set surimeta_filestore_index = [] %}
{# before we change outputs back to list, enable pcap-log if suricata is the pcapengine #} {# before we change outputs back to list, enable pcap-log if suricata is the pcapengine #}
{% if GLOBALS.pcap_engine == "SURICATA" %} {% if GLOBALS.pcap_engine in ["SURICATA", "TRANSITION"] %}
{% do SURICATAMERGED.config.outputs['pcap-log'].update({'enabled': 'yes'}) %} {% do SURICATAMERGED.config.outputs['pcap-log'].update({'enabled': 'yes'}) %}
{# move the items in suricata.pcap into suricata.config.outputs.pcap-log. these items were placed under suricata.config for ease of access in SOC #} {# move the items in suricata.pcap into suricata.config.outputs.pcap-log. these items were placed under suricata.config for ease of access in SOC #}
{% do SURICATAMERGED.config.outputs['pcap-log'].update({'compression': SURICATAMERGED.pcap.compression}) %} {% do SURICATAMERGED.config.outputs['pcap-log'].update({'compression': SURICATAMERGED.pcap.compression}) %}

View File

@@ -11,7 +11,7 @@ suripcapdir:
- mode: 775 - mode: 775
- makedirs: True - makedirs: True
{% if GLOBALS.pcap_engine == "SURICATA" %} {% if GLOBALS.pcap_engine in ["SURICATA", "TRANSITION"] %}
{# there should only be 1 interface in af-packet so we can just reference the first list item #} {# there should only be 1 interface in af-packet so we can just reference the first list item #}
{% for i in range(1, SURICATAMERGED.config['af-packet'][0].threads + 1) %} {% for i in range(1, SURICATAMERGED.config['af-packet'][0].threads + 1) %}

View File

@@ -5,7 +5,7 @@
# https://securityonion.net/license; you may not use this file except in compliance with the # https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0. # Elastic License 2.0.
{%- if GLOBALS.pcap_engine == "SURICATA" %} {%- if GLOBALS.pcap_engine in ["SURICATA", "TRANSITION"] %}
PCAPLOC=/host/nsm/suripcap PCAPLOC=/host/nsm/suripcap
{%- else %} {%- else %}
PCAPLOC=/host/nsm/pcap PCAPLOC=/host/nsm/pcap