mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 09:12:45 +01:00
Merge branch 'dev' of https://github.com/Security-Onion-Solutions/securityonion-saltstack into dev
This commit is contained in:
71
README.md
71
README.md
@@ -1,37 +1,39 @@
|
|||||||
## Hybrid Hunter Alpha 1.1.4 - Feature Parity Release
|
## Hybrid Hunter Beta 1.2.1 - Beta 1
|
||||||
|
|
||||||
### Changes:
|
### Changes:
|
||||||
|
|
||||||
- Added new in-house auth method [Security Onion Auth](https://github.com/Security-Onion-Solutions/securityonion-auth).
|
- Full support for Ubuntu 18.04. 16.04 is no longer supported for Hybrid Hunter.
|
||||||
- Web user creation is done via the browser now instead of so-user-add.
|
- Introduction of the Security Onion Console. Once logged in you are directly taken to the SOC.
|
||||||
- New Logstash pipeline setup. Now uses multiple pipelines.
|
- New authentication using Kratos.
|
||||||
- New Master + Search node type and well as a Heavy Node type in the install.
|
- During install you must specify how you would like to access the SOC ui. This is for strict cookie security.
|
||||||
- Change all nodes to point to the docker registry on the Master. This cuts down on the calls to dockerhub.
|
- Ability to list and delete web users from the SOC ui.
|
||||||
- Zeek 3.0.1
|
- The soremote account is now used to add nodes to the grid vs using socore.
|
||||||
- Elastic 6.8.6
|
- Community ID support for Zeek, osquery, and Suricata. You can now tie host events to connection logs!
|
||||||
- New SO Start | Stop | Restart scripts for all components (eg. `so-playbook-restart`).
|
- Elastic 7.6.1 with ECS support.
|
||||||
- BPF support for Suricata (NIDS), Steno (PCAP) & Zeek ([Docs](https://github.com/Security-Onion-Solutions/securityonion-saltstack/wiki/BPF)).
|
- New set of Kibana dashboards that align with ECS.
|
||||||
- Updated Domain Stats & Frequency Server containers to Python3 & created new Salt states for them.
|
- Eval mode no longer uses Logstash for parsing (Filebeat -> ES Ingest)
|
||||||
- Added so-status script which gives an easy to read look at container status.
|
- Ingest node parsing for osquery-shipped logs (osquery, WEL, Sysmon).
|
||||||
- Manage threshold.conf for Suricata using the thresholding pillar.
|
- Fleet standalone mode with improved Web UI & API access control.
|
||||||
- The ISO now includes all the docker containers for faster install speeds.
|
- Improved Fleet integration support.
|
||||||
- You now set the password for the onion account during the iso install. This account is temporary and will be removed after so-setup.
|
- Playbook now has full Windows Sigma community ruleset builtin.
|
||||||
- Updated Helix parsers for better compatibility.
|
- Automatic Sigma community rule updates.
|
||||||
- Updated telegraf docker to include curl and jq.
|
- Playbook stability enhancements.
|
||||||
- CVE-2020-0601 Zeek Detection Script.
|
- Zeek health check. Zeek will now auto restart if a worker crashes.
|
||||||
- ISO Install now prompts you to create a password for the onion user during imaging. This account gets disabled during setup.
|
- zeekctl is now managed by salt.
|
||||||
|
- Grafana dashboard improvements and cleanup.
|
||||||
|
- Moved logstash configs to pillars.
|
||||||
|
- Salt logs moved to /opt/so/log/salt.
|
||||||
|
- Strelka integrated for file-oriented detection/analysis at scale
|
||||||
|
|
||||||
## Version 1.1.4 ISO Download
|
### Known issues:
|
||||||
|
|
||||||
[HH1.1.4-46.ISO](https://download.securityonion.net/file/Hybrid-Hunter/HH-1.1.4-46.iso)
|
- Updating users via the SOC ui is known to fail. To change a user, delete the user and re-add them.
|
||||||
|
- Due to the move to ECS, the current Playbook plays may not alert correctly at this time.
|
||||||
MD5: ACF6B4586E8EE7D1938FB2C028DFC987
|
- The osquery MacOS package does not install correctly.
|
||||||
SHA1: C29B4F3748604196357EC7262BF071177E696D86
|
|
||||||
SHA256: 4D977B650196441294D53372F248B50C23E933B8FBEC5CC5BAB569DFEF31E7E8
|
|
||||||
|
|
||||||
### Warnings and Disclaimers
|
### Warnings and Disclaimers
|
||||||
|
|
||||||
- This ALPHA release is BLEEDING EDGE and TOTALLY UNSUPPORTED!
|
- This BETA release is BLEEDING EDGE and TOTALLY UNSUPPORTED!
|
||||||
- If this breaks your system, you get to keep both pieces!
|
- If this breaks your system, you get to keep both pieces!
|
||||||
- This script is a work in progress and is in constant flux.
|
- This script is a work in progress and is in constant flux.
|
||||||
- This script is intended to build a quick prototype proof of concept so you can see what our new platform might look like. This configuration will change drastically over time leading up to the final release.
|
- This script is intended to build a quick prototype proof of concept so you can see what our new platform might look like. This configuration will change drastically over time leading up to the final release.
|
||||||
@@ -44,33 +46,36 @@ SHA256: 4D977B650196441294D53372F248B50C23E933B8FBEC5CC5BAB569DFEF31E7E8
|
|||||||
|
|
||||||
Evaluation Mode:
|
Evaluation Mode:
|
||||||
|
|
||||||
- ISO or a Single VM running Ubuntu 16.04 or CentOS 7
|
- ISO or a Single VM running Ubuntu 18.04 or CentOS 7
|
||||||
- Minimum 12GB of RAM
|
- Minimum 12GB of RAM
|
||||||
- Minimum 4 CPU cores
|
- Minimum 4 CPU cores
|
||||||
- Minimum 2 NICs
|
- Minimum 2 NICs
|
||||||
|
|
||||||
Distributed:
|
Distributed:
|
||||||
|
|
||||||
- 3 VMs running the ISO or Ubuntu 16.04 or CentOS 7 (You can mix and match)
|
- 3 VMs running the ISO or Ubuntu 18.04 or CentOS 7 (You can mix and match)
|
||||||
- Minimum 8GB of RAM per VM
|
- Minimum 8GB of RAM per VM
|
||||||
- Minimum 4 CPU cores per VM
|
- Minimum 4 CPU cores per VM
|
||||||
- Minimum 2 NICs for forward nodes
|
- Minimum 2 NICs for forward nodes
|
||||||
|
|
||||||
### Prerequisites for Network Based Install
|
### Installation
|
||||||
|
|
||||||
Install git if using a Centos 7 Minimal install:
|
For most users, we recommend installing using [our ISO image](https://github.com/Security-Onion-Solutions/securityonion-saltstack/wiki/ISO).
|
||||||
|
|
||||||
|
If instead you would like to try a manual installation (not using our ISO), you can build from CentOS 7 or Ubuntu 18.04.
|
||||||
|
|
||||||
|
If using CentOS 7 Minimal, you will need to install git:
|
||||||
|
|
||||||
```sudo yum -y install git```
|
```sudo yum -y install git```
|
||||||
|
|
||||||
### Installation
|
Once you have git, then do the following:
|
||||||
|
|
||||||
Once you resolve those requirements or are using Ubuntu 16.04 do the following:
|
|
||||||
|
|
||||||
```
|
```
|
||||||
git clone https://github.com/Security-Onion-Solutions/securityonion-saltstack
|
git clone https://github.com/Security-Onion-Solutions/securityonion-saltstack
|
||||||
cd securityonion-saltstack
|
cd securityonion-saltstack
|
||||||
sudo bash so-setup-network
|
sudo bash so-setup-network
|
||||||
```
|
```
|
||||||
|
|
||||||
Follow the prompts and reboot if asked to do so.
|
Follow the prompts and reboot if asked to do so.
|
||||||
|
|
||||||
Then proceed to the [Hybrid Hunter Quick Start Guide](https://github.com/Security-Onion-Solutions/securityonion-saltstack/wiki/Hybrid-Hunter-Quick-Start-Guide).
|
Then proceed to the [Hybrid Hunter Quick Start Guide](https://github.com/Security-Onion-Solutions/securityonion-saltstack/wiki/Hybrid-Hunter-Quick-Start-Guide).
|
||||||
|
|||||||
@@ -34,8 +34,6 @@ base:
|
|||||||
- data.*
|
- data.*
|
||||||
- brologs
|
- brologs
|
||||||
- secrets
|
- secrets
|
||||||
- logstash
|
|
||||||
- logstash.eval
|
|
||||||
- healthcheck.eval
|
- healthcheck.eval
|
||||||
- minions.{{ grains.id }}
|
- minions.{{ grains.id }}
|
||||||
|
|
||||||
|
|||||||
@@ -19,5 +19,4 @@ health:
|
|||||||
enabled: true
|
enabled: true
|
||||||
interval: 10s
|
interval: 10s
|
||||||
threshold: 3
|
threshold: 3
|
||||||
proxy:
|
|
||||||
remoteurl: https://registry-1.docker.io
|
|
||||||
|
|||||||
@@ -603,9 +603,9 @@ docker_seed_registry() {
|
|||||||
"so-soctopus:$VERSION" \
|
"so-soctopus:$VERSION" \
|
||||||
"so-steno:$VERSION" \
|
"so-steno:$VERSION" \
|
||||||
"so-strelka-frontend:$VERSION" \
|
"so-strelka-frontend:$VERSION" \
|
||||||
"so-strelka-manager:$VERSION" \
|
"so-strelka-manager:$VERSION" \
|
||||||
"so-strelka-backend:$VERSION" \
|
"so-strelka-backend:$VERSION" \
|
||||||
"so-strelka-filestream:$VERSION" \
|
"so-strelka-filestream:$VERSION" \
|
||||||
"so-suricata:$VERSION" \
|
"so-suricata:$VERSION" \
|
||||||
"so-telegraf:$VERSION" \
|
"so-telegraf:$VERSION" \
|
||||||
"so-thehive:$VERSION" \
|
"so-thehive:$VERSION" \
|
||||||
@@ -645,6 +645,8 @@ docker_seed_registry() {
|
|||||||
done
|
done
|
||||||
else
|
else
|
||||||
# We already have the goods son
|
# We already have the goods son
|
||||||
|
cd /nsm/docker-registry/docker
|
||||||
|
tar xvf so-dockers-$VERSION.tar
|
||||||
rm /nsm/docker-registry/docker/so-dockers-$VERSION.tar
|
rm /nsm/docker-registry/docker/so-dockers-$VERSION.tar
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@@ -1323,6 +1325,7 @@ EOF
|
|||||||
echo "deb http://repo.saltstack.com/apt/ubuntu/$UVER/amd64/2019.2 $OSVER main" > /etc/apt/sources.list.d/saltstack.list
|
echo "deb http://repo.saltstack.com/apt/ubuntu/$UVER/amd64/2019.2 $OSVER main" > /etc/apt/sources.list.d/saltstack.list
|
||||||
fi
|
fi
|
||||||
echo "deb https://packages.wazuh.com/3.x/apt/ stable main" | tee /etc/apt/sources.list.d/wazuh.list
|
echo "deb https://packages.wazuh.com/3.x/apt/ stable main" | tee /etc/apt/sources.list.d/wazuh.list
|
||||||
|
|
||||||
# Initialize the new repos
|
# Initialize the new repos
|
||||||
apt-get update >> $SETUPLOG 2>&1
|
apt-get update >> $SETUPLOG 2>&1
|
||||||
if [ $OSVER != "xenial" ]; then
|
if [ $OSVER != "xenial" ]; then
|
||||||
|
|||||||
Reference in New Issue
Block a user