mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 17:22:49 +01:00
Merge pull request #12984 from Security-Onion-Solutions/jertel/testcy
tests will retry on any rule import failure
This commit is contained in:
@@ -201,6 +201,7 @@ if [[ $EXCLUDE_KNOWN_ERRORS == 'Y' ]]; then
|
|||||||
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|Unknown column" # Elastalert errors from running EQL queries
|
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|Unknown column" # Elastalert errors from running EQL queries
|
||||||
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|parsing_exception" # Elastalert EQL parsing issue. Temp.
|
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|parsing_exception" # Elastalert EQL parsing issue. Temp.
|
||||||
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|context deadline exceeded"
|
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|context deadline exceeded"
|
||||||
|
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|Error running query:" # Specific issues with detection rules
|
||||||
fi
|
fi
|
||||||
|
|
||||||
RESULT=0
|
RESULT=0
|
||||||
|
|||||||
@@ -1259,12 +1259,27 @@ soc_pillar() {
|
|||||||
" srvKey: '$SOCSRVKEY'"\
|
" srvKey: '$SOCSRVKEY'"\
|
||||||
" modules:"\
|
" modules:"\
|
||||||
" elastalertengine:"\
|
" elastalertengine:"\
|
||||||
" allowRegex: '$ELASTALERT_ALLOW_REGEX'"\
|
" allowRegex: '$ELASTALERT_ALLOW_REGEX'" > "$soc_pillar_file"
|
||||||
|
if [[ -n "$ELASTALERT_FAIL_ERROR_COUNT" ]]; then
|
||||||
|
printf '%s\n'\
|
||||||
|
" failAfterConsecutiveErrorCount: $ELASTALERT_FAIL_ERROR_COUNT" >> "$soc_pillar_file"
|
||||||
|
fi
|
||||||
|
|
||||||
|
printf '%s\n'\
|
||||||
" strelkaengine:"\
|
" strelkaengine:"\
|
||||||
" allowRegex: '$STRELKA_ALLOW_REGEX'"\
|
" allowRegex: '$STRELKA_ALLOW_REGEX'" >> "$soc_pillar_file"
|
||||||
|
if [[ -n "$STRELKA_FAIL_ERROR_COUNT" ]]; then
|
||||||
|
printf '%s\n'\
|
||||||
|
" failAfterConsecutiveErrorCount: $STRELKA_FAIL_ERROR_COUNT" >> "$soc_pillar_file"
|
||||||
|
fi
|
||||||
|
|
||||||
|
printf '%s\n'\
|
||||||
" suricataengine:"\
|
" suricataengine:"\
|
||||||
" allowRegex: '$SURICATA_ALLOW_REGEX'"\
|
" allowRegex: '$SURICATA_ALLOW_REGEX'" >> "$soc_pillar_file"
|
||||||
"" > "$soc_pillar_file"
|
if [[ -n "$SURICATA_FAIL_ERROR_COUNT" ]]; then
|
||||||
|
printf '%s\n'\
|
||||||
|
" failAfterConsecutiveErrorCount: $SURICATA_FAIL_ERROR_COUNT" >> "$soc_pillar_file"
|
||||||
|
fi
|
||||||
|
|
||||||
if [[ $telemetry -ne 0 ]]; then
|
if [[ $telemetry -ne 0 ]]; then
|
||||||
echo " telemetryEnabled: false" >> $soc_pillar_file
|
echo " telemetryEnabled: false" >> $soc_pillar_file
|
||||||
|
|||||||
@@ -246,8 +246,11 @@ if [ -n "$test_profile" ]; then
|
|||||||
WEBPASSWD1=0n10nus3r
|
WEBPASSWD1=0n10nus3r
|
||||||
WEBPASSWD2=0n10nus3r
|
WEBPASSWD2=0n10nus3r
|
||||||
STRELKA_ALLOW_REGEX="EquationGroup_Toolset_Apr17__ELV_.*"
|
STRELKA_ALLOW_REGEX="EquationGroup_Toolset_Apr17__ELV_.*"
|
||||||
|
STRELKA_FAIL_ERROR_COUNT=1
|
||||||
ELASTALERT_ALLOW_REGEX="Security Onion"
|
ELASTALERT_ALLOW_REGEX="Security Onion"
|
||||||
|
ELASTALERT_FAIL_ERROR_COUNT=1
|
||||||
SURICATA_ALLOW_REGEX="(200033\\d|2100538|2102466)"
|
SURICATA_ALLOW_REGEX="(200033\\d|2100538|2102466)"
|
||||||
|
SURICATA_FAIL_ERROR_COUNT=1
|
||||||
|
|
||||||
update_sudoers_for_testing
|
update_sudoers_for_testing
|
||||||
fi
|
fi
|
||||||
|
|||||||
Reference in New Issue
Block a user