Compare commits

...

1488 Commits

Author SHA1 Message Date
Mike Reeves
b2a2dc5aea Merge pull request #10037 from Security-Onion-Solutions/2.4/dev
2.4.0 Beta 1
2023-03-28 16:08:01 -04:00
Josh Patterson
72078848d3 Merge pull request #10041 from Security-Onion-Solutions/firsthighstatecronfix
add path to first highstate cron
2023-03-28 14:38:19 -04:00
Josh Patterson
af4acd5597 add path to first highstate cron 2023-03-28 14:37:28 -04:00
weslambert
de902ebd02 Merge pull request #10024 from Security-Onion-Solutions/esspace
Manage disk-based index deletion via so-curator-cluster-delete
2023-03-28 12:25:19 -04:00
Wes
6099a04e41 Change how the size is determined, in case there a decimal value is provided 2023-03-28 16:04:54 +00:00
Jason Ertel
44c696a495 Merge pull request #10036 from Security-Onion-Solutions/commonprofile
ensure scripts are run as root, have copyright, and path is correct
2023-03-28 11:59:10 -04:00
Josh Patterson
16606c1aaa Merge pull request #10038 from Security-Onion-Solutions/addbangs
change #/bin/bash to #!/bin/bash
2023-03-28 11:58:09 -04:00
Jason Ertel
4efe22efb3 Update so-elasticsearch-cluster-settings 2023-03-28 11:57:41 -04:00
Jason Ertel
591129b98c Update so-elasticsearch-pipelines 2023-03-28 11:57:22 -04:00
Jason Ertel
60d770411a Update so-elasticsearch-roles-load 2023-03-28 11:57:07 -04:00
Jason Ertel
5f49a120de Update so-elasticsearch-templates-load 2023-03-28 11:56:51 -04:00
m0duspwnens
64446f585c change #/bin/bash to #!/bin/bash 2023-03-28 11:55:47 -04:00
Wes
ed8f944638 Fix typo in GLOBALS reference 2023-03-28 15:55:33 +00:00
Mike Reeves
74840264d7 Update so-elasticsearch-cluster-space-used 2023-03-28 11:49:05 -04:00
Jason Ertel
492fe1fc85 Ensure /usr/sbin is in path 2023-03-28 11:48:31 -04:00
Mike Reeves
e77e645a36 Update so-elasticsearch-cluster-space-total 2023-03-28 11:45:57 -04:00
Mike Reeves
636505ef98 Add license and common 2023-03-28 11:18:56 -04:00
weslambert
942182e826 Remove additional copyright in so-curator-cluster-delete-delete 2023-03-28 11:00:14 -04:00
weslambert
303fec6302 Fix verbiage for so-curator-cluster-delete-delete 2023-03-28 10:59:39 -04:00
weslambert
9411f5ca79 Fix closed index function and check 2023-03-28 10:54:21 -04:00
Wes
d494381e9d Update verbiage for so-curator-cluster-delete 2023-03-28 14:18:49 +00:00
Wes
e1bda5acfd Update verbiage for so-curator-cluster-delete-delete 2023-03-28 14:18:27 +00:00
Wes
138b312705 Fix script name 2023-03-28 13:52:59 +00:00
Wes
82efce0b31 Ensure so-curator-cluster-delete is run to manage so-curator-cluster-delete-delete 2023-03-28 13:23:23 +00:00
Wes
1ab253b8c3 Use explicit path to so-elasticsearch-query 2023-03-28 13:18:14 +00:00
Wes
a1394b9102 Use explicit path to so-elasticsearch-query 2023-03-28 13:18:00 +00:00
Wes
b3b030958c Use explicit path to so-elasticsearch-query 2023-03-28 13:17:23 +00:00
Josh Patterson
ebdd74a420 Merge pull request #10032 from Security-Onion-Solutions/evalelasticfleet
add elasticfleet state to top for eval node
2023-03-28 09:03:16 -04:00
m0duspwnens
d886265211 add elasticfleet state to top for eval node 2023-03-28 09:01:41 -04:00
Wes
adbc9df222 Changes for LOG_SIZE_LIMIT 2023-03-28 12:54:32 +00:00
Doug Burks
1ad65f6326 Merge pull request #10030 from Security-Onion-Solutions/dougburks-patch-1
Update soc_idh.yaml
2023-03-28 08:54:12 -04:00
Doug Burks
46d9e0b804 Update soc_idh.yaml 2023-03-28 08:53:05 -04:00
Wes
f854d92cab Remove the cluster space configuration script reference from the Elasticsearch state 2023-03-28 12:27:45 +00:00
Wes
22e8e3be28 Remove the cluster space configuration script 2023-03-28 12:27:12 +00:00
Wes
4352825ceb Calculate log size limit every time so-curator-cluster-delete-delete runs 2023-03-28 12:25:49 +00:00
Wes
e2290d8a8e Remove unncessary Salt logic for Elasticsearch 2023-03-28 12:19:36 +00:00
Wes
c68235c169 Fix Curator script name 2023-03-28 02:27:27 +00:00
Wes
a38aa903ac Configure cluster space settings 2023-03-28 01:36:52 +00:00
Wes
fc0b9fa47c Remove Curator closed index deletion scripts 2023-03-28 00:57:45 +00:00
Wes
32e92d10ad Add new cluster space management scripts 2023-03-28 00:55:56 +00:00
Wes
7030f35561 Update Curator state 2023-03-28 00:54:36 +00:00
Wes
934b8894e2 Update Curator scripts 2023-03-28 00:54:04 +00:00
Jason Ertel
100d9f14e9 Merge pull request #10023 from Security-Onion-Solutions/kilo
fix role
2023-03-27 19:31:06 -04:00
Jason Ertel
34cd823cd4 fix role 2023-03-27 18:59:32 -04:00
Josh Patterson
a86da24bde Merge pull request #10021 from Security-Onion-Solutions/bpffix
remove default zeek bpf
2023-03-27 17:01:36 -04:00
m0duspwnens
fcb6f3eaf1 remove default zeek bpf 2023-03-27 16:59:27 -04:00
Mike Reeves
6cc510d51b Merge pull request #10020 from Security-Onion-Solutions/kilo
add minion CIDR to search also
2023-03-27 16:56:56 -04:00
Jason Ertel
2b1576249a add minion CIDR to search also 2023-03-27 16:44:21 -04:00
Josh Brower
2dd48c6f0b Merge pull request #10019 from Security-Onion-Solutions/2.4/idhfix
Add annotations
2023-03-27 15:19:15 -04:00
Josh Brower
d22a5b2eb3 Add annotations 2023-03-27 15:16:47 -04:00
Josh Patterson
8b626d2c67 Merge pull request #10018 from Security-Onion-Solutions/managersaltrestart
Managersaltrestart
2023-03-27 13:37:04 -04:00
m0duspwnens
0d87a5d739 import sensor vars in import vars 2023-03-27 12:51:29 -04:00
Mike Reeves
6c3c5730c5 Add curator settings 2023-03-27 12:33:34 -04:00
Mike Reeves
2cb6f0f1e6 Add curator settings 2023-03-27 12:30:39 -04:00
m0duspwnens
42cc419e00 restart salt master and minion after manager install completes 2023-03-27 11:30:03 -04:00
Mike Reeves
7752529b42 Merge pull request #10015 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update so-common
2023-03-27 10:51:26 -04:00
Mike Reeves
7f395c4c1e Update so-common 2023-03-27 10:49:36 -04:00
Mike Reeves
94ae7469e3 Merge pull request #10012 from Security-Onion-Solutions/pkg
Modify reposync useragent
2023-03-27 10:21:35 -04:00
Mike Reeves
2a288c7e4a Update so-functions 2023-03-27 10:18:57 -04:00
Mike Reeves
1602551295 Modify reposync useragent 2023-03-27 10:14:32 -04:00
Mike Reeves
72d01b13ed Modify reposync useragent 2023-03-27 10:12:13 -04:00
Mike Reeves
f34bb40025 Merge pull request #10011 from Security-Onion-Solutions/pkg
Add unzip
2023-03-27 09:28:05 -04:00
Mike Reeves
8246293983 Add unzip 2023-03-27 08:40:36 -04:00
Josh Patterson
80043d154a Merge pull request #10004 from Security-Onion-Solutions/guifixes
Guifixes
2023-03-24 16:58:19 -04:00
m0duspwnens
aa66a6471a Merge remote-tracking branch 'origin/2.4/dev' into guifixes 2023-03-24 16:16:32 -04:00
m0duspwnens
1a6d887b5f idh setup changes 2023-03-24 16:16:22 -04:00
Mike Reeves
3fed3b3f3e Merge pull request #10003 from Security-Onion-Solutions/mirrorz
Add additional mirror
2023-03-24 15:13:03 -04:00
Mike Reeves
cb2fdae368 Switch Repos 2023-03-24 14:40:59 -04:00
Josh Brower
d9e1a54479 Merge pull request #10001 from Security-Onion-Solutions/2.4/playbookfix
Fix errors
2023-03-24 14:31:43 -04:00
Mike Reeves
afe4d75d91 Switch Repos 2023-03-24 14:13:48 -04:00
Doug Burks
7ced7488c7 Merge pull request #10000 from Security-Onion-Solutions/dougburks-patch-1
Add four new GeoIP dashboards
2023-03-24 14:11:58 -04:00
Doug Burks
5be5466efe fix GeoIP queries 2023-03-24 14:03:12 -04:00
Mike Reeves
b2c2e1574f Switch Repos 2023-03-24 14:02:13 -04:00
Doug Burks
a9dc7a14cb fix GeoIP queries 2023-03-24 13:56:51 -04:00
m0duspwnens
627b243cac Merge remote-tracking branch 'origin/2.4/dev' into guifixes 2023-03-24 13:52:38 -04:00
m0duspwnens
462b2b23b9 rework idh for web ui 2023-03-24 13:52:21 -04:00
Doug Burks
aa9d44ab09 Add four new GeoIP dashboards 2023-03-24 13:51:13 -04:00
Jason Ertel
890e1897af Merge pull request #9999 from Security-Onion-Solutions/kilo
prune system volumes during upgrade
2023-03-24 13:30:57 -04:00
Jason Ertel
0be57e686e prune system volumes during upgrade 2023-03-24 13:22:21 -04:00
Josh Brower
16bc63233f Fix errors 2023-03-24 09:33:12 -04:00
Mike Reeves
e38b0313c7 Merge pull request #9994 from Security-Onion-Solutions/hotones
Switch up elastic roles
2023-03-23 16:59:49 -04:00
Josh Brower
c6f6f306a7 Merge pull request #9993 from Security-Onion-Solutions/2.4/ingestsoclogs
SOC Logs & Hunt Query
2023-03-23 16:25:32 -04:00
Josh Brower
bad905f54c SOC Logs & Hunt Query 2023-03-23 16:22:59 -04:00
Mike Reeves
90159f4bcd Switch up elastic roles 2023-03-23 15:09:40 -04:00
weslambert
0f66645a89 Merge pull request #9990 from Security-Onion-Solutions/fix/elasticsearch_node_attrs_remove
Remove node attrs configuration since node roles will be used
2023-03-23 13:48:00 -04:00
weslambert
0a9a064648 Remove node attrs configuration since node roles will be used 2023-03-23 13:45:51 -04:00
weslambert
d6bc20a2b8 Merge pull request #9986 from Security-Onion-Solutions/fix/elastic_agent_template_changes
Elastic Agent template changes
2023-03-23 13:07:22 -04:00
Mike Reeves
886bcda38c Merge pull request #9988 from Security-Onion-Solutions/repofun
Add Repo Sync
2023-03-23 12:49:06 -04:00
Mike Reeves
3b671efa8e Fix cache location 2023-03-23 12:47:48 -04:00
Mike Reeves
0a096712cb Fix cache location 2023-03-23 12:39:31 -04:00
Mike Reeves
c977f38a58 Change repo conf permissions 2023-03-23 11:56:40 -04:00
Mike Reeves
8f4076ccd6 Change repo conf permissions 2023-03-23 11:46:32 -04:00
Mike Reeves
3756c93518 Change repo download script location 2023-03-23 11:05:48 -04:00
Mike Reeves
b68cf85392 Change repo download script location 2023-03-23 11:04:26 -04:00
Mike Reeves
e52087b742 Saltify it up 2023-03-23 10:54:01 -04:00
Mike Reeves
02aa8662f7 Saltify it up 2023-03-23 10:52:05 -04:00
Mike Reeves
f8d5acd37d Saltify it up 2023-03-23 10:43:47 -04:00
Mike Reeves
b3ea4194dd Only allow reposync to run on managers 2023-03-23 09:49:02 -04:00
Wes
84360aa9bf Set replicas for Osquery manager indices to 0 2023-03-22 21:47:49 +00:00
Josh Patterson
c64987e756 Merge pull request #9985 from Security-Onion-Solutions/m0duspwnens-patch-1
ensure highstate schedule added sooner in highstate
2023-03-22 17:24:23 -04:00
Josh Patterson
c8e93f0388 Update top.sls 2023-03-22 17:22:21 -04:00
Wes
3fba27a0d4 Ensure component template files are in the correct directory 2023-03-22 20:45:33 +00:00
Wes
28f5dcd43b Add managed generic Elastic Agent log component templates 2023-03-22 19:57:46 +00:00
Wes
eaaa028999 Update Elastic Agent template settings 2023-03-22 19:52:13 +00:00
Mike Reeves
f8e59478f4 Merge pull request #9984 from Security-Onion-Solutions/TOoSmOotH-patch-8
Update config.map.jinja
2023-03-22 15:49:35 -04:00
Mike Reeves
d2bc5e4af2 Update config.map.jinja 2023-03-22 15:45:51 -04:00
Josh Patterson
4f995c1c7e Merge pull request #9983 from Security-Onion-Solutions/2.4/zeekbpf
add sensor vars to eval
2023-03-22 12:23:07 -04:00
weslambert
bc2a84c631 Merge pull request #9982 from Security-Onion-Solutions/fix/elastic_integration_and_pipeline_strelka
Change data stream name and 'event.dataset' value for Strelka events
2023-03-22 11:08:58 -04:00
weslambert
6d87620c6a Explicitly set 'event.dataset' as 'file' 2023-03-22 11:04:18 -04:00
weslambert
68380d7ecb Change data_stream.dataset from 'file' to 'strelka' 2023-03-22 11:02:38 -04:00
m0duspwnens
5a2ef21ce4 add sensor vars to eval 2023-03-22 09:55:30 -04:00
m0duspwnens
fdaf8e8c68 idh changes for web ui 2023-03-22 09:38:40 -04:00
Mike Reeves
00b1ecb7d9 Merge pull request #9979 from Security-Onion-Solutions/esfun
Elastic Fixes
2023-03-22 08:51:24 -04:00
Mike Reeves
007e2baf41 Change Elastic Logic 2023-03-21 17:46:52 -04:00
Mike Reeves
5fc297b8c1 Change Elastic Logic 2023-03-21 16:52:08 -04:00
Mike Reeves
07f303205a Merge pull request #9977 from Security-Onion-Solutions/TOoSmOotH-patch-7
Update so-minion
2023-03-21 15:50:52 -04:00
Mike Reeves
aeb6d47637 Update so-minion 2023-03-21 13:39:24 -04:00
Josh Brower
a247d1cc50 Merge pull request #9978 from Security-Onion-Solutions/2.4/updateEA
2.4/update ea
2023-03-21 13:27:59 -04:00
Mike Reeves
30fc74ac09 Update so-minion 2023-03-21 12:53:35 -04:00
Josh Brower
cd6bf0fe78 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/updateEA 2023-03-21 12:48:30 -04:00
Josh Brower
d87060b56e Update Elastic Agent to 8.6.2 2023-03-21 12:48:02 -04:00
Mike Reeves
1526a7de11 Rework IDH phase 1 2023-03-21 11:26:30 -04:00
Mike Reeves
d89310e479 Rework IDH phase 1 2023-03-21 11:25:06 -04:00
Mike Reeves
bd17121834 Rework IDH phase 1 2023-03-21 11:23:31 -04:00
Jason Ertel
ca363053e6 Merge pull request #9975 from Security-Onion-Solutions/kilo
catch errors and exit with proper exit code
2023-03-21 10:51:36 -04:00
Josh Patterson
a0eea10a1d Merge pull request #9974 from Security-Onion-Solutions/saltlogging
use saltversion grain to determine installed version
2023-03-21 10:46:57 -04:00
Jason Ertel
efd5f7b8a2 catch errors and exit with proper exit code 2023-03-21 10:44:21 -04:00
m0duspwnens
05b1a445d3 use saltversion grain to determine installed version 2023-03-21 10:12:10 -04:00
Josh Patterson
cdb714f331 Merge pull request #9973 from Security-Onion-Solutions/2.4/zeekbpf
2.4/zeekbpf
2023-03-21 09:54:39 -04:00
Mike Reeves
9ca9b9d4da Rework IDH phase 1 2023-03-21 09:53:06 -04:00
Mike Reeves
a3d38dd2e7 Rework IDH phase 1 2023-03-21 09:49:28 -04:00
Mike Reeves
41554e8311 Merge pull request #9969 from Security-Onion-Solutions/guifixes
Add several annotations
2023-03-21 08:51:53 -04:00
Mike Reeves
444988f287 Adjust annotations 2023-03-21 08:48:02 -04:00
m0duspwnens
02c79463e1 Merge remote-tracking branch 'origin/2.4/dev' into 2.4/zeekbpf 2023-03-21 08:45:07 -04:00
Mike Reeves
64904406b6 Adjust annotations 2023-03-21 08:41:48 -04:00
Josh Brower
1f23e4aafe Merge pull request #9966 from Security-Onion-Solutions/2.4/kratosfix
Fix Kratos parsing
2023-03-21 07:12:49 -04:00
Mike Reeves
bc7261acfe Adjust patch annotations 2023-03-20 20:16:43 -04:00
Mike Reeves
01d470a426 Adjust patch annotations 2023-03-20 20:13:29 -04:00
Mike Reeves
f810f9cbf0 Adjust patch annotations 2023-03-20 20:12:26 -04:00
Mike Reeves
507142cde4 Adjust patch annotations 2023-03-20 20:02:23 -04:00
Jason Ertel
331d4833b1 Merge pull request #9967 from Security-Onion-Solutions/kilo
Kilo
2023-03-20 18:27:35 -04:00
Jason Ertel
2e6fa1eff0 Merge branch '2.4/dev' into kilo 2023-03-20 18:15:00 -04:00
m0duspwnens
0fff3a5a11 suricata bpf 2023-03-20 17:31:56 -04:00
Mike Reeves
eb61b0c98f Adjust sensor annotations 2023-03-20 17:10:36 -04:00
m0duspwnens
252afa8499 bpf for pcap 2023-03-20 17:10:34 -04:00
Mike Reeves
a6e34ae1d7 Adjust manager annotations 2023-03-20 16:54:57 -04:00
Josh Brower
df036206a8 Fix Kratos parsing 2023-03-20 16:53:25 -04:00
Mike Reeves
27fdad4a25 Adjust manager annotations 2023-03-20 16:52:22 -04:00
Mike Reeves
0bb2fd7d45 Adjust manager annotations 2023-03-20 16:50:18 -04:00
Mike Reeves
bb3480cd76 Adjust host annotations 2023-03-20 16:20:22 -04:00
Mike Reeves
22c3a4d398 Adjust elasticsearch annotations 2023-03-20 16:08:26 -04:00
Mike Reeves
8c2a43c073 Adjust docker annotations 2023-03-20 15:51:48 -04:00
Mike Reeves
fe13f90394 Adjust docker annotations 2023-03-20 15:33:22 -04:00
m0duspwnens
903ad530fe move zeek bpf from zeek pillar to bpf pillar 2023-03-20 15:28:33 -04:00
Mike Reeves
9a43cd71e0 Adjust docker annotations 2023-03-20 15:19:54 -04:00
Jason Ertel
c43194665e add sudo prefix 2023-03-20 12:57:13 -04:00
Mike Reeves
a22af96403 Merge branch '2.4/dev' of https://github.com/Security-Onion-Solutions/securityonion into guifixes 2023-03-20 12:26:48 -04:00
Josh Brower
03393a95d9 Merge pull request #9963 from Security-Onion-Solutions/2.4/fixidh
Remove hosts file edit
2023-03-20 12:15:12 -04:00
Josh Brower
325e767587 Remove hosts file edit 2023-03-20 12:11:45 -04:00
Jason Ertel
1771a3123f Merge pull request #9961 from Security-Onion-Solutions/kilo
Backup old setup logs earlier in setup
2023-03-20 11:24:08 -04:00
Mike Reeves
823dde2856 Adjust repo sync 2023-03-20 11:17:15 -04:00
Jason Ertel
6b8b7df3c2 Move old setup/error logs before any logs are written on a subsequent setup invocation 2023-03-20 11:04:28 -04:00
Jason Ertel
da1c501cf7 Move old setup/error logs before any logs are written on a subsequent setup invocation 2023-03-20 11:01:07 -04:00
Jason Ertel
604db7534c Merge branch '2.4/dev' into kilo 2023-03-20 10:46:37 -04:00
Jason Ertel
43712182a0 update help for clarity 2023-03-20 10:46:23 -04:00
Mike Reeves
9487dbffdf Merge pull request #9960 from Security-Onion-Solutions/guifixes
Add gui components for fleet
2023-03-20 09:54:50 -04:00
Mike Reeves
cdbbc8e64c Add gui components for fleet 2023-03-20 09:46:57 -04:00
Mike Reeves
1a70a6eb30 Merge pull request #9949 from Security-Onion-Solutions/guifixes
Change the salt dir for elastic fleet
2023-03-20 08:59:09 -04:00
Mike Reeves
da3fa31439 Merge branch '2.4/dev' into guifixes 2023-03-20 08:57:42 -04:00
Josh Brower
542eb19cdc Merge pull request #9954 from Security-Onion-Solutions/2.4/whiptailsummary
Dist vs. non-Dist Install Summary
2023-03-20 08:37:10 -04:00
Josh Brower
c89bae7319 Wording tweaks 2023-03-20 07:51:44 -04:00
Josh Brower
3073b752bd Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/whiptailsummary 2023-03-20 07:48:40 -04:00
Josh Brower
d23c09a2ee Merge pull request #9956 from Security-Onion-Solutions/2.4/kibanaui
Setup Kibana default space
2023-03-20 07:39:43 -04:00
Josh Brower
b59466139a Merge pull request #9959 from Security-Onion-Solutions/2.4/curlquiet
2.4/wgetquiet
2023-03-20 07:37:30 -04:00
Josh Brower
cbf7b66729 Set wget to be quiet 2023-03-20 07:29:10 -04:00
Josh Brower
5b9ff06a85 Setup Kibana default space 2023-03-19 09:17:12 -04:00
Josh Brower
792732a8cf summary changes 2023-03-18 13:09:46 -04:00
Josh Brower
536391bb3b rename elasticfleet state 2023-03-17 16:14:29 -04:00
Mike Reeves
caa08e9cf0 Change the salt dir for elastic fleet 2023-03-17 11:44:56 -04:00
Mike Reeves
460f84d80f Merge pull request #9950 from Security-Onion-Solutions/TOoSmOotH-patch-6
Update so-functions
2023-03-17 11:36:31 -04:00
Mike Reeves
d7b0ed93c9 Update so-functions 2023-03-17 11:27:29 -04:00
Mike Reeves
4944365341 Change the salt dir for elastic fleet 2023-03-17 11:02:02 -04:00
Doug Burks
8a9bc8aefa Merge pull request #9948 from Security-Onion-Solutions/dougburks-patch-1
Fix typo and improve formatting in so-whiptail
2023-03-17 10:25:48 -04:00
Doug Burks
c5b16494d7 Fix typo and improve formatting in so-whiptail 2023-03-17 10:21:21 -04:00
Josh Brower
b9c4e647c4 Merge pull request #9946 from Security-Onion-Solutions/2.4/whiptailchanges
Add next steps to install summary
2023-03-17 10:16:05 -04:00
Josh Brower
8f5daa785b Add next steps to install summary 2023-03-17 10:14:44 -04:00
Josh Patterson
9893fce105 Merge pull request #9945 from Security-Onion-Solutions/2.4/strelka
2.4/strelka
2023-03-17 09:55:45 -04:00
m0duspwnens
91da3fd797 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/strelka 2023-03-17 08:39:10 -04:00
m0duspwnens
924d598a8a add filecheck_runas 2023-03-17 08:38:56 -04:00
Mike Reeves
c7099280da Merge pull request #9944 from Security-Onion-Solutions/guifixes
Change yum to dnf
2023-03-17 08:28:26 -04:00
Mike Reeves
bd1eb9c7df Change yum to dnf 2023-03-16 18:05:38 -04:00
m0duspwnens
dd4461daf4 remove other filecheck map import 2023-03-16 17:50:19 -04:00
m0duspwnens
a9b8877268 remove filecheckdefaults from strelka init 2023-03-16 17:15:52 -04:00
m0duspwnens
7950f692a8 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/strelka 2023-03-16 16:41:24 -04:00
m0duspwnens
0dfbbfcf8e fix spacing on filecheck config 2023-03-16 16:37:38 -04:00
m0duspwnens
2056ce37c6 strelka ui things 2023-03-16 16:32:41 -04:00
Mike Reeves
e88d459ef4 Merge pull request #9942 from Security-Onion-Solutions/guifixes
Fix Repo Issues and Change curl to check for Salt ports
2023-03-16 15:59:47 -04:00
Mike Reeves
d12367ed75 Force package update before syncing the repo 2023-03-16 15:54:00 -04:00
Mike Reeves
ef4882198a Force package update before syncing the repo 2023-03-16 15:48:57 -04:00
Mike Reeves
2b65c1498d Force package update before syncing the repo 2023-03-16 15:45:04 -04:00
Mike Reeves
957467eae0 Force package update before syncing the repo 2023-03-16 15:41:29 -04:00
Mike Reeves
849e82e39f Force package updates and curl check fix 2023-03-16 15:36:43 -04:00
Mike Reeves
6e3194486c Force package update before syncing the repo 2023-03-16 13:50:22 -04:00
Josh Brower
336cf3ccf8 Merge pull request #9940 from Security-Onion-Solutions/2.4/idh-logs
Add IDH log ingest
2023-03-16 13:16:17 -04:00
Josh Brower
d78128dbf4 Formatting 2023-03-16 13:11:12 -04:00
Josh Brower
a96473554d Add IDH log ingest 2023-03-16 12:56:04 -04:00
Mike Reeves
53e93f01c6 Force an update after repo is configured 2023-03-16 09:49:57 -04:00
Mike Reeves
d0955b3e91 Merge pull request #9937 from Security-Onion-Solutions/guifixes
Re-Work Backups
2023-03-16 09:42:07 -04:00
Jason Ertel
ad2616900c Merge pull request #9939 from Security-Onion-Solutions/kilo
automated testing support; removal of nonexistent ScanRuby strelka scanner
2023-03-16 09:30:05 -04:00
Jason Ertel
3ab3e4712c remove kilo for merge 2023-03-16 09:16:28 -04:00
Jason Ertel
49df376bcc Remove non-existant Ruby scanner 2023-03-15 19:24:03 -04:00
Mike Reeves
f288d0dd61 Re-Work Backups 2023-03-15 17:58:15 -04:00
Mike Reeves
3156b1ed0c Re-Work Backups 2023-03-15 17:53:14 -04:00
Mike Reeves
c355e6eaf0 Merge pull request #9935 from Security-Onion-Solutions/guifixes
Fix IDS tools
2023-03-15 17:27:07 -04:00
Mike Reeves
d4f5209e39 Re-Work IDSTOOLS 2023-03-15 17:22:54 -04:00
Mike Reeves
afcd1155bf Re-Work IDSTOOLS 2023-03-15 17:19:33 -04:00
Mike Reeves
28dc490775 Re-Work IDSTOOLS 2023-03-15 16:58:52 -04:00
Mike Reeves
02d013c0cc Re-Work IDSTOOLS 2023-03-15 16:47:43 -04:00
Mike Reeves
b56baf900c Re-Work IDSTOOLS 2023-03-15 16:44:53 -04:00
Jason Ertel
49a9affe2a Merge branch '2.4/dev' into kilo 2023-03-15 16:39:26 -04:00
Mike Reeves
0d30c14561 Re-Work IDSTOOLS 2023-03-15 16:33:33 -04:00
Jason Ertel
fbefe229c1 add test support to so-minion 2023-03-15 15:27:26 -04:00
Mike Reeves
a36a6d5659 Strelka UI components 2023-03-15 10:40:16 -04:00
Josh Patterson
b809b22566 Merge pull request #9931 from Security-Onion-Solutions/2.4/strelka
2.4/strelka
2023-03-14 16:16:53 -04:00
m0duspwnens
f9b8c78d74 move repos to rules dir 2023-03-14 14:43:13 -04:00
m0duspwnens
7cf4e6b03b add rules dir, change so-yar-update to save to local/salt/strelka/rules 2023-03-14 13:59:31 -04:00
m0duspwnens
5f7256c826 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/strelka 2023-03-14 13:26:15 -04:00
m0duspwnens
b38d5df684 set default mime_db 2023-03-14 13:25:51 -04:00
weslambert
4e0390963b Merge pull request #9928 from Security-Onion-Solutions/fix/curator_elastic_agent_filebeat_actions_close
Fix Curator Action Files
2023-03-14 10:58:53 -04:00
weslambert
8eba3426be Remove extra dash for 'logs-elastic_agent-metricbeat-default' key 2023-03-14 10:51:50 -04:00
weslambert
7c39938e14 Change 'elastic_agent.filebeat' to 'elastic_agent-filebeat' 2023-03-14 10:48:50 -04:00
weslambert
123275ca35 Merge pull request #9926 from Security-Onion-Solutions/fix/curator_additional_elastic_agent_indices
Add more Elastic Agent Curator actions
2023-03-14 09:59:47 -04:00
Wes
766e6a7974 Add 'logs-windows-sysmon_operational-delete' for Windows Sysmon operational indices 2023-03-14 13:51:49 +00:00
Wes
f0d4c16b2b Add more Elastic Agent index keys for Curator 2023-03-14 13:49:13 +00:00
Wes
412e5c0402 Add more Elastic Agent Curator action files 2023-03-14 13:46:08 +00:00
Josh Brower
fbac23c28d Merge pull request #9925 from Security-Onion-Solutions/2.4/fiedfix
Removes Suricata host.* fields
2023-03-14 07:38:05 -04:00
weslambert
ebc943fcab Merge pull request #9924 from Security-Onion-Solutions/fix/curator_action_file_system_syslog_delete
Fix Elastic Agent system syslog default delete file configuration
2023-03-13 17:28:38 -04:00
weslambert
486de12ca5 Delete logs-system-auth-syslog-close.yaml 2023-03-13 17:27:52 -04:00
weslambert
f4112b30c0 Fix index reference for system auth default 2023-03-13 17:27:06 -04:00
weslambert
bab40de58d Fix system auth default key value 2023-03-13 17:26:05 -04:00
weslambert
785f100132 Fix system auth default key value 2023-03-13 17:25:33 -04:00
weslambert
8ade7b85fc Fix system syslog default key value 2023-03-13 17:24:40 -04:00
weslambert
c2701f1835 Fix system syslog default key value 2023-03-13 17:24:12 -04:00
weslambert
d5bb223235 Fix system syslog delete file configuration 2023-03-13 17:10:52 -04:00
weslambert
bb711a2a15 Merge pull request #9923 from Security-Onion-Solutions/fix/curator_default_elastic_agent_logs
Add Elastic Agent default indices to be managed by Curator
2023-03-13 16:59:40 -04:00
Wes
efc5832499 Add Elastic Agent default log action files 2023-03-13 20:54:38 +00:00
Wes
8d395dc465 Add Elastic Agent default data stream backing indices for management by Curator 2023-03-13 20:54:13 +00:00
m0duspwnens
9d4e1cc149 jinja for strelka 2023-03-13 16:48:21 -04:00
Josh Brower
f7be4ba31c Remove host field from NIDS logs 2023-03-13 14:07:17 -04:00
Josh Brower
126add7ddd Merge pull request #9922 from Security-Onion-Solutions/2.4/fieldfixes
auto-apply firewall rules
2023-03-13 12:00:28 -04:00
Josh Brower
b3a2680847 auto-apply firewall rules 2023-03-13 11:41:36 -04:00
weslambert
1774d16d9a Merge pull request #9921 from Security-Onion-Solutions/fix/elasticsearch_template_data_stream_configuration
Move data stream configuration outside of ILM policy definition
2023-03-13 09:29:42 -04:00
Wes
e105e56fac Move data stream configuration outside of ILM policy definition 2023-03-13 13:27:02 +00:00
m0duspwnens
58343e39fa 2.4 strelka 2023-03-10 17:32:14 -05:00
weslambert
a844819261 Merge pull request #9919 from Security-Onion-Solutions/fix/elasticsearch_ilm_policy_elastic_agent_default
Add index lifecycle management policy definitions for default Elastic Agent data streams
2023-03-10 17:02:27 -05:00
weslambert
16d9478196 Add index lifecycle management policy definitions for default Elastic Agent data streams 2023-03-10 16:54:47 -05:00
Jason Ertel
5804409fcf Merge branch '2.4/dev' into kilo 2023-03-10 15:13:57 -05:00
Jason Ertel
5301f442f9 distributed testing 2023-03-09 19:31:04 -05:00
Jason Ertel
ed8a23cedc distributed testing 2023-03-09 17:01:38 -05:00
Jason Ertel
0ee870a199 cleanup unnecessary code 2023-03-09 15:40:51 -05:00
Jason Ertel
23b344bf14 distributed testing 2023-03-09 15:04:42 -05:00
Josh Brower
2fe8668f1b Merge pull request #9891 from Security-Onion-Solutions/2.4/huntqueries
Initial updates for 2.4 fieldnames
2023-03-09 14:37:50 -05:00
Josh Brower
73abf8dbfd Generic host dashboard 2023-03-09 14:32:52 -05:00
Jason Ertel
894a20b3ad autodetect manager IP 2023-03-09 12:58:51 -05:00
Jason Ertel
ecc300197d autodetect manager IP 2023-03-09 12:11:27 -05:00
Jason Ertel
b1f201ca87 autodetect manager IP 2023-03-09 12:05:42 -05:00
Jason Ertel
a4409b2979 autodetect manager IP 2023-03-09 11:47:35 -05:00
Jason Ertel
b6ce9f489a autodetect manager IP 2023-03-09 11:02:01 -05:00
Josh Brower
1493806040 Change host dashboard titles 2023-03-08 17:03:02 -05:00
Josh Brower
a5c89bfaa1 update sysmon dashboards 2023-03-08 16:49:34 -05:00
Jason Ertel
b9e3024521 fix user sync issue after setup finishes 2023-03-08 15:10:31 -05:00
Josh Patterson
d75866caec Merge pull request #9912 from Security-Onion-Solutions/2.4/heavynode
2.4/heavynode
2023-03-08 14:11:43 -05:00
m0duspwnens
61879a8d33 merge with dev and resolve conflicts in salt/top 2023-03-08 09:04:09 -05:00
Jason Ertel
0f456e6ecd Merge branch '2.4/dev' into kilo 2023-03-07 16:18:30 -05:00
weslambert
7ad34ee8d7 Merge pull request #9910 from Security-Onion-Solutions/fix/curator_so_curator_cluster_warm
Remove reference to 'so-curator-cluster-warm' script since it has been removed
2023-03-07 16:18:05 -05:00
weslambert
2d7ce41a70 Remove reference to 'so-curator-cluster-warm' script since it has been removed 2023-03-07 16:16:55 -05:00
weslambert
a738c7c36d Merge pull request #9907 from Security-Onion-Solutions/fix/curator_global_delete_action
Add the new Security Onion index format to the global delete action file for Curator
2023-03-07 16:03:28 -05:00
Josh Brower
6f82cf3807 Merge pull request #9906 from Security-Onion-Solutions/2.4/setupfix
Remove EA install from manager highstates
2023-03-07 15:33:34 -05:00
Jason Ertel
a3e05d782e Merge branch '2.4/dev' into kilo 2023-03-07 15:26:01 -05:00
weslambert
e93c052d34 Add the new index format to the global delete action file for Curator 2023-03-07 15:21:53 -05:00
Josh Brower
fd2312a2ac Remove EA install from manager highstates 2023-03-07 15:13:35 -05:00
Jason Ertel
4f3cb2eb3d Clarify playbook load time log message 2023-03-07 14:42:10 -05:00
weslambert
8c79d7e40d Merge pull request #9905 from Security-Onion-Solutions/fix/curator_new_action_files
Add New Curator Action Files
2023-03-07 12:44:25 -05:00
Wes
f50639d2d2 Fix import and syslog actions 2023-03-07 17:41:48 +00:00
Wes
26c9813276 Add keys for new Curator actions to defaults.yaml 2023-03-07 17:29:07 +00:00
Wes
88d98af243 Add new Curator action files to Curator close and delete scripts 2023-03-07 17:21:03 +00:00
Wes
d636546871 Add new Curator action files 2023-03-07 17:15:25 +00:00
weslambert
f0b7a75ae8 Merge pull request #9904 from Security-Onion-Solutions/fix/curator_clean_up_action_files
Clean Up Old Curator Action Files
2023-03-07 11:52:28 -05:00
Wes
073054b447 Remove 'so-curator-cluster-warm' and remove unncessary Curator default values 2023-03-07 16:21:55 +00:00
Wes
df94e830c5 Remove unnecessary Curator action files 2023-03-07 16:15:41 +00:00
m0duspwnens
2767d4bee3 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/heavynode 2023-03-07 10:36:12 -05:00
m0duspwnens
14aa9ac5c9 apply elastic-fleet state to managers 2023-03-07 10:35:49 -05:00
weslambert
deda0fa279 Merge pull request #9902 from Security-Onion-Solutions/fix/so-status_curator
Add Curator to so-status Output
2023-03-07 10:17:14 -05:00
Wes
086b3bf528 Add Curator to so-status output 2023-03-07 15:14:53 +00:00
Jason Ertel
66bb829505 if -i, either success or failure must be present 2023-03-06 22:18:08 -05:00
Jason Ertel
b641dc37b6 use high error code to flag an unrecoverable error 2023-03-06 18:56:04 -05:00
Jason Ertel
f77068f73f setup and so-verify/so-status interop 2023-03-06 18:37:37 -05:00
m0duspwnens
691080de88 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/heavynode 2023-03-06 16:04:14 -05:00
Jason Ertel
1998c66073 Merge branch '2.4/dev' into kilo 2023-03-06 15:59:21 -05:00
Jason Ertel
1945659369 Error is too common, found even in dashboard titles 2023-03-06 15:59:08 -05:00
Josh Brower
3eb839bd21 Merge pull request #9897 from Security-Onion-Solutions/2.4/dev-fleet
Fleet - setup ES output for all Managers
2023-03-06 15:54:03 -05:00
Josh Brower
a6db2d4502 Fleet - setup ES output for all Managers 2023-03-06 15:50:09 -05:00
m0duspwnens
0f9803120e Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/heavynode 2023-03-06 13:55:09 -05:00
m0duspwnens
b6d55bedc8 make influxdb token accessible to all nodes 2023-03-06 13:50:17 -05:00
Josh Brower
8fae826a3a Merge pull request #9890 from Security-Onion-Solutions/2.4/fixosquerylink
Fixup osquery SO Hunt link
2023-03-06 07:25:00 -05:00
Doug Burks
1e31966d8d Merge pull request #9893 from Security-Onion-Solutions/2.4/enable-zeek-vlan
2.4/enable zeek vlan
2023-03-06 07:20:45 -05:00
Doug Burks
a2bda07820 add VLAN dashboard 2023-03-05 15:24:11 -05:00
Doug Burks
19ab2a5a46 rename suricata vlan field to network.vlan.id 2023-03-05 05:57:52 -05:00
Josh Brower
9db6df0f14 Initial updates for 2.4 fieldnames 2023-03-04 15:19:19 -05:00
Josh Brower
f0db5cf657 Fixup osquery SO Hunt link 2023-03-04 11:50:01 -05:00
Doug Burks
4a2e75dd8c fix formatting 2023-03-03 17:16:45 -05:00
Jason Ertel
a45763f9a2 Merge branch '2.4/dev' into kilo 2023-03-03 16:01:06 -05:00
Doug Burks
e24296d536 add SOC Dashboards groupby for Zeek conn vlan field 2023-03-03 15:23:43 -05:00
Doug Burks
9940a36722 update Elasticsearch ingest for Zeek conn vlan field 2023-03-03 15:22:43 -05:00
Doug Burks
adb925b4d6 enable zeek vlan script 2023-03-03 12:48:42 -05:00
m0duspwnens
e3f9b5297a Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/heavynode 2023-03-02 16:58:56 -05:00
Jason Ertel
fd2068be88 Switch back to kilo images 2023-03-02 15:23:53 -05:00
m0duspwnens
e6167dc34a heavynode changes 2023-03-02 15:09:59 -05:00
Mike Reeves
26dbaeb7ac Merge pull request #9882 from Security-Onion-Solutions/TOoSmOotH-patch-5
Update so-functions
2023-03-02 11:36:24 -05:00
Mike Reeves
2b0ea8eb8b Update so-functions 2023-03-02 11:34:36 -05:00
weslambert
196a6ce984 Merge pull request #9881 from Security-Onion-Solutions/fix/curator_configuration_update_8.0.x
Update Curator configuration to align with requirements for Curator 8.0.x
2023-03-02 08:51:14 -05:00
weslambert
06d1f0f913 Update Curator configuration to align with requirements for Curator 8.0.x 2023-03-02 08:46:52 -05:00
Mike Reeves
204f423051 Merge pull request #9878 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update init.sls
2023-03-01 21:37:17 -05:00
Mike Reeves
af284b9aae Update init.sls 2023-03-01 16:38:48 -05:00
Jason Ertel
41bc1cd36f Merge branch '2.4/dev' into kilo 2023-03-01 09:53:59 -05:00
Mike Reeves
2091806f1f Merge pull request #9864 from Security-Onion-Solutions/setuperrors
Fix some errors in setup
2023-03-01 09:48:20 -05:00
m0duspwnens
704365c6eb only stdout redirect 2023-03-01 09:44:48 -05:00
m0duspwnens
a79c380e2b use cmd.run to populate metrics_link 2023-03-01 09:18:58 -05:00
weslambert
a5c2c0fb20 Merge pull request #9866 from Security-Onion-Solutions/fix/soc_elasticsearch_ilm_annotations_verbiage
Various adjustments to descriptions
2023-02-28 16:46:53 -05:00
m0duspwnens
c4e1ec781e apply influxdb before highstate in setup 2023-02-28 16:31:35 -05:00
Jason Ertel
13182fcda2 refactor automated testing inputs due to streamlined setup process 2023-02-28 16:31:17 -05:00
weslambert
134caa7f58 Various adjustments to descriptions 2023-02-28 16:31:16 -05:00
m0duspwnens
8772dcaa10 ensure influxdb is running 2023-02-28 15:57:54 -05:00
Jason Ertel
205e344034 dynamically choose test NICs in alphanumeric sort order 2023-02-28 15:40:08 -05:00
Jason Ertel
749c299ed2 refactor automated testing inputs due to streamlined setup process 2023-02-28 15:34:09 -05:00
Josh Brower
96467f0bd8 Merge pull request #9865 from Security-Onion-Solutions/2.4/fleet-esoutput
Move Output to ES
2023-02-28 15:20:46 -05:00
m0duspwnens
052e0dea2e create and manage metrics_link in a file for soc 2023-02-28 14:47:44 -05:00
Jason Ertel
d456f681f1 refactor automated testing inputs due to streamlined setup process 2023-02-28 14:45:21 -05:00
Jason Ertel
8f20e2bcb9 refactor automated testing inputs due to streamlined setup process 2023-02-28 14:29:22 -05:00
Jason Ertel
9c3cc17153 refactor automated testing inputs due to streamlined setup process 2023-02-28 13:44:38 -05:00
Jason Ertel
d5df1a106a refactor automated testing inputs due to streamlined setup process 2023-02-28 13:43:52 -05:00
Mike Reeves
ff495cb20e fix formatting issue 2023-02-28 10:41:44 -05:00
Mike Reeves
34f5dbeba0 Merge branch 'setuperrors' of https://github.com/Security-Onion-Solutions/securityonion into setuperrors 2023-02-28 09:41:10 -05:00
Mike Reeves
c00d671098 backup influx dir 2023-02-28 09:40:57 -05:00
Josh Patterson
cbcd3c9dd9 Update defaults.map.jinja 2023-02-27 15:39:03 -05:00
Josh Patterson
8632606a24 Update defaults.map.jinja 2023-02-27 15:37:35 -05:00
Mike Reeves
1692970789 back out verify changes since underlying errors should be fixed 2023-02-27 15:22:08 -05:00
Josh Patterson
8d33f01936 Update defaults.map.jinja 2023-02-27 15:01:31 -05:00
Mike Reeves
aa7b05d639 small cleanup 2023-02-27 14:12:26 -05:00
Mike Reeves
9967e91825 remove mysql check 2023-02-27 13:42:11 -05:00
Josh Patterson
fb5aad34e0 Merge pull request #9861 from Security-Onion-Solutions/somefixes2
Somefixes2
2023-02-27 13:14:08 -05:00
m0duspwnens
44ed48033c move requirement 2023-02-27 13:04:23 -05:00
m0duspwnens
068d383442 change to service.running 2023-02-27 12:44:46 -05:00
m0duspwnens
b4015ac73e add sensor to node_containers 2023-02-27 10:05:08 -05:00
Josh Brower
f7176f9989 Move Output to ES 2023-02-27 09:58:43 -05:00
Josh Patterson
dd8f6a460b Merge pull request #9853 from Security-Onion-Solutions/somefixes2
custom hostgroups in soc ui
2023-02-24 16:25:48 -05:00
m0duspwnens
d12ea041bf capitalize 2023-02-24 16:20:16 -05:00
m0duspwnens
6b486d9604 move to default 2023-02-24 15:55:27 -05:00
m0duspwnens
fa5b9799f5 add firewall.soc to top for managers 2023-02-24 15:26:39 -05:00
m0duspwnens
d502d95dba changes for soc firewall 2023-02-24 15:24:02 -05:00
m0duspwnens
29c68c1273 fix bracket, add output to template 2023-02-24 14:32:35 -05:00
m0duspwnens
3e2e68fbd0 custom hostgroups in soc 2023-02-24 14:24:47 -05:00
Jason Ertel
aed41404fc Merge pull request #9852 from Security-Onion-Solutions/kilo
Remove FleetDM tool from SOC instead of deactivating it; generate SRV key during setup
2023-02-24 13:05:58 -05:00
Mike Reeves
2b683b09e1 Merge pull request #9851 from Security-Onion-Solutions/somefixes2
Fix install
2023-02-24 12:24:43 -05:00
Mike Reeves
afccd3f820 comment out minion installs for now 2023-02-24 12:21:14 -05:00
Mike Reeves
a25acb4558 comment out minion installs for now 2023-02-24 12:19:57 -05:00
Mike Reeves
a0eb505db0 Add fireall custom groups 2023-02-24 11:12:17 -05:00
Mike Reeves
99105c7563 Add fireall custom groups 2023-02-24 10:43:41 -05:00
Jason Ertel
316db85584 Generate SOC SRVKey during setup 2023-02-24 10:20:23 -05:00
Jason Ertel
d3c5d0569a Remove FleetDM tool instead of deactivating it 2023-02-24 10:20:02 -05:00
Mike Reeves
57a02396de Merge pull request #9849 from Security-Onion-Solutions/somefixes2
Playbook fix
2023-02-24 10:08:58 -05:00
Mike Reeves
29cf95d6eb remove yum versionlock 2023-02-24 10:06:43 -05:00
Mike Reeves
39361c2ab0 unfix playbook fix 2023-02-24 10:01:27 -05:00
Mike Reeves
1289500e03 unfix playbook fix 2023-02-24 09:55:49 -05:00
Mike Reeves
663af7935b Merge pull request #9847 from Security-Onion-Solutions/somefixes 2023-02-23 20:05:51 -05:00
Mike Reeves
cd56d3a799 unfix playbook fix 2023-02-23 16:18:22 -05:00
Mike Reeves
bf512d56ec unfix playbook fix 2023-02-23 16:12:57 -05:00
Mike Reeves
b206b23fe1 unfix playbook fix 2023-02-23 16:09:54 -05:00
Mike Reeves
6141906b76 Merge pull request #9840 from Security-Onion-Solutions/reposync
Rocky 9 support
2023-02-23 12:30:38 -05:00
m0duspwnens
8f46e4aa30 set docker extra_hosts for soc 2023-02-23 12:26:58 -05:00
Jason Ertel
4222b09970 Merge branch '2.4/dev' into reposync 2023-02-23 12:15:03 -05:00
Jason Ertel
b62a0c5d5c Merge pull request #9846 from Security-Onion-Solutions/kilo
Kilo
2023-02-23 12:12:06 -05:00
Jason Ertel
7067f9cd9c allow the rpm gpg key filename 2023-02-23 12:09:55 -05:00
Jason Ertel
265447801e allow the rpm gpg key filename 2023-02-23 12:08:43 -05:00
Jason Ertel
52f0ccf00d Merge branch '2.4/dev' into kilo 2023-02-23 12:03:34 -05:00
Mike Reeves
2ebd9b3598 use hostnames please 2023-02-23 11:19:13 -05:00
Mike Reeves
4896452245 use hostnames please 2023-02-23 11:13:54 -05:00
Mike Reeves
9441d47c6a Merge branch 'reposync' of https://github.com/Security-Onion-Solutions/securityonion into reposync 2023-02-23 11:11:38 -05:00
Mike Reeves
148b0b1c4c use hostnames please 2023-02-23 11:11:29 -05:00
m0duspwnens
399e4de73c stop and disable firewalld 2023-02-23 11:04:23 -05:00
m0duspwnens
96b1fb4782 change to eval 2023-02-23 10:51:14 -05:00
Mike Reeves
7f2d263046 fix nginx config 2023-02-23 10:16:34 -05:00
Mike Reeves
3fed04a532 fix nginx config 2023-02-23 09:52:24 -05:00
Mike Reeves
95f254dc63 Change elastalert ip 2023-02-23 09:37:20 -05:00
Mike Reeves
dc2fed5b04 Change elastalert ip 2023-02-23 09:34:16 -05:00
Mike Reeves
6927e28def Change kibana IP 2023-02-23 09:25:16 -05:00
m0duspwnens
4db404b6f5 remove jinja from kibana defaults 2023-02-23 09:21:19 -05:00
Mike Reeves
7b30064d86 Chane Elastalert to use hosntame 2023-02-23 09:10:20 -05:00
Mike Reeves
0ec0983d7b Chane Elastalert to use hosntame 2023-02-23 08:57:30 -05:00
weslambert
ee311de9c8 Merge pull request #9841 from Security-Onion-Solutions/fix/soc_analyzers_analyzerNodeId
Change 'GLOBALS.minion_id' to 'GLOBALS.hostname' for 'analyzerNodeId' value to ensure SOC creates analyzer jobs in the correct directory
2023-02-22 16:26:03 -05:00
Mike Reeves
7987cde668 Merge branch 'reposync' of https://github.com/Security-Onion-Solutions/securityonion into reposync 2023-02-22 16:25:04 -05:00
Mike Reeves
8e83407974 change playbook to use hostname 2023-02-22 16:24:35 -05:00
weslambert
ecf70847fd Change 'GLOBALS.minion_id' to 'GLOBALS.hostname' for 'analyzerNodeId' value to ensure SOC creates analyzer jobs in the correct directory 2023-02-22 16:23:48 -05:00
m0duspwnens
0d0a61bd4a remove so-grafana from node containers 2023-02-22 15:29:30 -05:00
Mike Reeves
5bc1dc9567 change playbook to use hostname 2023-02-22 15:19:27 -05:00
Mike Reeves
45434b06a4 change playbook to use hostname 2023-02-22 15:08:56 -05:00
Mike Reeves
6e59cc3409 change playbook to use hostname 2023-02-22 14:56:53 -05:00
Mike Reeves
417fff924d change playbook to use hostname 2023-02-22 14:53:02 -05:00
Mike Reeves
1c1e613351 change playbook to use hostname 2023-02-22 14:48:55 -05:00
m0duspwnens
bf8e6c64d6 add sobip to global vars 2023-02-22 14:41:14 -05:00
Mike Reeves
68708accde change playbook to use hostname 2023-02-22 14:32:49 -05:00
Mike Reeves
59c700ad10 change playbook to use hostname 2023-02-22 14:15:10 -05:00
Mike Reeves
c6a46d1eb3 change playbook to use hostname 2023-02-22 14:14:27 -05:00
Mike Reeves
c20a7e6cf9 fix yaml 2023-02-22 13:48:40 -05:00
Mike Reeves
3deb619737 add watchdog 2023-02-22 12:58:39 -05:00
Mike Reeves
7c64dad95b add mysql 2023-02-22 11:28:46 -05:00
m0duspwnens
6dd09fb2c5 remove filebeat 2023-02-22 10:42:45 -05:00
m0duspwnens
b8966aa33a fix role match 2023-02-22 10:24:51 -05:00
Mike Reeves
76011c96d6 fix conflict 2023-02-22 10:20:14 -05:00
Mike Reeves
c3784fe548 remove grafana 2023-02-22 10:09:52 -05:00
m0duspwnens
db3a46b6a1 fix indent 2023-02-22 10:07:04 -05:00
m0duspwnens
d0bb7dc475 repo for rocky 2023-02-22 10:04:43 -05:00
m0duspwnens
53b58d532a apply docker state during setup 2023-02-22 09:35:37 -05:00
Mike Reeves
327855b0af add docker 2023-02-22 09:28:51 -05:00
m0duspwnens
56ccf5c504 remove podman 2023-02-22 09:13:16 -05:00
Mike Reeves
7b6db5d95a add docker 2023-02-22 09:08:39 -05:00
Mike Reeves
8645cd0c3b add docker 2023-02-22 08:57:00 -05:00
m0duspwnens
cc654fda9f fw 2.4 update 2023-02-21 15:43:41 -05:00
m0duspwnens
f2b0d67d8b update fw rules 2023-02-21 15:20:49 -05:00
m0duspwnens
de499ead0c update fw rules 2023-02-21 15:11:14 -05:00
m0duspwnens
a3bda9b322 podman changes to disable mgmt of iptables 2023-02-21 13:48:25 -05:00
Josh Brower
3a2ec8e8bf Merge pull request #9830 from Security-Onion-Solutions/2.4/IDHMerge
Initial support for IDH
2023-02-21 12:19:53 -05:00
Josh Brower
b62cc32b1a Initial support for IDH 2023-02-21 11:52:37 -05:00
Mike Reeves
bc054a15d3 add createrepo 2023-02-21 10:15:47 -05:00
Mike Reeves
c4a5470454 fix reposync 2023-02-21 10:06:01 -05:00
Mike Reeves
b402b84d11 fix reposync 2023-02-21 10:04:56 -05:00
Mike Reeves
f34e144629 removes filebeat 2023-02-21 10:01:27 -05:00
Mike Reeves
6cfa16c251 fix reposync script 2023-02-21 10:00:09 -05:00
Mike Reeves
173b15b46e Add python3-rich for sostatus 2023-02-21 09:58:07 -05:00
m0duspwnens
653062b7c9 run podman state early 2023-02-21 09:46:52 -05:00
Jason Ertel
2b6685c887 restore kilo version 2023-02-21 09:27:02 -05:00
Jason Ertel
f00c7169ce update test scenarios 2023-02-21 09:24:55 -05:00
m0duspwnens
5fff06602a change symlink 2023-02-17 15:41:49 -05:00
Mike Reeves
4bafb40894 fix registry from restart 2023-02-17 15:38:54 -05:00
m0duspwnens
03cd67431d start and enable podman services 2023-02-17 15:36:45 -05:00
m0duspwnens
160ed46d96 podman and remove filebeat 2023-02-17 14:59:39 -05:00
Mike Reeves
6fd68351ec fix more python depends 2023-02-17 14:30:55 -05:00
m0duspwnens
49549c3d61 remove unneedfuls from podman state 2023-02-17 14:24:55 -05:00
m0duspwnens
9d4e4830dd add podman state 2023-02-17 14:19:57 -05:00
Mike Reeves
b53aa08eeb remove grafana and filebeat 2023-02-17 13:58:45 -05:00
Mike Reeves
c6266e9f91 add m2crypto 2023-02-17 13:54:46 -05:00
Mike Reeves
c6cbb4857d add rsync 2023-02-17 13:53:36 -05:00
Mike Reeves
bcf1fe8dad fix reposync script 2023-02-17 13:48:10 -05:00
Mike Reeves
12398bdf24 add m2crypto 2023-02-17 13:34:21 -05:00
Josh Patterson
ba5b125952 Update minion.defaults.yaml 2023-02-17 13:25:01 -05:00
Mike Reeves
e3e8d30161 fix python docker name 2023-02-17 13:17:57 -05:00
Mike Reeves
4bb49ad617 add some deps 2023-02-17 13:11:13 -05:00
Mike Reeves
e7f35673e0 replace centos 2023-02-17 11:38:50 -05:00
Mike Reeves
ba9c52db37 replace centos 2023-02-17 11:37:28 -05:00
Mike Reeves
43c177727c replace centos 2023-02-17 11:32:05 -05:00
Mike Reeves
c6919a09da replace centos 2023-02-17 11:26:11 -05:00
m0duspwnens
d8e85cbc28 change salt version 2023-02-17 11:20:16 -05:00
Mike Reeves
0a7ad4d211 yum-utils 2023-02-17 11:16:02 -05:00
Mike Reeves
54fc07b5b8 yum-utils 2023-02-17 11:07:44 -05:00
m0duspwnens
8b680693f4 remove patch pkg and patching of influx 2023-02-17 11:01:17 -05:00
Mike Reeves
353b77cd59 add minions.d dir 2023-02-17 10:40:43 -05:00
Doug Burks
eef81fdd1b Merge pull request #9805 from Security-Onion-Solutions/2.4/upgrade-elastic-8.6.2
2.4/upgrade elastic 8.6.2
2023-02-17 08:03:09 -05:00
Doug Burks
ef3abe158c UPGRADE: Elastic 8.6.2 #9804 2023-02-17 07:07:20 -05:00
Doug Burks
dfa5503e41 UPGRADE: Elastic 8.6.2 #9804 2023-02-17 07:06:36 -05:00
Mike Reeves
405060674c Salt 3006 temp 2023-02-16 17:49:07 -05:00
Jason Ertel
1f37af0e57 Merge pull request #9800 from Security-Onion-Solutions/kilo
influx upgrade
2023-02-16 13:51:53 -05:00
Jason Ertel
59b1af15db correct top order for import 2023-02-16 13:49:19 -05:00
Jason Ertel
79041d091e influx upgrade 2023-02-16 13:22:13 -05:00
Jason Ertel
e4de89c960 Merge pull request #9798 from Security-Onion-Solutions/jertel-remove-kilo-from-ver
Update VERSION
2023-02-16 10:57:19 -05:00
Jason Ertel
dcbf5a2fa6 Update VERSION 2023-02-16 10:55:32 -05:00
Jason Ertel
6e9d1f7c2c Merge pull request #9797 from Security-Onion-Solutions/kilo
Influx upgrade
2023-02-16 10:46:57 -05:00
weslambert
5e94a2cd74 Merge pull request #9790 from Security-Onion-Solutions/fix/kibana_default_data_view
Change default data view from '*:so-*' to 'logs-*'
2023-02-15 14:21:55 -05:00
weslambert
b7ad4e0570 Change default data view from 'so-*' to 'logs-*' 2023-02-15 14:19:29 -05:00
weslambert
967440f49f Merge pull request #9789 from Security-Onion-Solutions/fix/kibana_visualization_index-pattern_reference
Replace 'so-*' index-pattern reference with 'logs-*' for Kibana dashboard visualizations
2023-02-15 11:33:44 -05:00
Wes
790b3c5635 Replace 'so-*' index-pattern reference with 'logs-*' for Kibana dashboard visualizations 2023-02-15 16:30:56 +00:00
Mike Reeves
01edb5dc00 Update repo URL 2023-02-15 11:09:37 -05:00
Jason Ertel
c43ccb7ed2 influx upgrade 2023-02-15 09:47:18 -05:00
Jason Ertel
a9b3594b35 merge 2023-02-15 08:06:41 -05:00
Jason Ertel
8746f55834 influx upgrade 2023-02-15 08:03:22 -05:00
Mike Reeves
577e3c27fe Update repo URL 2023-02-14 13:52:21 -05:00
Mike Reeves
2cddcc8b8d Change some order in repo sync 2023-02-14 13:38:28 -05:00
Mike Reeves
4c2142b181 add key for so packages 2023-02-14 13:21:37 -05:00
Mike Reeves
4dcdea58d7 add key for so packages 2023-02-14 13:16:13 -05:00
Mike Reeves
0f51e7bb98 fix key locations for rocky 2023-02-14 13:14:21 -05:00
Jason Ertel
1fa526cd0e influx upgrade 2023-02-14 11:22:54 -05:00
Mike Reeves
4741038a41 fix function 2023-02-14 10:15:35 -05:00
Mike Reeves
89bd9163fb reposync attempt for reocky 2023-02-14 10:08:34 -05:00
Mike Reeves
b2d85b843f reposync 2023-02-14 09:00:10 -05:00
Jason Ertel
d15158e77a influx upgrade 2023-02-13 20:52:12 -05:00
Jason Ertel
0890129c69 influx upgrade 2023-02-13 19:30:10 -05:00
Jason Ertel
e3ca0345a8 upgrade influx 2023-02-13 15:41:37 -05:00
Jason Ertel
1fa8294ee6 influx upgrade 2023-02-13 14:56:51 -05:00
weslambert
689ba5f341 Merge pull request #9778 from Security-Onion-Solutions/fix/filebeat_remove_docker_image
Remove 'so-filebeat' from list of trusted containers
2023-02-13 10:00:36 -05:00
weslambert
40d3269db3 Remove 'so-filebeat' from list of trusted containers 2023-02-13 09:58:39 -05:00
Jason Ertel
7b3acd53a1 upgrade influx 2023-02-13 09:55:45 -05:00
Jason Ertel
47af14c265 upgrade influx 2023-02-13 09:51:48 -05:00
Jason Ertel
34d19e308f influx upgrade 2023-02-10 19:42:25 -05:00
Jason Ertel
e5c26032c4 influx upgrade 2023-02-10 19:37:59 -05:00
Jason Ertel
4f0af9ac6b influx upgrade 2023-02-10 18:41:29 -05:00
Jason Ertel
0056b8f703 influx upgrade 2023-02-10 18:35:18 -05:00
Jason Ertel
39009ce938 influx upgrade 2023-02-10 18:32:01 -05:00
Jason Ertel
7dee2686ac influx upgrade 2023-02-10 18:19:31 -05:00
Jason Ertel
cd27ae89cc influx upgrade 2023-02-10 16:34:06 -05:00
weslambert
21ca8a9c50 Merge pull request #9770 from Security-Onion-Solutions/fix/elasticsearch_ilm_soc_annotations_settings
Add SOC annotation settings for Elasticsearch's ILM feature
2023-02-10 15:51:29 -05:00
weslambert
acda03ce40 Add annotation settings for Elasticsearch's ILM feature, and remove various index keys 2023-02-10 14:57:11 -05:00
weslambert
f2f318982e Merge pull request #9768 from Security-Onion-Solutions/fix/elasticsearch_ilm_policy_load_additions
Manage Elasticsearch index lifecycle management policies in Elasticsearch state
2023-02-10 14:16:32 -05:00
Wes
1255c60317 Move policy load script into Elasticsearch state script directory 2023-02-10 18:59:45 +00:00
Wes
994eabae1b Manage policy loading in Elasticsearch state 2023-02-10 18:57:19 +00:00
weslambert
82119b0247 Merge pull request #9765 from Security-Onion-Solutions/fix/elastic_utility_scripts_permissions
Ensure Elastic utility scripts have the correct permissions
2023-02-10 10:30:14 -05:00
Wes
1d0e09bdf7 Ensure Elastic utility scripts have the correct permissions 2023-02-10 15:26:46 +00:00
weslambert
7564a82b52 Merge pull request #9764 from Security-Onion-Solutions/fix/elasticsearch_ilm_dynamic_policy_loadiing
ILM Policy Changes
2023-02-10 10:17:14 -05:00
Wes
c9118699a9 Add index management lifecycle policy defintion and reference in index template 2023-02-10 15:10:30 +00:00
Wes
d17cf89c68 Fix Bash shebang 2023-02-10 15:01:09 +00:00
Wes
7b7461ef01 Dynamically load index management lifecycle policies based on pillar values 2023-02-10 14:59:29 +00:00
Jason Ertel
e77813a173 influx upgrade 2023-02-09 19:14:58 -05:00
Jason Ertel
0eec8b22a2 influx upgrade 2023-02-09 18:27:14 -05:00
Jason Ertel
0e50d36da6 upgrade influx 2023-02-09 16:18:04 -05:00
Jason Ertel
067b6bacd1 merge from 2.4/dev 2023-02-09 11:57:51 -05:00
weslambert
84c5d2fee9 Merge pull request #9753 from Security-Onion-Solutions/fix/elasticsearch_ilm_policy_load_additional_policies
Add index lifecycle policy templates for other logs
2023-02-09 10:59:24 -05:00
Wes
ee7f299e6d Fix typo - 'Kratos' to 'Kibana' 2023-02-09 15:56:36 +00:00
Wes
bb6fc8da19 Add policy templates for other logs 2023-02-09 15:51:58 +00:00
weslambert
364799dcc5 Merge pull request #9751 from Security-Onion-Solutions/fix/elastic_fleet_output_temp_change
Temporarily use Elasticsearch output for standalone installations
2023-02-09 09:37:14 -05:00
weslambert
b744dc0641 Add so-eval to list of modes using the Elasticsearch output for Elastic Agent and Fleet 2023-02-09 09:35:29 -05:00
weslambert
613793ad9b Temporarily use Elasticsearch output for Standalone installations 2023-02-09 09:32:04 -05:00
Jason Ertel
28eee48a7c influx upgrade 2023-02-08 20:38:29 -05:00
Jason Ertel
849e53e1eb upgrade influx 2023-02-08 17:40:27 -05:00
Josh Patterson
131d9b5898 Merge pull request #9747 from Security-Onion-Solutions/2.4/firewall
ensure node_data is populated with self
2023-02-08 17:29:07 -05:00
m0duspwnens
8a00521092 ensure node_data is populated with self if logstash:nodes data doesnt exist, ie import node 2023-02-08 17:19:20 -05:00
weslambert
32823ef640 Merge pull request #9746 from Security-Onion-Solutions/feature/elasticsearch_ilm_utility_scripts
Add Elasticsearch ILM utility scripts
2023-02-08 16:43:44 -05:00
Wes
b319b50fa1 Add initial ILM status script 2023-02-08 21:39:33 +00:00
Wes
1d6c03feb1 Rename initial ILM lifecycle status explanation script 2023-02-08 21:34:39 +00:00
Wes
91d24d36f9 Add initial ILM lifecycle status explanation script 2023-02-08 21:34:15 +00:00
Wes
3e31bda285 Fix typo in Elasticsearch portion of script names 2023-02-08 21:32:17 +00:00
Wes
1de3871ee9 Add initial ILM service restart script 2023-02-08 21:30:25 +00:00
Wes
03849b0659 Add initial ILM service start script 2023-02-08 21:29:38 +00:00
Wes
b38f4ca766 Add initial ILM service stop script 2023-02-08 21:29:16 +00:00
Wes
8027055086 Add initial ILM policy delete script 2023-02-08 21:09:42 +00:00
Jason Ertel
8ff0cf21cd influx upgrade 2023-02-08 16:03:10 -05:00
Wes
d6d01f8542 Add initial ILM policy view script 2023-02-08 21:01:02 +00:00
Jason Ertel
c43e69ad93 influx upgrade 2023-02-08 15:57:14 -05:00
Jason Ertel
abbc92a58d upgrade influx 2023-02-08 15:14:46 -05:00
Wes
713e9ee215 Create initial template for ILM policy load script 2023-02-08 20:10:41 +00:00
Jason Ertel
22eaeb1462 upgrade influx 2023-02-08 15:00:44 -05:00
Jason Ertel
2fddcc1e99 upgrade influx 2023-02-08 14:57:57 -05:00
Jason Ertel
67c8f6ba69 avoid cr/lr 2023-02-08 14:25:36 -05:00
Jason Ertel
44e60f1e57 upgrade influx 2023-02-08 14:03:27 -05:00
Jason Ertel
51674b3a5b upgrade influx 2023-02-08 13:50:32 -05:00
Jason Ertel
4c42671a21 Merge branch '2.4/dev' into kilo 2023-02-08 13:49:07 -05:00
Jason Ertel
a1ac1785d3 upgrade influx 2023-02-08 13:40:27 -05:00
Josh Patterson
3b9bdecab8 Merge pull request #9745 from Security-Onion-Solutions/2.4/firewall
2.4/firewall
2023-02-08 13:26:40 -05:00
Jason Ertel
ea0c3db8e1 upgrade influxdb 2023-02-08 13:23:45 -05:00
m0duspwnens
3d34a49e44 change to new local ports file 2023-02-08 13:21:48 -05:00
m0duspwnens
19f49dde75 recusivly copy the firewall files for setup 2023-02-08 13:14:08 -05:00
Josh Patterson
d6fb0598df Merge pull request #9743 from Security-Onion-Solutions/2.4/firewall
2.4/firewall
2023-02-08 11:37:05 -05:00
m0duspwnens
31daeef30d 2.4 fw changes 2023-02-08 11:01:26 -05:00
m0duspwnens
342b9619b0 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-02-08 09:18:21 -05:00
m0duspwnens
fb7ebcac7e 2.4 fw changes 2023-02-08 09:18:05 -05:00
Doug Burks
291bdc0d82 Merge pull request #9726 from Security-Onion-Solutions/2.4/change-radio-to-menu
FIX: Minimize keystrokes and errors in Setup by changing radio lists to menus where appropriate #9725
2023-02-06 12:11:21 -05:00
Doug Burks
cd38ecb300 change whiptail selections from radiolist to menu where appropriate 2023-02-06 11:52:42 -05:00
Josh Patterson
22a18d8855 Merge pull request #9717 from Security-Onion-Solutions/2.4/firewall
2.4/firewall
2023-02-03 11:04:36 -05:00
m0duspwnens
e8a1e164aa add so.version module 2023-02-03 10:58:08 -05:00
m0duspwnens
e0e094cd95 rename sosbip and sosrange to sobip and sorange 2023-02-03 10:10:51 -05:00
m0duspwnens
a37f0fd0c0 rename sosbridge to sobridge 2023-02-03 10:07:07 -05:00
m0duspwnens
6e45f1b6e1 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-02-03 09:55:50 -05:00
m0duspwnens
df9ef9ffc7 add managersearch 2023-02-03 09:55:33 -05:00
weslambert
bee5a1e9e8 Merge pull request #9711 from Security-Onion-Solutions/fix/so_import_pcap_suricata_metadata_disable_zeek
Only run Zeek if it is defined as the metadata engine
2023-02-02 13:27:35 -05:00
m0duspwnens
3e808a70fa allow managersearch. comment out localhost allow in setup 2023-02-02 12:11:03 -05:00
Wes
bc082dff99 Only run Zeek if it is defined as 'mdengine' 2023-02-02 16:22:42 +00:00
m0duspwnens
33787d345b Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-02-02 10:04:01 -05:00
m0duspwnens
9eae31e488 add managersearch to allowed roles for so-firewall. fix setup error from so-firewall "Please specify a role with --role=" 2023-02-02 10:03:22 -05:00
weslambert
395cbf330a Merge pull request #9706 from Security-Onion-Solutions/fix/suricata_metadata
Add Suricata metadata configuration
2023-02-02 09:54:49 -05:00
Wes
5fba3c5872 Add Suricata metadata configuration 2023-02-02 14:48:01 +00:00
m0duspwnens
3ba64f7545 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-02-02 09:31:40 -05:00
weslambert
eb7b6e78b9 Merge pull request #9702 from Security-Onion-Solutions/fix/elastic_agent_integration_policy_disable
Disable loading of Kibana and Logstash integration policies
2023-02-01 16:02:56 -05:00
weslambert
d242050627 Disable loading of Kibana and Logstash logs for now since there are issues with the packages from the registry 2023-02-01 15:59:35 -05:00
weslambert
3dfa7959b3 Merge pull request #9698 from Security-Onion-Solutions/fix/strelka_yara_exclusion_2_4
Add 'configured_vulns_ext_vars.yar' to exclusion list
2023-02-01 14:38:38 -05:00
weslambert
2101ca60e9 Add 'configured_vulns_ext_vars.yar' to exclusion list 2023-02-01 14:25:46 -05:00
m0duspwnens
33668105a5 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-02-01 11:32:02 -05:00
m0duspwnens
d2dd68eb44 add global vars for managersearch 2023-02-01 11:31:36 -05:00
Josh Patterson
77749adc8f Merge pull request #9691 from Security-Onion-Solutions/2.4/firewall
2.4/firewall
2023-01-31 17:11:57 -05:00
m0duspwnens
6ec086e24a add influxdb as extra_hosts for grafana container 2023-01-31 17:10:11 -05:00
m0duspwnens
6f1438148f allow elastic agent access 2023-01-31 16:54:46 -05:00
m0duspwnens
12bede5e77 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-01-31 16:10:50 -05:00
weslambert
056bcd0121 Merge pull request #9683 from Security-Onion-Solutions/fix/kibana_osquery_live_query_link_remove
Remove OSQuery live query link
2023-01-31 13:38:07 -05:00
m0duspwnens
8cbafb52d8 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-01-31 13:32:51 -05:00
m0duspwnens
16e1e297a0 allow elasticsearch_rest 2023-01-31 13:32:33 -05:00
weslambert
98bea0322e Merge pull request #9688 from Security-Onion-Solutions/fix/elastic_agent_elasticsearch_output_typo_fix
Fix Elastic Agent Elasticsearch output typo
2023-01-31 12:57:38 -05:00
weslambert
74eed31eec Change Elasticsearch output name from 'so-manager_elasticsearch2' to 'so-manager_elasticsearch' 2023-01-31 12:55:03 -05:00
m0duspwnens
aa411e2682 allow influxdb on manager and managersearch 2023-01-31 12:42:46 -05:00
weslambert
cbf2bd1373 Remove OSQuery live query link 2023-01-31 10:59:17 -05:00
m0duspwnens
0ba193c7a4 allow docker_registry fw 2023-01-31 10:55:14 -05:00
m0duspwnens
e09a86dc30 2.4 searchnode es config 2023-01-31 10:54:40 -05:00
m0duspwnens
8dc7a9da9e add searchnode global vars 2023-01-31 10:52:35 -05:00
Doug Burks
acffc5ee07 Merge pull request #9682 from Security-Onion-Solutions/fix/suricata-dhcp-parsing-2.4
2.4: Improve Suricata DHCP parsing and dashboard
2023-01-31 10:18:41 -05:00
Doug Burks
a44d83d69b Improve Suricata DHCP parsing and dashboard 2023-01-31 08:33:38 -05:00
weslambert
bde828cd4f Merge pull request #9676 from Security-Onion-Solutions/fix/so-import-evtx_updates
Updates to so-import-evtx
2023-01-31 08:17:02 -05:00
weslambert
0436f885b8 Set values for '@timestamp' and 'event.ingested' 2023-01-31 08:04:49 -05:00
Wes
5472f53c9f Remove bind mount and reference the correctly named entrypoint script 2023-01-30 21:24:30 +00:00
Wes
0156784687 Add EVTX integration policy for 'so-import-evtx' 2023-01-30 21:22:37 +00:00
Wes
cc100e50cd Update so-import-evtx to convert EVTX to a JSON file instead of streaming to Elasticsearch 2023-01-30 21:09:58 +00:00
weslambert
b1eb16d3a2 Merge pull request #9670 from Security-Onion-Solutions/fix/elastic_agent_integration_policies_zeek_exclude_files
Remove 'prospector.scanner' prefix from 'exclude_files' configuration
2023-01-27 16:53:02 -05:00
weslambert
8240e5b20d Remove 'prospector.scanner' prefix from 'exclude_files' configuration 2023-01-27 16:46:43 -05:00
Doug Burks
a13baf7bb8 Merge pull request #9669 from Security-Onion-Solutions/dougburks-patch-1
Fix typos in so-elastic-fleet-integration-policy-load
2023-01-27 15:52:47 -05:00
Doug Burks
b160d0add5 Fix typos in so-elastic-fleet-integration-policy-load 2023-01-27 15:45:58 -05:00
Doug Burks
209f732176 Merge pull request #9668 from Security-Onion-Solutions/fix/elastic_agent_integration_policies_zeek
Fix syntax for Zeek Elastic Agent integration policies
2023-01-27 15:30:50 -05:00
weslambert
68fac4488e Fix syntax for Zeek integration policies 2023-01-27 15:27:15 -05:00
weslambert
fa9e62a816 Merge pull request #9665 from Security-Onion-Solutions/fix/elastic_agent_integration_policy_import_suricata_event.category
Change event.category from 'file' to 'network' in Import Suricata integration policy
2023-01-27 12:03:34 -05:00
weslambert
e47f64bd04 Change event.category from 'file' to 'network' 2023-01-27 12:00:30 -05:00
weslambert
6d2f379ba5 Merge pull request #9664 from Security-Onion-Solutions/fix/elastic_agent_integration_policies_zeek_exclude_files
Update Zeek file exclusions and add a minor output formatting change
2023-01-27 11:58:19 -05:00
weslambert
f49627cec1 Update Zeek file exclusions and add a minor output formatting change 2023-01-27 11:47:14 -05:00
weslambert
5ab3d1e8f1 Merge pull request #9663 from Security-Onion-Solutions/fix/elastic_agent_integration_policy_zeek_import_ics_tag
Change 'pipeline' to 'import.file' so that ICS tag conditional is applied to the correct field
2023-01-27 11:34:28 -05:00
weslambert
6b251a2596 Change 'pipeline' to 'import.file' so that ICS tag conditional is applied to the correct field 2023-01-27 11:30:06 -05:00
weslambert
5468aa82b0 Merge pull request #9662 from Security-Onion-Solutions/fix/elasticsearch_ingest_pipeline_event.dataset_rename
Change event.dataset value for zeek.files and zeek.tunnels ingest pipelines
2023-01-27 11:19:45 -05:00
weslambert
2772b03dca Change event.dataset value from 'tunnels' to 'tunnel' 2023-01-27 11:03:49 -05:00
weslambert
716ec7f936 Change event.dataset value from 'files' to 'file' 2023-01-27 11:02:44 -05:00
Doug Burks
83aad48e3a Merge pull request #9657 from Security-Onion-Solutions/2.4/elastic-8.6.1
UPGRADE: Elastic 8.6.1 #9594 (2.4)
2023-01-26 16:24:42 -05:00
Doug Burks
86ca51ff99 Update to Elastic 8.6.1 2023-01-26 16:18:06 -05:00
Doug Burks
a27fc5c768 Update to Elastic 8.6.1 2023-01-26 16:17:36 -05:00
m0duspwnens
d5b5a36f28 remove data.nodestab from searchnodes pillar 2023-01-26 16:17:33 -05:00
m0duspwnens
75d73e4620 add yum portgroups for amnager 2023-01-26 15:35:22 -05:00
m0duspwnens
2fed977692 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-01-26 13:55:09 -05:00
m0duspwnens
f2d3298f14 allow nodes to connect to salt for manager and managersearch 2023-01-26 13:54:52 -05:00
weslambert
27b1f1bd07 Merge pull request #9654 from Security-Onion-Solutions/fix/logstash_cleanup
FIX: Logstash Pipeline Cleanup
2023-01-26 13:19:50 -05:00
Wes
e4271043c6 Remove unnecessary Logstash pipelines 2023-01-26 18:05:14 +00:00
Wes
b3123f7895 Remove unnecessary Logstash pipelines from the pillar 2023-01-26 17:57:07 +00:00
Mike Reeves
282d0f88db Merge pull request #9652 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update so-verify
2023-01-26 12:33:46 -05:00
Mike Reeves
25a6eba166 Update so-verify 2023-01-26 12:30:35 -05:00
weslambert
a8d2631d75 Merge pull request #9650 from Security-Onion-Solutions/fix/elastic_agent_add_import_mode
Elastic Agent - Import Mode
2023-01-26 11:33:20 -05:00
Josh Patterson
881c8337a3 Merge pull request #9641 from Security-Onion-Solutions/2.4/firewall
2.4/firewall
2023-01-26 11:21:30 -05:00
Wes
b381c5424e Remove extra whitespace after 'so-elastic-agent-builder' line in 'so-image-common' 2023-01-26 16:13:23 +00:00
Mike Reeves
a9919e7547 Merge pull request #9648 from Security-Onion-Solutions/mkr24
Enable Proxy Support
2023-01-26 11:12:35 -05:00
Wes
f1db1bc273 Ensure Kratos events are sent to a data stream instead of an index 2023-01-26 16:12:06 +00:00
Wes
7d68ef0e8b Add Elastic Agent and Fleet to firewall configuration for Import Mode 2023-01-26 16:07:31 +00:00
Wes
43ffcb1d63 Allow setup to set up Elastic Fleet for Import Mode 2023-01-26 16:05:16 +00:00
Wes
8051fc70eb Temporarily disable the loading of the RITA package policy 2023-01-26 16:03:59 +00:00
Wes
a9a119f1ab Add Elasticsearch output to 'so-elastic-fleet-setup' for Import Mode 2023-01-26 16:02:27 +00:00
Wes
6a803dfe35 Add Elastic Fleet to top file configuration for Import Mode 2023-01-26 16:01:03 +00:00
Wes
1fb6cf7bfe Add Elastic Fleet to allowed states for Import Mode 2023-01-26 15:59:49 +00:00
m0duspwnens
1d2f491084 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-01-26 10:49:00 -05:00
m0duspwnens
aafbdf6afc adjust retry and timeout for wait_for_influxdb 2023-01-26 10:12:37 -05:00
Mike Reeves
2456aac311 Proxy Stuff 2023-01-26 09:57:44 -05:00
m0duspwnens
08750154b4 add missing quotes in check_web_pass 2023-01-26 09:11:28 -05:00
Mike Reeves
9e146184d6 Proxy Stuff 2023-01-25 17:43:02 -05:00
Mike Reeves
c57d390bac Proxy Stuff 2023-01-25 17:40:40 -05:00
weslambert
211b87e7ae Merge pull request #9644 from Security-Onion-Solutions/revert-9640-fix/elastic_agent_import_mode
Revert "Elastic Agent and Fleet - Import Mode"
2023-01-25 17:23:27 -05:00
weslambert
6ee66a34bc Revert "Elastic Agent and Fleet - Import Mode" 2023-01-25 17:12:03 -05:00
weslambert
6785e0ec9e Merge pull request #9640 from Security-Onion-Solutions/fix/elastic_agent_import_mode
Elastic Agent and Fleet - Import Mode
2023-01-25 17:01:33 -05:00
weslambert
c73cd78f08 Merge pull request #9643 from Security-Onion-Solutions/2.4/dev
Merge Dev
2023-01-25 16:59:47 -05:00
m0duspwnens
790aa6b684 add logstash pillar items for minions 2023-01-25 15:18:56 -05:00
Wes
5c58cda872 Move certificate configuration outside of conditional logic 2023-01-25 19:29:50 +00:00
m0duspwnens
b7a5937dc1 add soc_logstash and adv_logstash to nodes in pillar/top 2023-01-25 14:04:36 -05:00
Mike Reeves
31f591a098 Merge pull request #9635 from Security-Onion-Solutions/mkr24
Ubuntu support changes
2023-01-25 13:34:44 -05:00
Wes
c3717dae67 Add Elastic Fleet firewall configuration for Import Mode 2023-01-25 18:27:00 +00:00
Mike Reeves
498301b111 Salt for Ubuntu 2023-01-25 12:00:19 -05:00
Mike Reeves
704d99e757 Salt for Ubuntu 2023-01-25 11:50:19 -05:00
Mike Reeves
9243b01cbb Salt for Ubuntu 2023-01-25 11:44:22 -05:00
Jason Ertel
c9f18891b2 Merge pull request #9639 from Security-Onion-Solutions/kilo
auto extract source/dest IP on case related event attachments; improve so-verify stream to console
2023-01-25 11:37:16 -05:00
Wes
86a925e1c7 Download Elastic Agent images for Import Mode 2023-01-25 16:09:12 +00:00
Jason Ertel
31d7e05c45 refactor so-verify to ensure output streams to console 2023-01-25 10:59:50 -05:00
Wes
838beabae5 Add missing single quote for Elastic Agent Elasticsearch output 2023-01-25 15:58:06 +00:00
m0duspwnens
3f99e3402e add elasticsearch pillar files to manager and adv_elasticsearch to those that had soc_elasticsearch 2023-01-25 10:53:58 -05:00
Wes
c46b5e734b Add 'elastic-fleet' to the list of allowed states for Import Mode 2023-01-25 14:38:23 +00:00
m0duspwnens
1b3f50a463 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-01-25 09:22:17 -05:00
Wes
1414b75e01 Allow 'elastic-fleet' state to be applied for Import Mode 2023-01-25 14:07:25 +00:00
Wes
506baa854d Configure Elasticsearch output if running Import Mode 2023-01-25 13:52:54 +00:00
weslambert
4868bd8f5e Merge pull request #9638 from Security-Onion-Solutions/fix/elastic_agent_integration_kratos_data_stream_rename
Rename Kratos Data Stream
2023-01-25 08:45:37 -05:00
weslambert
c9f458e1e2 Set event.dataset for all Kratos logs to 'access' for now 2023-01-25 08:19:50 -05:00
weslambert
7bf9d77962 Rename Kratos data stream 2023-01-25 08:18:21 -05:00
m0duspwnens
d1460ae01f add node_data.ips pillar. grab influx host ip for soc extra_hosts 2023-01-24 17:05:40 -05:00
Mike Reeves
161881efbb Salt for Ubuntu 2023-01-24 16:25:26 -05:00
Mike Reeves
d5f8ea8661 Salt for Ubuntu 2023-01-24 16:05:16 -05:00
Mike Reeves
53d6823ba7 Salt for Ubuntu 2023-01-24 16:00:03 -05:00
Mike Reeves
5a223981ca Salt for Ubuntu 2023-01-24 15:57:05 -05:00
Mike Reeves
177ddc1183 Salt for Ubuntu 2023-01-24 15:48:48 -05:00
Mike Reeves
20f7a77886 Salt for Ubuntu 2023-01-24 15:43:12 -05:00
Mike Reeves
b89e7efeea Salt for Ubuntu 2023-01-24 15:30:46 -05:00
weslambert
3f9764d22d Merge pull request #9633 from Security-Onion-Solutions/fix/elastic_agent_more_improvements
More Elastic Agent Integration Improvements
2023-01-24 15:16:52 -05:00
Mike Reeves
a048034f16 Salt for Ubuntu 2023-01-24 13:38:39 -05:00
Jason Ertel
7b1f867ac3 Add defaults for auto extracted observables 2023-01-24 13:17:50 -05:00
Wes
4b9c92c53d Set RITA event.dataset value explicitly 2023-01-24 18:00:34 +00:00
Wes
38ead7cb82 Remove import tag for now 2023-01-24 17:58:19 +00:00
Wes
44d149b1c3 Allow imported data to use a tag of 'import' 2023-01-24 17:01:52 +00:00
Wes
1e5377c78a Condense RITA integration policies, add ICS tags, and improve output readability 2023-01-24 16:56:20 +00:00
m0duspwnens
b23575d85e add global vars for manager 2023-01-24 11:03:03 -05:00
Jason Ertel
b0709e93fa test workflow 2023-01-24 10:50:52 -05:00
Jason Ertel
fd7d51a59b Merge pull request #9630 from Security-Onion-Solutions/kilo
Kilo
2023-01-24 10:45:12 -05:00
Jason Ertel
0dc5e7e714 try paths with wildcard 2023-01-24 10:38:59 -05:00
Jason Ertel
62b96c3698 rework filter for action 2023-01-24 10:31:02 -05:00
Jason Ertel
ec2e923530 Add proper spacing between headers and content 2023-01-24 10:28:39 -05:00
Jason Ertel
2bffd9b473 Merge pull request #9628 from Security-Onion-Solutions/kilo
try paths filter on both even though docs only mention support for push
2023-01-24 10:27:30 -05:00
Jason Ertel
cfc232eafa try paths filter on both even though docs only mention support for push 2023-01-24 10:23:42 -05:00
m0duspwnens
6d3f57d648 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-01-24 10:17:24 -05:00
m0duspwnens
50895ee304 need to set_minion_info in setup for each node type 2023-01-24 10:16:58 -05:00
weslambert
7e0e5071d9 Merge pull request #9627 from Security-Onion-Solutions/fix/elastic_agent_integration_improvements
Elastic Agent Integration Improvements
2023-01-24 10:10:01 -05:00
Mike Reeves
2da30f42d4 Check for Ubuntu 2023-01-24 10:07:32 -05:00
Wes
7b4d8a47f0 Add copyright header to 'so-elastic-fleet-*' scripts 2023-01-24 15:07:00 +00:00
Josh Patterson
095ca29aca Merge pull request #9626 from Security-Onion-Solutions/2.4/firewall
change MASTER to MANAGER in so-minion
2023-01-24 09:46:17 -05:00
Wes
f19cf75311 Change how event.dataset is determined for Suricata events 2023-01-24 14:45:00 +00:00
m0duspwnens
ee98e0684e change MASTER to MANAGER 2023-01-24 09:44:01 -05:00
Josh Patterson
b797e356b4 Merge pull request #9624 from Security-Onion-Solutions/2.4/firewall
remove filebeat and redis(commented out) from telegraf config
2023-01-24 09:01:59 -05:00
m0duspwnens
88107fe0df remove filebeat and redis(commented out) from telegraf config 2023-01-24 08:59:51 -05:00
Wes
51692ac66c Update index pattern in various template definitions to match new data stream naming convention 2023-01-23 21:52:44 +00:00
Wes
40c6b380df Update Import and Zeek integration policies; also update Zeek ingest node pipelines to set event.dataset. 2023-01-23 21:44:46 +00:00
Wes
d342f3c4b8 Add 'so-elastic-fleet-integration-policy-bulk-delete' to perform bulk deletion of integration policies 2023-01-23 21:38:13 +00:00
Josh Patterson
a503632f30 Merge pull request #9620 from Security-Onion-Solutions/2.4/firewall
2.4/firewall
2023-01-23 15:56:53 -05:00
m0duspwnens
d1ec7c8ace remove to match with 2.4/dev 2023-01-23 15:50:53 -05:00
Jason Ertel
5da1b03d9b Merge pull request #9619 from Security-Onion-Solutions/kilo
switch MySQL 8 to use native password for playbook compat; fix so-verify mail inspection
2023-01-23 15:14:00 -05:00
Jason Ertel
5a016312f6 switch MySQL 8 to use native password to avoid playbook incompatibility 2023-01-23 14:53:39 -05:00
m0duspwnens
90a224793e merge with 2.4dev and fix conflict 2023-01-23 14:49:32 -05:00
m0duspwnens
22fbb953ea create cronjob to run highstate after setup 2023-01-23 14:46:26 -05:00
Jason Ertel
d421aa82a2 do not treat all installs as ISO; fix check for non-empty mail files 2023-01-23 14:04:26 -05:00
Josh Patterson
1039e77550 Merge pull request #9617 from Security-Onion-Solutions/2.4/firewall
allow elastic agent on sensors to connect to managers
2023-01-23 13:19:49 -05:00
Mike Reeves
f077b5c96d Remove 18.04 2023-01-23 13:11:50 -05:00
Josh Brower
f811223ba7 Merge pull request #9614 from Security-Onion-Solutions/playbookfixup
Playbookfixup
2023-01-23 08:20:06 -05:00
Josh Brower
d3cb57bba2 Rerun the playbook state 2023-01-23 08:16:28 -05:00
m0duspwnens
a1fa4e3ef2 revert reload_modules since bugged 2023-01-20 15:43:57 -05:00
Josh Brower
1ab8c712e4 remove exit condition 2023-01-20 15:17:04 -05:00
Jason Ertel
a613d960b9 Merge pull request #9608 from Security-Onion-Solutions/kilo
setup improvements
2023-01-20 13:11:11 -05:00
Jason Ertel
9541214073 logCmd with tee is eating the exit code 2023-01-20 12:26:52 -05:00
Jason Ertel
56478da0b2 eliminate find/exec issue altogether to keep it simple 2023-01-20 11:58:29 -05:00
Jason Ertel
c3384d8381 further improvements 2023-01-20 11:23:13 -05:00
Jason Ertel
1e4f9c9f26 use newer find syntax to allow the exec to work inside a quoted string 2023-01-20 11:01:02 -05:00
Jason Ertel
fea4a1b33d Merge branch '2.4/dev' into kilo 2023-01-20 10:33:17 -05:00
Jason Ertel
ece63b72e2 Ensure so-verify output is logged 2023-01-20 07:38:58 -05:00
Jason Ertel
46aa7ebdf3 correct find/exec syntax 2023-01-20 06:48:33 -05:00
weslambert
9c83b775ee Merge pull request #9604 from Security-Onion-Solutions/feature/sensoroni_scripts
Add scripts for starting, stopping, and restarting Sensoroni
2023-01-19 16:59:29 -05:00
Wes
739c174898 Add scripts for starting, stopping, and restarting Sensoroni 2023-01-19 21:50:10 +00:00
Jason Ertel
4044706cd9 Merge pull request #9603 from Security-Onion-Solutions/kilo
Handle setup failures
2023-01-19 15:49:41 -05:00
Jason Ertel
79fb5dc525 prevent false success occurring when deleting the grafana dashboard 2023-01-19 14:19:55 -05:00
Jason Ertel
59177288ef correct grep patterns 2023-01-19 13:56:14 -05:00
Jason Ertel
85b5d1b317 Merge branch '2.4/dev' into kilo 2023-01-19 12:53:36 -05:00
Jason Ertel
6b7a8e1fcd fix verify path 2023-01-19 12:53:24 -05:00
Josh Brower
027c83b5ea Merge pull request #9601 from Security-Onion-Solutions/disablecontainer
Fixup
2023-01-19 11:47:04 -05:00
Josh Brower
4369d2385b Temp disable Elastic Registry Repo 2023-01-19 11:45:13 -05:00
Jason Ertel
c5260e4787 verify setup 2023-01-19 11:25:59 -05:00
Jason Ertel
35835edf96 Merge branch '2.4/dev' into kilo 2023-01-19 11:04:32 -05:00
weslambert
8c4e00cfbd Merge pull request #9600 from Security-Onion-Solutions/fix/elasticsearch_template_logs_default_remove
Remove default "logs-*" template settings for now
2023-01-19 10:30:44 -05:00
weslambert
7d3f6121eb Remove default "logs-*" template settings for now 2023-01-19 10:29:10 -05:00
Jason Ertel
05c7999df3 merge 2023-01-19 10:06:58 -05:00
Jason Ertel
05a6d702b0 Add logic to determine if setup succeeded and provide relevant output 2023-01-19 10:03:03 -05:00
Josh Brower
8ce96942c1 Merge pull request #9599 from Security-Onion-Solutions/disablecontainer
Temp disable Elastic Registry Repo
2023-01-19 07:27:51 -05:00
Josh Brower
e83e54936e Temp disable Elastic Registry Repo 2023-01-19 07:25:25 -05:00
weslambert
90f3e33cc6 Merge pull request #9597 from Security-Onion-Solutions/fix/elasticsearch_template_logs_default_priority_modification
Modify default 'logs-*' Elasticsearch template priority
2023-01-18 17:30:52 -05:00
weslambert
7a499c9051 Modify default 'logs-*' template priority 2023-01-18 17:24:07 -05:00
m0duspwnens
1eafb8d62a reload salt modules when docker is installed 2023-01-18 13:46:06 -05:00
m0duspwnens
d501b0fac9 add elastic agent to assigned hostgroups 2023-01-18 09:46:55 -05:00
weslambert
1bf088e976 Merge pull request #9591 from Security-Onion-Solutions/fix/kibana_basepath_rewrite_disable
Disable Kibana's native base path rewrite and add publicBaseUrl
2023-01-17 16:59:06 -05:00
weslambert
1fed3cf474 Disable Kibana's native base path rewrite and add publicBaseUrl 2023-01-17 16:54:31 -05:00
Josh Patterson
e0f8315d27 Merge pull request #9590 from Security-Onion-Solutions/2.4/firewall
create /opt/so/ for non manager nodes during setup
2023-01-17 15:36:34 -05:00
m0duspwnens
dbfe176b45 create /opt/so/ for non manager nodes during setup 2023-01-17 14:15:44 -05:00
Josh Patterson
2842178396 Merge pull request #9588 from Security-Onion-Solutions/2.4/firewall
fix iptables
2023-01-17 13:50:16 -05:00
m0duspwnens
aa858bab45 fix iptables 2023-01-17 13:48:39 -05:00
weslambert
1723f58c04 Merge pull request #9579 from Security-Onion-Solutions/fix/elasticsearch_templates_so-ids
Remove so-ids since the data stream is now 'logs-suricata-*'
2023-01-13 16:17:38 -05:00
weslambert
ca80548bf0 Remove so-ids since the data stream is now 'logs-suricata-*' 2023-01-13 16:15:58 -05:00
weslambert
3e5127810d Merge pull request #9577 from Security-Onion-Solutions/fix/elasticsearch_elastic_agent_templates
Make sure Elastic Agent data streams do not use replicas
2023-01-13 16:12:09 -05:00
weslambert
73a4dae28e Make sure Elastic Agent data streams do not use replicas 2023-01-13 16:10:44 -05:00
Josh Patterson
3efca0010a Merge pull request #9573 from Security-Onion-Solutions/2.4/firewall
2.4/firewall
2023-01-13 12:41:58 -05:00
m0duspwnens
3653df4d5f spell it right 2023-01-13 10:18:13 -05:00
m0duspwnens
6033e9a0de use port_bindings from docker defaults in docker states 2023-01-13 10:15:10 -05:00
weslambert
7cba5626b7 Merge pull request #9570 from Security-Onion-Solutions/fix/elasticsearch_templates_elastic_agent
Change priority for Elastic Agent Elasticsearch index templates
2023-01-12 16:48:12 -05:00
m0duspwnens
a69b0951d3 add strelka containers 2023-01-12 16:47:34 -05:00
weslambert
654d869e3e Change priority from 500 to 200 for Elastic Agent index templates to avoid collisions with other templates 2023-01-12 16:46:08 -05:00
m0duspwnens
d163d834d4 allow for binding ip and ports to different port number 2023-01-12 16:42:45 -05:00
weslambert
be6b42494c Merge pull request #9569 from Security-Onion-Solutions/fix/elasticsearch_ingest_pipeline_kratos
Kratos Index Changes
2023-01-12 15:33:51 -05:00
weslambert
fb8d8ea972 Update Elasticsearch index template for Kratos 2023-01-12 15:31:41 -05:00
weslambert
9416552338 Don't set the Kratos index explicitly 2023-01-12 15:25:35 -05:00
Mike Reeves
6c8b17d4d1 Merge pull request #9567 from Security-Onion-Solutions/mkr24
Fix nsm
2023-01-12 10:43:42 -05:00
Mike Reeves
8c5a060a80 Fix nsm 2023-01-12 10:41:54 -05:00
weslambert
66f9a06458 Merge pull request #9566 from Security-Onion-Solutions/fix/elastic_fleet_integration_policy_load
Fix Zeek import policies and remove unnecessary dash in RITAENABLED statement
2023-01-11 16:17:40 -05:00
Wes
0e437f84e7 Add back echo statement to print the import policy being loaded 2023-01-11 21:13:30 +00:00
Wes
ea01e68846 Fix Zeek import policies and remove unnecessary dash in RITAENABLED statement 2023-01-11 21:01:31 +00:00
Josh Patterson
add71cbdee Merge pull request #9565 from Security-Onion-Solutions/2.4/firewall
2.4/firewall
2023-01-11 15:04:25 -05:00
Mike Reeves
60d476457a Merge pull request #9564 from Security-Onion-Solutions/TOoSmOotH-patch-5
Update 0900_input_redis.conf.jinja
2023-01-11 14:54:40 -05:00
m0duspwnens
80f65fcd62 remove 514/tcp from filebeat for now 2023-01-11 14:54:05 -05:00
Mike Reeves
66924b63a7 Update 9999_output_redis.conf.jinja 2023-01-11 14:53:16 -05:00
Mike Reeves
bdaed849ea Update 0900_input_redis.conf.jinja 2023-01-11 14:52:32 -05:00
m0duspwnens
0d45c1583e add so-filebeat docker container ports and add to standalone 2023-01-11 14:48:20 -05:00
m0duspwnens
81e07997f0 add so-elastic-fleet docker container ports and add to standalone 2023-01-11 14:28:35 -05:00
Mike Reeves
4923fb1c35 Merge pull request #9563 from Security-Onion-Solutions/mkr24
Optimize reinstall process
2023-01-11 12:44:52 -05:00
Mike Reeves
8fa8b89d9c Fix reinstall logic 2023-01-11 12:43:22 -05:00
Mike Reeves
bab010a109 Fix reinstall logic 2023-01-11 12:40:18 -05:00
Mike Reeves
c07821a612 Fix reinstall logic 2023-01-11 12:32:43 -05:00
weslambert
acad7acc4a Merge pull request #9562 from Security-Onion-Solutions/fix/elastic_agent_integration_policy_load_suricata_import
Move Suricata import policy definition so that it does not get caught in the for loop for Zeek policies
2023-01-11 12:27:37 -05:00
Mike Reeves
b36f1bc79e Fix reinstall logic 2023-01-11 12:26:50 -05:00
weslambert
4391c22335 Move Suricata import policy definition so that it does not get caught in the for loop for Zeek policies 2023-01-11 12:23:50 -05:00
weslambert
39d1f07fab Merge pull request #9561 from Security-Onion-Solutions/fix/filebeat_remove_module_setup
Remove pipeline.load from top.sls so that Filebeat module loading is not attempted
2023-01-11 12:21:39 -05:00
Mike Reeves
35e0a78cad Fix reinstall logic 2023-01-11 12:20:57 -05:00
weslambert
b3e0183e39 Remove pipeline.load from top.sls so that Filebeat module loading is not attempted 2023-01-11 12:19:06 -05:00
Mike Reeves
708ba13721 Fix reinstall logic 2023-01-11 12:18:02 -05:00
Mike Reeves
eee433e8c4 Fix reinstall logic 2023-01-11 12:17:13 -05:00
Mike Reeves
cd57ff9820 Fix reinstall logic 2023-01-11 12:16:18 -05:00
Mike Reeves
6d1e6fc358 Fix reinstall logic 2023-01-11 12:15:21 -05:00
Mike Reeves
0531d369aa Fix reinstall logic 2023-01-11 11:09:06 -05:00
Mike Reeves
55911ef649 Fix reinstall logic 2023-01-11 11:05:01 -05:00
weslambert
355953427c Merge pull request #9553 from Security-Onion-Solutions/feature/filebeat_to_elastic_agent_conversion
Initial Conversion of Filebeat Inputs to Elastic Agent Inputs
2023-01-11 09:22:40 -05:00
Wes
52b620b137 Add additional conditional logic for Filebeat and disable Filebeat 2023-01-11 14:10:11 +00:00
Wes
33e2affb1d Remove newlines from end of Syslog processor definitions 2023-01-11 14:08:28 +00:00
Wes
c3b83f1fc8 Update template settings to use data streams 2023-01-11 14:03:11 +00:00
Wes
5062dd2873 Suricata Elasticsearch ingest node pipeline changes - set 'alert' dataset 2023-01-11 14:02:09 +00:00
Wes
2e886d0c55 Remove data_index_name processor since we are using data streams 2023-01-11 13:58:38 +00:00
Wes
5d86edeed4 Modify Logstash Elastic Agent output to accomodate for events with and without 'metadata.pipeline' 2023-01-11 13:57:32 +00:00
Wes
caf0ea6b53 Add Elastic Agent policy view script 2023-01-11 13:56:21 +00:00
Wes
a146f1134e Add Elastic Agent utility scripts 2023-01-11 13:54:42 +00:00
Mike Reeves
7cecc910d5 Merge pull request #9458 from Security-Onion-Solutions/2.4/firewall
2.4/firewall
2023-01-11 08:49:15 -05:00
Doug Burks
668fe10fc0 Merge pull request #9552 from Security-Onion-Solutions/fix/import-unnecessary-processes
Prevent unnecessary processes in Import Mode
2023-01-11 08:07:40 -05:00
m0duspwnens
76fff1b1e0 add logstash ports 2023-01-10 17:02:54 -05:00
Josh Patterson
5993d06896 Merge pull request #9548 from Security-Onion-Solutions/2.4minefunctionsconf
Update so-functions
2023-01-10 16:58:09 -05:00
Josh Patterson
64af393f40 Update so-functions
change MAININT to MNIC
2023-01-10 16:57:17 -05:00
Doug Burks
c15db73561 Avoid unnecessary Zeek processes in Import Mode 2023-01-10 16:48:47 -05:00
Doug Burks
554754421c Avoid unecessary Suricata processes in Import Mode 2023-01-10 16:48:06 -05:00
Doug Burks
322efa304a Avoid unnecessary processes in Import Mode 2023-01-10 16:47:18 -05:00
Mike Reeves
9995d06626 Merge branch '2.4/firewall' of https://github.com/Security-Onion-Solutions/securityonion into 2.4/firewall 2023-01-10 16:09:04 -05:00
Mike Reeves
ab3a7abcc7 run restore each time 2023-01-10 16:08:44 -05:00
Josh Patterson
f039ecb5ce Merge pull request #9547 from Security-Onion-Solutions/2.4/dev
2.4/dev
2023-01-10 13:42:44 -05:00
Mike Reeves
38962520ac Merge pull request #9546 from Security-Onion-Solutions/2.4minefunctionsconf
Update so-functions
2023-01-10 13:39:56 -05:00
Josh Patterson
0151830c85 Update so-functions 2023-01-10 13:37:56 -05:00
Mike Reeves
85978180c2 Merge pull request #9545 from Security-Onion-Solutions/revert-9544-2.4createrepoinstall
Revert "ensure yum-utils and createrepo are installed from so remote repo"
2023-01-10 13:13:31 -05:00
Mike Reeves
d3b8fbaafc Revert "ensure yum-utils and createrepo are installed from so remote repo" 2023-01-10 13:13:13 -05:00
Josh Patterson
745387a756 Merge pull request #9544 from Security-Onion-Solutions/2.4createrepoinstall
ensure yum-utils and createrepo are installed from so remote repo
2023-01-10 11:53:36 -05:00
m0duspwnens
39d808cb8f resolve conflict 2023-01-10 11:50:58 -05:00
Josh Patterson
ab8f41ecb5 Merge branch '2.4/firewall' into 2.4createrepoinstall 2023-01-10 11:38:31 -05:00
m0duspwnens
d2e623747d ensure yum-utils and createrepo are installed from so remote repo 2023-01-10 11:34:50 -05:00
Mike Reeves
3e9bddcd11 Changes to iptables.jinja 2023-01-09 15:36:23 -05:00
Mike Reeves
302bf28b6c Merge branch '2.4/firewall' of https://github.com/Security-Onion-Solutions/securityonion into 2.4/firewall 2023-01-09 15:00:05 -05:00
Mike Reeves
5058210bbb Changes to iptables.jinja 2023-01-09 14:59:55 -05:00
m0duspwnens
ac157432de include docker 2023-01-09 14:58:36 -05:00
m0duspwnens
ec5c565cec put elastalert on sosbridge 2023-01-09 14:49:33 -05:00
m0duspwnens
dbbcea0009 look for True 2023-01-09 11:53:32 -05:00
m0duspwnens
c313b19b50 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/firewall 2023-01-09 11:18:08 -05:00
Mike Reeves
73ae48d28e Merge pull request #9539 from Security-Onion-Solutions/mkr24
Changes to accept minion
2023-01-09 11:17:45 -05:00
Mike Reeves
0e1e9ff343 Changes to accept minion 2023-01-09 11:15:29 -05:00
Doug Burks
c3a5a02010 Merge pull request #9529 from Security-Onion-Solutions/dougburks-patch-1
Add missing Zeek log to filebeat defaults.yaml
2023-01-06 14:34:02 -05:00
Doug Burks
c1dfb9f935 Add missing Zeek log to filebeat defaults.yaml 2023-01-06 14:27:40 -05:00
Doug Burks
54e554eb3b Merge pull request #9528 from Security-Onion-Solutions/dougburks-patch-1
Remove line numbers from vi
2023-01-06 14:25:19 -05:00
Doug Burks
10e82c5f1c Remove line numbers from vi 2023-01-06 14:23:54 -05:00
m0duspwnens
d4c6834cd0 merge with 2.4/dev 2023-01-06 14:01:58 -05:00
m0duspwnens
4aacc6d1db change role names in so-firewall-minion 2023-01-06 11:09:09 -05:00
m0duspwnens
cb1822a62d change ref to DOCKER.sosrange 2023-01-05 15:57:06 -05:00
m0duspwnens
f10238da42 fw changes 2023-01-04 16:06:14 -05:00
Mike Reeves
2e53476a06 Merge pull request #9516 from Security-Onion-Solutions/mkr24
Add PW auth for Redis
2023-01-04 14:50:27 -05:00
Mike Reeves
275aead5b9 Allow auth for redis check for tgraf 2023-01-04 14:30:28 -05:00
Mike Reeves
e52b54720a Allow auth for redis check for tgraf 2023-01-04 14:26:24 -05:00
Mike Reeves
5afad52b3f Allow auth for redis check for tgraf 2023-01-04 14:18:08 -05:00
Mike Reeves
9bc08661c5 Allow auth for redis check for tgraf 2023-01-04 14:15:53 -05:00
Mike Reeves
48a3f4e261 Allow auth for redis check for tgraf 2023-01-04 14:14:10 -05:00
Doug Burks
723362e685 Merge pull request #9514 from Security-Onion-Solutions/fix/jinja-whitespace-2.4
fix jinja whitespace 2.4
2023-01-04 13:56:24 -05:00
doug
7ba4bdd87b fix jinja whitespace 2023-01-04 13:50:25 -05:00
Mike Reeves
831300b540 Require password auth for redis access 2023-01-04 11:02:40 -05:00
Doug Burks
4c1fc4c679 Merge pull request #9511 from Security-Onion-Solutions/fix/sysmon-fields-2.4
Improve default sysmon fields and add new network_connection fields
2023-01-04 07:58:16 -05:00
Doug Burks
5754365c6d Improve default sysmon fields and add new network_connection fields 2023-01-04 07:42:24 -05:00
Mike Reeves
761fbd0edf Merge pull request #9504 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update soc_global.yaml
2023-01-03 12:24:58 -05:00
Mike Reeves
08d7b24fb4 Update soc_global.yaml 2023-01-03 12:17:51 -05:00
Mike Reeves
df89445ab5 Update soc_global.yaml 2023-01-03 12:17:14 -05:00
m0duspwnens
203e612452 enable icc and hostbinding on sosbridge 2023-01-03 11:21:05 -05:00
weslambert
2c3bd6e3fd Merge pull request #9502 from Security-Onion-Solutions/fix/elasticsearch_ingest_pipeline_rita_beacon_2_4
Update RITA beacon parsing
2023-01-03 11:14:04 -05:00
m0duspwnens
c35a3e122f add ip to container.add containers to sosbridge 2023-01-03 11:13:50 -05:00
Wes
c8ff2c7a06 Update RITA beacon parsing 2023-01-03 16:03:49 +00:00
Doug Burks
3c91d842f5 Merge pull request #9499 from Security-Onion-Solutions/fix/sysmon-parsing-2.4
FIX: Sysmon logs are missing event.category and event.dataset #8194
2023-01-03 09:05:55 -05:00
doug
4e5d1d587e update sysmon ingest parser and Sysmon File dashboard 2023-01-03 09:02:17 -05:00
Jason Ertel
8d797ad9df Merge pull request #9490 from Security-Onion-Solutions/kilo
Ensure create/update dates are both reset when an admin sets a user pass
2022-12-30 11:47:01 -05:00
Jason Ertel
a89976779d Ensure create/update dates are both reset when an admin sets a user's password 2022-12-30 11:30:09 -05:00
Mike Reeves
058b4013aa Merge pull request #9470 from Security-Onion-Solutions/kilo
Kilo
2022-12-23 10:37:22 -05:00
Jason Ertel
136867c96a ensure zombie pipe is destroyed before SOC restarts 2022-12-23 10:27:49 -05:00
Mike Reeves
1b946ced7f Merge pull request #9469 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update soc_global.yaml
2022-12-23 08:58:07 -05:00
Mike Reeves
75ffd1f56b Update soc_global.yaml 2022-12-23 08:55:19 -05:00
Doug Burks
f335e7e477 Merge pull request #9466 from Security-Onion-Solutions/2.4/fix-grafana-playbook-links
Remove Grafana and Playbook links for Import mode
2022-12-22 16:09:46 -05:00
Doug Burks
5be074bbea Remove Grafana and Playbook links for Import mode 2022-12-22 15:45:25 -05:00
m0duspwnens
24876eecd9 change refs from sosnet to sosbridge 2022-12-22 14:02:40 -05:00
Mike Reeves
3f0ded0638 Merge pull request #9464 from Security-Onion-Solutions/mkr24
Add global annotation and influx support
2022-12-22 13:57:56 -05:00
Mike Reeves
cd77e71d8d Create annotation file for global settings 2022-12-22 13:37:41 -05:00
Mike Reeves
78f851e6c2 Create annotation file for global settings 2022-12-22 13:35:37 -05:00
Doug Burks
b02ba7edf7 Merge pull request #9463 from Security-Onion-Solutions/2.4/fix-grafana-eval
Enable Grafana in EVAL mode
2022-12-22 13:30:54 -05:00
m0duspwnens
90882ce1db disable docker from managing iptables 2022-12-22 13:26:10 -05:00
Mike Reeves
a924d48408 Specify Influxdb host 2022-12-22 13:12:19 -05:00
Mike Reeves
308228620a Specify Influxdb host 2022-12-22 13:05:33 -05:00
Mike Reeves
4620cd5edf Merge pull request #9462 from Security-Onion-Solutions/mkr24
Modify manager for repo
2022-12-22 13:01:58 -05:00
Doug Burks
2df4755fef Enable Grafana in EVAL mode 2022-12-22 12:54:57 -05:00
Mike Reeves
cf02b8e191 Modify manager for repo 2022-12-22 10:34:33 -05:00
Jason Ertel
a077645bb4 Merge branch '2.4/dev' into kilo 2022-12-22 10:27:13 -05:00
Jason Ertel
b6f37f8499 Correct indentation of client section 2022-12-22 10:26:51 -05:00
Doug Burks
f1d31a0c41 Merge pull request #9459 from Security-Onion-Solutions/2.4/fix-influxdb-telegraf
Make influxdb and telegraf consistent across import and eval modes
2022-12-22 10:26:36 -05:00
Doug Burks
e95034886e add influxdb and telegraf to import mode 2022-12-22 09:49:57 -05:00
Doug Burks
9352854fe4 enable influxdb for eval and import modes 2022-12-22 09:48:38 -05:00
Doug Burks
75e16963c8 add influxdb and telegraf to import mode 2022-12-22 09:47:47 -05:00
Doug Burks
dfd5947051 add influxdb and telegraf to import mode 2022-12-22 09:46:27 -05:00
m0duspwnens
b4908e2bb9 add iptables.jinja 2022-12-22 09:31:45 -05:00
Jason Ertel
ba13ad7151 Merge pull request #9454 from Security-Onion-Solutions/kilo
fix redis defaults to force string keys instead of numeric
2022-12-21 18:16:40 -05:00
Jason Ertel
38634fde17 fix redis defaults to force string keys instead of numeric 2022-12-21 18:15:17 -05:00
Jason Ertel
8b6006e9c3 fix redis defaults to force string keys instead of numeric 2022-12-21 18:14:18 -05:00
Jason Ertel
3fd210463e fix redis defaults to force string keys instead of numeric 2022-12-21 18:11:39 -05:00
Doug Burks
f99279ca24 Merge pull request #9453 from Security-Onion-Solutions/feature/improve-dashboards-2.4
FEATURE: Improve SOC Dashboards #9450 2.4
2022-12-21 15:46:11 -05:00
Doug Burks
69415a0d8d Improve Strelka dashboard 2022-12-21 15:34:35 -05:00
Doug Burks
506556f0d2 Improve Firewall dashboard 2022-12-21 15:29:09 -05:00
Doug Burks
d7b2c88201 Improve Software dashboard 2022-12-21 15:24:58 -05:00
Doug Burks
4519c533a2 Improve Intel dashboard 2022-12-21 15:20:27 -05:00
Josh Patterson
8d35e0120e Merge pull request #9451 from Security-Onion-Solutions/2.4/so-kibana-config-load
need space between curl.config and -X
2022-12-21 15:11:54 -05:00
m0duspwnens
6d6fa4c1e3 need space between curl.config and -X 2022-12-21 15:06:56 -05:00
m0duspwnens
accc293c8a 2.4 firewall changes 2022-12-21 15:03:45 -05:00
Doug Burks
3a367d69f4 Improve FTP dashboard 2022-12-21 14:37:17 -05:00
Doug Burks
a4f1f75306 Improve NIDS Alerts dashboard 2022-12-21 14:33:01 -05:00
Jason Ertel
5a5c565fae Merge pull request #9449 from Security-Onion-Solutions/kilo
Ensure user/pass values are quoted due to symbol chars appearing in values
2022-12-21 14:02:38 -05:00
Jason Ertel
0889d49025 Ensure user/pass values are quoted due to symbol chars appearing in the values 2022-12-21 14:00:10 -05:00
Doug Burks
3d1ce4ef10 Improve SOC dashboards 2022-12-21 13:26:04 -05:00
Jason Ertel
33a1aea729 Merge pull request #9448 from Security-Onion-Solutions/kilo
improve so-status rendering on terminals that only support 8 colors
2022-12-21 10:14:47 -05:00
Jason Ertel
8e63909edf improve so-status rendering on terminals that only support 8 colors 2022-12-21 10:11:38 -05:00
Mike Reeves
ab9edd4e6b Merge pull request #9421 from Security-Onion-Solutions/mkr24
Redis defaults.yaml
2022-12-21 09:15:49 -05:00
Mike Reeves
aa7690864a Modify redis config defaults 2022-12-20 22:05:04 -05:00
Mike Reeves
e1d0f99a14 Modify redis config defaults 2022-12-20 22:00:10 -05:00
Mike Reeves
38e23a0110 Modify Kratos config defaults 2022-12-20 21:21:18 -05:00
Mike Reeves
3768c0fee2 Fix Redis 2022-12-20 21:16:53 -05:00
Mike Reeves
8c6a2ce83a Fix Kratos mode 2022-12-20 21:00:06 -05:00
Mike Reeves
9428949c79 Fix Kratos top 2022-12-20 20:56:06 -05:00
Mike Reeves
90061e2683 Fix Kratos top 2022-12-20 20:54:43 -05:00
Mike Reeves
c3917a373c Fix Kratos top 2022-12-20 20:52:01 -05:00
m0duspwnens
318aac880e file.managed for kratos schema 2022-12-20 17:40:29 -05:00
m0duspwnens
16b882a10e new states for kratos config and schema 2022-12-20 15:34:58 -05:00
Mike Reeves
eaa705ee3e Fix Kratos Pillar entry 2022-12-20 14:38:17 -05:00
Jason Ertel
2edc3cac11 Clarify Kratos annotations 2022-12-20 14:08:49 -05:00
Mike Reeves
13e5fa7544 SOC files for Kratos 2022-12-20 13:30:51 -05:00
m0duspwnens
a2d0de7e49 kratos config jinja 2022-12-20 12:15:33 -05:00
Josh Brower
f7150d423c Merge pull request #9440 from Security-Onion-Solutions/fleet-setup-fixes
Make Fleet setup less fragile
2022-12-20 11:55:14 -05:00
Josh Brower
73a9c3bb38 Make Fleet setup less fragile 2022-12-20 11:52:56 -05:00
Doug Burks
03f682dbec Merge pull request #9439 from Security-Onion-Solutions/2.4/remove-old-whiptail
Remove whiptail_network_init_notice
2022-12-20 11:16:24 -05:00
Mike Reeves
c0c2d28d19 SOC files for Redis 2022-12-20 11:09:49 -05:00
Doug Burks
1371c4d01f remove whiptail_network_init_notice from so-whiptail 2022-12-20 10:46:14 -05:00
Doug Burks
388e0a08ae remove old whiptail reference from so-functions 2022-12-20 10:45:30 -05:00
Doug Burks
6487e6e1f0 remove old whiptail reference from so-setup 2022-12-20 10:44:37 -05:00
Doug Burks
d4c54ce161 Merge pull request #9438 from Security-Onion-Solutions/dougburks-patch-1
so-status should ignore commented entries in so-status.conf
2022-12-20 09:16:21 -05:00
Doug Burks
894434715b so-status should ignore commented entries in so-status.conf
Import mode comments out so-steno, so-suricata, and so-zeek in so-status.conf, so so-status should ignore these lines.
2022-12-20 09:05:07 -05:00
Doug Burks
86fc0e11b0 Merge pull request #9436 from Security-Onion-Solutions/2.4/improve-import
Import mode does not need Elastic Fleet or Playbook
2022-12-20 07:32:24 -05:00
Doug Burks
69811b4d74 Import mode does not need Elastic Fleet or Playbook 2022-12-20 06:46:01 -05:00
Doug Burks
316d2cd9a5 Merge pull request #9435 from Security-Onion-Solutions/2.4/fix-import
Fix Import Mode in 2.4
2022-12-20 06:13:37 -05:00
doug
cd55be2f83 move IMPORT to top of list 2022-12-19 16:58:43 -05:00
doug
9d8951ceb8 fix import 2022-12-19 16:55:16 -05:00
Doug Burks
7168c4f91a fix import in so-setup 2022-12-19 16:48:35 -05:00
Mike Reeves
aea91cc776 Merge branch 'mkr24' of https://github.com/Security-Onion-Solutions/securityonion into mkr24 2022-12-19 16:21:47 -05:00
Mike Reeves
74af54a200 SOC file for influx 2022-12-19 16:16:48 -05:00
m0duspwnens
6a4718ec0f merge defaults with pillar 2022-12-19 15:55:35 -05:00
m0duspwnens
30419e5b2b fix import and jinja spacing 2022-12-19 14:51:12 -05:00
m0duspwnens
ce0b920195 jinja conf for influxdb 2022-12-19 14:44:52 -05:00
m0duspwnens
e5d38255fa jinja conf for influxdb 2022-12-19 14:42:48 -05:00
Josh Brower
b901efc90d Merge pull request #9434 from Security-Onion-Solutions/2.4/allow-editing-efpolicies
Unmanage default policies
2022-12-19 14:33:16 -05:00
Josh Brower
6d07ab0c40 Unmanage default policies 2022-12-19 14:27:36 -05:00
Mike Reeves
c20f8c230b Initial SOC file for influx 2022-12-19 14:02:01 -05:00
Doug Burks
cf884c68a7 Merge pull request #9433 from Security-Onion-Solutions/dougburks-patch-1
Remove another hardcoded docs URL
2022-12-19 13:16:42 -05:00
Doug Burks
0494efaea0 remove temporary message 2022-12-19 13:15:02 -05:00
Mike Reeves
149038d08e pillar tops 2022-12-19 12:06:45 -05:00
Mike Reeves
fde65db021 Add influx pillars during setup 2022-12-19 12:03:00 -05:00
Mike Reeves
61bfeb82d9 fix defaults for influx 2022-12-19 11:01:19 -05:00
Mike Reeves
56f326d123 fix defaults for influx 2022-12-19 10:46:39 -05:00
Doug Burks
d7b47814dc Merge pull request #9432 from Security-Onion-Solutions/2.4/refactor-docs-url
2.4: Refactor docs URL
2022-12-19 10:43:22 -05:00
Mike Reeves
d9343d8450 fix defaults for redis 2022-12-19 10:38:11 -05:00
Mike Reeves
42157ff2b1 fix defaults for redis 2022-12-19 10:36:35 -05:00
Doug Burks
df1b564d17 Replace hardcoded URL in so-analyst-install with new $DOC_BASE_URL variable from so-common 2022-12-19 10:30:29 -05:00
Doug Burks
73f2789c95 Replace hardcoded URLs in soup with new $DOC_BASE_URL variable from so-common 2022-12-19 10:28:20 -05:00
m0duspwnens
3c00d67879 fix redis defaults 2022-12-19 10:24:28 -05:00
Doug Burks
a28f804f7f Replace hardcoded URLs with new $DOC_BASE_URL variable from so-common 2022-12-19 10:24:03 -05:00
Doug Burks
042693895a add new DOC_BASE_URL variable to so-common 2022-12-19 10:21:54 -05:00
m0duspwnens
01d6b2b1f1 jinja the redis config 2022-12-19 10:14:48 -05:00
weslambert
c220c322ef Merge pull request #9431 from Security-Onion-Solutions/fix/elasticsearch_templates_elastic_agent
Remove 'so-' prefix for Elastic Agent/Fleet component templates
2022-12-19 10:14:39 -05:00
weslambert
fd1be0ab2c Remove 'so-' prefix for Elastic Agent/Fleet component templates 2022-12-19 10:11:26 -05:00
Mike Reeves
4c90c1af12 Add defaults for redis 2022-12-18 18:07:02 -05:00
Doug Burks
c25a828dd2 Merge pull request #9417 from Security-Onion-Solutions/2.4/eval
Fix EVAL mode in 2.4
2022-12-16 16:39:46 -05:00
Doug Burks
0fa6ca3880 init.sls needs to import GLOBALS 2022-12-16 15:59:17 -05:00
Jason Ertel
1b42965a6d Merge pull request #9416 from Security-Onion-Solutions/jertel/lic
license key format change and eventFields dedup
2022-12-16 15:58:08 -05:00
Jason Ertel
fa7488effb change format of license key for compat with config alignment 2022-12-16 15:56:02 -05:00
Mike Reeves
93a8b76070 Add defaults for influxdb 2022-12-16 15:17:25 -05:00
Doug Burks
490e97b49f Merge pull request #9415 from Security-Onion-Solutions/2.4/dev
2.4/dev
2022-12-16 15:07:39 -05:00
Doug Burks
4384b83b65 Merge pull request #9412 from Security-Onion-Solutions/dougburks-patch-1
fix telegraf_pillar
2022-12-16 13:51:32 -05:00
Doug Burks
9c4d441b4d fix telegraf_pillar 2022-12-16 13:36:26 -05:00
doug
b9e51fc7cf first round of fixes for eval mode 2022-12-16 13:24:02 -05:00
Doug Burks
93056e802f remove old comment 2022-12-16 13:17:27 -05:00
Mike Reeves
3f4ad8b983 Merge pull request #9411 from Security-Onion-Solutions/mkr24
Change telegraf to match config map standard
2022-12-16 13:10:15 -05:00
Jason Ertel
b37697e95d Switch license key to single line to avoid multiline/list conflicts 2022-12-16 12:50:22 -05:00
Mike Reeves
676aec7576 Add config map 2022-12-16 11:22:53 -05:00
Mike Reeves
b5cc5a023d Merge pull request #9410 from Security-Onion-Solutions/mkr24
Add Telegraf to the GUI for 2.4
2022-12-16 08:44:57 -05:00
Mike Reeves
5badfb9cf5 Fix pillar 2022-12-16 08:38:31 -05:00
Jason Ertel
7853d972b6 Set default key to empty string to ensure new keys are type aligned correctly 2022-12-15 18:31:47 -05:00
Mike Reeves
8a0991afd0 Fix pillar 2022-12-15 15:05:57 -05:00
Jason Ertel
f84ceca03e consolidate eventFields from hunt and dashbaords into a single setting 2022-12-15 14:22:23 -05:00
Mike Reeves
6b3149f4e9 Fix the pillar top 2022-12-15 14:03:21 -05:00
Mike Reeves
175f413beb Minor gui tweak 2022-12-15 13:36:00 -05:00
Mike Reeves
121d07733f Merge the defaults and pillar for telegraf 2022-12-15 13:29:31 -05:00
Mike Reeves
e55086230d Merge the defaults and pillar for telegraf 2022-12-15 13:28:29 -05:00
Mike Reeves
d37a4b14ca Spelling error 2022-12-15 12:02:01 -05:00
Mike Reeves
fd27044471 Spelling error 2022-12-15 11:57:06 -05:00
Mike Reeves
ed87b08fc1 Spelling error 2022-12-15 10:59:07 -05:00
Mike Reeves
5d732872d6 Add soc gui info for telegraf 2022-12-15 10:51:22 -05:00
Mike Reeves
28e8c54443 Wire telegraf initial commit 2022-12-15 10:43:58 -05:00
Jason Ertel
6a73410be9 Merge pull request #9394 from Security-Onion-Solutions/jertel/mvkr
move Kratos DB to /nsm
2022-12-14 15:00:44 -05:00
Jason Ertel
52c4553ea6 move Kratos DB to /nsm 2022-12-14 14:28:34 -05:00
Jason Ertel
9885f418fa move Kratos DB to /nsm 2022-12-14 14:22:55 -05:00
Mike Reeves
c79457b41d Merge pull request #9386 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update config.map.jinja
2022-12-13 13:56:14 -05:00
Mike Reeves
6352b3fd53 Update config.map.jinja 2022-12-13 13:55:09 -05:00
Doug Burks
61c976f8a6 Merge pull request #9384 from Security-Onion-Solutions/2.4/streamline-setup
miscellaneous improvements for 2.4
2022-12-13 13:43:31 -05:00
Doug Burks
07df9ad0e0 FIX: so-import utilities should hyperlink to dashboards #9373 2022-12-13 13:30:38 -05:00
Doug Burks
ca3c99ac99 FIX: so-import utilities should hyperlink to dashboards #9373 2022-12-13 13:29:59 -05:00
doug
6eedae601f improve welcome screen 2022-12-13 12:35:43 -05:00
doug
d58579d916 improve grammar 2022-12-13 12:05:02 -05:00
weslambert
09b012ad4e Merge pull request #9372 from Security-Onion-Solutions/fix/sensoroni_analyzers_configuration_check_2_4
Fix localfile analyzer 'file_path' check and add new list value verification function for helpers
2022-12-13 11:47:18 -05:00
doug
0072cc42db add extra newline 2022-12-13 11:34:29 -05:00
doug
0f84f419b2 fix sizing 2022-12-13 11:31:12 -05:00
Wes
3ab8a0be60 Update tests to account for change in 'file_path' value verification 2022-12-13 16:29:18 +00:00
Wes
eae05e83e6 Use new list verification function for 'file_path' 2022-12-13 16:28:50 +00:00
Wes
117d230b9d Add new test for list value verification function 2022-12-13 16:28:22 +00:00
Wes
5422c5b3e2 Add new function to verify list value 2022-12-13 16:27:58 +00:00
doug
d3a8bdff52 setup improvements 2022-12-13 11:20:00 -05:00
Doug Burks
f94eb243e4 Merge pull request #9367 from Security-Onion-Solutions/dougburks-patch-1
Upgrade to Elastic 8.5.3
2022-12-13 10:14:41 -05:00
Doug Burks
3dd4e31f49 Upgrade to Elastic 8.5.3 in config_saved_objects.ndjson 2022-12-13 10:07:52 -05:00
Doug Burks
2004184b72 Upgrade to Elastic 8.5.3 in so-kibana-config-load 2022-12-13 10:06:23 -05:00
Doug Burks
ed8bf884eb Merge pull request #9355 from Security-Onion-Solutions/fix/2.4-ics
Fix ICS and other issues in 2.4
2022-12-12 09:18:14 -05:00
Doug Burks
e1d200e6ce Remove duplicate TDS dashboard from defaults.yaml 2022-12-11 14:39:08 -05:00
Doug Burks
72f71ba695 Fix TDS dashboard in defaults.yaml 2022-12-11 14:36:27 -05:00
Doug Burks
be75062612 Update so-import-pcap 2022-12-10 15:17:02 -05:00
Doug Burks
da8e098655 update so-import-evtx 2022-12-10 15:16:32 -05:00
Doug Burks
cb16bd36fb fix descriptions in defaults.yaml 2022-12-10 14:31:59 -05:00
Doug Burks
cf7d8076e9 remove old Wazuh Hunt queries in defaults.yaml 2022-12-10 14:21:58 -05:00
Doug Burks
cd664b2d39 remove old Modbus dashboard from defaults.yaml 2022-12-10 14:16:39 -05:00
Doug Burks
7f07a94a98 remove old DNP3 and Wazuh dashboards from defaults.yaml 2022-12-10 14:14:24 -05:00
Doug Burks
8a0f94f8df increase window width to accommodate extra text in so-whiptail 2022-12-10 11:24:11 -05:00
Doug Burks
66ad10cf77 fix airgap text in so-whiptail 2022-12-10 10:41:30 -05:00
Doug Burks
de2427cabe add -p option to mkdir in so-elastic-fleet-setup 2022-12-10 08:20:38 -05:00
Doug Burks
187ca4c453 Update soc defaults.yaml to include dnp3_control and dnp3_objects eventfields 2022-12-10 07:33:09 -05:00
Doug Burks
c4ea39d1ba Merge pull request #9349 from Security-Onion-Solutions/fix/2.4-ics
2.4: Fix multiple ICS issues and keep import indices open as in 2.3
2022-12-09 15:09:49 -05:00
doug
c2e10a4359 remove duplicate import iteration from so-functions 2022-12-09 11:00:06 -05:00
doug
90093395b6 keep so-import indices open as in 2.3 2022-12-09 10:23:09 -05:00
doug
565ca4e94f keep so-import indices open as in 2.3 2022-12-09 08:49:25 -05:00
weslambert
69c7bb11c6 Merge pull request #9343 from Security-Onion-Solutions/fix/analyzers_localfile_file_path
FIX: Ensure file path is ascertainable by localfile.py for localfile analyzer
2022-12-08 17:08:19 -05:00
weslambert
9477f29432 Remove double quotes to fix issue with file path sourcing from 'localfile.py' 2022-12-08 17:06:43 -05:00
doug
5c00ab7b7f correct order in defaults.yaml 2022-12-08 16:50:34 -05:00
doug
07a4919cd3 remove old opcua files 2022-12-08 16:43:11 -05:00
doug
7cfb688890 update defaults.yaml 2022-12-08 16:32:04 -05:00
Doug Burks
cf53242cf8 Merge pull request #9334 from Security-Onion-Solutions/dougburks-patch-1
update wording in so-whiptail
2022-12-08 10:43:22 -05:00
Doug Burks
c01486b009 update wording in so-whiptail 2022-12-08 10:32:03 -05:00
Mike Reeves
8af9dddd2e Merge pull request #9326 from Security-Onion-Solutions/config
Switch back to older style redirect due to incompatibility with Ubuntu 18
2022-12-07 14:10:23 -05:00
Jason Ertel
0bbc68edae Switch back to older style redirect due to incompatibility with Ub 18 2022-12-07 14:08:11 -05:00
Jason Ertel
ef3def156d Switch back to older style redirect due to incompatibility with Ubuntu 18 2022-12-07 14:03:31 -05:00
Mike Reeves
71e0d7c499 Merge pull request #9325 from Security-Onion-Solutions/config
Switch back to grep instead of pgrep
2022-12-07 12:13:27 -05:00
Jason Ertel
9f72cfa1fc roll back to grep instead of pgrep due to cron issue 2022-12-07 12:08:31 -05:00
Jason Ertel
fde33de030 Use original style due to pgrep conflict with cron 2022-12-07 11:51:49 -05:00
Jason Ertel
d1f554723a Merge pull request #9317 from Security-Onion-Solutions/config
Reduce cron noise; ensure filecheck is restarted if modified
2022-12-07 08:41:04 -05:00
Jason Ertel
e849783a86 Reduce cron noise; ensure filecheck is restarted if modified 2022-12-07 08:36:56 -05:00
weslambert
2240283457 Merge pull request #9316 from Security-Onion-Solutions/fix/ics_scada_filebeat_disable_ecat_arp_info
Disable Filebeat input for 'ecat_arp_info' Zeek logs
2022-12-07 08:08:42 -05:00
weslambert
def0c85349 Disable Filebeat input for 'ecat_arp_info' Zeek logs 2022-12-07 08:00:21 -05:00
weslambert
31832ae150 Merge pull request #9309 from Security-Onion-Solutions/fix/ignore_additional_strelka_rules_causing_compilation_errors
Ignore additional rules causing YARA compilation errors
2022-12-06 14:01:14 -05:00
weslambert
7ce0924382 Ignore additional rules causing compilation errors 2022-12-06 13:59:21 -05:00
weslambert
73304e049c Merge pull request #9304 from Security-Onion-Solutions/feature/ics_scada_additions
Port STUN, TDS, WireGuard, and ICS/SCADA Changes from 2.3 to 2.4
2022-12-06 13:14:47 -05:00
weslambert
a626acced0 Add new ICS/SCADA event fields to the dashboards section of the configuration and remove extra space in key names. 2022-12-06 13:11:55 -05:00
Jason Ertel
6443e702a5 Merge pull request #9305 from Security-Onion-Solutions/config
Filecheck support for Suricata
2022-12-06 12:53:19 -05:00
Jason Ertel
88410bc8f8 Merge branch '2.4/dev' into config 2022-12-06 12:38:43 -05:00
Jason Ertel
168cd00e1b Handle suricata extracted with filecheck 2022-12-06 12:34:02 -05:00
Wes
1b5c1fecd4 Revert SOC default 'alerts' event fields and specify additional event fields for ICS/SCADA events 2022-12-06 17:28:30 +00:00
Wes
b048eec3c0 Add STUN, TDS, WireGuard, and ICS/SCADA dashboard queries 2022-12-06 17:17:49 +00:00
Wes
f44eee134a Add default queries and ICS/SCADA queries 2022-12-06 16:52:20 +00:00
Wes
c741fe6b4d Ensure ICS/SCADA plugins/scripts are enabled 2022-12-06 16:23:26 +00:00
Wes
be5775e4a0 Ensure Filebeat defaults file is updated with ICS/SCADA log references 2022-12-06 16:15:09 +00:00
Wes
499b5d95f2 Add 'ics' tag for 'bsap'-prefixed events/logs 2022-12-06 16:01:57 +00:00
Wes
14af1d36cb Ensure ICS/SCADA pipelines are present 2022-12-06 15:58:47 +00:00
Jason Ertel
fd13c7ccc0 Additional metadata for soc 2022-12-05 09:03:22 -05:00
Mike Reeves
7e102949a6 Merge pull request #9268 from Security-Onion-Solutions/TOoSmOotH-patch-5
Update init.sls
2022-12-02 12:58:12 -05:00
Mike Reeves
f083b3867b Update init.sls 2022-12-02 09:40:35 -05:00
Mike Reeves
55444288bc Merge pull request #9254 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update filecheck
2022-11-30 11:04:18 -05:00
Mike Reeves
f83545c556 Update filecheck 2022-11-30 11:02:56 -05:00
weslambert
117a3d486a Merge pull request #9210 from Security-Onion-Solutions/fix/add_missing_opcua_activate_session_pipelines_2_4
Add Missing OPCUA Activate Session Pipelines
2022-11-22 16:01:45 -05:00
Wes
7f324bc47e Remove extra space used during testing 2022-11-22 20:52:08 +00:00
Wes
a6bc5b108f Add missing OPCUA 'activate_session' pipelines 2022-11-22 20:51:44 +00:00
weslambert
090f8309c2 Merge pull request #9207 from Security-Onion-Solutions/fix/ingest_typos_2_4
Fix spelling of 'wireguard.responses' field name
2022-11-22 15:36:04 -05:00
m0duspwnens
b95a83b016 Merge remote-tracking branch 'remotes/origin/2.4/dev' into dockerips 2022-11-22 14:17:19 -05:00
m0duspwnens
b05839bb93 use single quote 2022-11-22 13:07:58 -05:00
weslambert
356904f751 Fix spelling of 'wireguard.responses' field name 2022-11-22 13:03:04 -05:00
weslambert
f9cc7888f4 Merge pull request #9204 from Security-Onion-Solutions/fix/ics_ingest_field_names_2_4
Fix ICS Ingest Field Names
2022-11-22 12:30:17 -05:00
weslambert
6b77843e52 Fix format/speliing for 'enip.status_code' field name 2022-11-22 12:07:55 -05:00
weslambert
13faf63770 Fix spelling for 'stun.class' field name 2022-11-22 12:07:15 -05:00
m0duspwnens
6d89d58c50 ensure createrepo and yum-utils is installed from so repo 2022-11-22 11:10:30 -05:00
m0duspwnens
4b6b42f9b9 dont try to add sosnet if it exists 2022-11-22 10:19:18 -05:00
weslambert
b801997709 Merge pull request #9196 from Security-Onion-Solutions/fix/missing_ics_pipelines_2_4
Add COTP and TDS ingest pipelines
2022-11-22 08:44:19 -05:00
Wes
a38e312df4 Add COTP and TDS ingest pipelines 2022-11-22 13:36:27 +00:00
weslambert
bde899e7cb Merge pull request #9194 from Security-Onion-Solutions/fix/ics_tag_syntax_error_2_4
Fix syntax error for 'ics' tag logic
2022-11-22 07:32:54 -05:00
weslambert
d2bc1a5523 Fix syntax error for 'ics' tag logic 2022-11-22 07:24:54 -05:00
weslambert
68efd817e0 Merge pull request #9189 from Security-Onion-Solutions/feature/filebeat_config_ics_event_tag_2_4
Add 'ics' tag to events generated from ICS protocol logs
2022-11-21 17:06:14 -05:00
weslambert
fe180d5657 Fix indentation 2022-11-21 17:02:17 -05:00
weslambert
9994d47a43 Add 'ics' tag to events generated from ICS protocol logs 2022-11-21 16:46:47 -05:00
Doug Burks
6e1e6e15e8 Merge pull request #9186 from Security-Onion-Solutions/dougburks-patch-2
Add ICS/SCADA logs to filebeat defaults.yaml
2022-11-21 13:30:35 -05:00
Doug Burks
febb781428 Add ICS/SCADA logs to filebeat defaults.yaml 2022-11-21 12:10:55 -05:00
weslambert
061f0b0595 Merge pull request #9159 from Security-Onion-Solutions/feature/additional_ics_scada_ingest_pipelines_2_4
Add additional ICS/SCADA ingest node pipelines
2022-11-21 10:32:00 -05:00
Doug Burks
5a0fe6050b Merge pull request #9179 from Security-Onion-Solutions/dougburks-patch-2
Simplify version in README.md to just 2.4
2022-11-21 08:46:33 -05:00
Doug Burks
778ee4b00f Simplify version in README.md to just 2.4 2022-11-21 08:39:18 -05:00
Jason Ertel
5f59ae52d5 Merge pull request #9162 from Security-Onion-Solutions/config
Config
2022-11-17 11:50:35 -05:00
Wes
05b9a067fd Add additional ICS/SCADA ingest node pipelines 2022-11-17 16:03:21 +00:00
Jason Ertel
ed9aa5b73f Ensure filecheck is up by checking every minute 2022-11-17 10:48:53 -05:00
Jason Ertel
7f7e5474ed Add more logging for filecheck monitoring, and ensure scripts are accessible to salt-relay 2022-11-17 10:43:05 -05:00
Jason Ertel
0ffef75d7b Move background jobs to cron 2022-11-17 09:50:41 -05:00
Jason Ertel
c572848ece temporarily remove filecheck for debug purposes 2022-11-17 08:06:24 -05:00
Jason Ertel
7cd5d625d1 temporarily remove salt-pipe for debug purposes 2022-11-16 20:45:50 -05:00
Jason Ertel
4497037442 Use bg:True to send cmd to background 2022-11-16 20:03:54 -05:00
weslambert
c14c8c1306 Merge pull request #9154 from Security-Onion-Solutions/fix/ics_scada_ingest_pipeline_updates_2_4
Update ingest node pipelines for ICS/SCADA protocols
2022-11-16 16:17:19 -05:00
Wes
638a3568b0 Update ingest node pipelines for ICS/SCADA protocols 2022-11-16 21:11:21 +00:00
m0duspwnens
d97e13b473 add /24 back to default bip, rever daemon.json 2022-11-16 14:47:40 -05:00
m0duspwnens
a3b505971b remove /24 from docker bip 2022-11-16 12:51:43 -05:00
Josh Brower
98af16055c Merge pull request #9151 from Security-Onion-Solutions/2.4/elasticfleet-ag
Initial support for Elastic Fleet Package Registry
2022-11-16 08:45:29 -05:00
Josh Brower
8db49feb32 Use our docker image 2022-11-16 08:24:25 -05:00
m0duspwnens
9ffde8bff5 ensure options are strings 2022-11-15 17:46:08 -05:00
m0duspwnens
19f043cfe2 add some options for sosnet 2022-11-15 17:39:08 -05:00
m0duspwnens
54e4749ddf remove comma 2022-11-15 17:30:55 -05:00
m0duspwnens
d246aa6a80 we dont need default network config 2022-11-15 17:14:33 -05:00
m0duspwnens
75825617da add soc to sosnet 2022-11-15 17:13:25 -05:00
m0duspwnens
edd993fd82 change dupe soc to elastalert 2022-11-15 16:02:17 -05:00
Mike Reeves
813e59aa61 Add statics 2022-11-15 13:23:35 -05:00
Josh Brower
48d191b656 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/elasticfleet-ag 2022-11-15 12:13:05 -05:00
Josh Patterson
a371c89f38 Update top.sls 2022-11-15 11:52:51 -05:00
Josh Patterson
1c242fb7f3 Update top.sls 2022-11-15 11:52:25 -05:00
Josh Patterson
c0afcca87a Update init.sls 2022-11-15 11:16:18 -05:00
Mike Reeves
591616fe5b Add statics to all containers 2022-11-15 11:05:17 -05:00
Mike Reeves
efc8621524 Fix some settings and add all defaults 2022-11-15 10:31:37 -05:00
Mike Reeves
6016b0e38a Add dynamic ability for IP range for sosnet 2022-11-14 20:20:38 -05:00
Mike Reeves
e41361e127 Add Docker IP Skeleton 2022-11-14 17:43:14 -05:00
Mike Reeves
a40e10da83 Add Docker IP Skeleton 2022-11-14 17:41:38 -05:00
Mike Reeves
3378f58300 Add Docker IP Skeleton 2022-11-14 17:07:42 -05:00
Mike Reeves
a2d3b95e92 Add Docker IP Skeleton 2022-11-14 13:04:31 -05:00
Mike Reeves
5c50fdb74c Add Docker IP Skeleton 2022-11-14 13:00:56 -05:00
Mike Reeves
f1135342a9 Add Docker IP Skeleton 2022-11-14 11:17:48 -05:00
Doug Burks
a2da8e5e08 Merge pull request #9129 from Security-Onion-Solutions/dougburks-patch-1
fix descriptions in files related to analyzers
2022-11-12 19:26:34 +00:00
Doug Burks
632464335f fix descriptions in files related to analyzers 2022-11-12 13:14:02 -05:00
Doug Burks
f77db78219 fix descriptions in files related to analyzers 2022-11-12 13:13:30 -05:00
Doug Burks
2f4ce91678 fix descriptions in files related to analyzers 2022-11-12 13:12:58 -05:00
Doug Burks
154dff98de fix descriptions in files related to analyzers 2022-11-12 13:12:23 -05:00
Doug Burks
a15ca3cc49 fix descriptions in files related to analyzers 2022-11-12 13:11:38 -05:00
Doug Burks
a6ad7fa3ac Merge pull request #9125 from Security-Onion-Solutions/dougburks-patch-2
FIX: Avoid deprecation warning in Zeek file extraction script #9123
2022-11-11 21:33:43 +00:00
Doug Burks
40f5bb25ef FIX: Avoid deprecation warning in Zeek file extraction script #9123 2022-11-11 16:28:23 -05:00
Josh Patterson
7420c31411 Merge pull request #9096 from Security-Onion-Solutions/salt3005.1_2.4
roll back to salt 3004.2
2022-11-08 15:47:00 -05:00
m0duspwnens
00cb0f5abb roll back to salt 3004.2 2022-11-08 15:45:18 -05:00
Mike Reeves
bf31b593ed Merge pull request #9055 from Security-Onion-Solutions/strelkastuff
Strelkastuff
2022-11-08 13:45:42 -05:00
Josh Patterson
4870b4b91f Merge pull request #9095 from Security-Onion-Solutions/salt3005.1_2.4
upgrade to salt 3005.1
2022-11-08 13:45:24 -05:00
m0duspwnens
1a678064dc upgrade to salt 3005.1 2022-11-08 13:42:24 -05:00
Josh Brower
c389944e5c Initial support for Elastic Package Registry 2022-11-08 09:56:53 -05:00
Mike Reeves
de19a4dc53 Add Strelka Filecheck 2022-11-02 10:04:33 -04:00
Mike Reeves
d97de9fd0d Add Strelka Filecheck 2022-11-02 10:02:21 -04:00
Mike Reeves
bf5df1ac51 Add Strelka Filecheck 2022-11-02 09:57:07 -04:00
Mike Reeves
225c33e5c9 Add Strelka Filecheck 2022-11-02 09:46:23 -04:00
Mike Reeves
4187363451 Add Strelka Filecheck 2022-11-02 09:44:08 -04:00
Doug Burks
f3fc52dd2c Merge pull request #9041 from Security-Onion-Solutions/dougburks-patch-1
https://github.com/Security-Onion-Solutions/securityonion/pull/8952
2022-11-01 13:40:51 +00:00
Doug Burks
2030f08b54 https://github.com/Security-Onion-Solutions/securityonion/pull/8952 2022-11-01 09:35:53 -04:00
Jason Ertel
55f22af758 Merge pull request #9017 from Security-Onion-Solutions/config
Retry so-user commands if another process is currently using so-user
2022-10-27 15:41:37 -04:00
Jason Ertel
35fab05bdd Retry so-user commands if another process is currently using so-user 2022-10-27 15:25:08 -04:00
Jason Ertel
d7b370e31b Merge pull request #9010 from Security-Onion-Solutions/config
regex should match entire input against allowed logLevel values
2022-10-27 13:17:51 -04:00
Josh Patterson
c6ebe5c8dd Merge pull request #9016 from Security-Onion-Solutions/patch2.4
Patch2.4
2022-10-27 13:07:54 -04:00
m0duspwnens
8af0334c3c Merge remote-tracking branch 'remotes/origin/2.4/dev' into patch2.4 2022-10-27 11:08:32 -04:00
m0duspwnens
6525e0f201 setup no longer add patch pillar to minion 2022-10-27 10:56:29 -04:00
m0duspwnens
a95c2a690a add defaults and map for patch state 2022-10-27 10:54:29 -04:00
Jason Ertel
6347532dd8 regex should match entire input against allowed logLevel values 2022-10-26 18:48:20 -04:00
weslambert
8b0ea7104f Merge pull request #9003 from Security-Onion-Solutions/fix/remove_ja3er_references
Remove JA3er references
2022-10-26 10:37:45 -04:00
weslambert
0ede5a7313 Remove JA3er references 2022-10-26 10:24:25 -04:00
weslambert
409b8c276e Merge pull request #8999 from Security-Onion-Solutions/fix/sensoroni_analyzers_pyyaml_wheel_name
Fix PyYAML .whl file name and remove JA3er analyzer
2022-10-25 15:32:20 -04:00
Wes
803d2d4d75 Add PyYAML .whl files back since they were 'deleted' in the previous commit 2022-10-25 19:15:54 +00:00
Wes
0267ece4bf Fix PyYAML .whl file name and remove JA3er analyzer 2022-10-25 19:11:52 +00:00
Josh Patterson
d148febc99 Merge pull request #8967 from Security-Onion-Solutions/curator2.4
add line space
2022-10-21 11:56:01 -04:00
m0duspwnens
8c5197c2ea add line space 2022-10-21 11:49:01 -04:00
Josh Patterson
8197017b6c Merge pull request #8966 from Security-Onion-Solutions/curator2.4
Curator2.4
2022-10-21 11:26:51 -04:00
m0duspwnens
8b5c79fb39 add so-kratos and so-ossec to curator defaults 2022-10-21 11:21:03 -04:00
m0duspwnens
71eaa715b6 update jinja 2022-10-21 11:09:52 -04:00
m0duspwnens
c880be8d45 use curator defaults.yaml merged with pillar for actions 2022-10-21 10:38:32 -04:00
Josh Patterson
3af271a13c Merge pull request #8930 from Security-Onion-Solutions/statesglobals
Statesglobals
2022-10-17 16:06:42 -04:00
m0duspwnens
998870ac87 Merge remote-tracking branch 'remotes/origin/2.4/dev' into statesglobals 2022-10-17 15:58:44 -04:00
m0duspwnens
b089a58243 use registry_host instead of manager 2022-10-17 15:53:29 -04:00
m0duspwnens
09b7af2998 fix typo 2022-10-17 15:50:48 -04:00
m0duspwnens
deba743ef0 fix elasticsearch auth globals 2022-10-13 13:54:52 -04:00
m0duspwnens
04b4030eb6 only add elasticsearch.auth to elasticsearch global var if auth exists 2022-10-13 12:31:41 -04:00
Doug Burks
7ede0c3c76 Merge pull request #8915 from Security-Onion-Solutions/dougburks-patch-2
Remove destination_geo.organization_name from Sysmon Network sankey diagram
2022-10-13 13:04:23 +00:00
Doug Burks
f6151b3895 Remove destination_geo.organization_name from Sysmon Network sankey diagram 2022-10-13 09:03:10 -04:00
Jason Ertel
fd6bea92da Merge pull request #8913 from Security-Onion-Solutions/config
retry up to 25 minutes if APT is locked by an unattended upgrade. This is an increase from 8 minutes.
2022-10-13 07:01:00 -04:00
Jason Ertel
1c23d91a3b retry up to 25 minutes if APT is locked by an unattended upgrade. This is an increase from 8 minutes. 2022-10-13 06:57:17 -04:00
m0duspwnens
78b496a689 fix mine_functions.conf 2022-10-12 16:03:44 -04:00
m0duspwnens
95f7cb6bcd change file_mode to mode 2022-10-12 14:21:55 -04:00
m0duspwnens
eed3746ebc fix some globals 2022-10-12 13:39:37 -04:00
m0duspwnens
6a17f201a2 changes for backup state 2022-10-12 11:31:42 -04:00
weslambert
078213ddb3 Merge pull request #8898 from Security-Onion-Solutions/feature/elastic-agent-configuration-log-package
Add log package for Fleet to allow for custom log ingestion
2022-10-11 12:14:15 -04:00
weslambert
dd09ce7aab Add log package for Fleet to allow for custom log ingestion 2022-10-11 12:00:57 -04:00
m0duspwnens
b526532ab6 use global vars in states 2022-10-11 11:57:15 -04:00
Doug Burks
2c5038aa9c Merge pull request #8879 from Security-Onion-Solutions/2.4/improve-sysmon-dashboards
improve sysmon dashboards
2022-10-07 16:46:51 +00:00
doug
d65fde9536 improve sysmon dashboards 2022-10-07 12:23:40 -04:00
weslambert
8437592bb5 Merge pull request #8869 from Security-Onion-Solutions/feature/elastic-8.4.3
Elastic 8.4.3
2022-10-06 16:03:36 -04:00
weslambert
bee1b06f76 Update to Kibana 8.4.3 2022-10-06 15:14:43 -04:00
weslambert
985e1728d7 Update to Kibana 8.4.3 2022-10-06 15:13:27 -04:00
Mike Reeves
46bdd1acad Merge pull request #8837 from Security-Onion-Solutions/config
Add SOC annotations
2022-10-03 08:46:46 -04:00
Jason Ertel
0fdec03fa9 use yaml anchor to avoid duplicated annotations 2022-09-30 15:15:35 -04:00
Jason Ertel
30a23a4cd0 Add SOC annotations 2022-09-30 15:00:08 -04:00
Jason Ertel
fe62744c05 Merge pull request #8825 from Security-Onion-Solutions/config
resolve inode issue with soc_users_roles when deleting a user; other minor improvements
2022-09-27 17:38:20 -04:00
Jason Ertel
5708f3595e Avoid overwriting the file inode since it's mapped into a running container 2022-09-27 17:27:28 -04:00
Jason Ertel
e519548557 add logLevel default and annotation for quick access to enabling debug logs 2022-09-27 16:55:28 -04:00
Jason Ertel
981371c72f log salt-relay responses for troubleshooting assistance 2022-09-27 16:48:47 -04:00
Jason Ertel
16d24d4bc9 Merge pull request #8822 from Security-Onion-Solutions/config
user management / sync
2022-09-27 11:14:32 -04:00
Jason Ertel
53b4f01921 replace quotes on minion arg 2022-09-27 10:54:08 -04:00
Jason Ertel
851e44e5fa ensure salt-relay is restarted when SOC is manually restarted 2022-09-27 10:31:14 -04:00
Jason Ertel
7f7f2c15d0 add support for querying active salt jobs (future use) 2022-09-27 10:29:21 -04:00
Josh Patterson
004fa8167e Merge pull request #8821 from Security-Onion-Solutions/fix/soc2.4
Fix/soc2.4
2022-09-27 10:15:04 -04:00
m0duspwnens
6bd4860f19 fix path 2022-09-27 09:57:01 -04:00
m0duspwnens
42b03ca6df add missing soc things 2022-09-27 09:53:48 -04:00
Jason Ertel
556ddc2ee4 sync in background 2022-09-27 09:24:34 -04:00
Jason Ertel
8e175b2d3f add manual sync 2022-09-27 07:05:04 -04:00
Mike Reeves
e032a9f449 Merge pull request #8816 from Security-Onion-Solutions/funstuff 2022-09-26 18:15:14 -04:00
Mike Reeves
2066efcabf Add Rules to sync 2022-09-26 17:18:28 -04:00
Mike Reeves
37c98c14cd Fix zeek logs in filebeat 2022-09-26 17:11:10 -04:00
Mike Reeves
aa7dd47b00 Fix zeek logs in filebeat 2022-09-26 17:01:44 -04:00
Doug Burks
ea8d9362ae Merge pull request #8813 from Security-Onion-Solutions/dougburks-patch-1
Change managing-rules.html to rules.html in soc_idstools.yaml
2022-09-26 19:00:41 +00:00
Doug Burks
80201f1465 Change managing-rules.html to rules.html in soc_idstools.yaml 2022-09-26 14:58:51 -04:00
Jason Ertel
0ad1a1a262 so-user and salt-relay updates for user management 2022-09-26 14:57:33 -04:00
Doug Burks
1b13e454f8 Merge pull request #8812 from Security-Onion-Solutions/2.4/dev-fix-screenshots
fix screenshots in README.md
2022-09-26 17:49:10 +00:00
doug
97a6b3c2f3 fix screenshots 2022-09-26 13:46:46 -04:00
Josh Brower
97f42dcce5 Merge pull request #8811 from Security-Onion-Solutions/2.4/elastic-fleet
Live Query - View in Hunt fix
2022-09-26 09:35:12 -04:00
Josh Brower
a0b579019f Live Query - View in Hunt fix 2022-09-26 09:27:09 -04:00
Doug Burks
4e5eb1cbb8 Merge pull request #8807 from Security-Onion-Solutions/2.4/dev-ocd
initial quick OCD pass
2022-09-23 20:39:54 +00:00
doug
fee5a7bea9 initial quick OCD pass 2022-09-23 16:29:55 -04:00
Josh Brower
d698238ed1 Merge pull request #8799 from Security-Onion-Solutions/2.4/elastic-fleet
Live Query - View in Hunt link
2022-09-23 15:00:32 -04:00
Mike Reeves
e3f4a58989 Merge pull request #8804 from Security-Onion-Solutions/funstuff
Firewall and More
2022-09-23 14:00:51 -04:00
Mike Reeves
d26be44df1 update soc_firewall.yaml 2022-09-23 13:09:46 -04:00
Mike Reeves
3e2be096be update soc_firewall.yaml 2022-09-23 13:08:03 -04:00
Mike Reeves
2b9322b823 Helps if you add the IP address 2022-09-23 08:52:58 -04:00
Josh Patterson
02f1d24ea6 remove minion hg 2022-09-23 08:40:25 -04:00
Josh Patterson
975c7fabcc remove minion hg 2022-09-23 08:39:48 -04:00
Josh Patterson
5e32e333c4 remove minion hg 2022-09-23 08:37:59 -04:00
Josh Brower
c7eccfd0c5 Live Query - View in Hunt link 2022-09-22 20:17:57 -04:00
Mike Reeves
a7872234ab Remove NTP from setup 2022-09-22 17:07:00 -04:00
Mike Reeves
4b059ce7fb Firewall Changes 2022-09-22 17:04:18 -04:00
Mike Reeves
75b058c37f Firewall Changes 2022-09-22 17:03:03 -04:00
Mike Reeves
f9c77900ae Firewall Changes 2022-09-22 16:54:57 -04:00
Mike Reeves
81f79c3a02 Firewall Changes 2022-09-22 16:33:08 -04:00
Josh Patterson
3100efc954 fix syntax 2022-09-22 16:03:12 -04:00
Mike Reeves
4eebd855ac Firewall Changes 2022-09-22 15:47:16 -04:00
m0duspwnens
abee5afd7b adjust standalone firewall assigned_hostgroups 2022-09-22 15:40:52 -04:00
m0duspwnens
06d3681cec 2.4/firewall 2022-09-22 13:39:10 -04:00
weslambert
49dace66de Merge pull request #8796 from Security-Onion-Solutions/fix/elasticsearch_fleet_component_template_syntax
Fix syntax for Fleet component templates
2022-09-22 11:14:16 -04:00
Wes
0fd5fee868 Fix syntax for Fleet component templates 2022-09-22 15:07:43 +00:00
m0duspwnens
c77fcc74c1 merge in 2.4./firewall changes 2022-09-22 10:55:39 -04:00
m0duspwnens
2995ae32bd 2.4 fw changes 2022-09-22 10:49:26 -04:00
weslambert
e35c77be62 Merge pull request #8785 from Security-Onion-Solutions/fix/elasticsearch_component_templates_fleet_main
Add additional component templates for Fleet and fix references for Elastic Agent index templates in defaults.yaml
2022-09-20 17:02:02 -04:00
Wes
46dd4c2749 Rename component mappings and references for Security Onion 2022-09-20 20:33:06 +00:00
Josh Patterson
f0ddfecd42 Merge pull request #8784 from Security-Onion-Solutions/2.4/zeek
2.4/zeek
2022-09-20 16:28:40 -04:00
Wes
7f2c5bc757 Add component templates for Fleet 2022-09-20 20:27:26 +00:00
m0duspwnens
e1ea3c2031 soc for zeek 2022-09-20 16:22:54 -04:00
Mike Reeves
85339d7cb1 Add helpLinks to everything 2022-09-20 15:43:34 -04:00
Doug Burks
8a537204d6 Merge pull request #8783 from Security-Onion-Solutions/2.4/fix-docs-links
fix docs links
2022-09-20 19:34:01 +00:00
m0duspwnens
1685e0e6db few more 2022-09-20 15:25:50 -04:00
Doug Burks
0137004344 Fix releaseNotesUrl in defaults.yaml 2022-09-20 15:16:53 -04:00
Doug Burks
530c497800 Update motd.md 2022-09-20 15:16:04 -04:00
Doug Burks
0eafed32a4 Update docs links in README.md 2022-09-20 15:13:14 -04:00
Mike Reeves
097c05b114 Cleanup on aisle 4 2022-09-20 13:49:26 -04:00
Mike Reeves
0ade4d7847 Adjust portgroup yaml 2022-09-20 13:45:29 -04:00
Mike Reeves
b622940f3f Remvoe NTP from setup 2022-09-20 13:32:41 -04:00
Mike Reeves
555bd678fb Change Firewall Pillar Structure 2022-09-20 13:28:32 -04:00
Mike Reeves
27a9edbef7 Change Firewall Pillar Structure 2022-09-20 13:20:16 -04:00
m0duspwnens
75aa121b2d fix some things 2022-09-20 13:19:15 -04:00
Doug Burks
bc57a74ac8 Merge pull request #8782 from Security-Onion-Solutions/dougburks-patch-1
change version to 2.4.0
2022-09-20 16:52:39 +00:00
Doug Burks
aadce055d1 change version to 2.4.0 2022-09-20 12:49:14 -04:00
Mike Reeves
678d5c5c9c Replace so-firewall 2022-09-20 11:22:20 -04:00
m0duspwnens
29285b8fb1 fix conflixt in zeek/init.sls 2022-09-20 11:12:44 -04:00
m0duspwnens
d1ee3a7d04 zeek 2.4 2022-09-20 11:11:29 -04:00
Mike Reeves
9fffe1b5fa Replace so-firewall 2022-09-20 11:11:19 -04:00
Doug Burks
8c88285365 Merge pull request #8780 from Security-Onion-Solutions/2.4/sysmon-fix-bryant
2.4/sysmon fix bryant
2022-09-20 14:32:35 +00:00
Doug Burks
df18f8f886 Merge pull request #8779 from Security-Onion-Solutions/2.4/dev
2.4/dev
2022-09-20 13:32:54 +00:00
Josh Brower
0815b607e6 Merge pull request #8778 from Security-Onion-Solutions/2.4/elastic-fleet
Hunt Query - Elastic Agent Live Osquery Logs
2022-09-20 08:29:47 -04:00
Josh Brower
120fdef173 Hunt Query - Elastic Agent Live Osquery Logs 2022-09-20 08:27:47 -04:00
Josh Brower
da8d09713f Merge pull request #8776 from Security-Onion-Solutions/2.4/elastic-fleet
Hunt Query - Elastic Agent Live Osquery Logs
2022-09-20 06:20:51 -04:00
Josh Brower
3eb4adc5c3 Hunt Query - Elastic Agent Live Osquery Logs 2022-09-19 20:12:47 -04:00
Mike Reeves
512c044d80 Thresholding 2022-09-19 16:53:51 -04:00
weslambert
d4fb78fe3b Merge pull request #8775 from Security-Onion-Solutions/fix/elasticsearch_elastic_agent_index_templates_load
Update so-elasticsearch-templates-load to allow for proper loading of differently formatted Elastic Agent index templates
2022-09-19 16:44:21 -04:00
weslambert
509c32482f Update so-elasticsearch-templates-load to allow for proper loading of differently formatted Elastic Agent index templates 2022-09-19 16:39:49 -04:00
Mike Reeves
a1aae627a2 Merge pull request #8771 from Security-Onion-Solutions/funstuff
Add NTP and NGINX
2022-09-19 16:33:05 -04:00
Mike Reeves
e72eae2e8a NGINX fun 2022-09-19 16:23:46 -04:00
Mike Reeves
fad0e0a145 NGINX fun 2022-09-19 16:14:37 -04:00
Mike Reeves
cb2e46f275 NGINX fun 2022-09-19 16:11:49 -04:00
Josh Brower
b38804840d Merge pull request #8772 from Security-Onion-Solutions/2.4/grafana-ids
Grafana SOC Redirect
2022-09-19 16:02:41 -04:00
Josh Brower
80919827c6 Fixup index patterns 2022-09-19 15:55:23 -04:00
Josh Patterson
0367365225 Merge pull request #8773 from Security-Onion-Solutions/fix/soc2.4
fix some soc defaults
2022-09-19 15:54:25 -04:00
m0duspwnens
30afc88322 fix some soc defaults 2022-09-19 15:51:29 -04:00
Josh Brower
ea7979cfdd Add Elastic Agent datastreams to SOC index 2022-09-19 15:33:15 -04:00
m0duspwnens
79785fc053 zeek jinja 2022-09-19 15:26:32 -04:00
Mike Reeves
22e8c7ef3e Add NTP 2022-09-19 15:10:11 -04:00
Mike Reeves
2abfcdc042 Add NTP 2022-09-19 14:48:40 -04:00
doug
fdffac83e1 sysmon fix by bryant 2022-09-19 14:47:45 -04:00
Mike Reeves
17cbe38c25 Add NTP 2022-09-19 14:32:29 -04:00
Mike Reeves
74ccf333e0 Add NTP 2022-09-19 14:30:23 -04:00
Mike Reeves
44be7b4969 Add NTP 2022-09-19 14:26:16 -04:00
Mike Reeves
03ea714dc1 Add NTP 2022-09-19 14:06:46 -04:00
Mike Reeves
f7e614f358 Add NTP 2022-09-19 14:06:30 -04:00
Josh Brower
d28a9ecec2 Set Dashboard UUID 2022-09-19 13:32:04 -04:00
weslambert
4c2ac9dd93 Merge pull request #8770 from Security-Onion-Solutions/fix/elasticsearch_cluster_settings
Re-establish Elasticsearch cluster (search) settings
2022-09-19 12:10:55 -04:00
Wes
9095bc2205 Re-establish Elasticsearch cluster (search) settings 2022-09-19 15:41:54 +00:00
Mike Reeves
0a885221e8 Merge pull request #8769 from Security-Onion-Solutions/funstuff
Firewall and Sensoroni Fix
2022-09-19 11:05:46 -04:00
Mike Reeves
32034078fa Fix sensoroni Agent 2022-09-19 10:48:36 -04:00
Mike Reeves
aa8ce074f7 Fix sensoroni Agent 2022-09-19 10:43:05 -04:00
Mike Reeves
04a0be8247 Merge branch '2.4/dev' into funstuff 2022-09-19 10:41:53 -04:00
Mike Reeves
e3e6e7b4e8 Fix sensoroni Agent 2022-09-19 10:41:01 -04:00
Jason Ertel
21f8b3b61c Merge pull request #8768 from Security-Onion-Solutions/config
refactor sostatus telegraf input script
2022-09-19 10:35:22 -04:00
Jason Ertel
ae6fbab45d refactor sostatus telegraf input script 2022-09-19 10:27:20 -04:00
Mike Reeves
f4508aa534 Fix sensoroni Agent 2022-09-19 10:22:32 -04:00
Mike Reeves
61f3479d92 Merge branch '2.4/dev' into funstuff 2022-09-19 09:40:27 -04:00
Mike Reeves
9bdb364122 Firewall Fun 2022-09-19 09:39:42 -04:00
Jason Ertel
f2b09c84d4 Merge pull request #8767 from Security-Onion-Solutions/config
Config
2022-09-19 09:18:10 -04:00
Jason Ertel
7d965b5cda Ensure so-status does not get jinjafied 2022-09-19 09:17:06 -04:00
Jason Ertel
b4add5ebb3 Merge pull request #8766 from Security-Onion-Solutions/config
complete rewrite of so-status
2022-09-19 07:40:51 -04:00
Mike Reeves
d7585e1b3d Firewall Fun 2022-09-17 10:03:18 -04:00
Mike Reeves
4a68a5e054 Firewall Fun 2022-09-17 09:57:43 -04:00
Mike Reeves
98ae6149dc Firewall Fun 2022-09-17 09:54:20 -04:00
Mike Reeves
e717579113 Firewall Fun 2022-09-17 09:51:26 -04:00
Mike Reeves
8a26b3fa04 Firewall Fun 2022-09-17 09:47:15 -04:00
Mike Reeves
724d5d952a Firewall Fun 2022-09-17 09:46:07 -04:00
Mike Reeves
b6a1040090 Firewall Fun 2022-09-17 09:42:35 -04:00
Mike Reeves
f3056c7057 Firewall Fun 2022-09-17 09:39:49 -04:00
Mike Reeves
4b1031efa4 Firewall Fun 2022-09-17 09:34:35 -04:00
Jason Ertel
9542a5ada2 complete rewrite of so-status 2022-09-16 17:46:52 -04:00
weslambert
0a8aae8180 Merge pull request #8757 from Security-Onion-Solutions/fix/elastic_agent_templates_managed_by_securityonion
Change managed_by value from 'fleet' to 'security_onion' for Elastic Agent templates in defaults.yaml
2022-09-16 17:20:03 -04:00
Wes
12e940f809 Change managed_by value from 'fleet' to 'security_onion' for Elastic Agent templates in defaults.yaml 2022-09-16 20:55:49 +00:00
Mike Reeves
d02c6808a4 Firewall Fun 2022-09-16 13:44:54 -04:00
Mike Reeves
1c9069690f Firewall Fun 2022-09-16 13:38:07 -04:00
Mike Reeves
0eb6388ea3 Firewall Fun 2022-09-16 13:34:11 -04:00
Mike Reeves
6649ffd8b5 Firewall Fun 2022-09-16 13:33:26 -04:00
Mike Reeves
70c95c7c7b Firewall Fun 2022-09-16 13:31:23 -04:00
Mike Reeves
bc1921bd0e Firewall Fun 2022-09-16 13:30:07 -04:00
Josh Brower
eba82553a1 Merge pull request #8755 from Security-Onion-Solutions/2.4/tls
Change ssl_ecdh_curve
2022-09-16 13:28:35 -04:00
Mike Reeves
384478836a Firewall Fun 2022-09-16 13:02:11 -04:00
Mike Reeves
f14a8f3d01 Firewall Fun 2022-09-16 12:55:56 -04:00
Mike Reeves
943b98f091 IDS Tools rule management 2022-09-16 11:16:05 -04:00
Mike Reeves
f9e9e4ce1d IDS Tools rule management 2022-09-16 11:14:09 -04:00
Mike Reeves
ae5eea6e3a IDS Tools rule management 2022-09-16 11:12:03 -04:00
Mike Reeves
5e151a9fed Fix minion pillar for remote sensors 2022-09-16 10:43:36 -04:00
Mike Reeves
958d2494a8 Zeek Test 2022-09-16 10:27:42 -04:00
Mike Reeves
2a51ecb1ac Zeek Test 2022-09-16 09:10:09 -04:00
Josh Brower
d5debd9b6b Change ssl_ecdh_curve 2022-09-16 09:06:09 -04:00
Mike Reeves
f02db7a815 Zeek Test 2022-09-16 09:05:16 -04:00
Mike Reeves
58ab91ea84 Add BPF 2022-09-16 08:50:17 -04:00
Mike Reeves
9a6fe3e8de Add BPF 2022-09-16 08:36:44 -04:00
Mike Reeves
2c0d90bea4 Make test ping retry 2022-09-15 17:07:02 -04:00
Mike Reeves
c50a1608af Make test ping retry 2022-09-15 17:01:53 -04:00
weslambert
6212a288e4 Merge pull request #8752 from Security-Onion-Solutions/fix/logstash_remove_osquery_livequery_output_configuration
Remove Osquery live query Logstash output configuration
2022-09-15 15:53:49 -04:00
Mike Reeves
e6c0c2ce19 Modify Steno Config 2022-09-15 15:46:28 -04:00
Wes
1a90eeb1b1 Remove Osquery live query Logstash output configuration 2022-09-15 19:45:28 +00:00
m0duspwnens
5a9b3f6821 fix diskfreepercantage 2022-09-15 15:39:31 -04:00
m0duspwnens
62f5ee04a4 fix source for steno config 2022-09-15 15:13:40 -04:00
m0duspwnens
52b58ad6ae jinja for steno/pcap 2022-09-15 15:12:40 -04:00
Mike Reeves
9a75d939b4 Modify Steno Config 2022-09-15 13:55:39 -04:00
Mike Reeves
3286d55ef2 Modify Steno Config 2022-09-15 13:46:14 -04:00
Mike Reeves
c49c7348ff Merge pull request #8751 from Security-Onion-Solutions/funstuff
Funstuff
2022-09-15 13:15:51 -04:00
Mike Reeves
7d6e847f86 Fix Zeek PIllar 2022-09-15 13:11:03 -04:00
Mike Reeves
73d45bd9fc Update defaults for Steno 2022-09-15 12:56:02 -04:00
Mike Reeves
383714ec06 Fix pcap error 2022-09-15 12:38:55 -04:00
Mike Reeves
4357f013f0 Merge pull request #8748 from Security-Onion-Solutions/funstuff
Fix setup error
2022-09-15 11:12:21 -04:00
Mike Reeves
2e4f122e57 Fix setup error 2022-09-15 11:10:33 -04:00
Mike Reeves
b93c38759b Merge pull request #8747 from Security-Onion-Solutions/funstuff
Fix setup error
2022-09-15 10:58:59 -04:00
Mike Reeves
8e99e02787 Fix setup error 2022-09-15 10:57:52 -04:00
Mike Reeves
1c00344327 Merge pull request #8746 from Security-Onion-Solutions/funstuff
Fix for Suricata
2022-09-15 10:53:22 -04:00
Mike Reeves
0351ef4ff5 Fix Suricata analyzers list 2022-09-15 10:48:08 -04:00
m0duspwnens
845d2e33bd remove dupe afpacket 2022-09-15 10:44:39 -04:00
m0duspwnens
4cb955fe8d jinja for the suricata outputs 2022-09-15 10:35:59 -04:00
Josh Brower
99f54acef1 Merge pull request #8742 from Security-Onion-Solutions/2.4/elastic-fleet
2.4/elastic fleet
2022-09-15 07:16:37 -04:00
Josh Brower
bdfde669f3 remove outdated scripts 2022-09-14 18:38:08 -04:00
Josh Brower
798b39ec09 elastic-fleet so-status & restart scripts 2022-09-14 18:36:26 -04:00
Mike Reeves
8528645c2c Update suricata_config.map.jinja 2022-09-14 15:02:55 -04:00
Mike Reeves
f8c1571a91 Update suricata_config.map.jinja 2022-09-14 14:43:04 -04:00
Mike Reeves
30a469ea63 Update afpacket.map.jinja 2022-09-14 14:36:13 -04:00
Josh Brower
0c1f9eaa37 Merge pull request #8739 from Security-Onion-Solutions/2.4/elastic-fleet
EA Certs & image
2022-09-14 14:20:17 -04:00
Mike Reeves
90ed4fd4cb Fix Suricata 2022-09-14 14:18:10 -04:00
Josh Brower
1c671b47d7 Run container as elastic-fleet user 2022-09-14 14:17:54 -04:00
Mike Reeves
ee59822097 Fix Suricata 2022-09-14 14:15:50 -04:00
Mike Reeves
74a8bd17ea Fix Suricata 2022-09-14 13:56:17 -04:00
Mike Reeves
c60afba450 Fix core count 2022-09-14 12:30:22 -04:00
Mike Reeves
8049f9b9e4 Fix so-minion error for setup 2022-09-14 12:22:10 -04:00
Mike Reeves
8a5a58c647 Fix so-minion error for setup 2022-09-14 12:21:21 -04:00
Mike Reeves
547abb0fe1 Remove learn 2022-09-14 12:12:33 -04:00
Mike Reeves
be4c15877a Improve pcap defaults 2022-09-14 11:11:21 -04:00
Mike Reeves
0a40bfcb88 Change how pcap is written to the minion file 2022-09-14 11:00:22 -04:00
Josh Brower
b7b92c73a3 add so-elastic-agent to container list 2022-09-14 11:00:16 -04:00
Josh Brower
334a0d7b1c Start using so-elastic-agent container 2022-09-14 10:33:27 -04:00
weslambert
39c7c8cf80 Merge pull request #8738 from Security-Onion-Solutions/fix/remove_old_pipeline_config
Remove old Logstash pipeline configuration - initial cleanup
2022-09-14 10:30:37 -04:00
Wes
926a1e0189 Remove Snort output configuration 2022-09-14 14:22:00 +00:00
Wes
ce3ea456b6 Remove flow output configuration 2022-09-14 14:21:21 +00:00
Wes
d1a8b88eb9 Remove postprocess configuration 2022-09-14 14:20:24 +00:00
Wes
e3cd8a9c6a Remove main pipeline configuration 2022-09-14 14:20:08 +00:00
Wes
43f89adbd4 Remove preprocess configuration 2022-09-14 14:19:07 +00:00
Mike Reeves
a4dc63f3a4 Change how zeek and suri are populated in the minion file 2022-09-14 09:53:57 -04:00
Josh Brower
6945596eee Tweak elastic agent ssl gen 2022-09-14 08:10:42 -04:00
Josh Brower
bf14612258 Change out Elastic Fleet certs 2022-09-13 15:58:53 -04:00
Jason Ertel
0d32cc38d6 Merge pull request #8733 from Security-Onion-Solutions/config
Always use local docs
2022-09-13 14:40:10 -04:00
Mike Reeves
d36f2f642f Merge pull request #8734 from Security-Onion-Solutions/funstuff
Updates for grafana
2022-09-13 14:39:49 -04:00
Jason Ertel
deb19d24b8 Always use local docs 2022-09-13 14:24:35 -04:00
Jason Ertel
d1eb7ef849 Always use local docs 2022-09-13 14:23:50 -04:00
Mike Reeves
064b64f68a Add Grafana annotation 2022-09-13 14:00:04 -04:00
Mike Reeves
de047cea8e Add Grafana annotation 2022-09-13 13:56:37 -04:00
Jason Ertel
810d89eb6c Merge pull request #8731 from Security-Onion-Solutions/config
Remove comments to avoid confusing config viewers within SOC
2022-09-13 12:16:38 -04:00
Mike Reeves
8e8223b767 Merge pull request #8732 from Security-Onion-Solutions/funstuff
Update watermark settings
2022-09-13 12:16:17 -04:00
Mike Reeves
b38f0fa996 Update watermark settings 2022-09-13 12:13:45 -04:00
Jason Ertel
d12ff79af0 Remove comments to avoid confusing config viewers within SOC 2022-09-13 12:08:19 -04:00
Jason Ertel
8c5cba58aa Merge pull request #8730 from Security-Onion-Solutions/config
Config
2022-09-13 11:52:05 -04:00
Mike Reeves
8144588534 Merge pull request #8729 from Security-Onion-Solutions/funstuff
Fix advanced view
2022-09-13 11:50:43 -04:00
Jason Ertel
d2fc712400 Initial SOC annotations 2022-09-13 11:49:19 -04:00
Jason Ertel
21c7f940d7 Update copyrights 2022-09-13 11:48:25 -04:00
Mike Reeves
df1a64b5e0 Modify more defaults 2022-09-13 11:45:59 -04:00
Mike Reeves
a32ff6f403 Modify Suricata defaults 2022-09-13 11:29:31 -04:00
Mike Reeves
bc2aced20d Merge pull request #8726 from Security-Onion-Solutions/funstuff
Fix Typeo
2022-09-13 07:22:06 -04:00
Josh Brower
0c7ee56ee3 Merge pull request #8725 from Security-Onion-Solutions/2.4/elastic-fleet
Fix elastic agent gen script
2022-09-13 07:18:47 -04:00
Mike Reeves
74d991da45 Fix Typeo 2022-09-13 07:17:03 -04:00
Josh Brower
4a28841a7c Fix elastic agent gen script 2022-09-13 06:38:05 -04:00
Mike Reeves
85e74485e7 Merge pull request #8723 from Security-Onion-Solutions/funstuff
Fix Dev
2022-09-12 17:43:34 -04:00
Mike Reeves
ec187e9d85 Pull in dev 2022-09-12 17:35:42 -04:00
Mike Reeves
6e052a3063 Pull in dev 2022-09-12 17:17:14 -04:00
Mike Reeves
440861998c Merge pull request #8722 from Security-Onion-Solutions/funstuff
Add More Logging
2022-09-12 16:50:28 -04:00
Mike Reeves
a01fadd067 Add more logging to setup process 2022-09-12 15:56:08 -04:00
Mike Reeves
7ec66d1cd1 Add more logging to setup process 2022-09-12 15:46:33 -04:00
Mike Reeves
ea7c8e1fd9 Add more logging to setup process 2022-09-12 15:43:18 -04:00
weslambert
94f47a847d Merge pull request #8721 from Security-Onion-Solutions/fix/elasticsearch_elastic_agent_template_defaults
Add back Elastic Agent default templates
2022-09-12 15:23:23 -04:00
Mike Reeves
17239ac6e4 Add more logging to setup process 2022-09-12 15:18:09 -04:00
weslambert
030f4d228a Add back Elastic Agent default templates 2022-09-12 15:10:24 -04:00
Mike Reeves
f555846544 Add more logging to setup process 2022-09-12 15:06:29 -04:00
Mike Reeves
a168aa8b81 Add more logging to setup process 2022-09-12 14:53:34 -04:00
Mike Reeves
181e94a69d Add more logging to setup process 2022-09-12 14:35:32 -04:00
Mike Reeves
2de2b0eb23 Add more logging to setup process 2022-09-12 14:31:10 -04:00
Mike Reeves
07263e03cb Add more logging to setup process 2022-09-12 14:30:28 -04:00
Mike Reeves
c8a9fc2f26 Add more logging to setup process 2022-09-12 14:27:35 -04:00
Mike Reeves
9ca2e6e871 Add more logging to setup process 2022-09-12 14:20:59 -04:00
Josh Brower
905068f7bf Merge pull request #8720 from Security-Onion-Solutions/2.4/elastic-fleet
Add so-elastic-agent-builder
2022-09-12 13:40:28 -04:00
Mike Reeves
2254512a2a Add more logging to setup process 2022-09-12 12:48:02 -04:00
Josh Brower
0df7d0249a Add so-elastic-agent-builder 2022-09-12 12:22:35 -04:00
Josh Brower
3708c9b4d9 Merge pull request #8715 from Security-Onion-Solutions/2.4/elastic-fleet
Add links to tools menu
2022-09-12 09:34:17 -04:00
Josh Brower
9f99939bda Add links to tools menu 2022-09-12 09:28:10 -04:00
Josh Brower
e700a43a40 Merge pull request #8714 from Security-Onion-Solutions/2.4/elastic-fleet
2.4/elastic fleet
2022-09-12 08:34:28 -04:00
Mike Reeves
8b9fdef25c Merge pull request #8708 from Security-Onion-Solutions/funstuff 2022-09-11 07:35:35 -04:00
Mike Reeves
3de4e56db9 Fix ES merge 2022-09-10 19:25:01 -04:00
Mike Reeves
a3d9b1d83b Merge pull request #8707 from Security-Onion-Solutions/funstuff
Funstuff
2022-09-09 16:32:32 -04:00
Mike Reeves
f2ff8ca4e2 Create advanced files 2022-09-09 16:29:50 -04:00
Mike Reeves
9df2aaacb0 Create advanced files 2022-09-09 16:26:59 -04:00
Mike Reeves
8a7b194f2b Create advanced files 2022-09-09 16:24:41 -04:00
Mike Reeves
57c303b9ca Create advanced files 2022-09-09 16:23:32 -04:00
Mike Reeves
f8c6b82ed9 Merge pull request #8706 from Security-Onion-Solutions/funstuff
Fix yaml for idh,es,kib,esalert
2022-09-09 15:57:04 -04:00
Mike Reeves
037d5d1c46 Fix yaml for idh,es,kib,esalert 2022-09-09 15:55:51 -04:00
Mike Reeves
aa17837936 Merge pull request #8705 from Security-Onion-Solutions/funstuff
Fix yaml for idh,es,kib,esalert
2022-09-09 15:47:59 -04:00
Mike Reeves
16f2059f17 Fix yaml for idh,es,kib,esalert 2022-09-09 15:46:48 -04:00
Mike Reeves
e2eaefab6e Fix yaml for idh,es,kib,esalert 2022-09-09 15:45:13 -04:00
Josh Patterson
c6421275f7 Merge pull request #8704 from Security-Onion-Solutions/influx/defaults
remove jinja from influxdb defaults.yaml
2022-09-09 15:42:46 -04:00
m0duspwnens
9a08decadb remove jinja from influxdb defaults.yaml 2022-09-09 15:41:20 -04:00
Mike Reeves
cc08e5a42c Merge pull request #8703 from Security-Onion-Solutions/funstuff
Fix yaml for idh,es,kib,esalert
2022-09-09 15:38:07 -04:00
Mike Reeves
1f3b170213 Fix yaml for idh,es,kib,esalert 2022-09-09 15:36:57 -04:00
Mike Reeves
74ef6c0ed0 Fix yaml for idh,es,kib,esalert 2022-09-09 15:30:28 -04:00
Josh Brower
09a1032f77 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/elastic-fleet 2022-09-09 15:08:25 -04:00
Josh Brower
921d644a0b Elastic Fleet wrapper 2022-09-09 15:05:31 -04:00
Josh Patterson
54f7cefa28 Merge pull request #8702 from Security-Onion-Solutions/fix/soc2.4
add salt bind for soc
2022-09-09 14:45:31 -04:00
m0duspwnens
b5fb7596b0 add salt bind for soc 2022-09-09 14:44:41 -04:00
Josh Patterson
7dd65909f2 Merge pull request #8701 from Security-Onion-Solutions/fix/soc2.4
add saltPipe
2022-09-09 14:40:08 -04:00
m0duspwnens
0f2e9764ab add saltPipe 2022-09-09 14:39:20 -04:00
Josh Patterson
deaecad8fd Merge pull request #8700 from Security-Onion-Solutions/fix/soc2.4
Fix/soc2.4
2022-09-09 14:32:41 -04:00
m0duspwnens
5ccc103083 fix soc dashboards and things 2022-09-09 14:31:04 -04:00
m0duspwnens
5bb001281b soc defaults changes - client child of server 2022-09-08 15:57:18 -04:00
Mike Reeves
ce59a8a225 Merge pull request #8697 from Security-Onion-Solutions/funstuff
move endgamehost
2022-09-08 14:12:43 -04:00
Mike Reeves
8c12b26847 touch the soc file 2022-09-08 14:08:24 -04:00
Mike Reeves
9c9509594a move endgamehost 2022-09-08 13:55:35 -04:00
Jason Ertel
cfb3893c2b Merge pull request #8694 from Security-Onion-Solutions/salt-relay
Salt relay
2022-09-08 10:31:28 -04:00
Jason Ertel
b7bbe7d69f Add copyright notice 2022-09-08 10:27:56 -04:00
Jason Ertel
193c3fc4cd Add salt relay 2022-09-08 10:26:39 -04:00
Mike Reeves
6ab9cc6d53 Merge pull request #8693 from Security-Onion-Solutions/funstuff
Add an older version of so-status
2022-09-08 09:04:41 -04:00
Mike Reeves
3785b97d95 so-status 2022-09-08 08:48:49 -04:00
weslambert
c25b981c50 Merge pull request #8688 from Security-Onion-Solutions/elastic_agent_security_subfield_additions
Elastic Agent .security subfield additions
2022-09-08 08:05:16 -04:00
Wes
86d60e444d Add Elastic Agent index/template configuration to defaults file 2022-09-08 00:20:22 +00:00
Josh Brower
d9ae646ef2 Merge pull request #8682 from Security-Onion-Solutions/2.4/elastic-fleet
2.4/elastic fleet
2022-09-07 18:53:35 -04:00
Wes
b39a5061ca Load Elastic Agent component templates (managed by Security Onion) 2022-09-07 21:26:43 +00:00
Wes
eeffded248 Remove duplicate security subfield configuration from component templates 2022-09-07 21:23:04 +00:00
Josh Brower
f00aafdfb2 Elastic Agent - move gen installers 2022-09-07 16:57:11 -04:00
Josh Brower
e8af315e40 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/elastic-fleet 2022-09-07 16:32:31 -04:00
Jason Ertel
df6ba5cbe9 initial salt relay script for comms with soc 2022-09-07 16:19:16 -04:00
Josh Brower
e3e0e4c6ed Merge pull request #8681 from Security-Onion-Solutions/playbookfix
Update so-playbook-reset
2022-09-07 16:01:37 -04:00
Josh Brower
39ed582a72 Update so-playbook-reset 2022-09-07 15:59:54 -04:00
Mike Reeves
40131daeed Merge pull request #8680 from Security-Onion-Solutions/funstuff
Funstuff
2022-09-07 15:46:48 -04:00
Mike Reeves
5b65fdcc1c Remove crossthestreams 2022-09-07 15:42:22 -04:00
Mike Reeves
6d1bc78f7b Remove crossthestreams 2022-09-07 15:41:21 -04:00
Mike Reeves
6adcb4c968 Remove crossthestreams 2022-09-07 15:38:55 -04:00
Wes
3c50072690 Add Elastic Agent component templates 2022-09-07 18:51:57 +00:00
Josh Brower
ce688cfb91 Elastic Agent setup changes 2022-09-07 10:23:26 -04:00
Mike Reeves
f7f5d414c4 Merge pull request #8677 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update VERSION
2022-09-07 09:56:26 -04:00
Mike Reeves
2fb1f14d09 Update VERSION 2022-09-07 09:55:41 -04:00
Josh Patterson
de456a402c Merge pull request #8676 from Security-Onion-Solutions/index_settings_False
Update so-functions
2022-09-07 09:40:12 -04:00
Josh Patterson
dfd505dfaa Update so-functions 2022-09-07 09:38:22 -04:00
Mike Reeves
b76bf0a6e0 Merge pull request #8675 from Security-Onion-Solutions/gitfoo
Move In Day
2022-09-07 09:21:03 -04:00
Mike Reeves
c9dd2beaaa Move In Day 2022-09-07 09:15:58 -04:00
Mike Reeves
2bd9dd80e2 Move In Day 2022-09-07 09:06:25 -04:00
Josh Patterson
dcb7b49dbe Merge pull request #8451 from Security-Onion-Solutions/issue/8441_3
manage salt-minion start delay with systemd drop-in file -
2022-08-02 16:39:45 -04:00
m0duspwnens
a965301b2e manage salt-minion start delay with systemd drop-in file - https://github.com/Security-Onion-Solutions/securityonion/issues/8441 2022-08-02 16:37:27 -04:00
1301 changed files with 24894 additions and 58649 deletions

View File

@@ -536,7 +536,7 @@ secretGroup = 4
[allowlist]
description = "global allow lists"
regexes = ['''219-09-9999''', '''078-05-1120''', '''(9[0-9]{2}|666)-\d{2}-\d{4}''']
regexes = ['''219-09-9999''', '''078-05-1120''', '''(9[0-9]{2}|666)-\d{2}-\d{4}''', '''RPM-GPG-KEY.*''']
paths = [
'''gitleaks.toml''',
'''(.*?)(jpg|gif|doc|pdf|bin|svg|socket)$''',

View File

@@ -1,6 +1,12 @@
name: python-test
on: [push, pull_request]
on:
push:
paths:
- "salt/sensoroni/files/analyzers/**"
pull_request:
paths:
- "salt/sensoroni/files/analyzers/**"
jobs:
build:

View File

@@ -1,6 +1,6 @@
## Security Onion 2.3.140
## Security Onion 2.4
Security Onion 2.3.140 is here!
Security Onion 2.4 is here!
## Screenshots
@@ -18,24 +18,24 @@ Cases
### Release Notes
https://docs.securityonion.net/en/2.3/release-notes.html
https://docs.securityonion.net/en/2.4/release-notes.html
### Requirements
https://docs.securityonion.net/en/2.3/hardware.html
https://docs.securityonion.net/en/2.4/hardware.html
### Download
https://docs.securityonion.net/en/2.3/download.html
https://docs.securityonion.net/en/2.4/download.html
### Installation
https://docs.securityonion.net/en/2.3/installation.html
https://docs.securityonion.net/en/2.4/installation.html
### FAQ
https://docs.securityonion.net/en/2.3/faq.html
https://docs.securityonion.net/en/2.4/faq.html
### Feedback
https://docs.securityonion.net/en/2.3/community-support.html
https://docs.securityonion.net/en/2.4/community-support.html

View File

@@ -4,7 +4,8 @@
| Version | Supported |
| ------- | ------------------ |
| 2.x.x | :white_check_mark: |
| 2.4.x | :white_check_mark: |
| 2.3.x | :white_check_mark: |
| 16.04.x | :x: |
Security Onion 16.04 has reached End Of Life and is no longer supported.

View File

@@ -1,18 +1,18 @@
### 2.3.140-20220718 ISO image built on 2022/07/18
### 2.3.120-20220425 ISO image built on 2022/04/25
### Download and Verify
2.3.140-20220718 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.140-20220718.iso
2.3.120-20220425 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.120-20220425.iso
MD5: 9570065548DBFA6230F28FF623A8B61A
SHA1: D48B2CC81DF459C3EBBC0C54BD9AAFAB4327CB75
SHA256: 0E31E15EDFD3392B9569FCCAF1E4518432ECB0D7A174CCA745F2F22CDAC4A034
MD5: C99729E452B064C471BEF04532F28556
SHA1: 60BF07D5347C24568C7B793BFA9792E98479CFBF
SHA256: CD17D0D7CABE21D45FA45E1CF91C5F24EB9608C79FF88480134E5592AFDD696E
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.140-20220718.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.120-20220425.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.140-20220718.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.120-20220425.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.140-20220718.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.120-20220425.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.3.140-20220718.iso.sig securityonion-2.3.140-20220718.iso
gpg --verify securityonion-2.3.120-20220425.iso.sig securityonion-2.3.120-20220425.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Mon 18 Jul 2022 10:16:05 AM EDT using RSA key ID FE507013
gpg: Signature made Mon 25 Apr 2022 08:20:40 AM EDT using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

View File

@@ -1 +1 @@
2.3.140
2.4.0

View File

@@ -1,8 +1,8 @@
{% import_yaml 'firewall/portgroups.yaml' as default_portgroups %}
{% set default_portgroups = default_portgroups.firewall.aliases.ports %}
{% import_yaml 'firewall/portgroups.local.yaml' as local_portgroups %}
{% if local_portgroups.firewall.aliases.ports %}
{% set local_portgroups = local_portgroups.firewall.aliases.ports %}
{% import_yaml 'firewall/ports/ports.yaml' as default_portgroups %}
{% set default_portgroups = default_portgroups.firewall.ports %}
{% import_yaml 'firewall/ports/ports.local.yaml' as local_portgroups %}
{% if local_portgroups.firewall.ports %}
{% set local_portgroups = local_portgroups.firewall.ports %}
{% else %}
{% set local_portgroups = {} %}
{% endif %}

View File

@@ -1,82 +0,0 @@
firewall:
hostgroups:
analyst:
ips:
delete:
insert:
beats_endpoint:
ips:
delete:
insert:
beats_endpoint_ssl:
ips:
delete:
insert:
elasticsearch_rest:
ips:
delete:
insert:
endgame:
ips:
delete:
insert:
fleet:
ips:
delete:
insert:
heavy_node:
ips:
delete:
insert:
idh:
ips:
delete:
insert:
manager:
ips:
delete:
insert:
minion:
ips:
delete:
insert:
node:
ips:
delete:
insert:
osquery_endpoint:
ips:
delete:
insert:
receiver:
ips:
delete:
insert:
search_node:
ips:
delete:
insert:
sensor:
ips:
delete:
insert:
strelka_frontend:
ips:
delete:
insert:
syslog:
ips:
delete:
insert:
wazuh_agent:
ips:
delete:
insert:
wazuh_api:
ips:
delete:
insert:
wazuh_authd:
ips:
delete:
insert:

View File

@@ -1,3 +0,0 @@
firewall:
aliases:
ports:

View File

@@ -0,0 +1,2 @@
firewall:
ports:

View File

@@ -64,10 +64,4 @@ peer:
.*:
- x509.sign_remote_certificate
reactor:
- 'so/fleet':
- salt://reactor/fleet.sls
- 'salt/beacon/*/watch_sqlite_db//opt/so/conf/kratos/db/sqlite.db':
- salt://reactor/kratos.sls

View File

@@ -45,12 +45,10 @@ echo " rootfs: $ROOTFS" >> $local_salt_dir/pillar/data/$TYPE.sls
echo " nsmfs: $NSM" >> $local_salt_dir/pillar/data/$TYPE.sls
if [ $TYPE == 'sensorstab' ]; then
echo " monint: bond0" >> $local_salt_dir/pillar/data/$TYPE.sls
salt-call state.apply grafana queue=True
fi
if [ $TYPE == 'evaltab' ] || [ $TYPE == 'standalonetab' ]; then
echo " monint: bond0" >> $local_salt_dir/pillar/data/$TYPE.sls
if [ ! $10 ]; then
salt-call state.apply grafana queue=True
salt-call state.apply utility queue=True
fi
fi

View File

@@ -3,6 +3,7 @@ logstash:
port_bindings:
- 0.0.0.0:3765:3765
- 0.0.0.0:5044:5044
- 0.0.0.0:5055:5055
- 0.0.0.0:5644:5644
- 0.0.0.0:6050:6050
- 0.0.0.0:6051:6051

View File

@@ -2,8 +2,7 @@ logstash:
pipelines:
manager:
config:
- so/0009_input_beats.conf
- so/0010_input_hhbeats.conf
- so/0011_input_endgame.conf
- so/0012_input_elastic_agent.conf
- so/9999_output_redis.conf.jinja

View File

@@ -2,7 +2,7 @@
{% set cached_grains = salt.saltutil.runner('cache.grains', tgt='*') %}
{% for minionid, ip in salt.saltutil.runner(
'mine.get',
tgt='G@role:so-manager or G@role:so-managersearch or G@role:so-standalone or G@role:so-node or G@role:so-heavynode or G@role:so-receiver or G@role:so-helix',
tgt='G@role:so-manager or G@role:so-managersearch or G@role:so-standalone or G@role:so-searchnode or G@role:so-heavynode or G@role:so-receiver or G@role:so-helix ',
fun='network.ip_addrs',
tgt_type='compound') | dictsort()
%}

View File

@@ -2,8 +2,7 @@ logstash:
pipelines:
receiver:
config:
- so/0009_input_beats.conf
- so/0010_input_hhbeats.conf
- so/0011_input_endgame.conf
- so/0012_input_elastic_agent.conf
- so/9999_output_redis.conf.jinja

View File

@@ -3,16 +3,5 @@ logstash:
search:
config:
- so/0900_input_redis.conf.jinja
- so/9000_output_zeek.conf.jinja
- so/9002_output_import.conf.jinja
- so/9034_output_syslog.conf.jinja
- so/9050_output_filebeatmodules.conf.jinja
- so/9100_output_osquery.conf.jinja
- so/9400_output_suricata.conf.jinja
- so/9500_output_beats.conf.jinja
- so/9600_output_ossec.conf.jinja
- so/9700_output_strelka.conf.jinja
- so/9800_output_logscan.conf.jinja
- so/9801_output_rita.conf.jinja
- so/9802_output_kratos.conf.jinja
- so/9805_output_elastic_agent.conf.jinja
- so/9900_output_endgame.conf.jinja

View File

@@ -1,7 +1,5 @@
{% set node_types = {} %}
{% set manage_alived = salt.saltutil.runner('manage.alived', show_ip=True) %}
{% set manager = grains.master %}
{% set manager_type = manager.split('_')|last %}
{% for minionid, ip in salt.saltutil.runner('mine.get', tgt='*', fun='network.ip_addrs', tgt_type='glob') | dictsort() %}
{% set hostname = minionid.split('_')[0] %}
{% set node_type = minionid.split('_')[1] %}
@@ -24,10 +22,10 @@
node_data:
{% for node_type, host_values in node_types.items() %}
{{node_type}}:
{% for hostname, details in host_values.items() %}
{{hostname}}:
ip: {{details.ip}}
alive: {{ details.alive }}
{{hostname}}:
ip: {{details.ip}}
alive: {{ details.alive }}
role: {{node_type}}
{% endfor %}
{% endfor %}

View File

@@ -1,136 +1,229 @@
base:
'*':
- patch.needs_restarting
- ntp.soc_ntp
- ntp.adv_ntp
- logrotate
- docker.soc_docker
- docker.adv_docker
- sensoroni.soc_sensoroni
- sensoroni.adv_sensoroni
- telegraf.soc_telegraf
- telegraf.adv_telegraf
- influxdb.token
- node_data.ips
'* and not *_eval and not *_import':
- logstash.nodes
'*_eval or *_helixsensor or *_heavynode or *_sensor or *_standalone or *_import':
'*_eval or *_heavynode or *_sensor or *_standalone or *_import':
- match: compound
- zeek
- bpf.soc_bpf
- bpf.adv_bpf
'*_managersearch or *_heavynode':
- match: compound
- logstash
- logstash.manager
- logstash.search
- logstash.soc_logstash
- logstash.adv_logstash
- elasticsearch.index_templates
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
'*_manager':
- logstash
- logstash.manager
- logstash.soc_logstash
- logstash.adv_logstash
- elasticsearch.index_templates
'*_manager or *_managersearch':
- match: compound
- data.*
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
- elasticsearch.auth
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
- kibana.secrets
{% endif %}
{% endif %}
- secrets
- global
- soc_global
- adv_global
- manager.soc_manager
- manager.adv_manager
- idstools.soc_idstools
- idstools.adv_idstools
- soc.soc_soc
- soc.adv_soc
- kratos.soc_kratos
- kratos.adv_kratos
- redis.soc_redis
- redis.adv_redis
- influxdb.soc_influxdb
- influxdb.adv_influxdb
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- backup.soc_backup
- backup.adv_backup
- firewall.soc_firewall
- firewall.adv_firewall
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_sensor':
- zeeklogs
- healthcheck.sensor
- global
- soc_global
- adv_global
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_eval':
- data.*
- zeeklogs
- secrets
- healthcheck.eval
- elasticsearch.index_templates
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
- elasticsearch.auth
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
- kibana.secrets
{% endif %}
- global
{% endif %}
- soc_global
- kratos.soc_kratos
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- manager.soc_manager
- manager.adv_manager
- idstools.soc_idstools
- idstools.adv_idstools
- soc.soc_soc
- kratos.soc_kratos
- kratos.adv_kratos
- redis.soc_redis
- redis.adv_redis
- influxdb.soc_influxdb
- influxdb.adv_influxdb
- backup.soc_backup
- backup.adv_backup
- firewall.soc_firewall
- firewall.adv_firewall
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_standalone':
- logstash
- logstash.manager
- logstash.search
- logstash.soc_logstash
- logstash.adv_logstash
- elasticsearch.index_templates
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
- elasticsearch.auth
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
- kibana.secrets
{% endif %}
- data.*
- zeeklogs
{% endif %}
- secrets
- healthcheck.standalone
- global
- minions.{{ grains.id }}
'*_node':
- global
- soc_global
- idstools.soc_idstools
- idstools.adv_idstools
- kratos.soc_kratos
- kratos.adv_kratos
- redis.soc_redis
- redis.adv_redis
- influxdb.soc_influxdb
- influxdb.adv_influxdb
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- manager.soc_manager
- manager.adv_manager
- soc.soc_soc
- backup.soc_backup
- backup.adv_backup
- firewall.soc_firewall
- firewall.adv_firewall
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_heavynode':
- zeeklogs
- elasticsearch.auth
- global
- minions.{{ grains.id }}
'*_helixsensor':
- fireeye
- zeeklogs
- logstash
- logstash.helix
- global
- minions.{{ grains.id }}
'*_fleet':
- data.*
- secrets
- global
- soc_global
- redis.soc_redis
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_idh':
- data.*
- global
- soc_global
- adv_global
- idh.soc_idh
- idh.adv_idh
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_searchnode':
- logstash
- logstash.search
- logstash.soc_logstash
- logstash.adv_logstash
- elasticsearch.index_templates
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
- elasticsearch.auth
- global
{% endif %}
- redis.soc_redis
- soc_global
- adv_global
- minions.{{ grains.id }}
- data.nodestab
- minions.adv_{{ grains.id }}
'*_receiver':
- logstash
- logstash.receiver
- logstash.soc_logstash
- logstash.adv_logstash
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
- elasticsearch.auth
- global
{% endif %}
- redis.soc_redis
- redis.adv_redis
- soc_global
- adv_global
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_import':
- zeeklogs
- secrets
- elasticsearch.index_templates
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
- elasticsearch.auth
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
- kibana.secrets
{% endif %}
- global
{% endif %}
- kratos.soc_kratos
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- manager.soc_manager
- manager.adv_manager
- soc.soc_soc
- soc_global
- adv_global
- backup.soc_backup
- backup.adv_backup
- kratos.soc_kratos
- kratos.adv_kratos
- redis.soc_redis
- redis.adv_redis
- influxdb.soc_influxdb
- influxdb.adv_influxdb
- firewall.soc_firewall
- firewall.adv_firewall
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_workstation':
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}

View File

@@ -1,55 +1 @@
zeek:
zeekctl:
MailTo: root@localhost
MailConnectionSummary: 1
MinDiskSpace: 5
MailHostUpDown: 1
LogRotationInterval: 3600
LogExpireInterval: 0
StatsLogEnable: 1
StatsLogExpireInterval: 0
StatusCmdShowAll: 0
CrashExpireInterval: 0
SitePolicyScripts: local.zeek
LogDir: /nsm/zeek/logs
SpoolDir: /nsm/zeek/spool
CfgDir: /opt/zeek/etc
CompressLogs: 1
local:
'@load':
- misc/loaded-scripts
- tuning/defaults
- misc/capture-loss
- misc/stats
- frameworks/software/vulnerable
- frameworks/software/version-changes
- protocols/ftp/software
- protocols/smtp/software
- protocols/ssh/software
- protocols/http/software
- protocols/dns/detect-external-names
- protocols/ftp/detect
- protocols/conn/known-hosts
- protocols/conn/known-services
- protocols/ssl/known-certs
- protocols/ssl/validate-certs
- protocols/ssl/log-hostcerts-only
- protocols/ssh/geo-data
- protocols/ssh/detect-bruteforcing
- protocols/ssh/interesting-hostnames
- protocols/http/detect-sqli
- frameworks/files/hash-all-files
- frameworks/files/detect-MHR
- policy/frameworks/notice/extend-email/hostnames
- ja3
- hassh
- intel
- cve-2020-0601
- securityonion/bpfconf
- securityonion/communityid
- securityonion/file-extraction
'@load-sigs':
- frameworks/signatures/detect-windows-shells
redef:
- LogAscii::use_json = T;
- CaptureLoss::watch_interval = 5 mins;

View File

@@ -10,7 +10,7 @@ def check():
if path.exists('/var/run/reboot-required'):
retval = 'True'
elif os == 'CentOS':
elif os == 'Rocky':
cmd = 'needs-restarting -r > /dev/null 2>&1'
try:

View File

@@ -5,6 +5,8 @@ import logging
def status():
return __salt__['cmd.run']('/usr/sbin/so-status')
def version():
return __salt__['cp.get_file_str']('/etc/soversion')
def mysql_conn(retry):
log = logging.getLogger(__name__)
@@ -61,4 +63,4 @@ def mysql_conn(retry):
for addr in ip_arr:
log.debug(f' - {addr}')
return mysql_up
return mysql_up

View File

@@ -1,13 +1,13 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% set ZEEKVER = salt['pillar.get']('global:mdengine', '') %}
{% set WAZUH = salt['pillar.get']('global:wazuh', '0') %}
{% set PLAYBOOK = salt['pillar.get']('manager:playbook', '0') %}
{% set FREQSERVER = salt['pillar.get']('manager:freq', '0') %}
{% set DOMAINSTATS = salt['pillar.get']('manager:domainstats', '0') %}
{% set FLEETMANAGER = salt['pillar.get']('global:fleet_manager', False) %}
{% set FLEETNODE = salt['pillar.get']('global:fleet_node', False) %}
{% set ELASTALERT = salt['pillar.get']('elastalert:enabled', True) %}
{% set ELASTICSEARCH = salt['pillar.get']('elasticsearch:enabled', True) %}
{% set FILEBEAT = salt['pillar.get']('filebeat:enabled', True) %}
{% set KIBANA = salt['pillar.get']('kibana:enabled', True) %}
{% set LOGSTASH = salt['pillar.get']('logstash:enabled', True) %}
{% set CURATOR = salt['pillar.get']('curator:enabled', True) %}
@@ -32,9 +32,9 @@
'nginx',
'telegraf',
'influxdb',
'grafana',
'soc',
'kratos',
'elasticfleet',
'firewall',
'idstools',
'suricata.manager',
@@ -45,8 +45,7 @@
'schedule',
'soctopus',
'tcpreplay',
'docker_clean',
'learn'
'docker_clean'
],
'so-heavynode': [
'ssl',
@@ -77,25 +76,10 @@
'tcpreplay',
'docker_clean'
],
'so-fleet': [
'ssl',
'nginx',
'telegraf',
'firewall',
'mysql',
'redis',
'fleet',
'fleet.install_package',
'filebeat',
'schedule',
'docker_clean'
],
'so-idh': [
'ssl',
'telegraf',
'firewall',
'fleet.install_package',
'filebeat',
'idh',
'schedule',
'docker_clean'
@@ -109,6 +93,8 @@
'nginx',
'soc',
'kratos',
'influxdb',
'telegraf',
'firewall',
'idstools',
'suricata.manager',
@@ -119,7 +105,7 @@
'schedule',
'tcpreplay',
'docker_clean',
'learn'
'elasticfleet'
],
'so-manager': [
'salt.master',
@@ -130,17 +116,16 @@
'nginx',
'telegraf',
'influxdb',
'grafana',
'soc',
'kratos',
'elasticfleet',
'firewall',
'idstools',
'suricata.manager',
'utility',
'schedule',
'soctopus',
'docker_clean',
'learn'
'docker_clean'
],
'so-managersearch': [
'salt.master',
@@ -150,9 +135,9 @@
'nginx',
'telegraf',
'influxdb',
'grafana',
'soc',
'kratos',
'elasticfleet',
'firewall',
'manager',
'idstools',
@@ -160,10 +145,9 @@
'utility',
'schedule',
'soctopus',
'docker_clean',
'learn'
'docker_clean'
],
'so-node': [
'so-searchnode': [
'ssl',
'nginx',
'telegraf',
@@ -180,9 +164,9 @@
'nginx',
'telegraf',
'influxdb',
'grafana',
'soc',
'kratos',
'elasticfleet',
'firewall',
'idstools',
'suricata.manager',
@@ -193,8 +177,7 @@
'schedule',
'soctopus',
'tcpreplay',
'docker_clean',
'learn'
'docker_clean'
],
'so-sensor': [
'ssl',
@@ -204,8 +187,6 @@
'pcap',
'suricata',
'healthcheck',
'wazuh',
'filebeat',
'schedule',
'tcpreplay',
'docker_clean'
@@ -221,26 +202,10 @@
],
}, grain='role') %}
{% if FILEBEAT and grains.role in ['so-helixsensor', 'so-eval', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-import', 'so-receiver'] %}
{% do allowed_states.append('filebeat') %}
{% endif %}
{% if ((FLEETMANAGER or FLEETNODE) or PLAYBOOK != 0) and grains.role in ['so-eval', 'so-manager', 'so-managersearch', 'so-standalone'] %}
{% if (PLAYBOOK != 0) and grains.role in ['so-eval', 'so-manager', 'so-managersearch', 'so-standalone'] %}
{% do allowed_states.append('mysql') %}
{% endif %}
{% if (FLEETMANAGER or FLEETNODE) and grains.role in ['so-sensor', 'so-eval', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-receiver'] %}
{% do allowed_states.append('fleet.install_package') %}
{% endif %}
{% if (FLEETMANAGER or FLEETNODE) and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-heavynode'] %}
{% do allowed_states.append('fleet') %}
{% endif %}
{% if (FLEETMANAGER or FLEETNODE) and grains.role in ['so-eval'] %}
{% do allowed_states.append('redis') %}
{% endif %}
{%- if ZEEKVER != 'SURICATA' and grains.role in ['so-sensor', 'so-eval', 'so-standalone', 'so-heavynode'] %}
{% do allowed_states.append('zeek') %}
{%- endif %}
@@ -249,11 +214,7 @@
{% do allowed_states.append('strelka') %}
{% endif %}
{% if WAZUH and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-receiver','so-idh']%}
{% do allowed_states.append('wazuh') %}
{% endif %}
{% if ELASTICSEARCH and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-import'] %}
{% if ELASTICSEARCH and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-searchnode', 'so-managersearch', 'so-heavynode', 'so-import'] %}
{% do allowed_states.append('elasticsearch') %}
{% endif %}
@@ -266,7 +227,7 @@
{% do allowed_states.append('kibana.secrets') %}
{% endif %}
{% if grains.role in ['so-eval', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-manager'] %}
{% if grains.role in ['so-eval', 'so-standalone', 'so-managersearch', 'so-heavynode', 'so-manager'] %}
{% do allowed_states.append('curator') %}
{% endif %}
@@ -282,29 +243,14 @@
{% do allowed_states.append('redis') %}
{% endif %}
{% if (FREQSERVER !=0) and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch'] %}
{% do allowed_states.append('freqserver') %}
{% endif %}
{% if (DOMAINSTATS !=0) and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch'] %}
{% do allowed_states.append('domainstats') %}
{% endif %}
{% if LOGSTASH and grains.role in ['so-helixsensor', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-receiver'] %}
{% if LOGSTASH and grains.role in ['so-helixsensor', 'so-manager', 'so-standalone', 'so-searchnode', 'so-managersearch', 'so-heavynode', 'so-receiver'] %}
{% do allowed_states.append('logstash') %}
{% endif %}
{% if REDIS and grains.role in ['so-manager', 'so-standalone', 'so-managersearch', 'so-heavynode', 'so-receiver'] %}
{% do allowed_states.append('redis') %}
{% endif %}
{% if grains.os == 'CentOS' %}
{% if not ISAIRGAP %}
{% do allowed_states.append('yum') %}
{% endif %}
{% do allowed_states.append('yum.packages') %}
{% endif %}
{# all nodes on the right salt version can run the following states #}
{% do allowed_states.append('common') %}
{% do allowed_states.append('patch.os.schedule') %}

View File

@@ -0,0 +1,33 @@
{% from 'backup/map.jinja' import BACKUP_MERGED %}
# Lock permissions on the backup directory
backupdir:
file.directory:
- name: /nsm/backup
- user: 0
- group: 0
- makedirs: True
- mode: 700
config_backup_script:
file.managed:
- name: /usr/sbin/so-config-backup
- user: root
- group: root
- mode: 755
- template: jinja
- source: salt://backup/tools/sbin/so-config-backup.jinja
- defaults:
BACKUPLOCATIONS: {{ BACKUP_MERGED.locations }}
DESTINATION: {{ BACKUP_MERGED.destination }}
# Add config backup
so_config_backup:
cron.present:
- name: /usr/sbin/so-config-backup > /dev/null 2>&1
- user: root
- minute: '1'
- hour: '0'
- daymonth: '*'
- month: '*'
- dayweek: '*'

View File

@@ -0,0 +1,7 @@
backup:
locations:
- /opt/so/saltstack/local
- /etc/pki
- /etc/salt
- /nsm/kratos
destination: "/nsm/backup"

2
salt/backup/map.jinja Normal file
View File

@@ -0,0 +1,2 @@
{% import_yaml 'backup/defaults.yaml' as BACKUP_DEFAULTS %}
{% set BACKUP_MERGED = salt['pillar.get']('backup', BACKUP_DEFAULTS.backup, merge=true, merge_nested_lists=true) %}

View File

@@ -0,0 +1,10 @@
backup:
locations:
description: List of locations to back up to the destination.
helpLink: backup.html
global: True
destination:
description: Directory to store the configuration backups in.
helpLink: backup.html
global: True

View File

@@ -0,0 +1,37 @@
#!/bin/bash
#
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
TODAY=$(date '+%Y_%m_%d')
BACKUPDIR={{ DESTINATION }}
BACKUPFILE="$BACKUPDIR/so-config-backup-$TODAY.tar"
MAXBACKUPS=7
# Create backup dir if it does not exist
mkdir -p /nsm/backup
# If we haven't already written a backup file for today, let's do so
if [ ! -f $BACKUPFILE ]; then
# Create empty backup file
tar -cf $BACKUPFILE -T /dev/null
# Loop through all paths defined in global.sls, and append them to backup file
{%- for LOCATION in BACKUPLOCATIONS %}
tar -rf $BACKUPFILE {{ LOCATION }}
{%- endfor %}
fi
# Find oldest backup files and remove them
NUMBACKUPS=$(find /nsm/backup/ -type f -name "so-config-backup*" | wc -l)
while [ "$NUMBACKUPS" -gt "$MAXBACKUPS" ]; do
OLDESTBACKUP=$(find /nsm/backup/ -type f -name "so-config-backup*" -type f -printf '%T+ %p\n' | sort | head -n 1 | awk -F" " '{print $2}')
rm -f $OLDESTBACKUP
NUMBACKUPS=$(find /nsm/backup/ -type f -name "so-config-backup*" | wc -l)
done

4
salt/bpf/defaults.yaml Normal file
View File

@@ -0,0 +1,4 @@
bpf:
pcap: []
suricata: []
zeek: []

4
salt/bpf/pcap.map.jinja Normal file
View File

@@ -0,0 +1,4 @@
{% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %}
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %}
{% set PCAPBPF = BPFMERGED.pcap %}

16
salt/bpf/soc_bpf.yaml Normal file
View File

@@ -0,0 +1,16 @@
bpf:
pcap:
description: List of BPF filters to apply to PCAP.
multiline: True
forcedType: "[]string"
helpLink: bpf.html
suricata:
description: List of BPF filters to apply to Suricata.
multiline: True
forcedType: "[]string"
helpLink: bpf.html
zeek:
description: List of BPF filters to apply to Zeek.
multiline: True
forcedType: "[]string"
helpLink: bpf.html

View File

@@ -0,0 +1,4 @@
{% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %}
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %}
{% set SURICATABPF = BPFMERGED.suricata %}

4
salt/bpf/zeek.map.jinja Normal file
View File

@@ -0,0 +1,4 @@
{% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %}
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %}
{% set ZEEKBPF = BPFMERGED.zeek %}

View File

@@ -57,7 +57,7 @@ x509_signing_policies:
- extendedKeyUsage: serverAuth
- days_valid: 820
- copypath: /etc/pki/issued_certs/
fleet:
elasticfleet:
- minions: '*'
- signing_private_key: /etc/pki/ca.key
- signing_cert: /etc/pki/ca.crt
@@ -65,9 +65,8 @@ x509_signing_policies:
- ST: Utah
- L: Salt Lake City
- basicConstraints: "critical CA:false"
- keyUsage: "critical keyEncipherment"
- keyUsage: "digitalSignature, nonRepudiation"
- subjectKeyIdentifier: hash
- authorityKeyIdentifier: keyid,issuer:always
- extendedKeyUsage: serverAuth
- days_valid: 820
- copypath: /etc/pki/issued_certs/

View File

@@ -1,10 +1,16 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls in allowed_states %}
{% from 'vars/globals.map.jinja' import GLOBALS %}
include:
- ca.dirs
{% set manager = salt['grains.get']('master') %}
/etc/salt/minion.d/signing_policies.conf:
file.managed:
- source: salt://ca/files/signing_policies.conf
@@ -25,7 +31,7 @@ pki_public_ca_crt:
x509.certificate_managed:
- name: /etc/pki/ca.crt
- signing_private_key: /etc/pki/ca.key
- CN: {{ manager }}
- CN: {{ GLOBALS.manager }}
- C: US
- ST: Utah
- L: Salt Lake City

View File

@@ -1,12 +1,14 @@
{%- set DOCKERRANGE = salt['pillar.get']('docker:range', '172.17.0.0/24') %}
{%- set DOCKERBIND = salt['pillar.get']('docker:bip', '172.17.0.1/24') %}
{
"registry-mirrors": [ "https://:5000" ],
"bip": "{{ DOCKERBIND }}",
"default-address-pools": [
{
"base" : "{{ DOCKERRANGE }}",
"size" : 24
}
]
"registry-mirrors": [
"https://:5000"
],
"bip": "{{ DOCKERBIND }}",
"default-address-pools": [
{
"base": "{{ DOCKERRANGE }}",
"size": 24
}
]
}

View File

@@ -3,4 +3,3 @@ filetype plugin indent on
" Sets .sls files to use YAML syntax highlighting
autocmd BufNewFile,BufRead *.sls set syntax=yaml
set number

View File

@@ -1,12 +1,12 @@
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls in allowed_states %}
{% set role = grains.id.split('_') | last %}
{% from 'elasticsearch/auth.map.jinja' import ELASTICAUTH with context %}
{% from 'vars/globals.map.jinja' import GLOBALS %}
include:
- common.soup_scripts
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-import'] %}
- common.packages
{% if GLOBALS.role in GLOBALS.manager_roles %}
- manager.elasticsearch # needed for elastic_curl_config state
{% endif %}
@@ -15,11 +15,6 @@ rmvariablesfile:
file.absent:
- name: /tmp/variables.txt
dockergroup:
group.present:
- name: docker
- gid: 920
# Add socore Group
socoregroup:
group.present:
@@ -38,15 +33,15 @@ socore:
soconfperms:
file.directory:
- name: /opt/so/conf
- uid: 939
- gid: 939
- user: 939
- group: 939
- dir_mode: 770
sostatusconf:
file.directory:
- name: /opt/so/conf/so-status
- uid: 939
- gid: 939
- user: 939
- group: 939
- dir_mode: 770
so-status.conf:
@@ -57,8 +52,8 @@ so-status.conf:
sosaltstackperms:
file.directory:
- name: /opt/so/saltstack
- uid: 939
- gid: 939
- user: 939
- group: 939
- dir_mode: 770
so_log_perms:
@@ -88,92 +83,6 @@ vimconfig:
- source: salt://common/files/vimrc
- replace: False
# Install common packages
{% if grains['os'] != 'CentOS' %}
commonpkgs:
pkg.installed:
- skip_suggestions: True
- pkgs:
- apache2-utils
- wget
- ntpdate
- jq
- python3-docker
- curl
- ca-certificates
- software-properties-common
- apt-transport-https
- openssl
- netcat
- python3-mysqldb
- sqlite3
- libssl-dev
- python3-dateutil
- python3-m2crypto
- python3-mysqldb
- python3-packaging
- python3-lxml
- git
- vim
heldpackages:
pkg.installed:
- pkgs:
{% if grains['oscodename'] == 'bionic' %}
- containerd.io: 1.4.4-1
- docker-ce: 5:20.10.5~3-0~ubuntu-bionic
- docker-ce-cli: 5:20.10.5~3-0~ubuntu-bionic
- docker-ce-rootless-extras: 5:20.10.5~3-0~ubuntu-bionic
{% elif grains['oscodename'] == 'focal' %}
- containerd.io: 1.4.9-1
- docker-ce: 5:20.10.8~3-0~ubuntu-focal
- docker-ce-cli: 5:20.10.5~3-0~ubuntu-focal
- docker-ce-rootless-extras: 5:20.10.5~3-0~ubuntu-focal
{% endif %}
- hold: True
- update_holds: True
{% else %}
commonpkgs:
pkg.installed:
- skip_suggestions: True
- pkgs:
- wget
- ntpdate
- bind-utils
- jq
- tcpdump
- httpd-tools
- net-tools
- curl
- sqlite
- mariadb-devel
- nmap-ncat
- python3
- python36-docker
- python36-dateutil
- python36-m2crypto
- python36-mysql
- python36-packaging
- python36-lxml
- yum-utils
- device-mapper-persistent-data
- lvm2
- openssl
- git
- vim-enhanced
heldpackages:
pkg.installed:
- pkgs:
- containerd.io: 1.4.4-3.1.el7
- docker-ce: 3:20.10.5-3.el7
- docker-ce-cli: 1:20.10.5-3.el7
- docker-ce-rootless-extras: 20.10.5-3.el7
- hold: True
- update_holds: True
{% endif %}
# Always keep these packages up to date
alwaysupdated:
@@ -188,7 +97,6 @@ alwaysupdated:
Etc/UTC:
timezone.system
{% if salt['pillar.get']('elasticsearch:auth:enabled', False) %}
elastic_curl_config:
file.managed:
- name: /opt/so/conf/elasticsearch/curl.config
@@ -196,11 +104,10 @@ elastic_curl_config:
- mode: 600
- show_changes: False
- makedirs: True
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-import'] %}
{% if GLOBALS.role in GLOBALS.manager_roles %}
- require:
- file: elastic_curl_config_distributed
{% endif %}
{% endif %}
# Sync some Utilities
utilsyncscripts:
@@ -211,17 +118,20 @@ utilsyncscripts:
- file_mode: 755
- template: jinja
- source: salt://common/tools/sbin
- defaults:
ELASTICCURL: 'curl'
- context:
ELASTICCURL: {{ ELASTICAUTH.elasticcurl }}
- exclude_pat:
- so-common
- so-firewall
- so-image-common
- soup
- so-status
{% if role in ['eval', 'standalone', 'sensor', 'heavynode'] %}
so-status_script:
file.managed:
- name: /usr/sbin/so-status
- source: salt://common/tools/sbin/so-status
- mode: 755
{% if GLOBALS.role in GLOBALS.sensor_roles %}
# Add sensor cleanup
/usr/sbin/so-sensor-clean:
cron.present:
@@ -289,10 +199,18 @@ sostatus_log:
file.managed:
- name: /opt/so/log/sostatus/status.log
- mode: 644
common_pip_dependencies:
pip.installed:
- user: root
- pkgs:
- rich
- target: /usr/lib64/python3.6/site-packages
# Install sostatus check cron
'/usr/sbin/so-status -q; echo $? > /opt/so/log/sostatus/status.log 2>&1':
sostatus_check_cron:
cron.present:
- name: '/usr/sbin/so-status -j > /opt/so/log/sostatus/status.log 2>&1'
- user: root
- minute: '*/1'
- hour: '*'
@@ -300,36 +218,13 @@ sostatus_log:
- month: '*'
- dayweek: '*'
{% if role in ['eval', 'manager', 'managersearch', 'standalone'] %}
# Install cron job to determine size of influxdb for telegraf
'du -s -k /nsm/influxdb | cut -f1 > /opt/so/log/telegraf/influxdb_size.log 2>&1':
cron.present:
- user: root
- minute: '*/1'
- hour: '*'
- daymonth: '*'
- month: '*'
- dayweek: '*'
# Lock permissions on the backup directory
backupdir:
file.directory:
- name: /nsm/backup
- user: 0
- group: 0
- makedirs: True
- mode: 700
# Add config backup
/usr/sbin/so-config-backup > /dev/null 2>&1:
cron.present:
- user: root
- minute: '1'
- hour: '0'
- daymonth: '*'
- month: '*'
- dayweek: '*'
{% else %}
remove_post_setup_cron:
cron.absent:
- name: 'salt-call state.highstate'
- identifier: post_setup_cron
{% if GLOBALS.role not in ['eval', 'manager', 'managersearch', 'standalone'] %}
soversionfile:
file.managed:
- name: /etc/soversion
@@ -339,34 +234,8 @@ soversionfile:
{% endif %}
# Manager daemon.json
docker_daemon:
file.managed:
- source: salt://common/files/daemon.json
- name: /etc/docker/daemon.json
- template: jinja
# Make sure Docker is always running
docker:
service.running:
- enable: True
- watch:
- file: docker_daemon
# Reserve OS ports for Docker proxy in case boot settings are not already applied/present
# 55000 = Wazuh, 57314 = Strelka, 47760-47860 = Zeek
dockerapplyports:
cmd.run:
- name: if [ ! -s /etc/sysctl.d/99-reserved-ports.conf ]; then sysctl -w net.ipv4.ip_local_reserved_ports="55000,57314,47760-47860"; fi
# Reserve OS ports for Docker proxy
dockerreserveports:
file.managed:
- source: salt://common/files/99-reserved-ports.conf
- name: /etc/sysctl.d/99-reserved-ports.conf
{% if salt['grains.get']('sosmodel', '') %}
{% if grains['os'] == 'CentOS' %}
{% if GLOBALS.so_model %}
{% if GLOBALS.os == 'Rocky' %}
# Install Raid tools
raidpkgs:
pkg.installed:
@@ -377,8 +246,9 @@ raidpkgs:
{% endif %}
# Install raid check cron
/usr/sbin/so-raid-status > /dev/null 2>&1:
so_raid_status:
cron.present:
- name: '/usr/sbin/so-raid-status > /dev/null 2>&1'
- user: root
- minute: '*/15'
- hour: '*'

56
salt/common/packages.sls Normal file
View File

@@ -0,0 +1,56 @@
{% from 'vars/globals.map.jinja' import GLOBALS %}
{% if GLOBALS.os == 'Ubuntu' %}
commonpkgs:
pkg.installed:
- skip_suggestions: True
- pkgs:
- chrony
- apache2-utils
- wget
- ntpdate
- jq
- python3-docker
- curl
- ca-certificates
- software-properties-common
- apt-transport-https
- openssl
- netcat
- python3-mysqldb
- sqlite3
- libssl-dev
- python3-dateutil
- python3-m2crypto
- python3-mysqldb
- python3-packaging
- python3-lxml
- git
- vim
{% elif GLOBALS.os == 'Rocky' %}
commonpkgs:
pkg.installed:
- skip_suggestions: True
- pkgs:
- wget
- jq
- tcpdump
- httpd-tools
- net-tools
- curl
- sqlite
- mariadb-devel
- python3-dnf-plugin-versionlock
- nmap-ncat
- yum-utils
- device-mapper-persistent-data
- lvm2
- openssl
- git
- python3-docker
- python3-m2crypto
- rsync
- python3-rich
- python3-watchdog
- unzip
{% endif %}

View File

@@ -1,207 +1,11 @@
#!/usr/bin/env python3
#!/usr/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
import ipaddress
import textwrap
import os
import subprocess
import sys
import argparse
import re
from lxml import etree as ET
from datetime import datetime as dt
from datetime import timezone as tz
LOCAL_SALT_DIR='/opt/so/saltstack/local'
WAZUH_CONF='/nsm/wazuh/etc/ossec.conf'
VALID_ROLES = {
'a': { 'role': 'analyst','desc': 'Analyst - 80/tcp, 443/tcp' },
'b': { 'role': 'beats_endpoint', 'desc': 'Logstash Beat - 5044/tcp' },
'e': { 'role': 'elasticsearch_rest', 'desc': 'Elasticsearch REST API - 9200/tcp' },
'f': { 'role': 'strelka_frontend', 'desc': 'Strelka frontend - 57314/tcp' },
'o': { 'role': 'osquery_endpoint', 'desc': 'Osquery endpoint - 8090/tcp' },
's': { 'role': 'syslog', 'desc': 'Syslog device - 514/tcp/udp' },
'w': { 'role': 'wazuh_agent', 'desc': 'Wazuh agent - 1514/tcp/udp' },
'p': { 'role': 'wazuh_api', 'desc': 'Wazuh API - 55000/tcp' },
'r': { 'role': 'wazuh_authd', 'desc': 'Wazuh registration service - 1515/tcp' }
}
def validate_ip_cidr(ip_cidr: str) -> bool:
try:
ipaddress.ip_address(ip_cidr)
except ValueError:
try:
ipaddress.ip_network(ip_cidr)
except ValueError:
return False
return True
def role_prompt() -> str:
print()
print('Choose the role for the IP or Range you would like to allow')
print()
for role in VALID_ROLES:
print(f'[{role}] - {VALID_ROLES[role]["desc"]}')
print()
role = input('Please enter your selection: ')
if role in VALID_ROLES.keys():
return VALID_ROLES[role]['role']
else:
print(f'Invalid role \'{role}\', please try again.', file=sys.stderr)
sys.exit(1)
def ip_prompt() -> str:
ip = input('Enter a single ip address or range to allow (ex: 10.10.10.10 or 10.10.0.0/16): ')
if validate_ip_cidr(ip):
return ip
else:
print(f'Invalid IP address or CIDR block \'{ip}\', please try again.', file=sys.stderr)
sys.exit(1)
def wazuh_enabled() -> bool:
file = f'{LOCAL_SALT_DIR}/pillar/global.sls'
with open(file, 'r') as pillar:
if 'wazuh: 1' in pillar.read():
return True
return False
def root_to_str(root: ET.ElementTree) -> str:
return ET.tostring(root, encoding='unicode', method='xml', xml_declaration=False, pretty_print=True)
def add_wl(ip):
parser = ET.XMLParser(remove_blank_text=True)
with open(WAZUH_CONF, 'rb') as wazuh_conf:
tree = ET.parse(wazuh_conf, parser)
root = tree.getroot()
source_comment = ET.Comment(f'Address {ip} added by /usr/sbin/so-allow on {dt.utcnow().replace(tzinfo=tz.utc).strftime("%a %b %e %H:%M:%S %Z %Y")}')
new_global = ET.Element("global")
new_wl = ET.SubElement(new_global, 'white_list')
new_wl.text = ip
root.append(source_comment)
root.append(new_global)
with open(WAZUH_CONF, 'w') as add_out:
add_out.write(root_to_str(root))
def apply(role: str, ip: str) -> int:
firewall_cmd = ['so-firewall', 'includehost', role, ip]
salt_cmd = ['salt-call', 'state.apply', '-l', 'quiet', 'firewall', 'queue=True']
restart_wazuh_cmd = ['so-wazuh-restart']
print(f'Adding {ip} to the {role} role. This can take a few seconds...')
cmd = subprocess.run(firewall_cmd)
if cmd.returncode == 0:
cmd = subprocess.run(salt_cmd, stdout=subprocess.DEVNULL)
else:
return cmd.returncode
if cmd.returncode == 0:
if wazuh_enabled() and role=='analyst':
try:
add_wl(ip)
print(f'Added whitelist entry for {ip} from {WAZUH_CONF}', file=sys.stderr)
except Exception as e:
print(f'Failed to add whitelist entry for {ip} from {WAZUH_CONF}', file=sys.stderr)
print(e)
return 1
print('Restarting OSSEC Server...')
cmd = subprocess.run(restart_wazuh_cmd)
else:
return cmd.returncode
else:
print(f'Commmand \'{" ".join(salt_cmd)}\' failed.', file=sys.stderr)
return cmd.returncode
if cmd.returncode != 0:
print('Failed to restart OSSEC server.')
return cmd.returncode
def main():
if os.geteuid() != 0:
print('You must run this script as root', file=sys.stderr)
sys.exit(1)
main_parser = argparse.ArgumentParser(
formatter_class=argparse.RawDescriptionHelpFormatter,
epilog=textwrap.dedent(f'''\
additional information:
To use this script in interactive mode call it with no arguments
'''
))
group = main_parser.add_argument_group(title='roles')
group.add_argument('-a', dest='roles', action='append_const', const=VALID_ROLES['a']['role'], help="Analyst - 80/tcp, 443/tcp")
group.add_argument('-b', dest='roles', action='append_const', const=VALID_ROLES['b']['role'], help="Logstash Beat - 5044/tcp")
group.add_argument('-e', dest='roles', action='append_const', const=VALID_ROLES['e']['role'], help="Elasticsearch REST API - 9200/tcp")
group.add_argument('-f', dest='roles', action='append_const', const=VALID_ROLES['f']['role'], help="Strelka frontend - 57314/tcp")
group.add_argument('-o', dest='roles', action='append_const', const=VALID_ROLES['o']['role'], help="Osquery endpoint - 8090/tcp")
group.add_argument('-s', dest='roles', action='append_const', const=VALID_ROLES['s']['role'], help="Syslog device - 514/tcp/udp")
group.add_argument('-w', dest='roles', action='append_const', const=VALID_ROLES['w']['role'], help="Wazuh agent - 1514/tcp/udp")
group.add_argument('-p', dest='roles', action='append_const', const=VALID_ROLES['p']['role'], help="Wazuh API - 55000/tcp")
group.add_argument('-r', dest='roles', action='append_const', const=VALID_ROLES['r']['role'], help="Wazuh registration service - 1515/tcp")
ip_g = main_parser.add_argument_group(title='allow')
ip_g.add_argument('-i', help="IP or CIDR block to disallow connections from, requires at least one role argument", metavar='', dest='ip')
args = main_parser.parse_args(sys.argv[1:])
if args.roles is None:
role = role_prompt()
ip = ip_prompt()
try:
return_code = apply(role, ip)
except Exception as e:
print(f'Unexpected exception occurred: {e}', file=sys.stderr)
return_code = e.errno
sys.exit(return_code)
elif args.roles is not None and args.ip is None:
if os.environ.get('IP') is None:
main_parser.print_help()
sys.exit(1)
else:
args.ip = os.environ['IP']
if validate_ip_cidr(args.ip):
try:
for role in args.roles:
return_code = apply(role, args.ip)
if return_code > 0:
break
except Exception as e:
print(f'Unexpected exception occurred: {e}', file=sys.stderr)
return_code = e.errno
else:
print(f'Invalid IP address or CIDR block \'{args.ip}\', please try again.', file=sys.stderr)
return_code = 1
sys.exit(return_code)
if __name__ == '__main__':
try:
main()
except KeyboardInterrupt:
sys.exit(1)
echo "Please use the Configuration section in SOC to allow hosts"
echo ""
echo "If you need command line options on adding hosts please run so-firewall"

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common

View File

@@ -1,27 +1,18 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
doc_workstation_url="https://docs.securityonion.net/en/2.3/analyst-vm.html"
{# we only want the script to install the workstation if it is CentOS -#}
{% if grains.os == 'CentOS' -%}
{# we only want the script to install the workstation if it is Rocky -#}
{% if grains.os == 'Rocky' -%}
{# if this is a manager -#}
{% if grains.master == grains.id.split('_')|first -%}
source /usr/sbin/so-common
doc_workstation_url="$DOC_BASE_URL/analyst-vm.html"
pillar_file="/opt/so/saltstack/local/pillar/minions/{{grains.id}}.sls"
if [ -f "$pillar_file" ]; then
@@ -89,12 +80,12 @@ echo "Since this is not a manager, the pillar values to enable analyst workstati
{#- endif if this is a manager #}
{% endif -%}
{#- if not CentOS #}
{#- if not Rocky #}
{%- else %}
echo "The Analyst Workstation can only be installed on CentOS. Please view the documentation at $doc_workstation_url."
echo "The Analyst Workstation can only be installed on Rocky. Please view the documentation at $doc_workstation_url."
{#- endif grains.os == CentOS #}
{#- endif grains.os == Rocky #}
{% endif -%}
exit 0

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common

View File

@@ -1,26 +1,24 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
DEFAULT_SALT_DIR=/opt/so/saltstack/default
DOC_BASE_URL="https://docs.securityonion.net/en/2.4"
# Check for prerequisites
if [ "$(id -u)" -ne 0 ]; then
echo "This script must be run using sudo!"
exit 1
if [ -z $NOROOT ]; then
# Check for prerequisites
if [ "$(id -u)" -ne 0 ]; then
echo "This script must be run using sudo!"
exit 1
fi
fi
# Ensure /usr/sbin is in path
if ! echo "$PATH" | grep -q "/usr/sbin"; then
export PATH="$PATH:/usr/sbin"
fi
# Define a banner to separate sections
@@ -162,15 +160,12 @@ elastic_license() {
read -r -d '' message <<- EOM
\n
Starting in Elastic Stack version 7.11, the Elastic Stack binaries are only available under the Elastic License:
https://securityonion.net/elastic-license
Elastic Stack binaries and Security Onion components are only available under the Elastic License version 2 (ELv2):
https://securityonion.net/license/
Please review the Elastic License:
https://www.elastic.co/licensing/elastic-license
Do you agree to the terms of ELv2?
Do you agree to the terms of the Elastic License?
If so, type AGREE to accept the Elastic License and continue. Otherwise, press Enter to exit this program without making any changes.
If so, type AGREE to accept ELv2 and continue. Otherwise, press Enter to exit this program without making any changes.
EOM
AGREED=$(whiptail --title "$whiptail_title" --inputbox \
@@ -199,14 +194,14 @@ get_random_value() {
}
gpg_rpm_import() {
if [[ "$OS" == "centos" ]]; then
if [[ "$OS" == "rocky" ]]; then
if [[ "$WHATWOULDYOUSAYYAHDOHERE" == "setup" ]]; then
local RPMKEYSLOC="../salt/repo/client/files/centos/keys"
local RPMKEYSLOC="../salt/repo/client/files/rocky/keys"
else
local RPMKEYSLOC="$UPDATE_DIR/salt/repo/client/files/centos/keys"
local RPMKEYSLOC="$UPDATE_DIR/salt/repo/client/files/rocky/keys"
fi
RPMKEYS=('RPM-GPG-KEY-EPEL-7' 'GPG-KEY-WAZUH' 'docker.pub' 'SALTSTACK-GPG-KEY.pub' 'securityonion.pub')
RPMKEYS=('RPM-GPG-KEY-EPEL-9' 'SALTSTACK-GPG-KEY2.pub' 'docker.pub' 'securityonion.pub')
for RPMKEY in "${RPMKEYS[@]}"; do
rpm --import $RPMKEYSLOC/$RPMKEY
@@ -237,31 +232,17 @@ init_monitor() {
}
is_manager_node() {
# Check to see if this is a manager node
role=$(lookup_role)
is_single_node_grid && return 0
[ $role == 'manager' ] && return 0
[ $role == 'managersearch' ] && return 0
[ $role == 'helix' ] && return 0
return 1
grep "role: so-" /etc/salt/grains | grep -E "manager|eval|managersearch|standalone|import" &> /dev/null
}
is_sensor_node() {
# Check to see if this is a sensor (forward) node
role=$(lookup_role)
is_single_node_grid && return 0
[ $role == 'sensor' ] && return 0
[ $role == 'heavynode' ] && return 0
[ $role == 'helix' ] && return 0
return 1
grep "role: so-" /etc/salt/grains | grep -E "sensor|heavynode|helix" &> /dev/null
}
is_single_node_grid() {
role=$(lookup_role)
[ $role == 'eval' ] && return 0
[ $role == 'standalone' ] && return 0
[ $role == 'import' ] && return 0
return 1
grep "role: so-" /etc/salt/grains | grep -E "eval|standalone|import" &> /dev/null
}
lookup_bond_interfaces() {
@@ -392,17 +373,23 @@ run_check_net_err() {
fi
}
salt_minion_count() {
local MINIONDIR="/opt/so/saltstack/local/pillar/minions"
MINIONCOUNT=$(ls -la $MINIONDIR/*.sls | grep -v adv_ | wc -l)
}
set_cron_service_name() {
if [[ "$OS" == "centos" ]]; then
cron_service_name="crond"
else
cron_service_name="cron"
fi
if [[ "$OS" == "rocky" ]]; then
cron_service_name="crond"
else
cron_service_name="cron"
fi
}
set_os() {
if [ -f /etc/redhat-release ]; then
OS=centos
OS=rocky
else
OS=ubuntu
fi
@@ -518,6 +505,18 @@ valid_hostname() {
[[ $hostname =~ ^[a-zA-Z0-9\-]+$ ]] && [[ $hostname != 'localhost' ]] && return 0 || return 1
}
verify_ip4() {
local ip=$1
# Is this an IP or CIDR?
if grep -qP "^[^/]+/[^/]+$" <<< $ip; then
# Looks like a CIDR
valid_ip4_cidr_mask "$ip"
else
# We know this is not a CIDR - Is it an IP?
valid_ip4 "$ip"
fi
}
valid_ip4() {
local ip=$1

View File

@@ -1,48 +0,0 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.. /usr/sbin/so-common
{% set BACKUPLOCATIONS = salt['pillar.get']('backup:locations', {}) %}
TODAY=$(date '+%Y_%m_%d')
BACKUPFILE="/nsm/backup/so-config-backup-$TODAY.tar"
MAXBACKUPS=7
# Create backup dir if it does not exist
mkdir -p /nsm/backup
# If we haven't already written a backup file for today, let's do so
if [ ! -f $BACKUPFILE ]; then
# Create empty backup file
tar -cf $BACKUPFILE -T /dev/null
# Loop through all paths defined in global.sls, and append them to backup file
{%- for LOCATION in BACKUPLOCATIONS %}
tar -rf $BACKUPFILE {{ LOCATION }}
{%- endfor %}
tar -rf $BACKUPFILE /etc/pki
tar -rf $BACKUPFILE /etc/salt
tar -rf $BACKUPFILE /opt/so/conf/kratos
fi
# Find oldest backup files and remove them
NUMBACKUPS=$(find /nsm/backup/ -type f -name "so-config-backup*" | wc -l)
while [ "$NUMBACKUPS" -gt "$MAXBACKUPS" ]; do
OLDESTBACKUP=$(find /nsm/backup/ -type f -name "so-config-backup*" -type f -printf '%T+ %p\n' | sort | head -n 1 | awk -F" " '{print $2}')
rm -f $OLDESTBACKUP
NUMBACKUPS=$(find /nsm/backup/ -type f -name "so-config-backup*" | wc -l)
done

View File

@@ -1,20 +0,0 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
. /usr/sbin/so-common
echo "TheHive and its components are no longer part of Security Onion"

View File

@@ -1,20 +0,0 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
. /usr/sbin/so-common
echo "TheHive and its components are no longer part of Security Onion"

View File

@@ -1,20 +0,0 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
. /usr/sbin/so-common
echo "TheHive and its components are no longer part of Security Onion"

View File

@@ -1,20 +0,0 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
. /usr/sbin/so-common
echo "TheHive and its components are no longer part of Security Onion"

View File

@@ -1,20 +0,0 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
. /usr/sbin/so-common
echo "TheHive and its components are no longer part of Security Onion"

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common

View File

@@ -1,19 +1,11 @@
#!/usr/bin/env python3
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
import ipaddress
import textwrap
@@ -27,17 +19,12 @@ from xml.dom import minidom
LOCAL_SALT_DIR='/opt/so/saltstack/local'
WAZUH_CONF='/nsm/wazuh/etc/ossec.conf'
VALID_ROLES = {
'a': { 'role': 'analyst','desc': 'Analyst - 80/tcp, 443/tcp' },
'b': { 'role': 'beats_endpoint', 'desc': 'Logstash Beat - 5044/tcp' },
'e': { 'role': 'elasticsearch_rest', 'desc': 'Elasticsearch REST API - 9200/tcp' },
'f': { 'role': 'strelka_frontend', 'desc': 'Strelka frontend - 57314/tcp' },
'o': { 'role': 'osquery_endpoint', 'desc': 'Osquery endpoint - 8090/tcp' },
's': { 'role': 'syslog', 'desc': 'Syslog device - 514/tcp/udp' },
'w': { 'role': 'wazuh_agent', 'desc': 'Wazuh agent - 1514/tcp/udp' },
'p': { 'role': 'wazuh_api', 'desc': 'Wazuh API - 55000/tcp' },
'r': { 'role': 'wazuh_authd', 'desc': 'Wazuh registration service - 1515/tcp' }
}
@@ -76,73 +63,15 @@ def ip_prompt() -> str:
sys.exit(1)
def wazuh_enabled() -> bool:
for file in os.listdir(f'{LOCAL_SALT_DIR}/pillar'):
with open(file, 'r') as pillar:
if 'wazuh: 1' in pillar.read():
return True
return False
def root_to_str(root: ET.ElementTree) -> str:
xml_str = ET.tostring(root, encoding='unicode', method='xml').replace('\n', '')
xml_str = re.sub(r'(?:(?<=>) *)', '', xml_str)
# Remove specific substrings to better format comments on intial parse/write
xml_str = re.sub(r' -', '', xml_str)
xml_str = re.sub(r' -->', ' -->', xml_str)
dom = minidom.parseString(xml_str)
return dom.toprettyxml(indent=" ")
def rem_wl(ip):
parser = ET.XMLParser(remove_blank_text=True)
with open(WAZUH_CONF, 'rb') as wazuh_conf:
tree = ET.parse(wazuh_conf, parser)
root = tree.getroot()
global_elems = root.findall(f"global/white_list[. = '{ip}']/..")
if len(global_elems) > 0:
for g_elem in global_elems:
ge_index = list(root).index(g_elem)
if ge_index > 0 and root[list(root).index(g_elem) - 1].tag == ET.Comment:
root.remove(root[ge_index - 1])
root.remove(g_elem)
with open(WAZUH_CONF, 'w') as out:
out.write(root_to_str(root))
def apply(role: str, ip: str) -> int:
firewall_cmd = ['so-firewall', 'excludehost', role, ip]
salt_cmd = ['salt-call', 'state.apply', '-l', 'quiet', 'firewall', 'queue=True']
restart_wazuh_cmd = ['so-wazuh-restart']
print(f'Removing {ip} from the {role} role. This can take a few seconds...')
cmd = subprocess.run(firewall_cmd)
if cmd.returncode == 0:
cmd = subprocess.run(salt_cmd, stdout=subprocess.DEVNULL)
else:
return cmd.returncode
if cmd.returncode == 0:
if wazuh_enabled and role=='analyst':
try:
rem_wl(ip)
print(f'Removed whitelist entry for {ip} from {WAZUH_CONF}', file=sys.stderr)
except Exception as e:
print(f'Failed to remove whitelist entry for {ip} from {WAZUH_CONF}', file=sys.stderr)
print(e)
return 1
print('Restarting OSSEC Server...')
cmd = subprocess.run(restart_wazuh_cmd)
else:
return cmd.returncode
else:
print(f'Commmand \'{" ".join(salt_cmd)}\' failed.', file=sys.stderr)
return cmd.returncode
if cmd.returncode != 0:
print('Failed to restart OSSEC server.')
return cmd.returncode
def main():
@@ -163,11 +92,7 @@ def main():
group.add_argument('-b', dest='roles', action='append_const', const=VALID_ROLES['b']['role'], help="Logstash Beat - 5044/tcp")
group.add_argument('-e', dest='roles', action='append_const', const=VALID_ROLES['e']['role'], help="Elasticsearch REST API - 9200/tcp")
group.add_argument('-f', dest='roles', action='append_const', const=VALID_ROLES['f']['role'], help="Strelka frontend - 57314/tcp")
group.add_argument('-o', dest='roles', action='append_const', const=VALID_ROLES['o']['role'], help="Osquery endpoint - 8090/tcp")
group.add_argument('-s', dest='roles', action='append_const', const=VALID_ROLES['s']['role'], help="Syslog device - 514/tcp/udp")
group.add_argument('-w', dest='roles', action='append_const', const=VALID_ROLES['w']['role'], help="Wazuh agent - 1514/tcp/udp")
group.add_argument('-p', dest='roles', action='append_const', const=VALID_ROLES['p']['role'], help="Wazuh API - 55000/tcp")
group.add_argument('-r', dest='roles', action='append_const', const=VALID_ROLES['r']['role'], help="Wazuh registration service - 1515/tcp")
ip_g = main_parser.add_argument_group(title='allow')
ip_g.add_argument('-i', help="IP or CIDR block to disallow connections from, requires at least one role argument", metavar='', dest='ip')

View File

@@ -1,19 +1,11 @@
#!/usr/bin/env python3
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
import sys, argparse, re, docker
from packaging.version import Version, InvalidVersion

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
. /usr/sbin/so-image-common

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common

View File

@@ -0,0 +1,34 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0; you may not use
# this file except in compliance with the Elastic License 2.0.
#so-elastic-agent-gen-installers $FleetHost $EnrollmentToken
{% from 'vars/globals.map.jinja' import GLOBALS %}
. /usr/sbin/so-common
ENROLLMENTOKEN=$(curl -K /opt/so/conf/elasticsearch/curl.config -L "localhost:5601/api/fleet/enrollment_api_keys" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' | jq .list | jq -r -c '.[] | select(.policy_id | contains("endpoints")) | .api_key')
FLEETHOST=$(lookup_pillar "server:url" "elasticfleet")
#FLEETHOST=$1
#ENROLLMENTOKEN=$2
CONTAINERGOOS=( "linux" "darwin" "windows" )
rm -rf /tmp/elastic-agent-workspace
mkdir -p /tmp/elastic-agent-workspace
for OS in "${CONTAINERGOOS[@]}"
do
printf "\n\nGenerating $OS Installer..."
cp /opt/so/saltstack/default/salt/elasticfleet/files/elastic-agent/so-elastic-agent-*-$OS-x86_64.tar.gz /tmp/elastic-agent-workspace/$OS.tar.gz
docker run -e CGO_ENABLED=0 -e GOOS=$OS \
--mount type=bind,source=/etc/ssl/certs/,target=/workspace/files/cert/ \
--mount type=bind,source=/tmp/elastic-agent-workspace/,target=/workspace/files/elastic-agent/ \
--mount type=bind,source=/opt/so/saltstack/local/salt/elasticfleet/files/so_agent-installers/,target=/output/ \
{{ GLOBALS.registry_host }}:5000/{{ GLOBALS.image_repo }}/so-elastic-agent-builder:{{ GLOBALS.so_version }} go build -ldflags "-X main.fleetHost=$FLEETHOST -X main.enrollmentToken=$ENROLLMENTOKEN" -o /output/so-elastic-agent_$OS
printf "\n $OS Installer Generated..."
done

View File

@@ -1,67 +0,0 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
if [ -f "/usr/sbin/so-common" ]; then
. /usr/sbin/so-common
fi
ES_AUTH_PILLAR=${ELASTIC_AUTH_PILLAR:-/opt/so/saltstack/local/pillar/elasticsearch/auth.sls}
ES_USERS_FILE=${ELASTIC_USERS_FILE:-/opt/so/saltstack/local/salt/elasticsearch/files/users}
authEnable=$1
if ! grep -q "enabled: " "$ES_AUTH_PILLAR"; then
echo "Elastic auth pillar file is invalid. Unable to proceed."
exit 1
fi
function restart() {
if [[ -z "$ELASTIC_AUTH_SKIP_HIGHSTATE" ]]; then
echo "Elasticsearch on all affected minions will now be stopped and then restarted..."
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode' cmd.run so-elastic-stop queue=True
echo "Applying highstate to all affected minions..."
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode' state.highstate queue=True
fi
}
if [[ "$authEnable" == "true" ]]; then
if grep -q "enabled: False" "$ES_AUTH_PILLAR"; then
sed -i 's/enabled: False/enabled: True/g' "$ES_AUTH_PILLAR"
restart
echo "Elastic auth is now enabled."
if grep -q "argon" "$ES_USERS_FILE"; then
echo ""
echo "IMPORTANT: The following users will need to change their password, after logging into SOC, in order to access Kibana:"
grep argon "$ES_USERS_FILE" | cut -d ":" -f 1
fi
else
echo "Auth is already enabled."
fi
elif [[ "$authEnable" == "false" ]]; then
if grep -q "enabled: True" "$ES_AUTH_PILLAR"; then
sed -i 's/enabled: True/enabled: False/g' "$ES_AUTH_PILLAR"
restart
echo "Elastic auth is now disabled."
else
echo "Auth is already disabled."
fi
else
echo "Usage: $0 <true|false>"
echo ""
echo "Toggles Elastic authentication. Elasticsearch will be restarted on each affected minion."
echo ""
fi

27
salt/common/tools/sbin/so-elastic-auth-password-reset Normal file → Executable file
View File

@@ -1,19 +1,10 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
source $(dirname $0)/so-common
require_manager
@@ -98,18 +89,16 @@ function killAllSaltJobs() {
function soUserSync() {
# apply this state to update /opt/so/saltstack/local/salt/elasticsearch/curl.config on the manager
salt-call state.sls_id elastic_curl_config_distributed manager queue=True
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode' saltutil.kill_all_jobs
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-searchnode or G@role:so-heavynode' saltutil.kill_all_jobs
# apply this state to get the curl.config
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode' state.sls_id elastic_curl_config common queue=True
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-searchnode or G@role:so-heavynode' state.sls_id elastic_curl_config common queue=True
$(dirname $0)/so-user sync
printf "\nApplying logstash state to the appropriate nodes.\n\n"
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode' state.apply logstash queue=True
printf "\nApplying filebeat state to the appropriate nodes.\n\n"
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode or G@role:so-sensor or G@role:so-fleet' state.apply filebeat queue=True
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-searchnode or G@role:so-heavynode' state.apply logstash queue=True
printf "\nApplying kibana state to the appropriate nodes.\n\n"
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch' state.apply kibana queue=True
printf "\nApplying curator state to the appropriate nodes.\n\n"
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode' state.apply curator queue=True
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-searchnode or G@role:so-heavynode' state.apply curator queue=True
}
function highstateManager() {

View File

@@ -1,20 +1,11 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
{%- set NODEIP = salt['pillar.get']('elasticsearch:mainip', '') -%}
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
. /usr/sbin/so-common
SKIP=0
@@ -50,7 +41,7 @@ done
if [ $SKIP -ne 1 ]; then
# List indices
echo
{{ ELASTICCURL }} -k -L https://{{ NODEIP }}:9200/_cat/indices?v
curl -K /opt/so/conf/elasticsearch/curl.config -k -L https://{{ NODEIP }}:9200/_cat/indices?v
echo
# Inform user we are about to delete all data
echo
@@ -63,17 +54,10 @@ if [ $SKIP -ne 1 ]; then
if [ "$INPUT" != "AGREE" ] ; then exit 0; fi
fi
# Check to see if Logstash/Filebeat are running
# Check to see if Logstash are running
LS_ENABLED=$(so-status | grep logstash)
FB_ENABLED=$(so-status | grep filebeat)
EA_ENABLED=$(so-status | grep elastalert)
if [ ! -z "$FB_ENABLED" ]; then
/usr/sbin/so-filebeat-stop
fi
if [ ! -z "$LS_ENABLED" ]; then
/usr/sbin/so-logstash-stop
@@ -89,19 +73,13 @@ fi
# Delete data
echo "Deleting data..."
INDXS=$({{ ELASTICCURL }} -s -XGET -k -L https://{{ NODEIP }}:9200/_cat/indices?v | egrep 'logstash|elastalert|so-' | awk '{ print $3 }')
INDXS=$(curl -K /opt/so/conf/elasticsearch/curl.config -s -XGET -k -L https://{{ NODEIP }}:9200/_cat/indices?v | egrep 'logstash|elastalert|so-' | awk '{ print $3 }')
for INDX in ${INDXS}
do
{{ ELASTICCURL }} -XDELETE -k -L https://"{{ NODEIP }}:9200/${INDX}" > /dev/null 2>&1
curl -K /opt/so/conf/elasticsearch/curl.config-XDELETE -k -L https://"{{ NODEIP }}:9200/${INDX}" > /dev/null 2>&1
done
#Start Logstash/Filebeat
if [ ! -z "$FB_ENABLED" ]; then
/usr/sbin/so-filebeat-start
fi
#Start Logstash
if [ ! -z "$LS_ENABLED" ]; then
/usr/sbin/so-logstash-start

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
# Source common settings
. /usr/sbin/so-common

View File

@@ -0,0 +1,19 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
POLICY_ID=$1
# Let's snag a cookie from Kibana
SESSIONCOOKIE=$(curl -K /opt/so/conf/elasticsearch/curl.config -c - -X GET http://localhost:5601/ | grep sid | awk '{print $7}')
echo "Deleting agent policy $POLICY_ID..."
# Delete agent policy
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/agent_policies/delete" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d"{\"agentPolicyId\": \"$POLICY_ID\"}"
echo

View File

@@ -0,0 +1,17 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
# Let's snag a cookie from Kibana
SESSIONCOOKIE=$(curl -K /opt/so/conf/elasticsearch/curl.config -c - -X GET http://localhost:5601/ | grep sid | awk '{print $7}')
echo "Setting up default Security Onion package policies for Elastic Agent..."
# List configured agent policies
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET "localhost:5601/api/fleet/agent_policies" | jq
echo

View File

@@ -0,0 +1,19 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
POLICY_ID=$1
# Let's snag a cookie from Kibana
SESSIONCOOKIE=$(curl -K /opt/so/conf/elasticsearch/curl.config -c - -X GET http://localhost:5601/ | grep sid | awk '{print $7}')
echo "Viewing agent policy $POLICY_ID"
# View agent policy
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET "localhost:5601/api/fleet/agent_policies/$POLICY_ID/full" | jq
echo

View File

@@ -0,0 +1,17 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
# Let's snag a cookie from Kibana
SESSIONCOOKIE=$(curl -K /opt/so/conf/elasticsearch/curl.config -c - -X GET http://localhost:5601/ | grep sid | awk '{print $7}')
echo "Retrieving data stream information..."
# Retrieve data stream information
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET "localhost:5601/api/fleet/data_streams" | jq
echo

View File

@@ -0,0 +1,23 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
POLICY_ID=$1
# Let's snag a cookie from Kibana
SESSIONCOOKIE=$(curl -q -K /opt/so/conf/elasticsearch/curl.config -c - -X GET http://localhost:5601/ | grep sid | awk '{print $7}')
# Get integration policies relative to agent policy
INTEGRATION_POLICY_IDS=$(curl -q -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET "localhost:5601/api/fleet/agent_policies/$POLICY_ID" | jq -r '.item.package_policies[].id')
for i in $INTEGRATION_POLICY_IDS; do
# Delete integration policies
echo "Deleting integration policy: $i..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies/delete" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d"{\"packagePolicyIds\": [\"$i\"], \"force\":true}";
echo
echo
done

View File

@@ -0,0 +1,19 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
POLICY_ID=$1
# Let's snag a cookie from Kibana
SESSIONCOOKIE=$(curl -K /opt/so/conf/elasticsearch/curl.config -c - -X GET http://localhost:5601/ | grep sid | awk '{print $7}')
echo "Deleting integration policy $POLICY_ID..."
# List configured package policies
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies/delete" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d"{\"packagePolicyIds\": [\"$POLICY_ID\"]}"
echo

View File

@@ -0,0 +1,17 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
# Let's snag a cookie from Kibana
SESSIONCOOKIE=$(curl -K /opt/so/conf/elasticsearch/curl.config -c - -X GET http://localhost:5601/ | grep sid | awk '{print $7}')
echo "Setting up default Security Onion package policies for Elastic Agent..."
# List configured package policies
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET "localhost:5601/api/fleet/package_policies" | jq
echo

View File

@@ -0,0 +1,137 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- set ZEEKVER = salt['pillar.get']('global:mdengine', '') %}
{%- set STRELKAENABLED = salt['pillar.get']('strelka:enabled', '0') %}
{%- set RITAENABLED = salt['pillar.get']('rita:enabled', False) %}
wait_for_web_response "http://localhost:5601/api/spaces/space/default" "default" 300 "curl -K /opt/so/conf/elasticsearch/curl.config"
# Let's snag a cookie from Kibana
SESSIONCOOKIE=$(curl -K /opt/so/conf/elasticsearch/curl.config -c - -X GET http://localhost:5601/ | grep sid | awk '{print $7}')
# Disable certain Features from showing up in the Kibana UI
echo
echo "Disable certain Features from showing up in the Kibana UI"
so-kibana-space-defaults
echo
# Suricata logs
echo
echo "Setting up Suricata package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{ "policy_id": "so-grid-nodes", "package": { "name": "log", "version": "1.1.0" }, "id": "suricata-logs", "name": "suricata-logs", "description": "Suricata integration", "namespace": "so", "inputs": { "logs-logfile": { "enabled": true, "streams": { "log.log": { "enabled": true, "vars": { "paths": [ "/nsm/suricata/eve*.json" ], "data_stream.dataset": "suricata", "tags": [],"processors": "- add_fields:\n target: event\n fields:\n category: network\n module: suricata", "custom": "pipeline: suricata.common" }}}}}}'
echo
# Zeek logs
echo
echo "Setting up Zeek package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{ "policy_id": "so-grid-nodes", "package": { "name": "log", "version": "1.1.0" }, "name": "zeek-logs", "description": "Zeek logs", "namespace": "so", "inputs": { "logs-logfile": { "enabled": true, "streams": { "log.log": { "enabled": true, "vars": { "paths": ["/nsm/zeek/logs/current/*.log"], "data_stream.dataset": "zeek", "tags": [], "processors": "- dissect:\n tokenizer: \"/nsm/zeek/logs/current/%{pipeline}.log\"\n field: \"log.file.path\"\n trim_chars: \".log\"\n target_prefix: \"\"\n- script:\n lang: javascript\n source: >\n function process(event) {\n var pl = event.Get(\"pipeline\");\n event.Put(\"@metadata.pipeline\", \"zeek.\" + pl);\n }\n- add_fields:\n target: event\n fields:\n category: network\n module: zeek\n- add_tags:\n tags: \"ics\"\n when:\n regexp:\n pipeline: \"^bacnet*|^bsap*|^cip*|^cotp*|^dnp3*|^ecat*|^enip*|^modbus*|^opcua*|^profinet*|^s7comm*\"", "custom": "exclude_files: [\"broker|capture_loss|ecat_arp_info|loaded_scripts|packet_filter|stats|stderr|stdout.log$\"]\n" } } } } } }'
echo
# Import - EVTX
echo
echo "Setting up EVTX import package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d '{ "package": { "name": "log", "version": "1.1.0" }, "name": "import-evtx-logs", "namespace": "so", "description": "Import Windows EVTX logs", "policy_id": "so-grid-nodes", "inputs": { "logs-logfile": { "enabled": true, "streams": { "log.log": { "enabled": true, "vars": { "paths": [ "/nsm/import/*/evtx/data.json" ], "data_stream.dataset": "import", "custom": "pipeline: import.wel", "processors": "- dissect:\n tokenizer: \"/nsm/import/%{import.id}/evtx/%{import.file}\"\n field: \"log.file.path\"\n target_prefix: \"\"\n- decode_json_fields:\n fields: [\"message\"]\n target: \"\"\n- add_fields:\n target: event\n fields:\n module: windows_eventlog\n imported: true", "tags": [] } } } } } }'
echo
# Import - Suricata logs
echo
echo "Setting up Suricata import package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d '{ "policy_id": "so-grid-nodes", "package": { "name": "log", "version": "1.1.0" }, "id": "import-suricata-logs", "name": "import-suricata-logs", "description": "Import Suricata logs", "namespace": "so", "inputs": { "logs-logfile": { "enabled": true, "streams": { "log.log": { "enabled": true, "vars": { "paths": ["/nsm/import/*/suricata/eve*.json"], "data_stream.dataset": "import", "tags": [], "processors": "- add_fields:\n target: event\n fields:\n category: network\n module: suricata\n imported: true\n- dissect:\n tokenizer: \"/nsm/import/%{import.id}/suricata/%{import.file}\"\n field: \"log.file.path\"\n target_prefix: \"\"", "custom": "pipeline: suricata.common" } } } } } }'
echo
# Import - Zeek logs
echo
echo "Setting up Zeek import package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{ "policy_id": "so-grid-nodes", "package": { "name": "log", "version": "1.1.0" }, "name": "import-zeek-logs", "description": "Zeek Import logs", "namespace": "so", "inputs": { "logs-logfile": { "enabled": true, "streams": { "log.log": { "enabled": true, "vars": { "paths": ["/nsm/import/*/zeek/logs/*.log"], "data_stream.dataset": "import", "tags": [], "processors": "- dissect:\n tokenizer: \"/nsm/import/%{import.id}/zeek/logs/%{import.file}\"\n field: \"log.file.path\"\n target_prefix: \"\"\n- script:\n lang: javascript\n source: >\n function process(event) {\n var pl = event.Get(\"import.file\").slice(0,-4);\n event.Put(\"@metadata.pipeline\", \"zeek.\" + pl);\n }\n- add_fields:\n target: event\n fields:\n category: network\n module: zeek\n imported: true\n- add_tags:\n tags: \"ics\"\n when:\n regexp:\n import.file: \"^bacnet*|^bsap*|^cip*|^cotp*|^dnp3*|^ecat*|^enip*|^modbus*|^opcua*|^profinet*|^s7comm*\"", "custom": "exclude_files: [\"broker|capture_loss|ecat_arp_info|loaded_scripts|packet_filter|stats|stderr|stdout.log$\"]\n" } } } } } }'
echo
# Strelka logs
echo
echo "Setting up Strelka package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{ "policy_id": "so-grid-nodes", "package": { "name": "log", "version": "1.1.0" }, "id": "strelka-logs", "name": "strelka-logs", "description": "Strelka logs", "namespace": "so", "inputs": { "logs-logfile": { "enabled": true, "streams": { "log.log": { "enabled": true, "vars": { "paths": [ "/nsm/strelka/log/strelka.log" ], "data_stream.dataset": "strelka", "tags": [],"processors": "- add_fields:\n target: event\n fields:\n category: file\n module: strelka", "custom": "pipeline: strelka.file" }}}}}}'
echo
# Syslog TCP Port 514
echo
echo "Setting up Syslog TCP package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d '{ "policy_id": "so-grid-nodes", "package": { "name": "tcp", "version": "1.5.0" }, "id": "syslog-tcp-514", "name": "syslog-tcp-514", "description": "Syslog Over TCP Port 514", "namespace": "so", "inputs": { "tcp-tcp": { "enabled": true, "streams": { "tcp.generic": { "enabled": true, "vars": { "listen_address": "0.0.0.0", "listen_port": "514", "data_stream.dataset": "syslog", "pipeline": "syslog", "processors": "- add_fields:\n target: event\n fields:\n module: syslog", "tags": [ "syslog" ], "syslog_options": "field: message\n#format: auto\n#timezone: Local" } } } } } }'
echo
# Syslog UDP Port 514
echo
echo "Setting up Syslog UDP package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d '{ "policy_id": "so-grid-nodes", "package": { "name": "udp", "version": "1.5.0" }, "id": "syslog-udp-514", "name": "syslog-udp-514", "description": "Syslog over UDP Port 514", "namespace": "so", "inputs": { "udp-udp": { "enabled": true, "streams": { "udp.generic": { "enabled": true, "vars": { "listen_address": "0.0.0.0", "listen_port": "514", "data_stream.dataset": "syslog", "pipeline": "syslog", "max_message_size": "10KiB", "keep_null": false, "processors": "- add_fields:\n target: event\n fields: \n module: syslog\n", "tags": [ "syslog" ], "syslog_options": "field: message\n#format: auto\n#timezone: Local" } } } } } }'
echo
# Kratos logs
echo
echo "Setting up Kratos package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{ "policy_id": "so-grid-nodes", "package": { "name": "log", "version": "1.1.0" }, "id": "kratos-logs", "name": "kratos-logs", "description": "Kratos logs", "namespace": "so", "inputs": { "logs-logfile": { "enabled": true, "streams": { "log.log": { "enabled": true, "vars": { "paths": [ "/opt/so/log/kratos/kratos.log" ], "data_stream.dataset": "kratos", "tags": [],"custom":"pipeline: kratos","processors": "- decode_json_fields:\n fields: [\"message\"]\n target: \"\"\n add_error_key: true \n- add_fields:\n target: event\n fields:\n category: iam\n module: kratos" }}}}}}'
echo
# RITA Logs
#echo
#echo "Setting up RITA package policy..."
#curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{ "policy_id": "so-grid-nodes", "package": { "name": "log", "version": "1.1.0" }, "id": "rita-logs", "name": "rita-logs", "description": "RITA Beacon logs", "namespace": "so", "inputs": { "logs-logfile": { "enabled": true, "streams": { "log.log": { "enabled": true, "vars": { "paths": [ "/nsm/rita/beacons.csv", "/nsm/rita/long-connections.csv", "/nsm/rita/short-connections.csv", "/nsm/rita/exploded-dns.csv" ], "data_stream.dataset": "rita", "tags": [], "processors": "- add_fields:\n target: event\n fields:\n category: network\n module: rita\n- if:\n log.file.path: beacons.csv\n then: \n - add_fields:\n target: \"@metadata\"\n fields:\n pipeline: rita.beacon\n- if:\n regexp:\n log.file.path: \"*connections.csv\"\n then: \n - add_fields:\n target: \"@metadata\"\n fields:\n pipeline: rita.connection\n- if:\n log.file.path: \"exploded-dns.csv\"\n then: \n - add_fields:\n target: \"@metadata\"\n fields:\n pipeline: rita.dns" }}}}}}'
#echo
# Elasticsearch logs
echo
echo "Setting up Elasticsearch package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{ "policy_id": "so-grid-nodes", "package": { "name": "elasticsearch", "version": "1.0.0" }, "id": "elasticsearch-logs", "name": "elasticsearch-logs", "description": "Elasticsearch Logs", "namespace": "default", "inputs": { "elasticsearch-logfile": { "enabled": true, "streams": { "elasticsearch.audit": { "enabled": false, "vars": { "paths": [ "/var/log/elasticsearch/*_audit.json" ] } }, "elasticsearch.deprecation": { "enabled": false, "vars": { "paths": [ "/var/log/elasticsearch/*_deprecation.json" ] } }, "elasticsearch.gc": { "enabled": false, "vars": { "paths": [ "/var/log/elasticsearch/gc.log.[0-9]*", "/var/log/elasticsearch/gc.log" ] } }, "elasticsearch.server": { "enabled": true, "vars": { "paths": [ "/opt/so/log/elasticsearch/*.log" ] } }, "elasticsearch.slowlog": { "enabled": false, "vars": { "paths": [ "/var/log/elasticsearch/*_index_search_slowlog.json", "/var/log/elasticsearch/*_index_indexing_slowlog.json" ] } } } }, "elasticsearch-elasticsearch/metrics": { "enabled": false, "vars": { "hosts": [ "http://localhost:9200" ], "scope": "node" }, "streams": { "elasticsearch.stack_monitoring.ccr": { "enabled": false }, "elasticsearch.stack_monitoring.cluster_stats": { "enabled": false }, "elasticsearch.stack_monitoring.enrich": { "enabled": false }, "elasticsearch.stack_monitoring.index": { "enabled": false }, "elasticsearch.stack_monitoring.index_recovery": { "enabled": false, "vars": { "active.only": true } }, "elasticsearch.stack_monitoring.index_summary": { "enabled": false }, "elasticsearch.stack_monitoring.ml_job": { "enabled": false }, "elasticsearch.stack_monitoring.node": { "enabled": false }, "elasticsearch.stack_monitoring.node_stats": { "enabled": false }, "elasticsearch.stack_monitoring.pending_tasks": { "enabled": false }, "elasticsearch.stack_monitoring.shard": { "enabled": false } } } } }'
echo
# Logstash logs
#echo
#echo "Setting up Logstash package policy..."
#curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{ "policy_id": "so-grid-nodes", "package": { "name": "logstash", "version": "2.0.0" }, "id": "logstash-logs", "name": "logstash-logs", "description": "Logstash logs", "namespace": "default", "inputs": { "logstash-logfile": { "enabled": true, "streams": { "logstash.log": { "enabled": true, "vars": { "paths": [ "/opt/so/logs/logstash/logstash.log" ] } }, "logstash.slowlog": { "enabled": false, "vars": { "paths": [ "/var/log/logstash/logstash-slowlog-plain*.log", "/var/log/logstash/logstash-slowlog-json*.log" ] } } } }, "logstash-logstash/metrics": { "enabled": false, "vars": { "hosts": [ "http://localhost:9600" ], "period": "10s" }, "streams": { "logstash.stack_monitoring.node": { "enabled": false }, "logstash.stack_monitoring.node_stats": { "enabled": false } } } } }'
#echo
# Kibana logs
#echo
#echo "Setting up Kibana package policy..."
#curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{ "policy_id": "so-grid-nodes", "package": { "name": "kibana", "version": "2.0.0" }, "id": "kibana-logs", "name": "kibana-logs", "description": "Kibana logs", "namespace": "default", "inputs": { "kibana-logfile": { "enabled": true, "streams": { "kibana.audit": { "enabled": false, "vars": { "paths": [ "/opt/so/log/kibana/kibana.log" ] } }, "kibana.log": { "enabled": true, "vars": { "paths": [ "/opt/so/log/kibana/kibana.log" ] } } } }, "kibana-kibana/metrics": { "enabled": false, "vars": { "hosts": [ "http://localhost:5601" ] }, "streams": { "kibana.stack_monitoring.cluster_actions": { "enabled": false }, "kibana.stack_monitoring.cluster_rules": { "enabled": false }, "kibana.stack_monitoring.node_actions": { "enabled": false }, "kibana.stack_monitoring.node_rules": { "enabled": false }, "kibana.stack_monitoring.stats": { "enabled": false }, "kibana.stack_monitoring.status": { "enabled": false } } } } }'
#echo
# Redis logs
echo
echo "Setting up Redis package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{ "policy_id": "so-grid-nodes", "package": { "name": "redis", "version": "1.4.0" }, "id": "redis-logs", "name": "redis-logs", "description": "Redis logs", "namespace": "default", "inputs": { "redis-logfile": { "enabled": true, "streams": { "redis.log": { "enabled": true, "vars": { "paths": [ "/opt/so/log/redis/redis.log" ], "tags": [ "redis-log" ], "preserve_original_event": false } } } }, "redis-redis": { "enabled": false, "streams": { "redis.slowlog": { "enabled": false, "vars": { "hosts": [ "127.0.0.1:6379" ], "password": "" } } } }, "redis-redis/metrics": { "enabled": false, "vars": { "hosts": [ "127.0.0.1:6379" ], "idle_timeout": "20s", "maxconn": 10, "network": "tcp", "password": "" }, "streams": { "redis.info": { "enabled": false, "vars": { "period": "10s" } }, "redis.key": { "enabled": false, "vars": { "key.patterns": "- limit: 20\n pattern: '*'\n", "period": "10s" } }, "redis.keyspace": { "enabled": false, "vars": { "period": "10s" } } } } } }'
echo
# IDH logs
echo
echo "Setting up IDH package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{"policy_id":"so-grid-nodes","package":{"name":"log","version":"1.1.1"},"id":"idh-logs","name":"idh-logs","namespace":"so","description":"IDH integration","inputs":{"logs-logfile":{"enabled":true,"streams":{"log.log":{"enabled":true,"vars":{"paths":["/nsm/idh/opencanary.log"],"data_stream.dataset":"idh","custom":"pipeline: common","processors": "\n- decode_json_fields:\n fields: [\"message\"]\n target: \"\"\n add_error_key: true\n- drop_fields:\n when:\n equals:\n logtype: \"1001\"\n fields: [\"src_host\", \"src_port\", \"dst_host\", \"dst_port\" ]\n ignore_missing: true\n- rename:\n fields:\n - from: \"src_host\"\n to: \"source.ip\"\n - from: \"src_port\"\n to: \"source.port\"\n - from: \"dst_host\"\n to: \"destination.host\"\n - from: \"dst_port\"\n to: \"destination.port\"\n ignore_missing: true\n- convert:\n fields:\n - {from: \"logtype\", to: \"event.code\", type: \"string\"}\n ignore_missing: true\n- drop_fields:\n fields: '\''[\"prospector\", \"input\", \"offset\", \"beat\"]'\''\n- add_fields:\n target: event\n fields:\n category: host\n module: opencanary","tags":[]}}}}}}'
echo
# SOC - Server logs
echo
echo "Setting up SOC - Server Logs package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{"package":{"name":"log","version":"1.1.2"},"name":"soc-server-logs","namespace":"so","description":"Security Onion Console Logs","policy_id":"so-grid-nodes","inputs":{"logs-logfile":{"enabled":true,"streams":{"log.log":{"enabled":true,"vars":{"paths":["/opt/so/log/soc/sensoroni-server.log"],"data_stream.dataset":"soc","custom":"pipeline: common","processors": "- decode_json_fields:\n fields: [\"message\"]\n target: \"soc\"\n process_array: true\n max_depth: 2\n add_error_key: true \n- add_fields:\n target: event\n fields:\n category: host\n module: soc\n dataset_temp: server\n- rename:\n fields:\n - from: \"soc.fields.sourceIp\"\n to: \"source.ip\"\n - from: \"soc.fields.status\"\n to: \"http.response.status_code\"\n - from: \"soc.fields.method\"\n to: \"http.request.method\"\n - from: \"soc.fields.path\"\n to: \"url.path\"\n - from: \"soc.message\"\n to: \"event.action\"\n - from: \"soc.level\"\n to: \"log.level\"\n ignore_missing: true","tags":[]}}}}}}'
echo
# SOC - Sensoroni logs
echo
echo "Setting up SOC - Sensoroni Logs package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{"package":{"name":"log","version":"1.1.2"},"name":"soc-sensoroni-logs","namespace":"so","description":"Security Onion - Sensoroni - Logs","policy_id":"so-grid-nodes","inputs":{"logs-logfile":{"enabled":true,"streams":{"log.log":{"enabled":true,"vars":{"paths":["/opt/so/log/sensoroni/sensoroni.log"],"data_stream.dataset":"soc","custom":"pipeline: common","processors": "- decode_json_fields:\n fields: [\"message\"]\n target: \"sensoroni\"\n process_array: true\n max_depth: 2\n add_error_key: true \n- add_fields:\n target: event\n fields:\n category: host\n module: soc\n dataset_temp: sensoroni\n- rename:\n fields:\n - from: \"sensoroni.fields.sourceIp\"\n to: \"source.ip\"\n - from: \"sensoroni.fields.status\"\n to: \"http.response.status_code\"\n - from: \"sensoroni.fields.method\"\n to: \"http.request.method\"\n - from: \"sensoroni.fields.path\"\n to: \"url.path\"\n - from: \"sensoroni.message\"\n to: \"event.action\"\n - from: \"sensoroni.level\"\n to: \"log.level\"\n ignore_missing: true","tags":[]}}}}}}'
echo
# SOC - Elastic Auth Sync logs
echo
echo "Setting up SOC - Elastic Auth Sync Logs package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{"package":{"name":"log","version":"1.1.2"},"name":"soc-auth-sync-logs","namespace":"so","description":"Security Onion - Elastic Auth Sync - Logs","policy_id":"so-grid-nodes","inputs":{"logs-logfile":{"enabled":true,"streams":{"log.log":{"enabled":true,"vars":{"paths":["/opt/so/log/soc/sync.log"],"data_stream.dataset":"soc","custom":"pipeline: common","processors": "- dissect:\n tokenizer: \"%{event.action}\"\n field: \"message\"\n target_prefix: \"\"\n- add_fields:\n target: event\n fields:\n category: host\n module: soc\n dataset_temp: auth_sync","tags":[]}}}}}}'
echo
# SOC - Salt Relay logs
echo
echo "Setting up SOC - Salt_Relay Logs package policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d'{"package":{"name":"log","version":"1.1.2"},"name":"soc-salt-relay-logs","namespace":"so","description":"Security Onion - Salt Relay - Logs","policy_id":"so-grid-nodes","inputs":{"logs-logfile":{"enabled":true,"streams":{"log.log":{"enabled":true,"vars":{"paths":["/opt/so/log/soc/salt-relay.log"],"data_stream.dataset":"soc","custom":"pipeline: common","processors": "- dissect:\n tokenizer: \"%{soc.ts} | %{event.action}\"\n field: \"message\"\n target_prefix: \"\"\n- add_fields:\n target: event\n fields:\n category: host\n module: soc\n dataset_temp: salt_relay","tags":[]}}}}}}'
echo

View File

@@ -0,0 +1,12 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
/usr/sbin/so-restart elastic-fleet $1

View File

@@ -0,0 +1,109 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0; you may not use
# this file except in compliance with the Elastic License 2.0.
{% from 'vars/globals.map.jinja' import GLOBALS %}
. /usr/sbin/so-common
# Create ES Token
ESTOKEN=$(curl -K /opt/so/conf/elasticsearch/curl.config -L -X POST "localhost:5601/api/fleet/service_tokens" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' | jq -r .value)
printf "ESTOKEN = $ESTOKEN \n"
# Add SO-Manager Fleet URL
## This array replaces whatever URLs are currently configured
printf "\n"
curl -K /opt/so/conf/elasticsearch/curl.config -L -X PUT "localhost:5601/api/fleet/settings" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d '{"fleet_server_hosts":["https://{{ GLOBALS.manager_ip }}:8220"]}'
printf "\n\n"
# Configure certificates
mkdir -p /opt/so/conf/elastic-fleet/certs
cp /etc/ssl/certs/intca.crt /opt/so/conf/elastic-fleet/certs
cp /etc/pki/elasticfleet* /opt/so/conf/elastic-fleet/certs
{% if grains.role in ['so-import', 'so-standalone', 'so-eval', 'so-manager', 'so-managersearch'] %}
# Add SO-Manager Elasticsearch Ouput
ESCACRT=$(openssl x509 -in /opt/so/conf/elastic-fleet/certs/intca.crt)
JSON_STRING=$( jq -n \
--arg ESCACRT "$ESCACRT" \
'{"name":"so-manager_elasticsearch","id":"so-manager_elasticsearch","type":"elasticsearch","hosts":["https://{{ GLOBALS.manager_ip }}:9200"],"is_default":true,"is_default_monitoring":true,"config_yaml":"","ssl":{"certificate_authorities": [$ESCACRT]}}' )
curl -K /opt/so/conf/elasticsearch/curl.config -L -X POST "localhost:5601/api/fleet/outputs" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d "$JSON_STRING"
printf "\n\n"
{% else %}
# Create Logstash Output payload
LOGSTASHCRT=$(openssl x509 -in /opt/so/conf/elastic-fleet/certs/elasticfleet.crt)
LOGSTASHKEY=$(openssl rsa -in /opt/so/conf/elastic-fleet/certs/elasticfleet.key)
LOGSTASHCA=$(openssl x509 -in /opt/so/conf/elastic-fleet/certs/intca.crt)
JSON_STRING=$( jq -n \
--arg LOGSTASHCRT "$LOGSTASHCRT" \
--arg LOGSTASHKEY "$LOGSTASHKEY" \
--arg LOGSTASHCA "$LOGSTASHCA" \
'{"name":"so-manager_logstash","id":"so-manager_logstash","type":"logstash","hosts":["{{ GLOBALS.manager_ip }}:5055"],"is_default":true,"is_default_monitoring":true,"config_yaml":"","ssl":{"certificate": $LOGSTASHCRT,"key": $LOGSTASHKEY,"certificate_authorities":[ $LOGSTASHCA ]}}'
)
# Add SO-Manager Logstash Ouput
curl -K /opt/so/conf/elasticsearch/curl.config -L -X POST "localhost:5601/api/fleet/outputs" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d "$JSON_STRING"
printf "\n\n"
{%- endif %}
# Add Elastic Fleet Integrations
# Add Elastic Fleet Server Agent Policy
#curl -vv -K /opt/so/conf/elasticsearch/curl.config -L \
#-X POST "localhost:5601/api/fleet/agent_policies" \
#-H 'kbn-xsrf: true' -H 'Content-Type: application/json' \
#-d '{"name":"SO-Manager","id":"so-manager","description":"SO Manager Fleet Server Policy","namespace":"default","monitoring_enabled":["logs"],"has_fleet_server":true}'
# Add Agent Policy - SOS Grid Nodes
#curl -vv -K /opt/so/conf/elasticsearch/curl.config -L \
#-X POST "localhost:5601/api/fleet/agent_policies" \
#-H 'kbn-xsrf: true' -H 'Content-Type: application/json' \
#-d '{"name":"SO-Grid","id":"so-grid","description":"SO Grid Endpoint Policy","namespace":"default","monitoring_enabled":["logs"]}'
# Add Agent Policy - Default endpoints
#curl -vv -K /opt/so/conf/elasticsearch/curl.config -L \
#-X POST "localhost:5601/api/fleet/agent_policies" \
#-H 'kbn-xsrf: true' -H 'Content-Type: application/json' \
#-d '{"name":"Endpoints-Initalization","id":"endpoints","description":"Initial Endpoint Policy","namespace":"default","monitoring_enabled":["logs"]}'
ENDPOINTSENROLLMENTOKEN=$(curl -K /opt/so/conf/elasticsearch/curl.config -L "localhost:5601/api/fleet/enrollment_api_keys" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' | jq .list | jq -r -c '.[] | select(.policy_id | contains("endpoints-default")) | .api_key')
GRIDNODESENROLLMENTOKEN=$(curl -K /opt/so/conf/elasticsearch/curl.config -L "localhost:5601/api/fleet/enrollment_api_keys" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' | jq .list | jq -r -c '.[] | select(.policy_id | contains("so-grid-nodes")) | .api_key')
# Store needed data in minion pillar
pillar_file=/opt/so/saltstack/local/pillar/minions/{{ GLOBALS.minion_id }}.sls
printf '%s\n'\
"elasticfleet:"\
" server:"\
" es_token: '$ESTOKEN'"\
" endpoints_enrollment: '$ENDPOINTSENROLLMENTOKEN'"\
" grid_enrollment: '$GRIDNODESENROLLMENTOKEN'"\
" url: '{{ GLOBALS.manager_ip }}'"\
"" >> "$pillar_file"
#Store Grid Nodes Enrollment token in Global pillar
global_pillar_file=/opt/so/saltstack/local/pillar/soc_global.sls
printf '%s\n'\
" fleet_grid_enrollment_token: '$GRIDNODESENROLLMENTOKEN'"\
"" >> "$global_pillar_file"
# Call Elastic-Fleet Salt State
salt-call state.apply elasticfleet queue=True
# Load Elastic Fleet integrations
/usr/sbin/so-elastic-fleet-integration-policy-load
# Temp
wget --progress=bar:force:noscroll -P /opt/so/saltstack/default/salt/elasticfleet/files/elastic-agent/ https://github.com/Security-Onion-Solutions/securityonion-docker-rpm/releases/download/so_elastic-agent-8.6.2/so-elastic-agent-8.6.2-darwin-x86_64.tar.gz
wget --progress=bar:force:noscroll -P /opt/so/saltstack/default/salt/elasticfleet/files/elastic-agent/ https://github.com/Security-Onion-Solutions/securityonion-docker-rpm/releases/download/so_elastic-agent-8.6.2/so-elastic-agent-8.6.2-linux-x86_64.tar.gz
wget --progress=bar:force:noscroll -P /opt/so/saltstack/default/salt/elasticfleet/files/elastic-agent/ https://github.com/Security-Onion-Solutions/securityonion-docker-rpm/releases/download/so_elastic-agent-8.6.2/so-elastic-agent-8.6.2-windows-x86_64.tar.gz
#git clone -b 2.4-so-elastic-agent https://github.com/Security-Onion-Solutions/securityonion-image.git
#cd securityonion-image/so-elastic-agent-builder
#docker build -t so-elastic-agent-builder .
so-elastic-agent-gen-installers
salt-call state.apply elasticfleet.install_agent_grid queue=True

View File

@@ -0,0 +1,12 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
/usr/sbin/so-start elastic-fleet $1

View File

@@ -0,0 +1,12 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
/usr/sbin/so-stop elastic-fleet $1

View File

@@ -1,24 +1,16 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node', 'so-import']%}
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode', 'so-import']%}
/usr/sbin/so-restart elasticsearch $1
{%- endif %}
@@ -26,15 +18,11 @@
/usr/sbin/so-restart kibana $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node']%}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-restart logstash $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node', 'so-sensor']%}
/usr/sbin/so-restart filebeat $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node']%}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-restart curator $1
{%- endif %}

View File

@@ -1,24 +1,16 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node', 'so-import']%}
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode', 'so-import']%}
/usr/sbin/so-start elasticsearch $1
{%- endif %}
@@ -26,15 +18,11 @@
/usr/sbin/so-start kibana $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node']%}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-start logstash $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node', 'so-sensor']%}
/usr/sbin/so-start filebeat $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node']%}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-start curator $1
{%- endif %}

View File

@@ -1,24 +1,16 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node', 'so-import']%}
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode', 'so-import']%}
/usr/sbin/so-stop elasticsearch $1
{%- endif %}
@@ -26,15 +18,11 @@
/usr/sbin/so-stop kibana $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node']%}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-stop logstash $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node', 'so-sensor']%}
/usr/sbin/so-stop filebeat $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-node']%}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-stop curator $1
{%- endif %}

View File

@@ -0,0 +1,57 @@
#!/bin/bash
#
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{% from 'vars/globals.map.jinja' import GLOBALS %}
TOTAL_AVAILABLE_SPACE=0
# Wait for ElasticSearch to initialize
COUNT=0
ELASTICSEARCH_CONNECTED="no"
while [[ "$COUNT" -le 240 ]]; do
/usr/sbin/so-elasticsearch-query / -k --output /dev/null --silent --head --fail
if [ $? -eq 0 ]; then
ELASTICSEARCH_CONNECTED="yes"
break
else
((COUNT+=1))
sleep 1
fi
done
if [ "$ELASTICSEARCH_CONNECTED" == "no" ]; then
echo
echo -e "Connection attempt timed out. Unable to connect to ElasticSearch. \nPlease try: \n -checking log(s) in /var/log/elasticsearch/\n -running 'sudo docker ps' \n -running 'sudo so-elastic-restart'"
echo
exit 1
fi
# Set percentage of space to desired value, otherwise use a default value of 80 percent
if [[ "$1" != "" ]]; then
PERCENTAGE=$1
else
PERCENTAGE=80
fi
# Iterate through the output of _cat/allocation for each node in the cluster to determine the total available space
{% if GLOBALS.role == 'so-manager' %}
for i in $(/usr/sbin/so-elasticsearch-query _cat/allocation | grep -v {{ GLOBALS.manager }} | awk '{print $5}'); do
{% else %}
for i in $(/usr/sbin/so-elasticsearch-query _cat/allocation | awk '{print $5}'); do
{% endif %}
size=$(echo $i | grep -oE '[0-9].*' | awk '{print int($1+0.5)}')
unit=$(echo $i | grep -oE '[A-Za-z]+')
if [ $unit = "tb" ]; then
size=$(( size * 1024 ))
fi
TOTAL_AVAILABLE_SPACE=$(( TOTAL_AVAILABLE_SPACE + size ))
done
# Calculate the percentage of available space based on our previously defined value
PERCENTAGE_AVAILABLE_SPACE=$(( TOTAL_AVAILABLE_SPACE*PERCENTAGE/100 ))
echo "$PERCENTAGE_AVAILABLE_SPACE"

View File

@@ -0,0 +1,28 @@
#!/bin/bash
#
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{% from 'vars/globals.map.jinja' import GLOBALS %}
TOTAL_AVAILABLE_SPACE=0
# Iterate through the output of _cat/allocation for each node in the cluster to determine the total available space
{% if GLOBALS.role == 'so-manager' %}
for i in $(/usr/sbin/so-elasticsearch-query _cat/allocation | grep -v {{ GLOBALS.manager }} | awk '{print $3}'); do
{% else %}
for i in $(/usr/sbin/so-elasticsearch-query _cat/allocation | awk '{print $3}'); do
{% endif %}
size=$(echo $i | grep -oE '[0-9].*' | awk '{print int($1+0.5)}')
unit=$(echo $i | grep -oE '[A-Za-z]+')
if [ $unit = "tb" ]; then
size=$(( size * 1024 ))
fi
TOTAL_AVAILABLE_SPACE=$(( TOTAL_AVAILABLE_SPACE + size ))
done
# Calculate the percentage of available space based on our previously defined value
echo "$TOTAL_AVAILABLE_SPACE"

View File

@@ -1,23 +1,14 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
{%- set NODEIP = salt['pillar.get']('elasticsearch:mainip', '') -%}
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
. /usr/sbin/so-common
if [ "$1" == "" ]; then
{{ ELASTICCURL }} -s -k -L https://{{ NODEIP }}:9200/_component_template | jq '.component_templates[] |.name'| sort
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_component_template | jq '.component_templates[] |.name'| sort
else
{{ ELASTICCURL }} -s -k -L https://{{ NODEIP }}:9200/_component_template/$1 | jq
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_component_template/$1 | jq
fi

View File

@@ -0,0 +1,15 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
if [ "$1" == "" ]; then
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_all/_ilm/explain | jq .
else
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/$1/_ilm/explain | jq .[]
fi

View File

@@ -0,0 +1,11 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L -X DELETE https://{{ NODEIP }}:9200/_ilm/policy/$1

View File

@@ -0,0 +1,21 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{% import_yaml 'elasticsearch/defaults.yaml' as ESCONFIG with context %}
{%- set ES_INDEX_SETTINGS = salt['pillar.get']('elasticsearch:index_settings', default=ESCONFIG.elasticsearch.index_settings, merge=True) %}
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
{%- for index, settings in ES_INDEX_SETTINGS.items() %}
{%- if settings.policy is defined %}
echo
echo "Setting up {{ index }}-logs policy..."
curl -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -s -k -L -X PUT "https://{{ NODEIP }}:9200/_ilm/policy/{{ index }}-logs" -H 'Content-Type: application/json' -d'{ "policy": {{ settings.policy | tojson(true) }} }'
echo
{%- endif %}
{%- endfor %}
echo

View File

@@ -0,0 +1,15 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
if [ "$1" == "" ]; then
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_ilm/policy | jq .
else
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_ilm/policy/$1 | jq .[]
fi

View File

@@ -0,0 +1,10 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
so-elasticsearch-ilm-stop
so-elasticsearch-ilm-start

View File

@@ -0,0 +1,12 @@
/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
echo "Starting ILM..."
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L -X POST https://{{ NODEIP }}:9200/_ilm/start

View File

@@ -0,0 +1,11 @@
/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_ilm/status | jq .

View File

@@ -0,0 +1,12 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
echo "Stopping ILM..."
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L -X POST https://{{ NODEIP }}:9200/_ilm/stop

View File

@@ -1,23 +1,14 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
{%- set NODEIP = salt['pillar.get']('elasticsearch:mainip', '') -%}
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
. /usr/sbin/so-common
if [ "$1" == "" ]; then
{{ ELASTICCURL }} -s -k -L https://{{ NODEIP }}:9200/_index_template | jq '.index_templates[] |.name'| sort
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_index_template | jq '.index_templates[] |.name'| sort
else
{{ ELASTICCURL }} -s -k -L https://{{ NODEIP }}:9200/_index_template/$1 | jq
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_index_template/$1 | jq
fi

View File

@@ -1,21 +1,12 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>
{%- set NODEIP = salt['pillar.get']('elasticsearch:mainip', '') -%}
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
. /usr/sbin/so-common
{{ ELASTICCURL }} -s -k -L "https://{{ NODEIP }}:9200/_cat/indices?pretty&v&s=index"
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L "https://{{ NODEIP }}:9200/_cat/indices?pretty&v&s=index"

View File

@@ -1,23 +1,15 @@
#!/bin/bash
#
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
IP={{ salt['grains.get']('ip_interfaces').get(salt['pillar.get']('sensor:mainint', salt['pillar.get']('manager:mainint', salt['pillar.get']('elasticsearch:mainint', salt['pillar.get']('host:mainint')))))[0] }}
ESPORT=9200
echo "Removing read only attributes for indices..."
echo
{{ ELASTICCURL }} -s -k -XPUT -H "Content-Type: application/json" -L https://$IP:9200/_all/_settings -d '{"index.blocks.read_only_allow_delete": null}' 2>&1 | if grep -q ack; then echo "Index settings updated..."; else echo "There was any issue updating the read-only attribute. Please ensure Elasticsearch is running.";fi;
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -XPUT -H "Content-Type: application/json" -L https://$IP:9200/_all/_settings -d '{"index.blocks.read_only_allow_delete": null}' 2>&1 | if grep -q ack; then echo "Index settings updated..."; else echo "There was any issue updating the read-only attribute. Please ensure Elasticsearch is running.";fi;

View File

@@ -1,25 +1,16 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>
{%- set NODEIP = salt['pillar.get']('elasticsearch:mainip', '') -%}
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
. /usr/sbin/so-common
if [ "$1" == "" ]; then
{{ ELASTICCURL }} -s -k -L https://{{ NODEIP }}:9200/_nodes/stats | jq .nodes | jq ".[] | .ingest.pipelines"
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_nodes/stats | jq .nodes | jq ".[] | .ingest.pipelines"
else
{{ ELASTICCURL }} -s -k -L https://{{ NODEIP }}:9200/_nodes/stats | jq .nodes | jq ".[] | .ingest.pipelines.\"$1\""
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_nodes/stats | jq .nodes | jq ".[] | .ingest.pipelines.\"$1\""
fi

View File

@@ -1,25 +1,16 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>
{%- set NODEIP = salt['pillar.get']('elasticsearch:mainip', '') -%}
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
. /usr/sbin/so-common
if [ "$1" == "" ]; then
{{ ELASTICCURL }} -s -k -L https://{{ NODEIP }}:9200/_ingest/pipeline/* | jq .
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_ingest/pipeline/* | jq .
else
{{ ELASTICCURL }} -s -k -L https://{{ NODEIP }}:9200/_ingest/pipeline/$1 | jq .[]
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_ingest/pipeline/$1 | jq .[]
fi

View File

@@ -1,23 +1,14 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
{%- set NODEIP = salt['pillar.get']('elasticsearch:mainip', '') -%}
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
. /usr/sbin/so-common
if [ "$1" == "" ]; then
{{ ELASTICCURL }} -s -k -L https://{{ NODEIP }}:9200/_ingest/pipeline/* | jq 'keys'
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_ingest/pipeline/* | jq 'keys'
else
{{ ELASTICCURL }} -s -k -L https://{{ NODEIP }}:9200/_ingest/pipeline/$1 | jq
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_ingest/pipeline/$1 | jq
fi

View File

@@ -1,19 +1,10 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
if [[ $# -lt 1 ]]; then
@@ -34,4 +25,4 @@ fi
QUERYPATH=$1
shift
{{ ELASTICCURL }} -s -k -L -H "Content-Type: application/json" "https://localhost:9200/${QUERYPATH}" "$@"
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L -H "Content-Type: application/json" "https://localhost:9200/${QUERYPATH}" "$@"

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common

View File

@@ -1,21 +1,12 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>
{%- set NODEIP = salt['pillar.get']('elasticsearch:mainip', '') -%}
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set NODEIP = salt['pillar.get']('host:mainip', '') %}
. /usr/sbin/so-common
{{ ELASTICCURL }} -s -k -L https://{{ NODEIP }}:9200/_cat/shards?pretty
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -L https://{{ NODEIP }}:9200/_cat/shards?pretty

View File

@@ -1,19 +1,11 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common

Some files were not shown because too many files have changed in this diff Show More