Compare commits

...

18 Commits

Author SHA1 Message Date
Mike Reeves
ccc8f9ff0a Merge pull request #5353 from Security-Onion-Solutions/hotfix/2.3.70 2021-08-31 09:57:05 -04:00
Mike Reeves
43d20226a8 Merge pull request #5352 from Security-Onion-Solutions/wazhf
2.3.70 WAZUH Hotfix sigs
2021-08-31 08:47:14 -04:00
Mike Reeves
4fe0a1d7b4 2.3.70 WAZUH Hotfix sigs 2021-08-31 08:39:37 -04:00
Mike Reeves
1aacc27cd4 Merge pull request #5340 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update HOTFIX
2021-08-30 17:48:53 -04:00
Mike Reeves
92858cd13a Update HOTFIX 2021-08-30 17:38:29 -04:00
Mike Reeves
99cb38362a Merge pull request #5339 from Security-Onion-Solutions/hotfix/wazuh-update-exclude
wazuh-agent fix + pull in master
2021-08-30 17:37:47 -04:00
William Wernert
bfd632e20a Add wazuh to exclude arg when running yum update 2021-08-30 14:21:13 -04:00
Mike Reeves
518f9fceb0 Merge pull request #5337 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update HOTFIX
2021-08-30 12:33:43 -04:00
Mike Reeves
2b34da0fee Update HOTFIX 2021-08-30 12:32:44 -04:00
Josh Patterson
72ba29fb7b Merge pull request #5282 from Security-Onion-Solutions/hotfix/2.3.70
Hotfix/2.3.70
2021-08-24 10:15:33 -04:00
Josh Patterson
2859bff0e4 Merge pull request #5281 from Security-Onion-Solutions/grafana_fleet_hotfix
sig files and iso info
2021-08-24 10:01:10 -04:00
Mike Reeves
6e921415ea sig files and iso info 2021-08-24 10:00:06 -04:00
Mike Reeves
2f8b68e67a sig files and iso info 2021-08-24 09:58:28 -04:00
Josh Patterson
8ea89932ae Merge pull request #5270 from Security-Onion-Solutions/grafana_fleet_hotfix
Grafana fleet hotfix
2021-08-23 13:10:35 -04:00
m0duspwnens
f87cf123b0 fix typo - https://github.com/Security-Onion-Solutions/securityonion/issues/5268 2021-08-23 13:08:11 -04:00
m0duspwnens
80f4d03254 place unique identifier on same line for hotfix - https://github.com/Security-Onion-Solutions/securityonion/issues/5268 2021-08-23 13:05:28 -04:00
m0duspwnens
a9cc68f89e add unique identifier for hotfix - https://github.com/Security-Onion-Solutions/securityonion/issues/5268 2021-08-23 13:02:49 -04:00
m0duspwnens
b053f29a89 only create dashboards for certain node types - https://github.com/Security-Onion-Solutions/securityonion/issues/5268 2021-08-23 12:58:52 -04:00
6 changed files with 19 additions and 15 deletions

3
HOTFIX
View File

@@ -1,2 +1 @@
CURATOR
CURATOR GRAFANA_DASH_ALLOW WAZUH

View File

@@ -1,18 +1,18 @@
### 2.3.70-CURATOR ISO image built on 2021/08/20
### 2.3.70-WAZUH ISO image built on 2021/08/23
### Download and Verify
2.3.70-CURATOR ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.70-CURATOR.iso
2.3.70-WAZUH ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.70-WAZUH.iso
MD5: E0F7882E37B1B6BC4F9A6C8FD6F213F6
SHA1: 82E1204BAD9489B275A083A642F175E352F9A332
SHA256: 147CA7F5082273EDCC32EF6322D86A04CCB2E96B3A7F0B01EFA8A029BD84C3D7
MD5: CEDEF3C38089896C252F9E3C75F7CB15
SHA1: FB420115C72DABDEB87C8B27F26E862C94628057
SHA256: CC3E75A97163E9CD255DA0D9C3EB11922FA045651827F291025398943C1BC230
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70-CURATOR.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70-WAZUH.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70-CURATOR.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70-WAZUH.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.70-CURATOR.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.70-WAZUH.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.3.70-CURATOR.iso.sig securityonion-2.3.70-CURATOR.iso
gpg --verify securityonion-2.3.70-WAZUH.iso.sig securityonion-2.3.70-WAZUH.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Fri 20 Aug 2021 01:23:59 PM EDT using RSA key ID FE507013
gpg: Signature made Mon 30 Aug 2021 06:13:14 PM EDT using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

View File

@@ -12,16 +12,21 @@
{% if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone'] or (grains.role == 'so-eval' and GRAFANA == 1) %}
{% set ALLOWED_DASHBOARDS = ['overview', 'standalone', 'manager', 'managersearch', 'sensor', 'searchnode', 'heavynode', 'eval'] %}
{% set DASHBOARDS = ['overview'] %}
{% if grains.role == 'so-eval' %}
{% do DASHBOARDS.append('eval') %}
{% else %}
{# Grab a unique listing of nodetypes that exists so that we create only the needed dashboards #}
{% for dashboard in salt['cmd.shell']("ls /opt/so/saltstack/local/pillar/minions/|awk -F'_' {'print $2'}|awk -F'.' {'print $1'}").split() %}
{% do DASHBOARDS.append(dashboard) %}
{% if dashboard in ALLOWED_DASHBOARDS %}
{% do DASHBOARDS.append(dashboard) %}
{% endif %}
{% endfor %}
{% endif %}
# Grafana all the things
grafanadir:
file.directory:

View File

@@ -2795,7 +2795,7 @@ update_sudoers() {
update_packages() {
if [ "$OS" = 'centos' ]; then
yum repolist >> /dev/null
yum -y update --exclude=salt* >> "$setup_log"
yum -y update --exclude=salt*,wazuh* >> "$setup_log"
else
retry 50 10 "apt-get -y update" >> "$setup_log" 2>&1 || exit 1
retry 50 10 "apt-get -y upgrade" >> "$setup_log" 2>&1 || exit 1

Binary file not shown.

Binary file not shown.