mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 17:22:49 +01:00
Compare commits
18 Commits
2.3.70
...
2.3.70-CUR
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
0abf7593ed | ||
|
|
f096b513b7 | ||
|
|
51b517581a | ||
|
|
936c998ecb | ||
|
|
02372d130a | ||
|
|
6f9a263af3 | ||
|
|
43ffaab82c | ||
|
|
dccfdb14e4 | ||
|
|
21f3b3d985 | ||
|
|
e2d74b115f | ||
|
|
13741400f1 | ||
|
|
d0f587858c | ||
|
|
acca8cc5d2 | ||
|
|
ef950955bd | ||
|
|
9a8ccef828 | ||
|
|
7b8e23fadd | ||
|
|
18335afa7f | ||
|
|
41e8be87b6 |
@@ -1,18 +1,18 @@
|
|||||||
### 2.3.70 ISO image built on 2021/08/17
|
### 2.3.70-CURATOR ISO image built on 2021/08/20
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Download and Verify
|
### Download and Verify
|
||||||
|
|
||||||
2.3.70 ISO image:
|
2.3.70-CURATOR ISO image:
|
||||||
https://download.securityonion.net/file/securityonion/securityonion-2.3.70.iso
|
https://download.securityonion.net/file/securityonion/securityonion-2.3.70-CURATOR.iso
|
||||||
|
|
||||||
MD5: F048FABC7FD2D0E1A8B02381F115D1E0
|
MD5: E0F7882E37B1B6BC4F9A6C8FD6F213F6
|
||||||
SHA1: DF6D20FEF13CDC1B19309D2A1178D6E5D25FDA6F
|
SHA1: 82E1204BAD9489B275A083A642F175E352F9A332
|
||||||
SHA256: B193FFD7EE69958A8E257117149DCFB2125C5772FBFA6003AD80FD1CC129E571
|
SHA256: 147CA7F5082273EDCC32EF6322D86A04CCB2E96B3A7F0B01EFA8A029BD84C3D7
|
||||||
|
|
||||||
Signature for ISO image:
|
Signature for ISO image:
|
||||||
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70.iso.sig
|
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70-CURATOR.iso.sig
|
||||||
|
|
||||||
Signing key:
|
Signing key:
|
||||||
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
|
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
|
||||||
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
|
|||||||
|
|
||||||
Download the signature file for the ISO:
|
Download the signature file for the ISO:
|
||||||
```
|
```
|
||||||
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70.iso.sig
|
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.70-CURATOR.iso.sig
|
||||||
```
|
```
|
||||||
|
|
||||||
Download the ISO image:
|
Download the ISO image:
|
||||||
```
|
```
|
||||||
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.70.iso
|
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.70-CURATOR.iso
|
||||||
```
|
```
|
||||||
|
|
||||||
Verify the downloaded ISO image using the signature file:
|
Verify the downloaded ISO image using the signature file:
|
||||||
```
|
```
|
||||||
gpg --verify securityonion-2.3.70.iso.sig securityonion-2.3.70.iso
|
gpg --verify securityonion-2.3.70-CURATOR.iso.sig securityonion-2.3.70-CURATOR.iso
|
||||||
```
|
```
|
||||||
|
|
||||||
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
|
||||||
```
|
```
|
||||||
gpg: Signature made Tue 17 Aug 2021 10:52:17 PM EDT using RSA key ID FE507013
|
gpg: Signature made Fri 20 Aug 2021 01:23:59 PM EDT using RSA key ID FE507013
|
||||||
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
|
||||||
gpg: WARNING: This key is not certified with a trusted signature!
|
gpg: WARNING: This key is not certified with a trusted signature!
|
||||||
gpg: There is no indication that the signature belongs to the owner.
|
gpg: There is no indication that the signature belongs to the owner.
|
||||||
|
|||||||
@@ -4,6 +4,7 @@
|
|||||||
{% set VERSION = salt['pillar.get']('global:soversion', 'HH1.2.2') %}
|
{% set VERSION = salt['pillar.get']('global:soversion', 'HH1.2.2') %}
|
||||||
{% set IMAGEREPO = salt['pillar.get']('global:imagerepo') %}
|
{% set IMAGEREPO = salt['pillar.get']('global:imagerepo') %}
|
||||||
{% set MANAGER = salt['grains.get']('master') %}
|
{% set MANAGER = salt['grains.get']('master') %}
|
||||||
|
{% set REMOVECURATORCRON = False %}
|
||||||
{% if grains['role'] in ['so-eval', 'so-node', 'so-managersearch', 'so-heavynode', 'so-standalone', 'so-manager'] %}
|
{% if grains['role'] in ['so-eval', 'so-node', 'so-managersearch', 'so-heavynode', 'so-standalone', 'so-manager'] %}
|
||||||
{% from 'elasticsearch/auth.map.jinja' import ELASTICAUTH with context %}
|
{% from 'elasticsearch/auth.map.jinja' import ELASTICAUTH with context %}
|
||||||
{% from "curator/map.jinja" import CURATOROPTIONS with context %}
|
{% from "curator/map.jinja" import CURATOROPTIONS with context %}
|
||||||
@@ -88,36 +89,6 @@ curdel:
|
|||||||
- group: 939
|
- group: 939
|
||||||
- mode: 755
|
- mode: 755
|
||||||
|
|
||||||
so-curatorcloseddeletecron:
|
|
||||||
cron.present:
|
|
||||||
- name: /usr/sbin/so-curator-closed-delete > /opt/so/log/curator/cron-closed-delete.log 2>&1
|
|
||||||
- user: root
|
|
||||||
- minute: '*'
|
|
||||||
- hour: '*'
|
|
||||||
- daymonth: '*'
|
|
||||||
- month: '*'
|
|
||||||
- dayweek: '*'
|
|
||||||
|
|
||||||
so-curatorclosecron:
|
|
||||||
cron.present:
|
|
||||||
- name: /usr/sbin/so-curator-close > /opt/so/log/curator/cron-close.log 2>&1
|
|
||||||
- user: root
|
|
||||||
- minute: '*'
|
|
||||||
- hour: '*'
|
|
||||||
- daymonth: '*'
|
|
||||||
- month: '*'
|
|
||||||
- dayweek: '*'
|
|
||||||
|
|
||||||
so-curatordeletecron:
|
|
||||||
cron.present:
|
|
||||||
- name: /usr/sbin/so-curator-delete > /opt/so/log/curator/cron-delete.log 2>&1
|
|
||||||
- user: root
|
|
||||||
- minute: '*'
|
|
||||||
- hour: '*'
|
|
||||||
- daymonth: '*'
|
|
||||||
- month: '*'
|
|
||||||
- dayweek: '*'
|
|
||||||
|
|
||||||
so-curator:
|
so-curator:
|
||||||
docker_container.{{ CURATOROPTIONS.status }}:
|
docker_container.{{ CURATOROPTIONS.status }}:
|
||||||
{% if CURATOROPTIONS.status == 'running' %}
|
{% if CURATOROPTIONS.status == 'running' %}
|
||||||
@@ -152,12 +123,77 @@ so-curator_so-status.disabled:
|
|||||||
file.comment:
|
file.comment:
|
||||||
- name: /opt/so/conf/so-status/so-status.conf
|
- name: /opt/so/conf/so-status/so-status.conf
|
||||||
- regex: ^so-curator$
|
- regex: ^so-curator$
|
||||||
|
|
||||||
|
# need to remove cronjobs here since curator is disabled
|
||||||
|
{% set REMOVECURATORCRON = True %}
|
||||||
{% else %}
|
{% else %}
|
||||||
delete_so-curator_so-status.disabled:
|
delete_so-curator_so-status.disabled:
|
||||||
file.uncomment:
|
file.uncomment:
|
||||||
- name: /opt/so/conf/so-status/so-status.conf
|
- name: /opt/so/conf/so-status/so-status.conf
|
||||||
- regex: ^so-curator$
|
- regex: ^so-curator$
|
||||||
|
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
|
{% else %}
|
||||||
|
delete_so-curator_so-status:
|
||||||
|
file.line:
|
||||||
|
- name: /opt/so/conf/so-status/so-status.conf
|
||||||
|
- match: ^so-curator$
|
||||||
|
- mode: delete
|
||||||
|
|
||||||
|
# need to remove cronjobs here since curator is disabled
|
||||||
|
{% set REMOVECURATORCRON = True %}
|
||||||
|
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
{% if REMOVECURATORCRON %}
|
||||||
|
so-curatorcloseddeletecron:
|
||||||
|
cron.absent:
|
||||||
|
- name: /usr/sbin/so-curator-closed-delete > /opt/so/log/curator/cron-closed-delete.log 2>&1
|
||||||
|
- user: root
|
||||||
|
|
||||||
|
so-curatorclosecron:
|
||||||
|
cron.absent:
|
||||||
|
- name: /usr/sbin/so-curator-close > /opt/so/log/curator/cron-close.log 2>&1
|
||||||
|
- user: root
|
||||||
|
|
||||||
|
so-curatordeletecron:
|
||||||
|
cron.absent:
|
||||||
|
- name: /usr/sbin/so-curator-delete > /opt/so/log/curator/cron-delete.log 2>&1
|
||||||
|
- user: root
|
||||||
|
|
||||||
|
{% else %}
|
||||||
|
|
||||||
|
so-curatorcloseddeletecron:
|
||||||
|
cron.present:
|
||||||
|
- name: /usr/sbin/so-curator-closed-delete > /opt/so/log/curator/cron-closed-delete.log 2>&1
|
||||||
|
- user: root
|
||||||
|
- minute: '*'
|
||||||
|
- hour: '*'
|
||||||
|
- daymonth: '*'
|
||||||
|
- month: '*'
|
||||||
|
- dayweek: '*'
|
||||||
|
|
||||||
|
so-curatorclosecron:
|
||||||
|
cron.present:
|
||||||
|
- name: /usr/sbin/so-curator-close > /opt/so/log/curator/cron-close.log 2>&1
|
||||||
|
- user: root
|
||||||
|
- minute: '*'
|
||||||
|
- hour: '*'
|
||||||
|
- daymonth: '*'
|
||||||
|
- month: '*'
|
||||||
|
- dayweek: '*'
|
||||||
|
|
||||||
|
so-curatordeletecron:
|
||||||
|
cron.present:
|
||||||
|
- name: /usr/sbin/so-curator-delete > /opt/so/log/curator/cron-delete.log 2>&1
|
||||||
|
- user: root
|
||||||
|
- minute: '*'
|
||||||
|
- hour: '*'
|
||||||
|
- daymonth: '*'
|
||||||
|
- month: '*'
|
||||||
|
- dayweek: '*'
|
||||||
|
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
# Begin Curator Cron Jobs
|
# Begin Curator Cron Jobs
|
||||||
|
|||||||
@@ -3,13 +3,13 @@
|
|||||||
{% set TRUECLUSTER = salt['pillar.get']('elasticsearch:true_cluster', False) %}
|
{% set TRUECLUSTER = salt['pillar.get']('elasticsearch:true_cluster', False) %}
|
||||||
{% do CURATOROPTIONS.update({'manage_sostatus': True}) %}
|
{% do CURATOROPTIONS.update({'manage_sostatus': True}) %}
|
||||||
|
|
||||||
# don't start the docker container if searchnode and true clustering is enabled or curator disabled via pillar or true cluster not enabled and manager
|
# don't start the docker container if curator is disabled via pillar
|
||||||
{% if not ENABLED or (TRUECLUSTER and grains.id.split('_')|last == 'searchnode') or (not TRUECLUSTER and grains.id.split('_')|last == 'manager') %}
|
{% if not ENABLED or grains.id.split('_')|last == 'manager'%}
|
||||||
{% do CURATOROPTIONS.update({'start': False}) %}
|
{% do CURATOROPTIONS.update({'start': False}) %}
|
||||||
{% do CURATOROPTIONS.update({'status': 'absent'}) %}
|
{% do CURATOROPTIONS.update({'status': 'absent'}) %}
|
||||||
{% if (TRUECLUSTER and grains.id.split('_')|last == 'searchnode') or (not TRUECLUSTER and grains.id.split('_')|last == 'manager') %}
|
{% if grains.id.split('_')|last == 'manager' %}
|
||||||
{% do CURATOROPTIONS.update({'manage_sostatus': False}) %}
|
{% do CURATOROPTIONS.update({'manage_sostatus': False}) %}
|
||||||
{% endif %}%}
|
{% endif %}
|
||||||
{% else %}
|
{% else %}
|
||||||
{% do CURATOROPTIONS.update({'start': True}) %}
|
{% do CURATOROPTIONS.update({'start': True}) %}
|
||||||
{% do CURATOROPTIONS.update({'status': 'running'}) %}
|
{% do CURATOROPTIONS.update({'status': 'running'}) %}
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"manint": "{{ salt['pillar.get']('host:mainint', '') }}",
|
|
||||||
{%- if grains.role in ['so-standalone', 'so-eval', 'so-sensor', 'so-heavynode', ] %}
|
{%- if grains.role in ['so-standalone', 'so-eval', 'so-sensor', 'so-heavynode', ] %}
|
||||||
"monint": "{{ salt['pillar.get']('sensor:interface', '') }}"
|
"monint": "{{ salt['pillar.get']('sensor:interface', '') }}",
|
||||||
{% endif -%}
|
{%- endif %}
|
||||||
|
"manint": "{{ salt['pillar.get']('host:mainint', '') }}"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -189,13 +189,13 @@ base:
|
|||||||
{%- if KIBANA %}
|
{%- if KIBANA %}
|
||||||
- kibana
|
- kibana
|
||||||
{%- endif %}
|
{%- endif %}
|
||||||
- curator
|
|
||||||
{%- if ELASTALERT %}
|
{%- if ELASTALERT %}
|
||||||
- elastalert
|
- elastalert
|
||||||
{%- endif %}
|
{%- endif %}
|
||||||
{%- if FILEBEAT %}
|
{%- if FILEBEAT %}
|
||||||
- filebeat
|
- filebeat
|
||||||
{%- endif %}
|
{%- endif %}
|
||||||
|
- curator
|
||||||
- utility
|
- utility
|
||||||
- schedule
|
- schedule
|
||||||
{%- if FLEETMANAGER or FLEETNODE %}
|
{%- if FLEETMANAGER or FLEETNODE %}
|
||||||
|
|||||||
BIN
sigs/securityonion-2.3.70-CURATOR.iso.sig
Normal file
BIN
sigs/securityonion-2.3.70-CURATOR.iso.sig
Normal file
Binary file not shown.
Reference in New Issue
Block a user