Compare commits

...

956 Commits

Author SHA1 Message Date
Mike Reeves d570b56c55 Merge pull request #7392 from Security-Onion-Solutions/hotfix/2.3.100
Hotfix 2.3.100 20220301
2022-03-02 10:24:50 -05:00
Mike Reeves ff4345d3aa Merge pull request #7393 from Security-Onion-Solutions/jertelhf
Jertelhf
2022-03-02 10:20:29 -05:00
Jason Ertel e59f0d69d9 Merge branch 'master' into jertelhf 2022-03-02 10:18:14 -05:00
Mike Reeves ad2b69c9de Merge pull request #7391 from Security-Onion-Solutions/hf0301
Hotfix 2.3.100 20220301
2022-03-02 10:08:27 -05:00
Mike Reeves e874c32c08 Hotfix 2.3.100-20220301 2022-03-02 10:05:41 -05:00
Mike Reeves c0649a863b Merge pull request #7376 from Security-Onion-Solutions/hfnew
Curator Fixes
2022-03-01 14:38:31 -05:00
Mike Reeves e93dbb5347 Update Hotfix 2022-03-01 14:37:03 -05:00
doug bbced5b52f FIX: curator should exclude so-case* indices #7270 2022-03-01 14:34:52 -05:00
Doug Burks f134c74585 FIX: curator should exclude so-case* indices #7270 2022-03-01 14:34:41 -05:00
William Wernert bc5fa55ecd Merge pull request #7160 from Security-Onion-Solutions/rwwiv-contributing-patch-1
Update CONTRIBUTING.md
2022-02-09 11:49:52 -05:00
William Wernert 2e2eed9f42 PR's -> pull requests 2022-02-09 11:45:12 -05:00
William Wernert 3f83191083 Update CONTRIBUTING.md 2022-02-09 11:34:39 -05:00
Doug Burks e54ece06a2 Merge pull request #7106 from Security-Onion-Solutions/hotfix/2.3.100
Hotfix/2.3.100
2022-02-03 16:25:04 -05:00
Mike Reeves cc986c8d7c Merge pull request #7105 from Security-Onion-Solutions/23100hotfix2
2.3.100 Hotfix 2
2022-02-03 16:04:06 -05:00
Mike Reeves b7732fb14a 2.3.100 Hotfix 2 2022-02-03 15:58:26 -05:00
Mike Reeves 6f03662120 Merge pull request #7102 from Security-Onion-Solutions/TOoSmOotH-patch-5
Update HOTFIX
2022-02-03 15:08:52 -05:00
Mike Reeves 4f2952105e Update HOTFIX 2022-02-03 15:06:18 -05:00
Josh Patterson b34d0d7f7a Merge pull request #7100 from Security-Onion-Solutions/100_hotfix_2
100 hotfix 2
2022-02-03 13:15:37 -05:00
m0duspwnens 797d769661 use actual hostname in logstash:nodes pillar 2022-02-03 10:36:18 -05:00
Mike Reeves bbd2f0da2b Merge pull request #7094 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update distributed-airgap-manager
2022-02-03 10:36:09 -05:00
Mike Reeves 5c39162aef Update distributed-airgap-sensor 2022-02-03 10:34:55 -05:00
Mike Reeves d8a4301533 Update distributed-airgap-manager 2022-02-03 10:34:12 -05:00
Doug Burks c39047666b Merge pull request #7082 from Security-Onion-Solutions/hotfix/2.3.100
Hotfix/2.3.100
2022-02-02 16:38:27 -05:00
Mike Reeves 5c75bb8e7a Merge pull request #7080 from Security-Onion-Solutions/23100hotfix
2.3.100 Hotfix
2022-02-02 16:30:46 -05:00
Mike Reeves 83683ec27e 2.3.100 Hotfix 2022-02-02 16:23:51 -05:00
Mike Reeves b94cae0176 2.3.100 Hotfix 2022-02-02 16:22:44 -05:00
Mike Reeves fc0824ceb0 2.3.100 Hotfix 2022-02-02 16:20:49 -05:00
Mike Reeves 73a43f3816 Merge pull request #7069 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update HOTFIX
2022-02-02 09:57:26 -05:00
Mike Reeves 8152aec22e Update HOTFIX 2022-02-02 09:49:19 -05:00
Mike Reeves 0e28e1e4cb Merge pull request #7066 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update acng.conf
2022-02-02 09:22:00 -05:00
Josh Patterson 13f87e4654 Merge pull request #7067 from Security-Onion-Solutions/m0duspwnens-patch-2.3.100
FIX: ssl state and manager hostname with uppercase
2022-02-02 09:21:54 -05:00
Josh Patterson a02fb37493 Update init.sls 2022-02-02 09:18:02 -05:00
Mike Reeves eaeed07fd4 Update acng.conf 2022-02-02 09:12:29 -05:00
Mike Reeves 943edd0303 Merge pull request #7042 from Security-Onion-Solutions/dev
2.3.100 Release
2022-01-31 16:29:57 -05:00
Mike Reeves b49524a293 Merge pull request #7041 from Security-Onion-Solutions/23100release
2.3.100 Release
2022-01-31 14:07:02 -05:00
Mike Reeves 6dc8415af5 2.3.100 Release 2022-01-31 14:05:22 -05:00
Doug Burks 7927534279 Merge pull request #7040 from Security-Onion-Solutions/dougburks-patch-1
Update version from 2.3.91 to 2.3.100
2022-01-31 13:32:05 -05:00
Doug Burks e0f6b9af3a Update version from 2.3.91 to 2.3.100 2022-01-31 13:27:45 -05:00
weslambert 6a2111c2ae Merge pull request #7037 from Security-Onion-Solutions/fix/revert_zeek_dns_answers
Revert back to dns.answers for now
2022-01-31 09:55:22 -05:00
weslambert 367b59188b Revert back to dns.answers for now 2022-01-31 09:54:39 -05:00
Josh Patterson d3fc61e557 Merge pull request #7035 from Security-Onion-Solutions/soup_salt_repo
ensure /etc/yum.repos.d/securityonion.repo is absent if not a manager…
2022-01-31 09:05:45 -05:00
m0duspwnens 4dd0ce9f2c ensure /etc/yum.repos.d/securityonion.repo is absent if not a manager and managerupdates is enabled 2022-01-31 09:01:18 -05:00
Josh Patterson 0c5b4c6070 Merge pull request #7033 from Security-Onion-Solutions/receiver_grafana
Receiver grafana
2022-01-31 08:41:56 -05:00
Josh Patterson a8983dd895 Merge pull request #7028 from Security-Onion-Solutions/soup_salt_repo
Soup salt repo
2022-01-31 08:21:17 -05:00
m0duspwnens e189f10a1b Merge branch 'dev' of https://github.com/Security-Onion-Solutions/securityonion into soup_salt_repo 2022-01-29 11:04:07 -05:00
m0duspwnens a90660c07b ensure salt-latest.repo is absent, salt.minion state include repo.client 2022-01-29 11:04:03 -05:00
Mike Reeves bb87c85e07 Merge pull request #7027 from Security-Onion-Solutions/fix/soup-kibana
Move Kibana dashboard update from post_to_2.3.90() to post_to_2.3.100()
2022-01-29 10:07:36 -05:00
Doug Burks bc0a362b39 Move Kibana dashboard update from post_to_2.3.90() to post_to_2.3.100() 2022-01-29 08:02:56 -05:00
m0duspwnens 3aee8656d4 fix %} - add redis to receiver telegraf 2022-01-28 17:45:12 -05:00
m0duspwnens 980a1a0c3d add redis to receiver telegraf 2022-01-28 17:44:04 -05:00
m0duspwnens bf26ae8e41 add receiver to allowed dashboards 2022-01-28 17:32:53 -05:00
m0duspwnens da3e1e402a add receiver dashboard grafana 2022-01-28 17:27:58 -05:00
m0duspwnens 1cd1ad9214 add inputs for so-receiver to telegraf conf 2022-01-28 17:18:31 -05:00
Josh Patterson ddba4a5fe5 Merge pull request #7024 from Security-Onion-Solutions/soup_receiver
Soup receiver
2022-01-28 17:01:04 -05:00
m0duspwnens c8b1e6f501 remove -X from UPGRADECOMMAND so salt-minion starts after upgrade 2022-01-28 15:49:53 -05:00
m0duspwnens c45efebc7f Merge remote-tracking branch 'remotes/origin/dev' into soup_receiver 2022-01-28 15:27:27 -05:00
m0duspwnens 014696f62f fix receiver append to assigned_hostgroups.local.map.yaml 2022-01-28 15:26:37 -05:00
m0duspwnens 6b18551dd1 skip applying repo.client if airgap and saltupgrade prior to yum clean all 2022-01-28 14:39:10 -05:00
weslambert 4ecf4ab253 Merge pull request #7020 from Security-Onion-Solutions/feature/dash_updates
EG and HL Dashboard Updates
2022-01-28 13:19:02 -05:00
m0duspwnens 75b8d6a0c5 ensure /etc/yum.repos.d/securityonioncache.repo is absent if global:managerupdate = 0 2022-01-28 13:09:48 -05:00
weslambert 5142e6ccc7 Update so-kibana-config-load 2022-01-28 13:01:33 -05:00
Wes Lambert 3b76c2421c Update to allow for passing HL saved objects 2022-01-28 17:59:34 +00:00
m0duspwnens e82c6a2393 default for managerupdate should be int not a string 2022-01-28 12:50:58 -05:00
m0duspwnens 905ca35e93 use sed instead of echo 2022-01-28 11:19:54 -05:00
m0duspwnens 3977146a16 add receiver to firewall files during soup 2022-01-28 10:36:30 -05:00
Josh Patterson 5a37b14809 Merge pull request #7017 from Security-Onion-Solutions/issue/7016
dont apply wazuh state on sensors if it is disabled globally
2022-01-28 09:33:34 -05:00
m0duspwnens 15c29bda74 dont apply wazuh state on sensors if it is disabled globally - https://github.com/Security-Onion-Solutions/securityonion/issues/7016 2022-01-28 09:31:02 -05:00
Josh Patterson d0186c8c1b Merge pull request #7011 from Security-Onion-Solutions/fix/reinstall
https://github.com/Security-Onion-Solutions/securityonion/issues/7010
2022-01-27 16:40:37 -05:00
Jason Ertel ac21bd1e29 Merge pull request #7009 from Security-Onion-Solutions/kilo
Add new abbreviated result limit param
2022-01-27 15:55:42 -05:00
Jason Ertel 14c587fca2 Add new abbreviated result limit param 2022-01-27 15:51:02 -05:00
m0duspwnens 6cc8e4355e exclude salt ERROR seen during reinstall 2022-01-27 15:31:42 -05:00
m0duspwnens e63f35a223 change to test 2022-01-27 15:19:33 -05:00
weslambert 69689b470b Merge pull request #7005 from Security-Onion-Solutions/fix/revert_cases_field_limit
Revert field limit from testing
2022-01-27 11:33:31 -05:00
weslambert fc0a5bce86 Revert field limit from testing 2022-01-27 11:18:35 -05:00
weslambert 39257df396 Merge pull request #7004 from Security-Onion-Solutions/fix/revert_dtc
Revert changes to common template
2022-01-27 11:15:50 -05:00
weslambert 60a0204975 Revert changes to common template 2022-01-27 11:02:47 -05:00
William Wernert c6b11f4e05 Merge pull request #7001 from Security-Onion-Solutions/fix/so-rule-string-split
Fix error message printing in so-rule
2022-01-26 16:08:00 -05:00
William Wernert 4532de368a Fix error message printing in so-rule 2022-01-26 16:04:45 -05:00
m0duspwnens 9e2278a199 Merge remote-tracking branch 'remotes/origin/dev' into fix/reinstall 2022-01-26 15:48:46 -05:00
weslambert e303fb12cf Merge pull request #7000 from Security-Onion-Solutions/fix/zeek_dns_answers_pipeline
Fix Zeek field name so it doesn't conflict with mapping of other dns.…
2022-01-26 15:04:12 -05:00
weslambert 8f0a327cb5 Fix Zeek field name so it doesn't conflict with mapping of other dns.answers fields 2022-01-26 15:02:59 -05:00
weslambert bdc5e89822 Merge pull request #6999 from Security-Onion-Solutions/fix/case_mapping_changes_temp
Mapping changes for case index
2022-01-26 14:59:45 -05:00
weslambert 1b3e7f9d79 Temp changes while adjusting mapping 2022-01-26 14:57:16 -05:00
Josh Patterson 4f30d43611 Merge pull request #6998 from Security-Onion-Solutions/es_binds
mount repo dir in container same as defined on host
2022-01-26 13:59:17 -05:00
m0duspwnens c80adc0430 mount repo dir in container same as defined on host 2022-01-26 13:42:56 -05:00
weslambert e77648c475 Merge pull request #6994 from Security-Onion-Solutions/feature/dtc
Additional DTC changes
2022-01-26 12:22:48 -05:00
Jason Ertel c2636036ee Merge pull request #6995 from Security-Onion-Solutions/kilo
store related event data as a flattened object blob
2022-01-26 12:21:02 -05:00
Wes Lambert e10749a495 Additional changes to template to accomodate default fields and keyword subfield 2022-01-26 17:16:29 +00:00
Jason Ertel ed9b74dc33 store related event data as a flattened object blob 2022-01-26 12:16:05 -05:00
m0duspwnens 2aa19b78da dont remove ca-certificates.crt 2022-01-26 11:27:35 -05:00
m0duspwnens 1337af9d69 more dupes 2022-01-26 11:07:06 -05:00
m0duspwnens a0e493a186 remove dupe ids 2022-01-26 10:50:35 -05:00
m0duspwnens a43fb293fc remove role logic 2022-01-26 10:26:52 -05:00
m0duspwnens 8aa002b82e add states to remove ca and ssl keys and certs and call them during reinstall. 2022-01-26 09:33:19 -05:00
m0duspwnens 8ce0f5b7be log removal of root cron 2022-01-26 08:31:37 -05:00
Josh Patterson 26e03ccad2 Merge pull request #6978 from Security-Onion-Solutions/es_binds
allow for path.repo mounts for elasticsearch
2022-01-25 16:13:49 -05:00
m0duspwnens dd00e3babc use .get since repo may not exist 2022-01-25 13:18:21 -05:00
m0duspwnens 5d2b3992e2 dont need to set ES_PATH_REPO 2022-01-25 13:11:53 -05:00
m0duspwnens 7b6eeac03f dnt mount under /repo in the container 2022-01-25 13:08:46 -05:00
m0duspwnens 00e17d5c78 put repos in /repo in es container 2022-01-25 13:03:54 -05:00
m0duspwnens a17e1aa87a 930 for group 2022-01-25 13:00:04 -05:00
m0duspwnens 4423e93880 prevent path.repo from being put in elasticsearch.yml if the symlink doesnt exist 2022-01-25 12:57:05 -05:00
m0duspwnens e62de2934c fix test for es repo 2022-01-25 12:24:03 -05:00
m0duspwnens a92e2a917b change repos to repo 2022-01-25 10:53:28 -05:00
m0duspwnens a72f12c4c7 add path.repo mount if symlink exists 2022-01-25 10:50:00 -05:00
Josh Patterson 9a45a9799b Merge pull request #6974 from Security-Onion-Solutions/issue/6599
https://github.com/Security-Onion-Solutions/securityonion/issues/6599
2022-01-25 09:11:33 -05:00
weslambert ba52bd3835 Update template with syntax fixes 2022-01-25 08:56:03 -05:00
m0duspwnens edd8709cdd remove export LC_CTYPE="en_US.UTF-8" from soup 2022-01-24 19:42:56 -05:00
m0duspwnens d6fc436d49 copy files to default salt base 2022-01-24 19:30:34 -05:00
m0duspwnens 82e2b2b611 dont escape raw and endraw 2022-01-24 17:03:25 -05:00
m0duspwnens d083338350 adding --local 2022-01-24 16:46:29 -05:00
m0duspwnens e3f1b456e6 add raw end raw back 2022-01-24 16:09:15 -05:00
m0duspwnens 268e07e2a2 remove jinja from soup scripts 2022-01-24 15:49:55 -05:00
Doug Burks 80b7487d45 Merge pull request #6968 from Security-Onion-Solutions/dougburks-patch-1
Update CONTRIBUTING.md with warning about more involved PRs
2022-01-24 10:39:40 -05:00
Jason Ertel 4ab7a6a079 Merge pull request #6967 from Security-Onion-Solutions/kilo
Copyright year and format update
2022-01-24 10:39:31 -05:00
Doug Burks 5f67dfd432 Update CONTRIBUTING.md 2022-01-24 10:36:22 -05:00
Jason Ertel eefcc929c2 Update copyright pattern to match other repos 2022-01-24 10:09:23 -05:00
Jason Ertel a4d2807fbb Switch to httpcase for consistency 2022-01-24 09:45:07 -05:00
Doug Burks fb5bff3913 Merge pull request #6956 from Security-Onion-Solutions/dougburks-patch-1
Fix typos in ssh_warning
2022-01-24 09:39:40 -05:00
Jason Ertel 7c22f46a55 Update copyright year for 2022 2022-01-24 09:35:29 -05:00
Doug Burks b103420100 fix typo in so-setup 2022-01-22 10:25:37 -05:00
Doug Burks 304ef64bc8 fix another typo in ssh_warning 2022-01-22 10:24:36 -05:00
Doug Burks 1e14e2977f Fix typo in ssh_warning 2022-01-22 10:21:14 -05:00
Josh Patterson 86cfa07af9 Merge pull request #6955 from Security-Onion-Solutions/issue/6810
Issue/6810
2022-01-21 17:37:59 -05:00
m0duspwnens 32080b02e4 dont use logCmd for moving repo files after centos-release update 2022-01-21 17:28:40 -05:00
m0duspwnens 58c5db3bf6 reorder process in securityonion_repo function 2022-01-21 15:15:48 -05:00
m0duspwnens 9e5fb458b4 update saltstack repo location for securityonioncache.repo / managerupdates=1 2022-01-21 14:38:42 -05:00
weslambert f7a4cc20f2 Update so-common-template.json.jinja 2022-01-21 12:36:38 -05:00
Josh Patterson 36fc25f78e Merge pull request #6953 from Security-Onion-Solutions/issue/6492
https://github.com/Security-Onion-Solutions/securityonion/issues/6492
2022-01-21 12:09:13 -05:00
m0duspwnens e7852d7700 https://github.com/Security-Onion-Solutions/securityonion/issues/6492 2022-01-21 11:59:27 -05:00
Josh Patterson 0257d09cf8 Merge pull request #6949 from Security-Onion-Solutions/issue/6811
Issue/6811
2022-01-21 08:46:54 -05:00
m0duspwnens 878c3fe6d9 Merge remote-tracking branch 'remotes/origin/dev' into issue/6811 2022-01-21 08:09:24 -05:00
m0duspwnens 281e5d9b25 remove salt.enable_higstate state 2022-01-21 08:09:04 -05:00
m0duspwnens baa93301b5 enable cron at the end of soup 2022-01-20 16:53:33 -05:00
m0duspwnens 00d0eb1ce5 fix setting var 2022-01-20 16:37:33 -05:00
m0duspwnens 01cb505338 start cron and enable highstate if soup exits on error 2022-01-20 16:31:01 -05:00
William Wernert ec023f8f7c Merge pull request #6937 from Security-Onion-Solutions/fix/fail-preflight-early
Correctly handle failure to install curl in so-preflight
2022-01-20 16:03:20 -05:00
m0duspwnens e1757926cf start cron and reenable highstate on soup exit 2022-01-20 15:26:03 -05:00
William Wernert 357cd059aa Use ret_code in prereq function to return failures 2022-01-20 13:53:59 -05:00
weslambert 1b860e11e7 Merge pull request #6936 from Security-Onion-Solutions/fix/field_conflicts
Remove dynamic keyword template to prevent field conflicts with mappi…
2022-01-20 12:48:15 -05:00
weslambert d1efa71c57 Remove dynamic keyword template to prevent field conflicts with mappings defined in common template 2022-01-20 12:34:32 -05:00
Josh Patterson c57b2d005e Merge pull request #6933 from Security-Onion-Solutions/issue/6810
quote ES_PASS in SOCtopus.conf and remove % from random pw
2022-01-20 10:57:56 -05:00
m0duspwnens 9b2459d8ba quote ES_PASS in SOCtopus.conf and remove % from random pw 2022-01-20 10:52:48 -05:00
weslambert d0c8dd0626 Merge pull request #6931 from Security-Onion-Solutions/fix/cases_dynamic_disable
Disable dynamic mapping and increase order to reduce potential field …
2022-01-20 09:48:01 -05:00
weslambert e137ad60c5 Disable dynamic mapping and increase order to reduce potential field conflicts 2022-01-20 09:44:41 -05:00
Josh Patterson 93236738de Merge pull request #6930 from Security-Onion-Solutions/issue/6810
upgrade salt to 3004
2022-01-20 08:28:20 -05:00
m0duspwnens fc65f7bb84 Merge remote-tracking branch 'remotes/origin/dev' into issue/6810 2022-01-19 15:35:28 -05:00
m0duspwnens 67e34b2402 reorder yum operations in securityonion_repo function 2022-01-19 15:35:04 -05:00
Jason Ertel e984b0b9c4 Merge pull request #6921 from Security-Onion-Solutions/kilo
remove unused fields object from related case schema
2022-01-19 14:42:05 -05:00
Jason Ertel dc44a91398 Prefix all SO fields to avoid potential conflicts with future ECS changes 2022-01-19 14:26:22 -05:00
m0duspwnens a861801a24 more logCmd 2022-01-19 13:38:10 -05:00
m0duspwnens fbe54b9ee8 yum clean all needs to happen before repo files are moved or the clean doesnt clean anything 2022-01-19 12:33:58 -05:00
m0duspwnens 7ebba1f325 use show_changes: False to prevent es pw from being shown when running the state 2022-01-19 12:11:38 -05:00
m0duspwnens f8ac37c101 Merge remote-tracking branch 'remotes/origin/dev' into issue/6810 2022-01-19 11:57:37 -05:00
m0duspwnens 4d078046d6 quote ES_PASS due to new characters in random string for elasticsearch:auth pw generation 2022-01-19 11:55:25 -05:00
William Wernert 13dbd0034f Merge pull request #6924 from Security-Onion-Solutions/fix/whiptail-height
Fix height of node whiptail menu
2022-01-19 11:18:44 -05:00
William Wernert c10ab712d5 Fix height of node whiptail menu 2022-01-19 11:05:34 -05:00
Jason Ertel d7ba1cedff remove unused fields object from related case schema 2022-01-19 08:39:21 -05:00
m0duspwnens 55a262646c use logCmd 2022-01-19 08:34:54 -05:00
William Wernert a3925d231c Merge pull request #6909 from Security-Onion-Solutions/fix/preflight-curl
Install curl in preflight script to avoid error on Ubuntu
2022-01-18 13:39:44 -05:00
William Wernert c0c42c3574 Install curl in preflight script to avoid error on Ubuntu
Also add check for already installed curl later in setup
2022-01-18 13:17:56 -05:00
m0duspwnens f006d1a22c logCmd commands in securityonion_repo function 2022-01-18 12:34:23 -05:00
m0duspwnens a2ed9a86ff remove influixdb salt state files and update patch files for influxdb salt modules/state 2022-01-18 11:33:36 -05:00
Josh Brower 19ccd5f8e9 Merge pull request #6904 from Security-Onion-Solutions/fix/fleetdm-disable-vuln-feature
FleetDM - Disable Vuln Proc Feature
2022-01-18 10:48:06 -05:00
Josh Brower c4babf22d6 FleetDM - Disable Vuln Proc Feature 2022-01-18 10:38:55 -05:00
Mike Reeves 7eb564db14 Merge pull request #6901 from Security-Onion-Solutions/elasticupdate
Elastic 7.16.3
2022-01-18 09:47:36 -05:00
Mike Reeves 2e4e59bbe8 Elastic 7.16.3 2022-01-18 09:42:06 -05:00
m0duspwnens 87999453f2 Merge remote-tracking branch 'remotes/origin/dev' into issue/6810 2022-01-18 09:13:10 -05:00
m0duspwnens 3bd26f05d4 account for salt 3004 adding new chars to random.get_str 2022-01-14 18:02:18 -05:00
m0duspwnens a46a740170 account for salt 3004 adding new chars to random.get_str 2022-01-14 17:23:29 -05:00
Mike Reeves 71da74fd00 Merge pull request #6878 from Security-Onion-Solutions/fix/scan_pe_sections_entropy
Fix/scan pe sections entropy
2022-01-14 17:02:32 -05:00
weslambert c512351dd6 Add mapping for scan.exiftool and scan.pe.sections.entropy 2022-01-14 17:01:13 -05:00
weslambert a90bc9dba9 Add mapping for scan.pe.sections.entropy 2022-01-14 16:58:53 -05:00
m0duspwnens 02ce5c3236 update install salt to 3004 2022-01-14 13:47:16 -05:00
m0duspwnens b6b2e06fbc change module to cmd for onchanges_in 2022-01-14 12:44:58 -05:00
m0duspwnens f5fe466410 repo update 2022-01-14 12:02:35 -05:00
Jason Ertel a63787daba Merge pull request #6864 from Security-Onion-Solutions/kilo
Add default queries for cases to show user's assigned cases
2022-01-13 17:15:02 -05:00
Jason Ertel 6b0b7245f0 Add default queries for cases to show user's assigned cases 2022-01-13 17:10:08 -05:00
m0duspwnens bda9221d6f upgrade salt to 3004 and update bootstrap-salt.sh 2022-01-13 13:26:11 -05:00
Josh Patterson b2434faf10 Merge pull request #6862 from Security-Onion-Solutions/issue/6811
restart wazuh with docker restart vs so-wazuh-restart
2022-01-13 13:06:43 -05:00
m0duspwnens 82db3fa3c0 restart wazuh with docker restart vs so-wazuh-restart 2022-01-13 13:02:01 -05:00
Josh Patterson 78bb6e4176 Merge pull request #6856 from Security-Onion-Solutions/issue/6811
Issue/6811
2022-01-13 11:03:51 -05:00
m0duspwnens 06c0cebb26 merge with dev 2022-01-13 09:44:26 -05:00
m0duspwnens 389ff1a46d create enable_highstate state to reenable highstate following minion restart if it was previously disabled. same with cron 2022-01-13 09:39:46 -05:00
m0duspwnens a28bb23d20 fix os_family for cron state map 2022-01-12 17:27:47 -05:00
m0duspwnens 443dc6ebaa move branch echo to main so it is in the log 2022-01-12 16:14:49 -05:00
m0duspwnens 03b9b74ace stop cron before soup upgrades the manager, start cron at the end. add cron state that is in included in common 2022-01-12 16:04:10 -05:00
Mike Reeves e123dd4bb2 Merge pull request #6844 from Security-Onion-Solutions/highlanderml
Add additional highlander settings
2022-01-12 13:34:22 -05:00
Josh Patterson 5889ce02cd Merge pull request #6845 from Security-Onion-Solutions/23100soup_jpp
remove mine push from 2.3.100 function
2022-01-12 13:34:06 -05:00
Josh Patterson 776e4c6e12 Update soup 2022-01-12 13:32:46 -05:00
Josh Patterson 035984569b Merge branch 'dev' into 23100soup_jpp 2022-01-12 13:31:46 -05:00
Josh Patterson da30f66096 remove mine push from 2.3.100 function 2022-01-12 13:29:34 -05:00
Mike Reeves c525bf310d Add additional highlander settings 2022-01-12 13:19:40 -05:00
Mike Reeves ee44edfe75 Add additional highlander settings 2022-01-12 13:18:44 -05:00
m0duspwnens 0cf877f169 kill any possible queued salt jobs before stopping salt-master 2022-01-12 12:27:19 -05:00
Mike Reeves f836d3ad16 Merge pull request #6843 from Security-Onion-Solutions/23100soup_jpp
push ips of mainint to salt mine
2022-01-12 12:25:51 -05:00
Josh Patterson 5b347600e9 push ips of mainint to salt mine 2022-01-12 12:24:52 -05:00
m0duspwnens 0388912ba7 kill all salt jobs across grid before stopping salt-master. kill all salt jobs on manager before stopping salt-minion. 2022-01-12 11:05:47 -05:00
m0duspwnens 494737549d move some es script to src elasticsearch/tools/sbin and dst /usr/sbin. set requires 2022-01-12 10:20:05 -05:00
Mike Reeves 22096174bb Merge pull request #6841 from Security-Onion-Solutions/TOoSmOotH-patch-4
Fix some formatting
2022-01-12 09:39:15 -05:00
Mike Reeves 1d94e3ac69 Fix some formatting 2022-01-12 09:38:22 -05:00
m0duspwnens abf3a9401b listen instead to not start service if not running then restart if changes to files 2022-01-11 18:31:35 -05:00
m0duspwnens ae0f392035 wait for salt-master and salt-minin to exit. disable highstate before stopping salt-minion. apply salt-minion state before first highstate to update configs 2022-01-11 16:57:29 -05:00
Mike Reeves 53d2e20e48 Merge pull request #6834 from Security-Onion-Solutions/nohive
Remove hive install option
2022-01-11 16:50:18 -05:00
Mike Reeves 4ff5fc3b38 Remove hive install option 2022-01-11 14:38:38 -05:00
m0duspwnens 5ade8193f0 move highstate messages for more accurate final highstate message 2022-01-11 13:41:51 -05:00
m0duspwnens 0ef130bd38 bootstrap.sh, dont start salt services after salt upgrade, allow soup to do it 2022-01-11 13:12:07 -05:00
m0duspwnens e33a9eb45c bootstrap.sh, dont start salt services after salt upgrade, allow soup to do it 2022-01-11 13:11:25 -05:00
m0duspwnens 9d19cba600 log time when salt services stopped and started 2022-01-11 13:09:05 -05:00
m0duspwnens baf297ab0a merge with dev, resolve conflict 2022-01-11 11:24:10 -05:00
m0duspwnens 14eed8e5b9 redirect to setup_log 2022-01-11 11:20:30 -05:00
Josh Brower 5083be4ce7 Merge pull request #6816 from Security-Onion-Solutions/fix/wazuh-parsing-v2
Fix Wazuh WEL Parsing
2022-01-11 11:17:24 -05:00
Doug Burks a3c8335130 Merge pull request #6827 from Security-Onion-Solutions/dougburks-patch-1
Remove unnecessary word
2022-01-11 11:06:40 -05:00
Doug Burks 29d8dbe371 Remove unnecessary word 2022-01-11 11:05:30 -05:00
m0duspwnens 91ef9b9366 update salt mine before salt-master and salt-minion get stopped 2022-01-11 10:57:48 -05:00
m0duspwnens 328d6cdeb4 Merge remote-tracking branch 'remotes/origin/dev' into issue/6811 2022-01-11 10:02:18 -05:00
Mike Reeves a9e58e2aba Merge pull request #6826 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update init.sls
2022-01-11 10:01:49 -05:00
Mike Reeves 8ad36fc7b9 Update init.sls 2022-01-11 10:01:14 -05:00
m0duspwnens 87756cdbc9 Merge remote-tracking branch 'remotes/origin/dev' into issue/6811 2022-01-11 09:57:31 -05:00
Mike Reeves 7937487ee9 Merge pull request #6825 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update init.sls
2022-01-11 09:57:10 -05:00
Mike Reeves 770a389410 Update init.sls 2022-01-11 09:56:22 -05:00
m0duspwnens b5c274de10 Merge remote-tracking branch 'remotes/origin/dev' into issue/6811 2022-01-11 09:48:31 -05:00
m0duspwnens a8d1b9eb90 restart salt-minion at end of run if mine_functions changes 2022-01-11 09:29:12 -05:00
m0duspwnens 86c8fc6c1c need to update mine after salt-master starts 2022-01-11 08:56:38 -05:00
weslambert 17509a9231 Merge pull request #6822 from Security-Onion-Solutions/fix/event_fields
Add event.acknowledged and event.escalated mappings
2022-01-10 16:14:45 -05:00
weslambert 84f7c6b13b Add event.acknowledged and event.escalated mappings 2022-01-10 16:08:35 -05:00
m0duspwnens 716c98ec61 requires and ordering for socusersroles state 2022-01-10 14:39:00 -05:00
Josh Brower 56aa24d874 Fix Wazuh WEL Parsing 2022-01-10 13:55:38 -05:00
Mike Reeves b7a90a88f9 Merge pull request #6815 from Security-Onion-Solutions/esbackup
Add ability to specify local backup dir
2022-01-10 13:31:24 -05:00
weslambert 1dc363138a Merge pull request #6814 from Security-Onion-Solutions/fix/template_typo
Fix typo -- replace period with comma
2022-01-10 13:30:13 -05:00
weslambert 1c3eeb5a34 Fix typo -- replace period with comma 2022-01-10 13:29:06 -05:00
m0duspwnens beb9a33628 only include curl.config if elasticsearch:auth is enabled 2022-01-10 11:48:16 -05:00
Mike Reeves dbba7d7226 Add ability to specify local backup dir 2022-01-10 11:31:41 -05:00
m0duspwnens 291ac7d361 https://github.com/Security-Onion-Solutions/securityonion/issues/6811 2022-01-10 10:36:42 -05:00
Josh Patterson 43eda0c5a3 Merge pull request #6796 from Security-Onion-Solutions/fix/wazuh_register_agent
dont try to register if state file exists
2022-01-07 16:07:56 -05:00
m0duspwnens 715d3f0e7e dont try to register if state file exists 2022-01-07 16:05:55 -05:00
Jason Ertel db04646735 Merge pull request #6794 from Security-Onion-Solutions/kilo
Update field mappings based on Wes' feedback
2022-01-07 16:03:05 -05:00
Jason Ertel 66c9e20c6a Add wilcards for CCS compatibility 2022-01-07 15:57:08 -05:00
Josh Patterson ed97fe0b65 Merge pull request #6795 from Security-Onion-Solutions/fix/wazuh_register_agent
Fix/wazuh register agent
2022-01-07 15:52:17 -05:00
m0duspwnens 3a86af8de2 quote $API_RESULT 2022-01-07 15:49:53 -05:00
m0duspwnens 7ee913eb1f if /opt/so/conf/wazuh/initial_agent_registration.log doesnt exist, and agent is already registered, touch file and exit 0 to prevent salt error 2022-01-07 15:46:47 -05:00
Jason Ertel d3656a7777 Merge branch 'dev' into kilo 2022-01-07 13:41:35 -05:00
Josh Patterson 3c44f6fd41 Merge pull request #6793 from Security-Onion-Solutions/23100soup_jpp
23100soup
2022-01-07 13:32:33 -05:00
Jason Ertel 391db568b0 Update field mappings based on Wes' feedback 2022-01-07 13:28:36 -05:00
Jason Ertel a4f01d4412 Merge pull request #6792 from Security-Onion-Solutions/kilo
Add case exclusion toggle to Hunt to avoid hunt results getting case …
2022-01-07 13:02:27 -05:00
Jason Ertel 9ef83da23f Add case exclusion toggle to Hunt to avoid hunt results getting case data hits unintentionally 2022-01-07 12:58:35 -05:00
m0duspwnens 871fd115ae put so-firewalll in /usr/sbin since salt-master isnt running at this time 2022-01-07 12:04:19 -05:00
weslambert 218f7f3a13 Merge pull request #6790 from Security-Onion-Solutions/fix/dtc_severity_label
Add event.severity_label
2022-01-07 11:44:30 -05:00
weslambert 770e53d914 Add keyword subfield for event.severity_label 2022-01-07 11:21:57 -05:00
weslambert c69e1353d9 Add event.severity_label 2022-01-07 11:19:54 -05:00
m0duspwnens fd0e5d7d29 make sure so-firewall is up to date 2022-01-07 11:10:48 -05:00
Josh Brower ae6aa0dafd Merge pull request #6789 from Security-Onion-Solutions/fix/wazuh-parsing-revert
Revert Wazuh parser update
2022-01-07 10:53:53 -05:00
Josh Brower 5d4ea2ba3a Revert Wazuh parser update 2022-01-07 10:51:24 -05:00
weslambert a7e7566532 Merge pull request #6780 from Security-Onion-Solutions/feature/datatype_compliance
Initial commit for data type compliance
2022-01-06 16:38:17 -05:00
m0duspwnens 5ecb63f5cf prevent exit if minion doesnt respond 2022-01-06 16:17:51 -05:00
Josh Brower ca4aaae47c Merge pull request #6778 from Security-Onion-Solutions/fix/wazuh-parsing
Uppercase first char in Wazuh WEL
2022-01-06 16:01:09 -05:00
Josh Brower 277c7f1ef8 Uppercase first char in Wazuh WEL 2022-01-06 14:58:50 -05:00
m0duspwnens cd590b894a check that ossec.conf exists 2022-01-06 12:39:48 -05:00
weslambert 3f02003ea2 Merge pull request #6777 from Security-Onion-Solutions/fix/deprecation_ecs_compatibility_logstash
Add config option for ECS compatibility (default of disabled)
2022-01-06 11:31:51 -05:00
weslambert 8e2f500b9c Add config option for ECS compatibility (default of disabled) 2022-01-06 11:24:04 -05:00
weslambert 099e3e1ceb Merge pull request #6775 from Security-Onion-Solutions/fix/deprecation_warning_suppress
Add logger stanza to suppress ES deprecation warning messages
2022-01-06 10:45:37 -05:00
weslambert 900d12b556 Add logger stanza to suppress deprecation warning messages for now due to current system index access warning messages flooding the ES log 2022-01-06 10:35:50 -05:00
Jason Ertel 8cf7ea8b87 Merge pull request #6772 from Security-Onion-Solutions/kilo
Prevent PCAP action from showing up outside of hunt/alerts
2022-01-05 19:15:02 -05:00
Josh Patterson eaa6597cd7 Merge pull request #6773 from Security-Onion-Solutions/issue/6765
Issue/6765
2022-01-05 18:11:06 -05:00
m0duspwnens 6338ba2e45 remove /var/cache/salt/ for reinstall 2022-01-05 16:54:56 -05:00
m0duspwnens 8af74e8bb3 remove more salt configs for reinstall 2022-01-05 16:53:54 -05:00
m0duspwnens 9357995bfa remove root cron and restore yeselastic.txt 2022-01-05 16:04:32 -05:00
weslambert 2fb488f768 Merge pull request #6769 from Security-Onion-Solutions/fix/id_fielddata_deprecation
Fix issue with _id field fielddata/deprecation
2022-01-05 15:40:25 -05:00
Wes Lambert 1cafacfa51 Update saved objects to reflect removal of TheHive scripted field and replacement of PCAP pivot with Hunt pivot 2022-01-05 20:36:23 +00:00
weslambert c1a88977cf Disable fielddata for _id field by default (since it is deprecated and can be memory-intensive) 2022-01-05 15:23:52 -05:00
m0duspwnens 0ff5e3cf6f require so-elasticsearch container to be running to run the scripts 2022-01-05 14:48:41 -05:00
m0duspwnens 8950f94fb0 restore state files so python3-influxdb state doesnt try to patch during a restinstall 2022-01-05 12:02:53 -05:00
Wes Lambert b60837e71a Initial commit for data type compliance 2022-01-05 16:38:56 +00:00
Jason Ertel 4f8524e0ac Prevent PCAP action from showing up outside of hunt/alerts 2022-01-05 11:13:12 -05:00
weslambert 2f9672d3ea Merge pull request #6764 from Security-Onion-Solutions/feature/soup_branch
Denote which branch is being used in SOUP if BRANCH is specified
2022-01-05 10:54:29 -05:00
weslambert db43e21378 Fix indentation 2022-01-05 10:46:41 -05:00
weslambert 4d8b417fc9 Denote which branch is being used in SOUP if BRANCH is specified 2022-01-05 10:41:27 -05:00
Jason Ertel 89415b12ce Merge pull request #6762 from Security-Onion-Solutions/kilo
Switch soc.json to use lowercase labels in default queries; Also enab…
2022-01-05 09:59:39 -05:00
Jason Ertel 4bfdfffe21 Switch soc.json to use lowercase labels in default queries; Also enable the 'Add Case' feature 2022-01-05 09:54:13 -05:00
Mike Reeves 1adc4c5346 Merge pull request #6752 from Security-Onion-Solutions/ubufix
Fix docker holds so re-install will work properly
2022-01-04 18:56:06 -05:00
Mike Reeves 3ca0ce9eea Update so-functions 2022-01-04 18:47:35 -05:00
Mike Reeves e869013057 Remove docker the reinstall it 2022-01-04 15:24:10 -05:00
Mike Reeves dd104c9490 Add holds for ubuntu 2022-01-04 13:07:09 -05:00
m0duspwnens 7bb9b6efa9 populate mine with network.ip_addrs pillar.host.mainint for each host prior to highstate 2022-01-04 10:27:45 -05:00
Mike Reeves 288389c93e Soup changes for 2.3.100 2022-01-04 08:38:14 -05:00
Josh Patterson 4247a3a816 Merge pull request #6730 from Security-Onion-Solutions/fix/ub1804ssl
more detailed logging for the retry command
2021-12-30 13:19:58 -05:00
m0duspwnens cc2f6e23ca more detailed logging for the retry command 2021-12-30 13:09:29 -05:00
Josh Patterson 064355dfb5 Merge pull request #6729 from Security-Onion-Solutions/fix/ub1804ssl
change exitCode to exitcode. set exitcode to 1 if failed output found
2021-12-30 11:38:32 -05:00
m0duspwnens d274615376 change exitCode to exitcode. set exitcode to 1 if failed output found 2021-12-30 10:45:30 -05:00
Josh Patterson 78eda75c0f Merge pull request #6725 from Security-Onion-Solutions/fix/ub1804ssl
add option to look for failed outout in retry function in so-common. …
2021-12-29 18:18:12 -05:00
m0duspwnens 200736a118 add option to look for failed outout in retry function in so-common. look for Err: when running soapt-get update in setup 2021-12-29 18:15:16 -05:00
Jason Ertel 1d136b611a Merge pull request #6723 from Security-Onion-Solutions/kilo
Uniform presets
2021-12-29 16:49:41 -05:00
Jason Ertel e6051cb653 Switch all presets to lowercase for uniformity 2021-12-29 16:42:34 -05:00
Jason Ertel 74dbc4bf67 Merge pull request #6720 from Security-Onion-Solutions/kilo
Add case template to eval install types; also improve clarity of case queries
2021-12-29 11:41:06 -05:00
Josh Patterson a2f1f52450 Merge pull request #6719 from Security-Onion-Solutions/fix/ub1804ssl
Fix/ub1804ssl
2021-12-29 11:39:10 -05:00
Jason Ertel 1d885a5419 Add case template to eval installs 2021-12-29 11:38:38 -05:00
m0duspwnens b414e22e95 remove spaces in function 2021-12-29 11:37:22 -05:00
m0duspwnens 4c54d45681 some echos for logging 2021-12-29 11:36:12 -05:00
m0duspwnens c6e9b00488 Merge remote-tracking branch 'remotes/origin/dev' into fix/ub1804ssl 2021-12-29 11:22:25 -05:00
m0duspwnens b027da6378 wait for the salt-minion service to be ready for requests prior to running ssl state 2021-12-29 11:18:38 -05:00
Jason Ertel fb02d0d35c clarify case filters 2021-12-29 11:07:36 -05:00
Jason Ertel d4f3615cae Merge pull request #6717 from Security-Onion-Solutions/kilo
Support CCS in CM
2021-12-29 09:12:13 -05:00
Jason Ertel e5110ac4e8 Use CCS compatible index 2021-12-29 09:08:10 -05:00
Jason Ertel e87cbc37a4 Add case template 2021-12-28 19:17:15 -05:00
Josh Patterson 3b130ab202 Merge pull request #6712 from Security-Onion-Solutions/fix/ub1804ssl
all run ssl state during setup
2021-12-28 16:34:58 -05:00
m0duspwnens 22afe99719 all run ssl state during setup 2021-12-28 16:24:17 -05:00
Doug Burks e56a9a5f22 Merge pull request #6711 from Security-Onion-Solutions/dougburks-patch-1
fix typo in so-analyst-install
2021-12-28 15:24:19 -05:00
Josh Patterson 7655920068 Merge pull request #6710 from Security-Onion-Solutions/fix/ub1804ssl
add mine function to signing_policies.conf
2021-12-28 15:23:36 -05:00
Doug Burks 463925686d fix typo in so-analyst-install 2021-12-28 15:23:17 -05:00
m0duspwnens 2a5b4ef276 add mine function to signing_policies.conf. no longer need to check if mine in ca during manager install 2021-12-28 15:19:06 -05:00
Josh Patterson 7029c3a94a Merge pull request #6707 from Security-Onion-Solutions/fix/ub1804ssl
put x509 signing policies in place when minion is configured
2021-12-28 12:05:20 -05:00
m0duspwnens 67a9f4d22e put x509 signing policies in place when minion is configured 2021-12-28 12:03:10 -05:00
Josh Patterson a5746d4919 Merge pull request #6706 from Security-Onion-Solutions/fix/ub1804ssl
Fix/ub1804ssl
2021-12-28 11:27:15 -05:00
m0duspwnens 487ac24306 revert back to getting ca from mine 2021-12-28 11:16:01 -05:00
m0duspwnens 2405de4b82 fix require 2021-12-28 11:00:35 -05:00
m0duspwnens 9e3c289562 remove restarting salt in ssl generation. sperate ca and ssl generation into seperate functions 2021-12-28 10:43:45 -05:00
m0duspwnens f2adcf4ca5 ensure /etc/pki is created and simplify ca logic for non manager in ssl state 2021-12-28 10:41:57 -05:00
Jason Ertel 0072ae253b Merge pull request #6705 from Security-Onion-Solutions/kilo
Initial CM Impl; Improve so-user script
2021-12-28 08:36:59 -05:00
Jason Ertel 5a4473ecd6 fix indent 2021-12-28 08:33:31 -05:00
Jason Ertel f335670b3f Add new client-side param for cases 2021-12-27 21:53:30 -05:00
Jason Ertel 194e4119f0 Correct missing json vars 2021-12-27 20:36:28 -05:00
Jason Ertel 09626deb05 Correct var names for jinja 2021-12-27 18:01:15 -05:00
Jason Ertel ae7a4b6528 More syntax corrections 2021-12-27 16:18:12 -05:00
Jason Ertel 0a255e5765 Resolve syntax error 2021-12-27 15:15:33 -05:00
Jason Ertel 789719d25e Correct preset file syntax 2021-12-27 13:21:13 -05:00
Jason Ertel 7140255d95 Add missing presets file 2021-12-27 12:27:04 -05:00
Jason Ertel ab3319b472 Add artifact support 2021-12-27 10:49:10 -05:00
Jason Ertel b0d36f2ed2 Ensure update timestamp is updated when changing passwords; this ensures the sync will automatically follow 2021-12-21 13:38:35 -05:00
Jason Ertel 62e5914ab8 Merge branch 'dev' into kilo 2021-12-21 13:37:37 -05:00
Jason Ertel 2f88f08be2 Merge pull request #6649 from Security-Onion-Solutions/2.3.91-merge
2.3.91 merge
2021-12-21 09:39:14 -05:00
Jason Ertel 9aeaa1fccc resolved merge conflicts 2021-12-21 09:35:57 -05:00
Jason Ertel 2c9062efb7 resolved merge conflicts 2021-12-21 09:34:39 -05:00
Doug Burks c8de36d467 Merge pull request #6646 from Security-Onion-Solutions/patch/2.3.91
Patch/2.3.91
2021-12-21 09:27:14 -05:00
doug 284e0e9108 fix hashes in VERIFY_ISO.md 2021-12-20 17:27:19 -05:00
doug e66b023c9c update README.md for 2.3.91 2021-12-20 17:23:52 -05:00
doug 9f47522591 add sig for 2.3.91 ISO and update VERIFY_ISO.md 2021-12-20 17:21:53 -05:00
Jason Ertel 35617acaeb Update cacerts to reflect new path; this changed due to ES 7.16.2 2021-12-20 12:12:00 -05:00
Jason Ertel 6f116a2d01 Switch to new Ubuntu SSL dir 2021-12-20 09:43:59 -05:00
Jason Ertel d6c651af1c Remove old patch dir from previously-patched installations 2021-12-20 09:42:27 -05:00
Jason Ertel 203e8a7873 Bump version to 2.3.91 2021-12-20 09:33:20 -05:00
Jason Ertel b8fcec04b8 Remove patched jar due to upgrade of Elastic images to 7.16.2 2021-12-20 09:27:03 -05:00
Jason Ertel 6556a37869 Merge branch 'master' into patch/1.3.91 2021-12-20 09:20:03 -05:00
Jason Ertel 5af2bd8fa4 Upgrade to Elastic 7.16.2 2021-12-20 09:16:28 -05:00
Josh Patterson d33cf19e3d Merge pull request #6612 from Security-Onion-Solutions/issue/6469
add managersearch to list
2021-12-16 13:57:53 -05:00
m0duspwnens a46a876ec6 add managersearch to list 2021-12-16 13:48:41 -05:00
Josh Brower affe5b9ac0 Merge pull request #6605 from Security-Onion-Solutions/fix/fleet-ips
Fix cidr for fleet custom docker range
2021-12-16 11:55:11 -05:00
Josh Patterson e0c8e03882 Merge pull request #6604 from Security-Onion-Solutions/issue/6469
https://github.com/Security-Onion-Solutions/securityonion/issues/6469
2021-12-16 11:54:05 -05:00
Josh Brower a23824e199 Fix cidr for fleet custom docker range 2021-12-16 11:53:26 -05:00
m0duspwnens ae342ab673 Merge remote-tracking branch 'remotes/origin/dev' into issue/6469 2021-12-16 11:33:09 -05:00
m0duspwnens b4b8b91ccd simplify ip logic wazuh-register-agent, mine_interval to 35 minutes 2021-12-16 11:24:35 -05:00
m0duspwnens 2e4ed8062e simplify wazuh agent ip logic 2021-12-16 11:11:01 -05:00
m0duspwnens bd7ef1cc59 fix whitespace control 2021-12-16 09:19:20 -05:00
Jason Ertel 8ec671422f Merge pull request #6593 from Security-Onion-Solutions/esup
Finish upgrade of ES to 7.16.1
2021-12-16 07:59:34 -05:00
Jason Ertel 1268f8f92b Upgrade ES to 7.16.1 2021-12-16 07:57:42 -05:00
Jason Ertel d4f395b7f4 Fix query name for open cases 2021-12-15 20:02:35 -05:00
Jason Ertel c68efd56c2 Merge branch 'dev' into kilo 2021-12-15 20:01:55 -05:00
m0duspwnens a7600f7f43 update scripts to use their own ip 2021-12-15 17:31:39 -05:00
Mike Reeves 0f76227631 Merge pull request #6585 from Security-Onion-Solutions/unhotfix
Unhotfix
2021-12-15 17:23:02 -05:00
m0duspwnens d0b0970353 Merge remote-tracking branch 'remotes/origin/dev' into issue/6469 2021-12-15 17:08:56 -05:00
Mike Reeves 465ba1b7d3 Change CA certs location 2021-12-15 17:08:36 -05:00
m0duspwnens f9b04ab96a add node's own ip to FILEBEAT_EXTRA_HOSTS 2021-12-15 16:53:22 -05:00
m0duspwnens 522bc1d2b8 fix loadbalance logic and whitespace for filebeat.yml 2021-12-15 16:21:08 -05:00
m0duspwnens cf2f4bad09 have standalone and managersearch pull from redis nodes 2021-12-15 15:27:23 -05:00
Mike Reeves 61955b7928 Change CA certs location 2021-12-15 13:50:19 -05:00
Jason Ertel ffa8ca57a7 Merge pull request #6579 from Security-Onion-Solutions/unhotfix
Remove some previous hotfix code
2021-12-15 12:34:00 -05:00
Mike Reeves 7cd1b1c482 Remove some previous hotfix code 2021-12-15 12:26:53 -05:00
m0duspwnens 6ab2bdef0c add sensoroni state to receiver node 2021-12-15 10:45:54 -05:00
m0duspwnens ce0a39db4b remove old EXTRAHOSTNAME EXTRAHOSTIP from being set for logstash 2021-12-15 09:43:46 -05:00
m0duspwnens ea89d2074b remove ca from allowed_hosts on so-receiver 2021-12-15 09:32:12 -05:00
m0duspwnens 759bf9837e pillar top clean up for receiver and logstash.nodes 2021-12-15 09:31:03 -05:00
m0duspwnens d9a384cc29 remove global:pipeline pillar call from logstash pipeline pillars 2021-12-15 09:30:15 -05:00
m0duspwnens 176ef852c8 clean up assinged hostgroups for receiver 2021-12-15 08:28:40 -05:00
Doug Burks 09f0bdba91 Merge pull request #6574 from Security-Onion-Solutions/dougburks-patch-1
fix typo in so-image-common
2021-12-15 07:45:24 -05:00
Doug Burks 7d1f9c51e8 fix typo in so-image-common 2021-12-15 07:24:30 -05:00
m0duspwnens 024860d0ae rename EXTRA_NODES to LOGSTASH_NODES AND REDIS_NODES 2021-12-14 23:43:06 -05:00
m0duspwnens 0c6aba16ec fix redis input 2021-12-14 23:42:37 -05:00
m0duspwnens 15b8d80b71 fix host for input_redis 2021-12-14 18:51:43 -05:00
m0duspwnens 55b74abcc5 extra_hosts and redis_input for logstash 2021-12-14 18:49:30 -05:00
m0duspwnens 4da017d61c change extra_hosts for docker container 2021-12-14 17:05:30 -05:00
m0duspwnens a31d61e151 handle ca for redis 2021-12-14 16:43:04 -05:00
m0duspwnens 841b91e052 exclude elasticsearch and managerssl keys and certs from receiver 2021-12-14 16:05:47 -05:00
m0duspwnens d0b6d5bba6 remove so-eval from lists since it doesnt run logstash 2021-12-14 15:33:06 -05:00
m0duspwnens a31f034f2e remove receiver add node for cacerts and tls-ca-bundle for logstash bind 2021-12-14 15:02:59 -05:00
m0duspwnens 6962e3f9b3 fix logstash certs mapped into container 2021-12-14 14:52:15 -05:00
m0duspwnens c490a3be36 move node_data pillar to logstash:nodes, set extra hosts for filebeat docker 2021-12-14 13:32:42 -05:00
Mike Reeves 5006e34208 Merge pull request #6560 from Security-Onion-Solutions/mergerz
Merge latest hotfix
2021-12-14 10:57:49 -05:00
Mike Reeves 30344ba0ef Fix conflicts 2021-12-14 10:55:19 -05:00
m0duspwnens 6518691c55 sort the items 2021-12-13 18:16:25 -05:00
m0duspwnens 067e79894f fix loop for node_data 2021-12-13 16:26:38 -05:00
m0duspwnens 6de2f5bd03 fix node_data 2021-12-13 15:55:09 -05:00
m0duspwnens 8d0872bce5 create node_data pillar from mine data, use node_data pillar for filebeat config 2021-12-13 15:48:30 -05:00
Mike Reeves 85cf096322 Merge pull request #6541 from Security-Onion-Solutions/hotfix/2.3.90
Hotfix/2.3.90
2021-12-13 12:41:24 -05:00
Mike Reeves 4eaf3f8d8b Merge pull request #6540 from Security-Onion-Solutions/2390hotfix3
2.3.90-20211213 Hotfix
2021-12-13 12:12:03 -05:00
Mike Reeves d90904b4d4 2.3.90-20211213 Hotfix 2021-12-13 12:09:09 -05:00
Mike Reeves 65cc9930e7 Merge pull request #6537 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update HOTFIX
2021-12-13 11:13:40 -05:00
Mike Reeves 7f982d2824 Update HOTFIX 2021-12-13 11:12:18 -05:00
Mike Reeves d3ac1f7994 Merge pull request #6533 from Security-Onion-Solutions/jertel/hotfix-20211213
Add missing logstash lib
2021-12-13 09:30:32 -05:00
Jason Ertel c94d5fa9dc Strip JndiLookup.class from log4j-core jars, to match Elastic's mitigation approach 2021-12-13 09:27:13 -05:00
Mike Reeves 83d1cdad90 Merge pull request #6532 from Security-Onion-Solutions/jertel/hotfix-20211213
Strip JndiLookup.class from log4j-core jars, to match Elastic's mitigation approach
2021-12-13 09:05:30 -05:00
Jason Ertel 8365b5f140 Strip JndiLookup.class from log4j-core jars, to match Elastic's mitigation approach 2021-12-13 09:02:41 -05:00
m0duspwnens 86f67198bf loadbalance filebeat if across managers and receivers 2021-12-10 17:43:06 -05:00
Mike Reeves 4d6cd66d9d Merge pull request #6521 from Security-Onion-Solutions/hotfix/2.3.90
Hotfix/2.3.90
2021-12-10 16:20:29 -05:00
Mike Reeves 1946965c5f Merge pull request #6520 from Security-Onion-Solutions/2390hotfix0day
2.3.90-20211210 Hotfix
2021-12-10 15:49:38 -05:00
Mike Reeves c9a14788ed 2.3.90-20211210 Hotfix 2021-12-10 15:42:53 -05:00
m0duspwnens fe7247f876 update fw for receiver and add mine_functions for ip_addr 2021-12-10 15:28:40 -05:00
Mike Reeves ce963a02d9 Merge pull request #6517 from Security-Onion-Solutions/ES0day2
Add JVM Options for logstash
2021-12-10 14:25:52 -05:00
Mike Reeves dcd56de890 Update log4j2.properties 2021-12-10 14:23:38 -05:00
Mike Reeves 3d7b963912 Update log4j2.properties 2021-12-10 14:16:16 -05:00
Mike Reeves 09253b637e Create jvm.options 2021-12-10 14:12:43 -05:00
Mike Reeves c81ce48bff Update log4j2.properties 2021-12-10 14:10:35 -05:00
Mike Reeves 73ec595baa Update init.sls 2021-12-10 14:10:05 -05:00
Mike Reeves 04862fcc06 Merge pull request #6514 from Security-Onion-Solutions/ES0day2
Throw the log4j into the java options
2021-12-10 12:04:31 -05:00
Mike Reeves 45346b6318 Update log4j2.properties 2021-12-10 12:01:39 -05:00
Mike Reeves e48de18480 Update init.sls 2021-12-10 12:00:12 -05:00
Mike Reeves 66c8cc6e86 Update init.sls 2021-12-10 11:59:12 -05:00
Mike Reeves 8dcb64d87c Update init.sls 2021-12-10 11:56:33 -05:00
Mike Reeves ae3e980852 Merge pull request #6513 from Security-Onion-Solutions/EShotfix
Update log4j2.properties
2021-12-10 10:35:43 -05:00
Mike Reeves 11f1fe7ab1 Update HOTFIX 2021-12-10 10:21:50 -05:00
Mike Reeves 4561e13871 Update log4j2.properties 2021-12-10 10:19:58 -05:00
Mike Reeves ea26e402c8 Update log4j2.properties 2021-12-10 10:17:49 -05:00
m0duspwnens 54c32acdbf dont call logstash_pillar if manager or helix 2021-12-09 15:26:00 -05:00
Jason Ertel 83d86aebb1 Perform full email match 2021-12-09 15:04:00 -05:00
m0duspwnens d94496bb90 remove minio_key and add missing endif 2021-12-09 13:24:20 -05:00
m0duspwnens c2a952796c Merge remote-tracking branch 'remotes/origin/sans' into issue/6469 2021-12-09 13:13:18 -05:00
Mike Reeves b92cbb01b3 SSL modifications 2021-12-09 13:13:01 -05:00
m0duspwnens 5b70d5510f Merge remote-tracking branch 'remotes/origin/sans' into issue/6469 2021-12-09 13:12:00 -05:00
Jason Ertel 2761662eb9 Add status presets 2021-12-09 13:09:56 -05:00
Mike Reeves a7f0d81555 SSL modifications 2021-12-09 13:07:00 -05:00
Josh Brower d3bbae23ca Merge pull request #6499 from Security-Onion-Solutions/fix/beats-logstash
Use id for doc id if it exists
2021-12-09 09:47:14 -05:00
Josh Brower 656ea974dc Use id for doc id if it exists 2021-12-09 09:16:58 -05:00
Jason Ertel a9b7b9ee92 Jinjafy case params 2021-12-08 17:41:48 -05:00
m0duspwnens 7390b03dc1 dont show es options in final whiptail setup confirmation 2021-12-08 14:58:34 -05:00
m0duspwnens b4bc32d3ca set logstash pillar and enable avanced ls menu for so-receiver 2021-12-08 14:33:15 -05:00
m0duspwnens ecc8594d44 prevent so-receiver from getting extra keys/certs 2021-12-08 13:32:56 -05:00
m0duspwnens 59464af10c filebeat certs for logstash on so-receiver 2021-12-08 09:41:17 -05:00
m0duspwnens 1ef63f3a23 ssl things for so-receiver 2021-12-08 09:08:46 -05:00
m0duspwnens c80059efb0 change from || to && 2021-12-07 17:11:15 -05:00
m0duspwnens 8c95d0f36b set ip for wazuh-register-agent and dont apply nginx in setup for receiver 2021-12-07 16:50:41 -05:00
m0duspwnens 429b9cab2f set ip for ossec.conf 2021-12-07 16:22:07 -05:00
m0duspwnens f8da5c7fe9 start of fw rules for receiver 2021-12-07 15:59:11 -05:00
m0duspwnens 06010bd157 add so-receiver to allowed_states 2021-12-07 13:34:06 -05:00
Jason Ertel b73eb76c94 Make case module dynamic 2021-12-07 11:51:02 -05:00
m0duspwnens f3ec5df447 add receiver node 2021-12-07 11:13:51 -05:00
m0duspwnens 7549e34881 Merge remote-tracking branch 'remotes/origin/dev' into issue/6469 2021-12-07 10:57:12 -05:00
m0duspwnens ba30c59ec7 add receiver node 2021-12-07 10:56:35 -05:00
Mike Reeves 892899b7f9 Merge pull request #6477 from Security-Onion-Solutions/merge-202112071526
Merge hotfix
2021-12-07 10:30:13 -05:00
Jason Ertel 702d95c63a Merge branch 'master' into merge-202112071527 2021-12-07 10:28:00 -05:00
m0duspwnens 96666ab307 add receiver node 2021-12-07 10:19:32 -05:00
Mike Reeves 9f41df641e Merge pull request #6470 from Security-Onion-Solutions/hotfix/2.3.90
HOTFIX: 2.3.90-20211206
2021-12-07 09:51:01 -05:00
Mike Reeves 9f94ecfab7 Merge pull request #6466 from Security-Onion-Solutions/2390updates3
2.3.90 hotfix 20211206
2021-12-06 11:07:14 -05:00
Mike Reeves 4188282724 2.3.90 hotfix 20211206 2021-12-06 11:03:49 -05:00
Mike Reeves 3945933dec Merge pull request #6446 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update HOTFIX
2021-12-06 09:38:02 -05:00
Mike Reeves 73a1a3878f Update HOTFIX 2021-12-06 09:37:07 -05:00
weslambert ff25d6f80b Merge pull request #6447 from Security-Onion-Solutions/eg_dashes
Add initial EG dashboards
2021-12-03 18:05:22 -05:00
Wes Lambert 0571612ea1 Add initial EG dashes 2021-12-03 22:38:30 +00:00
Mike Reeves f697d88090 Update HOTFIX 2021-12-03 15:36:16 -05:00
Mike Reeves ad03241910 Merge pull request #6445 from Security-Onion-Solutions/TOoSmOotH-patch-3
Apply hotfix to all 2.3.90 installs
2021-12-03 15:24:33 -05:00
Mike Reeves f82d204c0e Update soup 2021-12-03 15:20:33 -05:00
Mike Reeves 780daf8aa7 Apply hotfix to all 2.3.90 installs 2021-12-03 15:15:45 -05:00
Josh Patterson 5008b647b0 Merge pull request #6441 from Security-Onion-Solutions/hf/soc_append2.3.90
export LC_CTYPE="en_US.UTF-8" in soup
2021-12-03 15:10:12 -05:00
m0duspwnens 65b1ab833d run salt-call locally as if no Salt master were present during reinstall - https://github.com/Security-Onion-Solutions/securityonion/discussions/6435 2021-12-03 12:00:29 -05:00
m0duspwnens c6773a0bbc move "Preparing soup" to main so shows in soup.log 2021-12-03 10:26:22 -05:00
m0duspwnens ff2d2c7c04 export LC_CTYPE="en_US.UTF-8" - https://github.com/Security-Onion-Solutions/securityonion/discussions/6431 2021-12-02 16:39:32 -05:00
Mike Reeves 6c7a1f23f5 Merge pull request #6440 from Security-Onion-Solutions/TOoSmOotH-patch-2
Fix for the clustername used in wrong context
2021-12-02 15:35:26 -05:00
Mike Reeves f5761c73a5 Fix for the clustername used in wrong context 2021-12-02 15:30:35 -05:00
Mike Reeves 8448778ecd Merge pull request #6438 from Security-Onion-Solutions/hf/soc_append2.3.90
hf/soc append2.3.90
2021-12-02 15:10:51 -05:00
m0duspwnens 8d667795a7 only add soc:es_index_patterns to pillar if not already present 2021-12-02 10:28:17 -05:00
m0duspwnens 7a664ab8f7 more error proof up_to_2.3.90 function 2021-12-02 10:02:26 -05:00
Jason Ertel 83fab42b6e Merge pull request #6433 from Security-Onion-Solutions/kilo
Reign in the Wazuh port check to only complain if a non-Docker process is listening on 55000.
2021-12-02 09:39:14 -05:00
Jason Ertel e549cfdf82 Reign in the Wazuh port check to only complain if a non-Docker process is listening on 55000. 2021-12-02 09:35:13 -05:00
Josh Brower c7a9fb1fa3 Merge pull request #6432 from Security-Onion-Solutions/fix/fleet-nginx
Fix FleetDM nginx errors
2021-12-02 08:30:28 -05:00
Josh Brower 97cd679d74 Fix FleetDM nginx errors 2021-12-02 08:17:01 -05:00
William Wernert 3bd8bcba12 Merge pull request #6421 from Security-Onion-Solutions/hotfix-merge
Hotfix merge
2021-12-01 14:49:05 -05:00
William Wernert 6e7188b4d8 Merge branch 'hotfix/2.3.90' into hotfix-merge
# Conflicts:
#	HOTFIX
2021-12-01 14:40:34 -05:00
m0duspwnens 5e0ac89841 merge with master 2021-12-01 14:27:58 -05:00
Mike Reeves 8990a09d92 Merge pull request #6418 from Security-Onion-Solutions/hotfix/2.3.90
Hotfix/2.3.90
2021-12-01 13:24:19 -05:00
Mike Reeves 946673dc3b Merge pull request #6417 from Security-Onion-Solutions/2390updates2
2.3.90 hotfix airgap
2021-12-01 13:20:41 -05:00
m0duspwnens c571b2c499 handle redirect if more than 1 match from compgen 2021-12-01 13:17:14 -05:00
Mike Reeves 80c569317f 2.3.90 hotfix airgap 2021-12-01 13:16:13 -05:00
Mike Reeves 84b91c547d Merge pull request #6403 from Security-Onion-Solutions/dlee35-patch-1
add subjectAltName to filebeat.crt
2021-12-01 11:54:05 -05:00
Mike Reeves 5f121f3b99 Merge pull request #6411 from Security-Onion-Solutions/m0duspwnens-patch-1/hotfix/2.3.90
remove redirect to /dev/null for compgen
2021-12-01 10:17:29 -05:00
Josh Patterson 63cb486698 remove redirect to /dev/null for compgen 2021-12-01 10:16:04 -05:00
Dustin Lee 8a394380cb add subjectAltName to filebeat.crt
IP SAN is required for Endgame integration w/Logstash when DNS resolution is unavailable
2021-11-30 16:24:08 -05:00
William Wernert 1a31e60e47 Merge pull request #6402 from Security-Onion-Solutions/fix/airgap-check
Fix/airgap check
2021-11-30 15:57:02 -05:00
William Wernert 168f860c87 Add hotfix string to HOTFIX 2021-11-30 15:49:41 -05:00
William Wernert 8d87fae6a8 Remove airgap repo file if it shouldn't exist 2021-11-30 15:46:22 -05:00
William Wernert 739efc22d2 Fix airgap check logic 2021-11-30 15:46:18 -05:00
Jason Ertel 1272de3058 Merge pull request #6378 from Security-Onion-Solutions/TOoSmOotH-patch-2
bump version to 2.3.100
2021-11-29 09:57:29 -05:00
Mike Reeves 2beb69f495 Update HOTFIX 2021-11-29 09:55:32 -05:00
Mike Reeves 5a447c53d9 bump version to 2.3.100 2021-11-29 09:55:01 -05:00
Jason Ertel 31ffd6c4ec Merge pull request #6339 from Security-Onion-Solutions/kilo
Merge 2.3.90 WAZUH hotfix into dev
2021-11-23 19:33:18 -05:00
Mike Reeves 4c6786a412 Merge pull request #6335 from Security-Onion-Solutions/hotfix/2.3.90
Hotfix/2.3.90
2021-11-23 16:51:27 -05:00
Mike Reeves 5062e910e2 Merge pull request #6334 from Security-Onion-Solutions/2390updates
2.3.90 hotfix soup
2021-11-23 15:41:21 -05:00
Mike Reeves 1f9dc0db1f 2.3.90 hotfix soup 2021-11-23 15:40:04 -05:00
Mike Reeves c536e11383 2.3.90 hotfix soup 2021-11-23 15:32:41 -05:00
Mike Reeves faa8464b60 Merge pull request #6333 from Security-Onion-Solutions/kilo
Correct if check to inline the command instead of checking for emptin…
2021-11-23 14:53:24 -05:00
Jason Ertel 4f283c2d86 Suppres grep output 2021-11-23 14:52:40 -05:00
Jason Ertel 801d42ed20 Correct if check to inline the command instead of checking for emptiness of a variable 2021-11-23 14:51:06 -05:00
Mike Reeves 30a1ffc1c7 Merge pull request #6329 from Security-Onion-Solutions/kilo
2.3.90 WAZUH
2021-11-23 13:37:41 -05:00
Jason Ertel 59fc122eec Force restart of wazuh since conf file is changing 2021-11-23 13:29:04 -05:00
Jason Ertel 52ffa27eda Update hotfix file 2021-11-23 13:22:47 -05:00
Jason Ertel bd59d65f02 Strip trailing newlines from version and hotfix files 2021-11-23 13:12:27 -05:00
Jason Ertel 01ceded223 Handle CRs in hotfix 2021-11-23 13:03:40 -05:00
Jason Ertel 3c37bd61ab Add debug logging 2021-11-23 12:46:59 -05:00
Jason Ertel a35670c889 Merge branch 'hotfix/1.3.90' into kilo 2021-11-23 12:38:57 -05:00
Jason Ertel 7627d37386 Add 2.3.90 WAZUH hotfix corrective function 2021-11-23 12:21:28 -05:00
Jason Ertel 273842eb43 Merge pull request #6328 from Security-Onion-Solutions/kilo
WAZUH hotfix
2021-11-23 12:06:34 -05:00
Jason Ertel 0dd251e2a9 Fix typo in whiptail prompt 2021-11-23 11:19:53 -05:00
Josh Patterson c67b2b6936 Update soup
only check if salt was upgraded if upgrade_salt function was called
2021-11-23 11:14:10 -05:00
Jason Ertel af4c04be59 Fix #6325 - Prevent XML header from outputting to ossec.conf 2021-11-23 10:57:21 -05:00
Jason Ertel 4672b0c15c Fix #6317 - Do not attempt to whitelist when wazuh isn't enabled 2021-11-23 10:06:14 -05:00
Jason Ertel 9737a4088c Merge pull request #6327 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update HOTFIX
2021-11-23 09:25:43 -05:00
Mike Reeves d8d429c71a Update HOTFIX 2021-11-23 09:19:41 -05:00
Mike Reeves 3bfc3b8943 Merge pull request #6301 from Security-Onion-Solutions/dev
2.3.90
2021-11-22 13:15:23 -05:00
Mike Reeves 4ad6d616ae Merge pull request #6313 from Security-Onion-Solutions/2390update
2390update
2021-11-22 09:04:16 -05:00
Mike Reeves 759c0b858a 2.3.90 2021-11-22 09:01:12 -05:00
Mike Reeves c17a49a730 Merge pull request #6302 from Security-Onion-Solutions/fix/md5soup
Fix/md5soup
2021-11-19 16:45:02 -05:00
m0duspwnens c0f183fb5e add comment 2021-11-19 16:37:27 -05:00
m0duspwnens d602339c45 render and md5sum soup and so-common 2021-11-19 16:32:59 -05:00
Mike Reeves 0122e62920 Merge pull request #6300 from Security-Onion-Solutions/2390
2.3.90
2021-11-19 14:09:02 -05:00
Mike Reeves 1634105780 2.3.90 2021-11-19 14:07:03 -05:00
Josh Patterson 198a690ba1 Merge pull request #6298 from Security-Onion-Solutions/fix/soup-script-check
Check soup in /usr/sbin rather than the saltstack default dir
2021-11-19 11:24:48 -05:00
William Wernert bebd62187d Check soup in /usr/sbin rather than the saltstack default dir 2021-11-19 11:23:32 -05:00
Mike Reeves a91564605c Merge pull request #6297 from Security-Onion-Solutions/fix/soup-playbook-secrets
Fix indent on playbook_admin and playbook_automation secrets
2021-11-19 10:28:11 -05:00
William Wernert 23b91ee7e5 Fix indent on playbook_admin and playbook_automation secrets 2021-11-19 10:27:11 -05:00
Mike Reeves d3f25f8d74 Merge pull request #6293 from Security-Onion-Solutions/fix/fleet-stats
Fix FleetDM - disable stats
2021-11-19 09:53:26 -05:00
Josh Brower 8bd4ba3acd Fix FleetDM - disable stats 2021-11-19 09:49:34 -05:00
Josh Patterson e5927d0bf7 Merge pull request #6290 from Security-Onion-Solutions/fleet_startup_eval
run redis state before fleet state for eval highstate
2021-11-18 17:54:26 -05:00
m0duspwnens 9dd89f6be7 run redis state before fleet state for eval highstate 2021-11-18 17:41:56 -05:00
Mike Reeves 796eb59dc6 Merge pull request #6288 from Security-Onion-Solutions/syncesusers_so-kratos
wait for up to 5 minutes for kratos to respond before proceeding
2021-11-18 16:42:18 -05:00
m0duspwnens 55fed43469 wait for up to 5 minutes for kratos to respond before proceeding 2021-11-18 16:35:35 -05:00
William Wernert af83019427 Merge pull request #6287 from Security-Onion-Solutions/feat/cidr-extra-validation
Check for more invalid cidr syntax
2021-11-18 15:21:58 -05:00
William Wernert 4149236cda Check for more invalid cidr syntax 2021-11-18 15:18:12 -05:00
Josh Patterson 825106d074 Merge pull request #6286 from Security-Onion-Solutions/fix/docker-upgrade
Prevent downgrade of docker, containerd, and docker-cli
2021-11-18 15:15:37 -05:00
William Wernert 1a3324868a Specify version of docker-ce-rootless-extras 2021-11-18 15:12:47 -05:00
William Wernert bc87bb4770 Specify docker cli version as well 2021-11-18 14:51:26 -05:00
William Wernert 6aae48bdae Don't upgrade docker or containerd before versionlock is applied 2021-11-18 14:14:18 -05:00
Mike Reeves a0425a48e6 Merge pull request #6282 from Security-Onion-Solutions/syncesusers_so-kratos
remove restart policy for kratos container
2021-11-18 11:43:16 -05:00
m0duspwnens 4b89bf7bbc remove restart policy for kratos container 2021-11-18 11:41:07 -05:00
Mike Reeves 5fc5afa9ea Merge pull request #6281 from Security-Onion-Solutions/syncesusers_so-kratos
install specific docker verison
2021-11-18 11:32:38 -05:00
m0duspwnens ddec8e4da0 install specific docker verison 2021-11-18 11:29:22 -05:00
Jason Ertel 9c0e8cedba Merge pull request #6279 from Security-Onion-Solutions/syncesusers_so-kratos
restart kratos if failure
2021-11-18 10:49:12 -05:00
m0duspwnens 5054da0027 restart kratos if failure 2021-11-18 10:48:06 -05:00
Jason Ertel 96f1f0174b Merge pull request #6275 from Security-Onion-Solutions/syncesusers_so-kratos
break kratos state out from soc state
2021-11-18 09:13:10 -05:00
m0duspwnens cd1f0c0440 break kratos state out from soc state 2021-11-18 09:10:00 -05:00
Mike Reeves 12546a8efa Merge pull request #6271 from Security-Onion-Solutions/fix/fleet-users
Fix soup - fleetdm SA user
2021-11-17 19:48:15 -05:00
Josh Brower 3f5956b56d Fix soup - fleetdm SA user 2021-11-17 19:47:16 -05:00
Mike Reeves 6e49ab0558 Merge pull request #6270 from Security-Onion-Solutions/fix/whiptail-text
Fix text cutoff
2021-11-17 19:18:46 -05:00
William Wernert c52df32f05 Fix text cutoff 2021-11-17 19:08:10 -05:00
Josh Patterson c0602f4222 Merge pull request #6269 from Security-Onion-Solutions/syncesusers_so-kratos
run elasticsearch.auth state and so-elastic-auth true before manager …
2021-11-17 18:41:18 -05:00
m0duspwnens d4b412bcbe run elasticsearch.auth state and so-elastic-auth true before manager in setup for syncesusers in manager state 2021-11-17 18:38:13 -05:00
Josh Brower 66e2de0934 Merge pull request #6268 from Security-Onion-Solutions/fix/fleet-users
Fix soup - fleetdm SA user
2021-11-17 18:26:11 -05:00
Josh Brower c93794a402 Fix soup - fleetdm SA user 2021-11-17 18:22:34 -05:00
Josh Patterson 98efc6f2ed Merge pull request #6267 from Security-Onion-Solutions/syncesusers_so-kratos
syncesusers require so-kratos
2021-11-17 18:20:53 -05:00
m0duspwnens 59ef734064 syncesusers require so-kratos 2021-11-17 18:16:06 -05:00
Josh Brower 922657afbc Merge pull request #6266 from Security-Onion-Solutions/fix/fleet-users
Unset pw reset for new Fleet users
2021-11-17 17:10:27 -05:00
Josh Brower 5f3601ac78 Unset pw reset for new Fleet users 2021-11-17 17:06:01 -05:00
Josh Brower 2fe4fa06a6 Merge pull request #6265 from Security-Onion-Solutions/fix/fleet-users
Fix FleetDM SA Creation for SOUP
2021-11-17 14:09:59 -05:00
Josh Brower 773c580e77 Fix FleetDM SA Creation for SOUP 2021-11-17 14:08:34 -05:00
Mike Reeves aca684d55a Merge pull request #6264 from Security-Onion-Solutions/fix/fleet-users
Migrate FleetDM user mgt to fleetctl
2021-11-17 13:16:05 -05:00
Josh Brower 6f391dbe50 Migrate FleetDM user mgt to fleetctl 2021-11-17 13:13:25 -05:00
William Wernert 8d033264e7 Merge pull request #6262 from Security-Onion-Solutions/fix/new-cidr-test
Add new ipv4 address w/ cidr mask validator
2021-11-17 13:09:04 -05:00
William Wernert 262d2023b5 Add new ipv4 address w/ cidr mask validator 2021-11-17 12:41:25 -05:00
Josh Patterson d143a309a1 Merge pull request #6261 from Security-Onion-Solutions/soup_soc_endgame
change how soc endgame added to manager pillar in soup
2021-11-17 11:12:17 -05:00
m0duspwnens ac400f1c41 change how soc endgame added to manager pillar in soup 2021-11-17 11:07:12 -05:00
William Wernert df495c0017 Merge pull request #6258 from Security-Onion-Solutions/fix/nm-conf
Run `check_network_manager_conf()` later in setup
2021-11-17 08:44:25 -05:00
William Wernert 8c454973ad Run check_network_manager_conf() later in setup
The directory was being overwritten when network-manager was installed later
2021-11-17 08:42:27 -05:00
Josh Patterson a16e6aca22 Merge pull request #6257 from Security-Onion-Solutions/es_soup_ingest
escape raw and endraw
2021-11-17 07:56:01 -05:00
m0duspwnens ce21ae11f5 escape raw and endraw 2021-11-17 07:53:15 -05:00
Mike Reeves fdd9706669 Merge pull request #6255 from Security-Onion-Solutions/kilo 2021-11-16 18:09:40 -05:00
Jason Ertel 8fa9a180b2 Refactor upgrade and post-upgrade version to function mappings; fix missing version upgrades from older 2.3.61 releases and earlier; Drop support for upgrading ancient RC releases 2021-11-16 18:08:28 -05:00
Josh Patterson 6288365a50 Merge pull request #6254 from Security-Onion-Solutions/es_soup_ingest
wrap common ingest in raw endraw since json and no jinja
2021-11-16 16:47:53 -05:00
m0duspwnens 5448107310 wrap common ingest in raw endraw since json and no jinja 2021-11-16 16:43:33 -05:00
Mike Reeves adaf3faf90 Merge pull request #6253 from Security-Onion-Solutions/kilo 2021-11-16 16:13:31 -05:00
Jason Ertel 1bd8e226b4 Force DB migration since installations on 2.3.50 or earlier will skip the Kratos 0.6 version 2021-11-16 15:58:04 -05:00
Josh Patterson f60f0b5b6d Merge pull request #6246 from Security-Onion-Solutions/es_soup_ingest
soup for es ingest common and watch esingestdynamicconf for so-elastic docker
2021-11-16 14:05:15 -05:00
William Wernert adc867846c Merge pull request #6245 from Security-Onion-Solutions/fix/ubuntu-nic-unmanaged
Modify network-manager conf earlier in setup
2021-11-16 14:00:58 -05:00
m0duspwnens 5945326817 soup for es ingest common and watch esingestdynamicconf for so-elastic docker 2021-11-16 14:00:41 -05:00
William Wernert 90cbb5d00e Modify network-manager conf earlier in setup 2021-11-16 13:30:09 -05:00
Josh Brower 8bb2789c6f Merge pull request #6237 from Security-Onion-Solutions/kilo
Migrate to email field instead of username due to breaking change in …
2021-11-16 12:06:08 -05:00
Jason Ertel 11fc0da971 Migrate to email field instead of username due to breaking change in FleetDM 4.x 2021-11-16 12:03:46 -05:00
William Wernert 76a1d767f2 Merge pull request #6235 from Security-Onion-Solutions/feature/preflight-retry
Retry failed URLs in so-preflight + improve logging clarity
2021-11-16 11:11:02 -05:00
William Wernert a2152446ea Pad count string to align text 2021-11-16 11:08:13 -05:00
William Wernert d4d9032bfc Remove confusing punctuation 2021-11-16 10:56:49 -05:00
William Wernert 4e3f43bee4 Fix variable name 2021-11-16 10:53:22 -05:00
William Wernert 57377e0a0e Add retry support + more precise logging to so-preflight 2021-11-16 10:46:48 -05:00
Mike Reeves 2514d36ccd Merge pull request #6232 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update init.sls
2021-11-15 17:11:08 -05:00
Mike Reeves 809dbc0a48 Merge pull request #6233 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update soup
2021-11-15 17:10:52 -05:00
Mike Reeves b51405d5e8 Update soup 2021-11-15 17:04:46 -05:00
Mike Reeves d1cfc4a8dc Merge pull request #6231 from Security-Onion-Solutions/fix/whiptail-cutoff
Fix whiptail description text
2021-11-15 17:02:00 -05:00
Mike Reeves 731bbabe4c Update init.sls 2021-11-15 17:00:34 -05:00
William Wernert d4509ff4d8 Fix whiptail description text 2021-11-15 16:29:26 -05:00
Mike Reeves 85c0b0818b Merge pull request #6230 from Security-Onion-Solutions/fix/cidr-full-validation-bash
Check CIDR validity completely
2021-11-15 15:43:58 -05:00
William Wernert f674555290 Check CIDR validity completely 2021-11-15 15:43:05 -05:00
Josh Patterson a8aae544d5 Merge pull request #6229 from Security-Onion-Solutions/kibana_json_logging
change kibana logging to json
2021-11-15 14:27:04 -05:00
m0duspwnens 6f9db25ea7 change kibana logging to json 2021-11-15 14:23:47 -05:00
Mike Reeves 405e78858a Merge pull request #6228 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update soup
2021-11-15 14:07:23 -05:00
Mike Reeves 146e1f4297 Update soup 2021-11-15 14:05:29 -05:00
Mike Reeves f78e0fb7b9 Merge pull request #6227 from Security-Onion-Solutions/fix/fleetlogging
Fix env var for logging
2021-11-15 14:00:31 -05:00
Josh Brower 6e6d2d1949 Fix env var for logging 2021-11-15 13:52:35 -05:00
Josh Patterson ca5d20fecb Merge pull request #6225 from Security-Onion-Solutions/clean_meta_data
clean metadata with cmd.run instead of pkg module due to False return…
2021-11-15 11:03:41 -05:00
m0duspwnens dcfaece8b1 clean metadata with cmd.run instead of pkg module due to False return from module 2021-11-15 11:00:31 -05:00
Mike Reeves af0e062193 Merge pull request #6221 from Security-Onion-Solutions/fix/var-reference
Fix variable reference in so-functions
2021-11-15 09:49:07 -05:00
Mike Reeves 56acedfbf7 Merge pull request #6220 from Security-Onion-Solutions/fix/revert-python-validation
Fix/revert python validation
2021-11-15 09:44:31 -05:00
William Wernert 4b0a5c3a17 Un-revert validation test script 2021-11-15 09:43:43 -05:00
William Wernert 052192e1d6 Revert "Use python lib to make cidr validation more strict"
This reverts commit 569cb24861.
2021-11-15 09:43:18 -05:00
weslambert 92131d4bb7 Merge pull request #6215 from Security-Onion-Solutions/fix/eg_spelling
Fix spelling
2021-11-12 21:13:28 -05:00
weslambert 9ac1cb0e76 Fix spelling 2021-11-12 21:12:09 -05:00
Josh Patterson ffbb04bb5a Merge pull request #6213 from Security-Onion-Solutions/issue/5809
Issue/5809
2021-11-12 15:07:54 -05:00
m0duspwnens cc1dea446c Merge branch 'dev' of https://github.com/Security-Onion-Solutions/securityonion into issue/5809 2021-11-12 15:02:22 -05:00
m0duspwnens 7f3379e034 verify manager pillars can be rendered before proceeding with soup - https://github.com/Security-Onion-Solutions/securityonion/issues/5809 2021-11-12 15:02:16 -05:00
weslambert 8c46a2d1db Merge pull request #6210 from Security-Onion-Solutions/fix/soc_pillar_soup
Add SOC pillar entry
2021-11-12 13:35:46 -05:00
William Wernert ba621639bd Merge pull request #6201 from Security-Onion-Solutions/fix/cidr-ip-validation
Improve cidr validation in setup and match ip validation to similar method
2021-11-12 13:34:19 -05:00
Wes Lambert 2fb9196604 Move logic above version declaration 2021-11-12 18:26:21 +00:00
Wes Lambert 48c71c8b12 Add soc pillar entry 2021-11-12 18:23:09 +00:00
weslambert 8d185ced61 Merge pull request #6209 from Security-Onion-Solutions/fix/endgame_setup
Adjust manager pillar config for Endgame and defaults
2021-11-12 12:27:55 -05:00
William Wernert 9141c271f0 Fix indent 2021-11-12 12:25:32 -05:00
weslambert bc2e470da9 Fix indentation 2021-11-12 12:20:00 -05:00
weslambert 0f817cd735 Merge pull request #6208 from Security-Onion-Solutions/fix/endgame_pivot
Make Endgame pivot independent
2021-11-12 12:17:24 -05:00
weslambert df5901a65d Adjust how manager pillar is populated for ENDGAME and default SOC config 2021-11-12 12:16:26 -05:00
weslambert 3cd1b5687e Make pivot condition independent for ENDGAMEHOST 2021-11-12 12:06:39 -05:00
Josh Patterson 86a42addf0 Merge pull request #6207 from Security-Onion-Solutions/so_elastic_auth_password_reset
https://github.com/Security-Onion-Solutions/securityonion/issues/6206
2021-11-12 11:43:31 -05:00
m0duspwnens 6bf4d5a576 https://github.com/Security-Onion-Solutions/securityonion/issues/6206 2021-11-12 11:37:55 -05:00
William Wernert efa5eb9f7f Merge pull request #6184 from Security-Onion-Solutions/foxtrot
Whiptail changes
2021-11-11 13:57:07 -05:00
Josh Patterson 22959f0260 Merge pull request #6195 from Security-Onion-Solutions/issue/6146
Issue/6146
2021-11-11 11:47:33 -05:00
m0duspwnens 8da2133cff give kibana.secrets pillar to import node 2021-11-11 11:31:07 -05:00
William Wernert 1472af4fc3 Merge branch 'dev' into foxtrot 2021-11-11 09:03:05 -05:00
Josh Brower f91a6d3cb6 Merge pull request #6194 from Security-Onion-Solutions/fix/fleetstandalone
Add Fleet Standalone Node to manager ssl
2021-11-11 08:52:29 -05:00
Josh Brower 96f427d924 Add so-fleet to cert requirements 2021-11-11 08:45:22 -05:00
Josh Brower 184356618c Add Fleet Standalone Node to manager ssl 2021-11-11 08:28:22 -05:00
William Wernert ed3b2e4569 Put entire ref to doc page on new line 2021-11-10 17:46:35 -05:00
William Wernert 62b41af069 Fix docs link being cut off 2021-11-10 17:17:19 -05:00
William Wernert 569cb24861 Use python lib to make cidr validation more strict
Also update ipv4 validation to match the method used to validate cidr strings
2021-11-10 16:53:01 -05:00
William Wernert ac22df8381 Merge branch 'dev' into foxtrot 2021-11-10 16:51:31 -05:00
Mike Reeves 446d6bd532 Merge pull request #6189 from Security-Onion-Solutions/soup2390
Soup2390
2021-11-10 16:49:46 -05:00
Mike Reeves fcf889be2f Add soup to 2.3.90 2021-11-10 16:46:24 -05:00
Mike Reeves 8168f19b31 Add soup to 2.3.90 2021-11-10 16:37:54 -05:00
Mike Reeves ba553d971c Add soup to 2.3.90 2021-11-10 16:31:44 -05:00
Mike Reeves 9137454a25 Add soup placeholders 2021-11-10 16:08:07 -05:00
m0duspwnens 7ebd861e32 enable secureCookies, security.encryptionKey and reporting.encryptionKey - https://github.com/Security-Onion-Solutions/securityonion/issues/6146 2021-11-10 16:05:40 -05:00
William Wernert d110b63050 Merge pull request #6187 from Security-Onion-Solutions/fix/so-rule-modify-example
Fix `so-rule modify` example
2021-11-10 14:31:28 -05:00
William Wernert 3806f10f8b Fix so-rule modify example 2021-11-10 14:18:32 -05:00
Jason Ertel 83bd314a63 Merge pull request #6186 from Security-Onion-Solutions/kilo
Upgrade to ES 7.15.2
2021-11-10 14:06:08 -05:00
Jason Ertel 6cd7b252df Upgrade to ES 7.15.2 2021-11-10 13:59:55 -05:00
Jason Ertel dea03bbf5e Upgrade to ES 7.15.2 2021-11-10 13:44:20 -05:00
Josh Brower 9edc543262 Merge pull request #6183 from Security-Onion-Solutions/delta
Upgrade FleetDM to 4.5
2021-11-10 11:35:12 -05:00
Josh Brower d3dc5ffc5a Fix salt syntax 2021-11-10 11:28:48 -05:00
William Wernert 2c296e832f Remove references to CURCLOSEDAYS in setup
Curator is configured differently now so the variable set during setup is no longer in use
2021-11-10 11:25:51 -05:00
Josh Brower b350174df1 Merge remote-tracking branch 'remotes/origin/dev' into delta 2021-11-10 11:08:36 -05:00
Josh Brower 67ebfeab16 Disable FleetDM usage stats 2021-11-10 10:49:56 -05:00
Josh Brower 435f430747 Fix enroll secret parsing 2021-11-10 10:24:53 -05:00
Josh Patterson aa9e1701f0 Merge pull request #6180 from Security-Onion-Solutions/issue/5794
timeout wazuh-register-agent faster
2021-11-10 09:58:05 -05:00
m0duspwnens 02d9b87f66 https://github.com/Security-Onion-Solutions/securityonion/issues/5794 2021-11-10 09:54:51 -05:00
Josh Patterson cfd46c1e58 Merge pull request #6176 from Security-Onion-Solutions/bravo
Grafana improvements, pillarize kibana
2021-11-10 09:18:47 -05:00
m0duspwnens 392305e4ed add engame changes that were missing from merge somehow 2021-11-10 09:01:42 -05:00
m0duspwnens 5ff14ab652 Merge remote-tracking branch 'origin/issue/6007' into bravo 2021-11-09 18:31:56 -05:00
m0duspwnens 1890c7244a set elasticsearch:auth to persist through user pw change 2021-11-09 18:25:17 -05:00
m0duspwnens a8c4ed7bbf set elasticsearch:auth:enabled True in auth pillar 2021-11-09 18:05:05 -05:00
m0duspwnens 91f54537d7 handle elasticsearch.auth state like kibana.secrets 2021-11-09 17:52:38 -05:00
m0duspwnens 7e3a4656aa change xpack update 2021-11-09 17:33:09 -05:00
m0duspwnens 8a04fcd919 change how key is added 2021-11-09 17:07:20 -05:00
m0duspwnens 409ab623a5 ensure kibana pillar dir exists 2021-11-09 16:49:45 -05:00
m0duspwnens ac85d1598e dont show changes 2021-11-09 16:44:54 -05:00
m0duspwnens 4c8e68e014 Merge remote-tracking branch 'remotes/origin/dev' into issue/3933 2021-11-09 16:42:47 -05:00
m0duspwnens 57c6e26634 encrypt kibana saved objects - https://github.com/Security-Onion-Solutions/securityonion/issues/6146 2021-11-09 16:41:25 -05:00
m0duspwnens b6a1d7418e fix typo, dont show changes for kibana.yaml or dashboard so 2021-11-09 16:14:48 -05:00
weslambert 6eb1a0b0ae Merge pull request #6169 from Security-Onion-Solutions/fix/ingest_dynamic_ref
Add dynamic conf to config change check
2021-11-09 16:11:38 -05:00
weslambert 9301b8f5b9 Add dynamic conf to config change check 2021-11-09 15:56:52 -05:00
m0duspwnens 202977a323 create so script to load saved object defaults 2021-11-09 15:54:15 -05:00
weslambert 9597373e4a Merge pull request #6167 from Security-Onion-Solutions/ecs_pipeline_common
Add config for dynamically formatted ingest pipelines
2021-11-09 15:41:43 -05:00
Wes Lambert f80b70e008 Add config for dynamically formatted ingest pipelines 2021-11-09 20:07:53 +00:00
William Wernert 04d2b52306 Fix IP route whiptail error 2021-11-09 14:03:32 -05:00
m0duspwnens af7830c2be remove reference to saved_objects in defaults 2021-11-09 13:52:47 -05:00
m0duspwnens 3c3cb47b88 merge with dev 2021-11-09 13:07:35 -05:00
m0duspwnens da4e92a7a3 change config id 2021-11-09 12:13:28 -05:00
Mike Reeves 3afb0bd263 Merge pull request #6161 from Security-Onion-Solutions/sslchange
Enable Subject Alt Name for registry
2021-11-09 10:53:38 -05:00
Josh Brower f6e6b20392 Add Name and OrgName to Fleet setup 2021-11-09 09:20:47 -05:00
William Wernert 3835a4401e Merge pull request #6157 from Security-Onion-Solutions/foxtrot
Fix preflight script on centos
2021-11-09 08:49:46 -05:00
William Wernert 4bae57d994 Fix preflight printing to log 2021-11-09 08:34:02 -05:00
William Wernert ea7289d92e Fix preflight script on centos 2021-11-09 08:20:19 -05:00
m0duspwnens 48eaf190e9 Merge remote-tracking branch 'remotes/origin/dev' into issue/6007 2021-11-08 17:00:06 -05:00
m0duspwnens 497de0fede hide vars on pipeline overview 2021-11-08 16:54:39 -05:00
m0duspwnens 70e3bc7eb8 hide vars on pipeline overview 2021-11-08 16:52:15 -05:00
Mike Reeves eefc9cfcb6 Enable Subject Alt Name for registry 2021-11-08 16:50:43 -05:00
m0duspwnens 42b8955883 panel cleanup 2021-11-08 16:33:57 -05:00
m0duspwnens f6b753b805 panel cleanup 2021-11-08 16:26:41 -05:00
m0duspwnens 17fc03a553 pipleine overview tc changes 2021-11-08 16:15:42 -05:00
weslambert 8bf88043ac Merge pull request #6149 from Security-Onion-Solutions/add_test_pipeline
Add ECS testing pipeline
2021-11-08 15:43:03 -05:00
m0duspwnens 79640342f2 update redis queue query 2021-11-08 15:20:28 -05:00
Mike Reeves 3ad47742bd Merge pull request #6150 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update acng.conf
2021-11-08 15:18:35 -05:00
Mike Reeves a8c02252dc Update acng.conf 2021-11-08 15:16:05 -05:00
m0duspwnens fbef420155 update redis queue query 2021-11-08 15:15:53 -05:00
m0duspwnens ccd84e441d add redis queue to pipeline overview 2021-11-08 15:09:46 -05:00
Wes Lambert 46d3eb452d Add ECS testing pipeline 2021-11-08 20:08:56 +00:00
Josh Brower 083d467aa9 Update to FleetDM 4.5 2021-11-08 15:05:58 -05:00
m0duspwnens f026ac1b41 pipeline overview tc changes 2021-11-08 15:02:52 -05:00
m0duspwnens 9ea292b11e fix query 2021-11-08 13:48:33 -05:00
m0duspwnens e2ee460fdd fix gridPos 2021-11-08 12:39:23 -05:00
m0duspwnens 5b70ff61d1 fix gridPos 2021-11-08 12:37:03 -05:00
m0duspwnens 3b2ca89852 use endif not fi 2021-11-08 12:20:07 -05:00
m0duspwnens 199c97684c fix nontc name in defaults 2021-11-08 12:10:23 -05:00
m0duspwnens d67e34dac4 add pipeline overview for true cluster 2021-11-08 12:09:35 -05:00
William Wernert 49a573074e Merge pull request #6142 from Security-Onion-Solutions/foxtrot
Whiptail changes
2021-11-08 11:29:58 -05:00
William Wernert 6c16d6d222 Update invalid hostname message 2021-11-08 11:15:28 -05:00
William Wernert acba82d194 Update dist install menus' top text 2021-11-08 11:04:51 -05:00
William Wernert f66d915f5d Normal hostname check already checks for localhost 2021-11-08 10:38:30 -05:00
William Wernert ee2dd75dfd Fix variable ref 2021-11-08 10:36:36 -05:00
William Wernert 50b7779d6e Make manager hostname error more specific 2021-11-08 10:35:28 -05:00
William Wernert ad71485361 Fix whiptail height 2021-11-08 10:21:55 -05:00
William Wernert 8b2cccdf4a More whiptail formatting 2021-11-08 10:21:17 -05:00
William Wernert dbe4a7de63 Fix new whiptail layouts 2021-11-08 10:19:38 -05:00
William Wernert 9c4bba9ac9 Fix variable reference 2021-11-08 10:08:23 -05:00
Doug Burks b3fd7c548c Merge pull request #6135 from Security-Onion-Solutions/dougburks-patch-1
Improve clarity in CONTRIBUTING.md
2021-11-08 08:53:50 -05:00
Doug Burks dcf6dfb676 Improve clarity 2021-11-08 06:38:16 -05:00
William Wernert 246d41c552 Add additional checks for manager hostname + ip
Check for current hostname, ip, and localhost (ip + string) when setting the manager ip and hostname
2021-11-05 15:56:08 -04:00
William Wernert 988932293f Whiptail changes
* Ask whether to join to or create new dist install
* Also add links to architecture on install type prompts
2021-11-05 15:54:17 -04:00
m0duspwnens 0b28e89f3c change how telegraf script determine if there is already and instance of the script already running 2021-11-04 23:22:13 -04:00
m0duspwnens 665732bd32 dont show points 2021-11-04 14:23:11 -04:00
m0duspwnens b599b49630 enable beat input plugin for telegraf 2021-11-04 13:52:45 -04:00
m0duspwnens edb3b602a9 pipeline overview dashboard changs 2021-11-04 10:59:01 -04:00
William Wernert a4289b7ab9 Merge pull request #6107 from Security-Onion-Solutions/foxtrot
Manage docker gid and run preflight check during setup
2021-11-04 10:07:05 -04:00
Mike Reeves 9b0ce8b395 Merge pull request #6090 from Security-Onion-Solutions/commonupdate
Make common template honor replicas
2021-11-03 14:04:19 -04:00
m0duspwnens 05456b38d1 update panel 2021-11-03 13:54:05 -04:00
m0duspwnens 4fc58e7a5a update panel 2021-11-03 13:51:57 -04:00
Mike Reeves dc07aba63d Update so-common-template.json.jinja 2021-11-03 13:50:31 -04:00
m0duspwnens f1d66e2d51 change searchnode var 2021-11-03 13:40:09 -04:00
m0duspwnens fab0dd2bad add repeating es ingest panel for nontc 2021-11-03 13:25:42 -04:00
Mike Reeves 747f14d60e Make common template honor replicas 2021-11-03 13:11:38 -04:00
William Wernert fb35ff40b4 Just hide whiptail cancel message on test installs 2021-11-03 10:41:44 -04:00
m0duspwnens 2cb31a4c05 fix query 2021-11-03 09:27:02 -04:00
m0duspwnens 32f986c505 change panel 2021-11-03 09:23:21 -04:00
m0duspwnens c8ee67f354 update panel for pipeline_overview 2021-11-03 09:12:32 -04:00
m0duspwnens db80315c06 rename panel 2021-11-03 08:37:33 -04:00
m0duspwnens 8e3b08a831 start of pipeline dashboard 2021-11-03 08:33:20 -04:00
m0duspwnens 677f62ebd1 dont show changes for telegraf conf 2021-11-02 18:22:37 -04:00
William Wernert d927e79154 Exit on failed preflight check during testing 2021-11-02 16:17:08 -04:00
William Wernert 8670aa6cd8 Run check-update in preflight instead of update 2021-11-02 14:29:58 -04:00
William Wernert 7c7c225a41 Fix tmp file check 2021-11-02 14:01:21 -04:00
m0duspwnens 54b034b537 fix spacing on es input 2021-11-02 13:43:59 -04:00
m0duspwnens 2232759fa4 rename file 2021-11-02 12:21:54 -04:00
m0duspwnens f65eea6a03 rename file 2021-11-02 12:09:32 -04:00
William Wernert e4a77acfe6 Move whiptail menus outside of progress func 2021-11-02 12:03:42 -04:00
William Wernert 9671dab2a3 Make so-preflight executable 2021-11-02 11:48:24 -04:00
William Wernert e6adb46364 Run so-preflight during setup 2021-11-02 11:18:23 -04:00
m0duspwnens 7abb2e5935 monitor interface graph total 2021-11-02 11:07:29 -04:00
m0duspwnens 561f86eac8 change eps graphs to use logstash data and not consumptioneps script 2021-11-02 11:06:29 -04:00
William Wernert 9a9d1480de Manage docker group's gid to prevent gid overlap 2021-11-02 10:41:36 -04:00
Josh Brower 8b52f87a60 Merge pull request #6066 from Security-Onion-Solutions/fix/evtx-import-elastic-creds
Fix/evtx import elastic creds
2021-11-02 09:25:25 -04:00
Josh Brower a6f399acf4 Fix evtx import logging 2021-11-02 09:19:32 -04:00
Josh Brower 3534256517 Add evtx import logging 2021-11-02 09:03:52 -04:00
m0duspwnens b109d95d6f add max to zeek capture loss legend 2021-11-02 09:02:48 -04:00
Josh Brower b756c0cd38 Pull ES Creds at Runtime 2021-11-02 08:57:11 -04:00
m0duspwnens 3517ea3f2a select last value for cpucount var 2021-11-02 08:41:57 -04:00
m0duspwnens 5d414c8bdd remove logstash row from manager 2021-11-02 08:36:13 -04:00
Josh Brower 2b56b53c15 Merge pull request #6064 from Security-Onion-Solutions/feature/support_non-wel_beats
Support non-WEL Beats
2021-11-02 08:29:48 -04:00
Josh Brower 2ba619144c Support non-WEL Beats 2021-11-02 08:23:29 -04:00
m0duspwnens a9be0a0409 create and add mon traffic combined graph to sensor dash 2021-11-02 07:55:39 -04:00
m0duspwnens bf116d210e mostly overview dash panel changes 2021-11-01 17:48:02 -04:00
William Wernert f8b62b63f9 Merge pull request #6061 from Security-Onion-Solutions/foxtrot
Fix NIC string values for VLAN tagged interfaces
2021-11-01 16:43:52 -04:00
m0duspwnens f4d9455872 revert to b63b50d98c 2021-11-01 16:10:13 -04:00
m0duspwnens 936c796b9d Revert "graph changes"
This reverts commit 8857fca797.
2021-11-01 15:19:50 -04:00
m0duspwnens 8ff122262c Revert "update many panels"
This reverts commit b63b50d98c.
2021-11-01 14:50:57 -04:00
m0duspwnens c4a1fbd82a remove old json 2021-11-01 14:39:03 -04:00
m0duspwnens 8857fca797 graph changes 2021-11-01 14:36:41 -04:00
m0duspwnens b63b50d98c update many panels 2021-11-01 14:06:01 -04:00
William Wernert c17187708e Merge branch 'dev' into foxtrot 2021-11-01 12:46:43 -04:00
Mike Reeves 095e6bd48c Merge pull request #6044 from Burak-PLT/patch-1
Update auth.sls
2021-11-01 10:22:16 -04:00
m0duspwnens c4b9244f9a add gridPos 2021-10-29 17:24:50 -04:00
m0duspwnens 2ba548fcfc grafana bug fixes and improvements - https://github.com/Security-Onion-Solutions/securityonion/issues/6007 2021-10-29 17:11:51 -04:00
William Wernert f76a52b2ee Fix NIC string values for VLAN tagged interfaces 2021-10-29 13:34:23 -04:00
William Wernert b555ad16da Merge pull request #6052 from Security-Onion-Solutions/foxtrot
Foxtrot
2021-10-29 10:52:51 -04:00
William Wernert b1c67f696e Re-order logic to maintain backwards compatibility 2021-10-29 10:47:05 -04:00
William Wernert d08149f728 Don't set INTERWEBS variable on automated minions 2021-10-29 10:11:47 -04:00
William Wernert a5cba5ecf8 Merge branch 'dev' into foxtrot 2021-10-29 10:01:46 -04:00
Burak-PLT f081938be5 Update auth.sls
Change default password lengths to 72 characters from 20.
2021-10-28 16:00:58 -04:00
William Wernert c2b18efdbb Minions still need to be ISO installs to be airgap 2021-10-28 11:59:42 -04:00
William Wernert 6b480a5ba4 Change airgap check to something that doesn't require root 2021-10-28 11:51:50 -04:00
William Wernert d6eeb0b735 Gen ssh key sooner 2021-10-28 10:04:03 -04:00
Josh Patterson 3000c57428 Merge pull request #6039 from Security-Onion-Solutions/issue/5759
Issue/5759
2021-10-28 09:24:44 -04:00
m0duspwnens 5c5b4004e9 Merge remote-tracking branch 'remotes/origin/dev' into issue/5759 2021-10-28 08:52:04 -04:00
Josh Patterson 05e0f92ec5 Merge pull request #6036 from Security-Onion-Solutions/issue/5955
include ssl state in telegraf state
2021-10-28 08:50:57 -04:00
m0duspwnens 0cea5e8f22 include ssl state in telegraf state 2021-10-28 08:46:27 -04:00
m0duspwnens 7eb42fa6bd change boolean 2021-10-28 08:43:03 -04:00
m0duspwnens 18ce9c7819 disable zeekpacketlosscron and telegraf checks if zeek is diabled via pillar 2021-10-28 07:46:02 -04:00
Mike Reeves b3e5319806 Merge pull request #6028 from Security-Onion-Solutions/telecluster
Enable cluster stats
2021-10-27 16:37:42 -04:00
Mike Reeves c8c8cf203f Enable cluster stats 2021-10-27 15:44:52 -04:00
Josh Patterson 19056b9177 Merge pull request #6027 from Security-Onion-Solutions/issue/5955
Issue/5955
2021-10-27 15:07:22 -04:00
William Wernert 75490a2536 Fix typo 2021-10-27 14:59:24 -04:00
William Wernert eee612e73d Make folder/file states explicit
Rather than using /nsm/zeek (max_depth: 1) create explicit states for /nsm/zeek/spool and /nsm/zeek/spool/state.db that set correct ownership
2021-10-27 11:43:09 -04:00
William Wernert 9e9079f9cb Reorder airgap prompt and add additional logic
Setup should now only ask the user whether to setup as airgap on manager-type installs. For all distributed minions setup will now inherit the airgap boolean from the manager.
2021-10-27 11:03:00 -04:00
William Wernert 331801eec2 Merge branch 'dev' into foxtrot 2021-10-27 10:58:16 -04:00
William Wernert a0216cea57 Merge pull request #6021 from Security-Onion-Solutions/fix/update-mysql-root-user
Update ip for root user in mysql when running so-ip-update
2021-10-27 10:55:11 -04:00
m0duspwnens e7f43cff5e limit nodes that bind filebeat certs in so-logstash 2021-10-27 10:45:10 -04:00
William Wernert 90d473f2d6 Update ip for root user in mysql when running so-ip-update 2021-10-27 10:42:33 -04:00
m0duspwnens bf403a8307 only manager nodes get cert, key and att&ck binds 2021-10-27 09:47:12 -04:00
m0duspwnens 58d62f29ea include ssl state in registry state 2021-10-26 11:55:47 -04:00
Mike Reeves bcf03773c0 Merge pull request #6009 from Security-Onion-Solutions/stenoports
Remove port bindings for steno
2021-10-26 10:58:11 -04:00
m0duspwnens c0dd9efd9b change so-thehive-es binds and requires 2021-10-26 10:50:16 -04:00
m0duspwnens 36ae07b78e change timeout from 60 to 120 2021-10-26 10:49:50 -04:00
Mike Reeves d77328608e Remove port bindings for steno
Steno runs in host mode so port bindings are not required
2021-10-26 10:23:33 -04:00
m0duspwnens 682cbfd223 remove the mode 2021-10-26 09:23:24 -04:00
m0duspwnens fa2edb2b59 make cortex_init and hive_init time out after 1 minutes vs 5 minutes 2021-10-26 08:39:30 -04:00
m0duspwnens 0c679b62b2 Merge remote-tracking branch 'remotes/origin/dev' into issue/5955 2021-10-25 16:29:41 -04:00
m0duspwnens 7e8d74e770 just use mode 2021-10-25 15:50:27 -04:00
m0duspwnens 9a78d13bee change perms on mysql 2021-10-25 15:37:23 -04:00
Jason Ertel c469d12a49 Merge pull request #6002 from Security-Onion-Solutions/kilo
Update whiptail links to use latest docs
2021-10-25 15:08:31 -04:00
Jason Ertel d5f42e0d7c Update whiptail links to use latest docs 2021-10-25 15:06:42 -04:00
weslambert 926551d398 Merge pull request #5998 from Security-Onion-Solutions/fix/hl_host_name
Rename HTTP client headers and host
2021-10-25 13:21:11 -04:00
weslambert 3be0d05eea Update field removal based on HTTP input changes 2021-10-25 13:16:30 -04:00
weslambert 7fa43a276a Rename default headers and host for HTTP input 2021-10-25 13:15:20 -04:00
William Wernert 2bfedbd581 Merge pull request #5996 from Security-Onion-Solutions/fix/escape-node-desc
Escape single quotes and allow for any character in node description
2021-10-25 10:53:36 -04:00
William Wernert dca30146ab Merge branch 'dev' into foxtrot 2021-10-25 10:50:25 -04:00
William Wernert 6e34905b42 Escape single quotes and allow for any character in node description 2021-10-25 10:48:09 -04:00
m0duspwnens ee7e714f43 change to file_mode 2021-10-22 16:55:23 -04:00
m0duspwnens d7e5377a44 more requires 2021-10-22 16:46:45 -04:00
William Wernert 38b16a507b Update ip for root user in mysql when running so-ip-update 2021-10-22 15:29:32 -04:00
William Wernert 17af513692 Escape single quotes and allow for any character in node description 2021-10-22 15:28:37 -04:00
m0duspwnens 283f7296bc fix require 2021-10-22 14:45:22 -04:00
m0duspwnens 9f6407fcb0 fix dupe ids 2021-10-22 14:26:04 -04:00
m0duspwnens f61400680d fix dupe ids 2021-10-22 14:22:15 -04:00
m0duspwnens fed8bfac67 more requires on docker containers 2021-10-22 14:10:59 -04:00
William Wernert 62971d8c15 Add Fleet custom hostname to end summary 2021-10-22 11:57:47 -04:00
William Wernert 352e30f9e1 Add CUSTOM_FLEET_HOSTNAME to subjectAltName of fleet.key
Resolves #4319
2021-10-22 11:16:29 -04:00
m0duspwnens 451b19dc4d change from file to x509 2021-10-22 09:53:20 -04:00
William Wernert d5d970672d Merge pull request #5974 from Security-Onion-Solutions/foxtrot
Add so-deny script + rewrite so-allow to match
2021-10-21 16:37:05 -04:00
m0duspwnens f93c6146f5 docker binds requires 2021-10-21 15:24:55 -04:00
weslambert 40dd33affe Merge pull request #5971 from Security-Onion-Solutions/feature/es_templates
Add .keyword subfield for conflict fields
2021-10-21 15:07:00 -04:00
William Wernert f374dcbb58 Check for IP environment variable in so-allow and so-deny 2021-10-21 13:54:06 -04:00
weslambert 77ee1db44c Add .keyword subfield for conflict fields 2021-10-21 12:56:03 -04:00
Josh Patterson 8784d65023 Merge pull request #5967 from Security-Onion-Solutions/issue/5954
require files before starting soc or kratos
2021-10-21 11:15:36 -04:00
William Wernert 15fe7512b7 Install lxml during setup and in common state 2021-10-21 10:49:41 -04:00
William Wernert 0beeeb94bf Actually add new so-allow script 2021-10-21 10:48:17 -04:00
m0duspwnens 928aed27c5 require files before starting soc or kratos 2021-10-20 17:04:02 -04:00
William Wernert 387d4d6ad5 Add so-deny script + rewrite so-allow to match so-deny 2021-10-20 16:44:57 -04:00
William Wernert adf6cb4b3c Merge branch 'dev' into foxtrot 2021-10-20 16:44:50 -04:00
William Wernert 0ed2ce0766 Fix validation.sh tests 2021-10-20 16:44:09 -04:00
William Wernert b5cb47e066 Fix sbin perms 2021-10-20 16:43:55 -04:00
Josh Patterson 8061508330 Merge pull request #5961 from Security-Onion-Solutions/issue/5960
Issue/5960
2021-10-20 16:08:50 -04:00
m0duspwnens adffb11800 fix redis port 2021-10-20 15:39:21 -04:00
m0duspwnens 8619af59cc servers to list format 2021-10-20 15:02:33 -04:00
m0duspwnens 7ecfb55b70 fix pillar call 2021-10-20 14:50:50 -04:00
m0duspwnens b496810b63 add redis and logstash input plugins to telegraf 2021-10-20 14:46:47 -04:00
Mike Reeves e1ad02c28d Merge pull request #5949 from Security-Onion-Solutions/kilo
Fix Docker-created corruption of SOC user roles file
2021-10-19 18:37:37 -04:00
Jason Ertel 2f8bb5a2a6 Fix Docker-created corruption of SOC user roles file 2021-10-19 16:04:10 -04:00
weslambert 6f3e441bf7 Merge pull request #5945 from Security-Onion-Solutions/fix/soc_index_pattern
Remove space to allow pattern(s) to be correctly interpreted
2021-10-19 13:05:40 -04:00
Mike Reeves 7f1585dcc0 Merge pull request #5942 from Security-Onion-Solutions/tunesteno
Fix Steno Math for PL
2021-10-19 13:03:50 -04:00
weslambert 9453ed7fa1 Remove space to allow pattern(s) to be correctly interpreted 2021-10-19 13:01:40 -04:00
Mike Reeves 64f25961b0 Fix Steno Math for PL 2021-10-19 11:15:58 -04:00
Mike Reeves b9a3d3a6a9 Fix Steno Math for PL 2021-10-19 11:14:02 -04:00
m0duspwnens 36cb0d6c42 remove space 2021-10-18 14:34:33 -04:00
m0duspwnens 1b2268dfe5 load kibana configs during setup 2021-10-18 14:30:47 -04:00
Mike Reeves 00e5b54dda Merge pull request #5911 from Security-Onion-Solutions/tunesteno
Add Steno Tuning Options
2021-10-18 09:01:14 -04:00
Mike Reeves 4016b416ec Merge pull request #5923 from Security-Onion-Solutions/kilo
Upgrade to ES 7.15.1
2021-10-16 09:15:06 -04:00
weslambert 7590728a0b Merge pull request #5915 from Security-Onion-Solutions/feature/ti_module
Add TI module
2021-10-15 17:17:33 -04:00
weslambert bb36fc1ed8 Add TI module defaults 2021-10-15 17:16:38 -04:00
weslambert d0a6dafc8b Add TI module 2021-10-15 17:09:59 -04:00
m0duspwnens 76097476d3 remove includes 2021-10-15 16:57:38 -04:00
m0duspwnens 8b3b0bf160 fix opts 2021-10-15 16:51:11 -04:00
m0duspwnens f19680b3e6 fix opts 2021-10-15 16:50:03 -04:00
m0duspwnens 7e1bbe3cc2 define MAANGER 2021-10-15 16:14:14 -04:00
m0duspwnens 947285e932 update cmd.run amd s_o files 2021-10-15 16:06:25 -04:00
m0duspwnens 1741f5068a update config-load to do an update or import 2021-10-15 15:35:30 -04:00
Mike Reeves a9f6c84d7c Add Steno Tuning Options 2021-10-15 14:17:54 -04:00
weslambert 59852841ff Add keyword subfield for event.module 2021-10-15 13:29:50 -04:00
weslambert 6f1f7d2a63 Merge pull request #5905 from Security-Onion-Solutions/feature/soc_es_index_pattern
Allow setting ES index patterns for SOC in pillar
2021-10-15 13:28:04 -04:00
Jason Ertel 8de8d58155 Upgrade to ES 7.15.1 2021-10-15 13:27:08 -04:00
Wes Lambert 8feeff97b5 Add EG index pattern during setup (if enabled) 2021-10-15 16:19:19 +00:00
Wes Lambert 032373187c Allow setting ES index patterns for SOC in pillar 2021-10-15 16:02:53 +00:00
William Wernert db2b70f655 Merge pull request #5900 from Security-Onion-Solutions/foxtrot
Replace rather than append to Kibana misc log
2021-10-15 10:27:25 -04:00
Jason Ertel 1800ec4570 Upgrade to Elastalert 2 v2.2.2 2021-10-15 09:25:44 -04:00
Mike Reeves 8a5960c220 Merge pull request #5896 from Security-Onion-Solutions/kilo 2021-10-14 18:05:33 -04:00
Jason Ertel 9797a15218 Fix issue with 'so-user delete' resetting all user roles - note that this function is not technically supported or published since it's not intended for production use 2021-10-14 17:23:18 -04:00
William Wernert c7b15a9b1f Replace rather than append to Kibana misc log 2021-10-14 15:13:55 -04:00
William Wernert cba97802fe Fix indent 2021-10-14 15:13:34 -04:00
William Wernert 025256aeaf Merge pull request #5890 from Security-Onion-Solutions/foxtrot
Misc setup changes
2021-10-14 14:55:24 -04:00
weslambert 490f7eaf81 Merge pull request #5886 from Security-Onion-Solutions/feature/eg_pivot
Add EG pivot
2021-10-14 14:49:38 -04:00
m0duspwnens 6a2bf11a75 change format of file 2021-10-14 13:43:39 -04:00
m0duspwnens 78d30285b1 seperate securitySolutions load 2021-10-14 13:24:51 -04:00
Wes Lambert f1fafa015e Add EG to list of groups to include 127.0.0.1 2021-10-14 16:27:28 +00:00
Wes Lambert 6cdc214582 Add pillar in setup and change name of EG variable 2021-10-14 15:33:37 +00:00
Wes Lambert 15049f44b9 Add EG pivot 2021-10-14 15:15:23 +00:00
Doug Burks 42a642b85c Merge pull request #5873 from petiepooo/enh-rediscount-tty
featreq: remove tty flag in redis-count script
2021-10-14 10:07:07 -04:00
weslambert 3b45e68ead Merge pull request #5885 from Security-Onion-Solutions/feature/jinjafy_soc_actions
Allow SOC actions to use Jinja
2021-10-14 10:03:12 -04:00
Wes Lambert 5ee0ea3fe7 Allow SOC actions to use Jinja 2021-10-14 13:59:55 +00:00
weslambert 55c60f485c Merge pull request #5884 from Security-Onion-Solutions/feature/hl_eg
Add EG firewall allowance via setup
2021-10-14 09:55:07 -04:00
Wes Lambert 78e88e0765 Add EG firewall allowance via setup 2021-10-13 21:42:54 +00:00
Wes Lambert a9b250c0f4 Add EG firewall config 2021-10-13 21:37:59 +00:00
m0duspwnens ae9753326a fix var, quote vars 2021-10-13 16:38:01 -04:00
m0duspwnens c8fb504ee0 Revert "Merge remote-tracking branch 'remotes/origin/dev' into issue/3933"
This reverts commit 54eec92621, reversing
changes made to 7832e59629.
2021-10-13 15:22:46 -04:00
m0duspwnens 54eec92621 Merge remote-tracking branch 'remotes/origin/dev' into issue/3933 2021-10-13 15:19:33 -04:00
m0duspwnens 7832e59629 only load default kibana saved_objects during setup 2021-10-13 15:19:20 -04:00
weslambert f9001654bb Merge pull request #5871 from Security-Onion-Solutions/feature/hl_eg
Initial EG stuff
2021-10-13 15:07:03 -04:00
Wes Lambert 2a504a061b Add Curator action files for EG indices 2021-10-13 18:40:34 +00:00
m0duspwnens bb9c6446e4 Merge remote-tracking branch 'remotes/origin/dev' into issue/3933 2021-10-13 14:01:36 -04:00
Pete e7581036f7 remove tty/interactive flags
This call to docker exec simply returns a number.  No interaction (stdin) or tty is required.  Specifically, having the -t option prevents running via salt using a command such as:

> salt '*' cmd.run 'so-redis-count'
2021-10-13 13:51:05 -04:00
Wes Lambert e1629d7ec4 Initial EG stuff 2021-10-13 17:13:07 +00:00
Josh Patterson b4873bd296 Merge pull request #5868 from Security-Onion-Solutions/issue/5818
Issue/5818
2021-10-13 12:52:48 -04:00
m0duspwnens 3044edb104 update comment 2021-10-13 12:38:58 -04:00
m0duspwnens a495779552 only 3 attempts with 120s max attemps 2021-10-13 12:34:56 -04:00
m0duspwnens 880c1b97b0 remove $ from var 2021-10-13 12:25:11 -04:00
m0duspwnens 7a4fa8879c change count, attempts and timeout 2021-10-13 12:13:24 -04:00
m0duspwnens adb8292814 add missing ) 2021-10-13 10:37:18 -04:00
m0duspwnens 6e7a5fa326 add timeouts to check_salt_minion_status and check_salt_master_status - https://github.com/Security-Onion-Solutions/securityonion/issues/5818 2021-10-13 09:45:15 -04:00
m0duspwnens 23ea53248d single line format 2021-10-12 14:15:37 -04:00
m0duspwnens f1a5991699 add securitySolution.defaultIndex to defaults 2021-10-12 12:35:13 -04:00
m0duspwnens c69ad091f7 update saved_objects config 2021-10-12 12:02:30 -04:00
William Wernert b97361fab9 Remove references to xenial in setup
Resolves #4292
2021-10-12 10:23:39 -04:00
William Wernert 36e1795295 Add end of setup log messages per #5032 2021-10-12 10:19:47 -04:00
m0duspwnens 498e385484 change name to SAVED_OBJECTS 2021-10-12 10:15:39 -04:00
William Wernert af687b0706 Remove all holds on Ubuntu reinstall 2021-10-12 10:10:34 -04:00
m0duspwnens 19489f3626 Merge remote-tracking branch 'remotes/origin/dev' into issue/3933 2021-10-12 10:07:40 -04:00
m0duspwnens 89d1df8a1d change name to SAVED_OBJECTS 2021-10-12 10:07:26 -04:00
William Wernert 946cf81a27 If ANALYST is selected immediately quit setup 2021-10-12 09:48:38 -04:00
Mike Reeves 2561480371 Merge pull request #5850 from Security-Onion-Solutions/kilo
Upgrade to Kratos 0.7.6-alpha.1
2021-10-12 08:19:25 -04:00
Jason Ertel d21dee162d Add Note field to user traits; Enforce max length restrictions on email, firstname, lastname, and note fields 2021-10-08 12:39:17 -04:00
Mike Reeves 444d067112 Merge pull request #5813 from Security-Onion-Solutions/macleod
Highlander changes
2021-10-08 10:06:18 -04:00
Mike Reeves 2a82373051 highlander fixes 2021-10-08 09:32:13 -04:00
Mike Reeves 64758a534c Set ml to true 2021-10-08 08:42:26 -04:00
m0duspwnens 7517a63008 disabled ml 2021-10-07 13:06:52 -04:00
m0duspwnens b2facdf31c add securitySolutions advanced setting 2021-10-07 12:57:28 -04:00
m0duspwnens 4c54d6309c change host to 0.0.0.0 2021-10-07 09:59:29 -04:00
Jason Ertel 62c3afc81d Migrate users from locked to inactive during soup 2021-10-06 15:45:35 -04:00
Jason Ertel 7d8c8144b0 Drop obsolete status trait 2021-10-06 12:52:41 -04:00
Jason Ertel a2c4fce1ef Switch to use state attribute in identities for enabling/disabling users 2021-10-06 11:53:10 -04:00
m0duspwnens 599aba43d9 restart so-kibaba if config changes 2021-10-06 09:51:16 -04:00
m0duspwnens fa4f92cdda change defaults 2021-10-05 17:35:44 -04:00
m0duspwnens 5d98c0d14c fix dict update 2021-10-05 15:57:57 -04:00
Mike Reeves 27614569e3 Fix set 2021-10-05 14:32:02 -04:00
m0duspwnens ec357cca3c fix cars 2021-10-05 12:57:30 -04:00
m0duspwnens 26681ac98a var for dash saved objevs 2021-10-05 12:46:21 -04:00
m0duspwnens 748f0f2a1d Merge remote-tracking branch 'remotes/origin/dev' into issue/3933 2021-10-05 12:12:56 -04:00
Mike Reeves 869af548af Fix spaces for highlander 2021-10-05 11:06:13 -04:00
Mike Reeves 2fd344822d Add additional roles for highlander 2021-10-05 10:40:40 -04:00
Mike Reeves a3e0fb127a Merge pull request #5069 from datlife/datlife/asn-annotation
Add ASN annotation for IP
2021-10-05 06:50:31 -04:00
Dat 9569e73bd0 Added ASN annotation for IP 2021-10-04 12:41:20 -07:00
m0duspwnens 96d783b158 merge with dev 2021-10-04 10:39:48 -04:00
m0duspwnens e0c097c270 add dashboard theme defaults 2021-10-04 10:36:58 -04:00
Mike Reeves e6fce4cf3e Merge pull request #5749 from Security-Onion-Solutions/kilo
Use safe_load to avoid warnings - credit to @clairmont32
2021-10-04 08:55:53 -04:00
Jason Ertel 6ef9a5c95d Use safe_load to avoid warnings - credit to @clairmont32 2021-10-04 08:53:25 -04:00
Mike Reeves 727613b6e1 Merge pull request #5601 from Security-Onion-Solutions/special
Ubuntu 20.04 Beta
2021-10-04 08:51:01 -04:00
Mike Reeves 5013aa8490 Merge pull request #5748 from Security-Onion-Solutions/kilo
Merge ES Upgrade, Version Bump into dev
2021-10-04 08:48:07 -04:00
Jason Ertel 72a1b299ac Bump to 2.3.90 2021-10-04 08:44:51 -04:00
m0duspwnens bb95963d73 add missing {{}} 2021-09-30 14:40:13 -04:00
m0duspwnens dfa9afde0e change to mode 2021-09-30 14:33:52 -04:00
m0duspwnens fa2333b9ef change t file.managed 2021-09-30 14:32:28 -04:00
m0duspwnens 8b9c43915d fix source 2021-09-30 14:30:00 -04:00
m0duspwnens 36832139b2 pillarize kibana 2021-09-30 14:28:31 -04:00
m0duspwnens c3bf835566 kibana config 2021-09-30 14:23:49 -04:00
m0duspwnens 39d3c7c6ed begin pillarization of kibana 2021-09-30 11:48:42 -04:00
Jason Ertel b1a5527e82 Update ElastAlert to use ElastAlert 2 2021-09-28 07:01:47 -04:00
Jason Ertel d0592c4293 Update ElastAlert to use ElastAlert 2 2021-09-28 00:51:29 -04:00
William Wernert 98f74c25ba Fix variable reference in so-functions 2021-09-24 12:32:56 -04:00
Mike Reeves c1537335b1 Fix Python Problem 2021-09-20 19:05:01 -04:00
Mike Reeves 5f475ff9cb Fix Python Problem 2021-09-20 18:46:43 -04:00
Mike Reeves 481ffb1cda Fix Grain 2021-09-20 18:12:18 -04:00
Mike Reeves 50b78681f2 Ubuntu 20.04 Support 2021-09-20 17:24:47 -04:00
479 changed files with 20057 additions and 9491 deletions
+8 -1
View File
@@ -15,7 +15,7 @@
### Contributing code ### Contributing code
* **All commits must be signed** with a valid key that has been added to your GitHub account. The commits should have all the "**Verified**" tag when viewed on GitHub as shown below: * **All commits must be signed** with a valid key that has been added to your GitHub account. Each commit should have the "**Verified**" tag when viewed on GitHub as shown below:
<img src="./assets/images/verified-commit-1.png" width="450"> <img src="./assets/images/verified-commit-1.png" width="450">
@@ -29,6 +29,11 @@
* See this document's [code styling and conventions section](#code-style-and-conventions) below to be sure your PR fits our code requirements prior to submitting. * See this document's [code styling and conventions section](#code-style-and-conventions) below to be sure your PR fits our code requirements prior to submitting.
* Change behavior (fix a bug, add a new feature) separately from refactoring code. Refactor pull requests are welcome, but ensure your new code behaves exactly the same as the old.
* **Do not refactor code for non-functional reasons**. If you are submitting a pull request that refactors code, ensure the refactor is improving the functionality of the code you're refactoring (e.g. decreasing complexity, removing reliance on 3rd party tools, improving performance).
* Before submitting a PR with significant changes to the project, [start a discussion](https://github.com/Security-Onion-Solutions/securityonion/discussions/new) explaining what you hope to acheive. The project maintainers will provide feedback and determine whether your goal aligns with the project.
### Code style and conventions ### Code style and conventions
@@ -37,3 +42,5 @@
* All new Bash code should pass [ShellCheck](https://www.shellcheck.net/) analysis. Where errors can be *safely* [ignored](https://github.com/koalaman/shellcheck/wiki/Ignore), the relevant disable directive should be accompanied by a brief explanation as to why the error is being ignored. * All new Bash code should pass [ShellCheck](https://www.shellcheck.net/) analysis. Where errors can be *safely* [ignored](https://github.com/koalaman/shellcheck/wiki/Ignore), the relevant disable directive should be accompanied by a brief explanation as to why the error is being ignored.
* **Ensure all YAML (this includes Salt states and pillars) is properly formatted**. The spec for YAML v1.2 can be found [here](https://yaml.org/spec/1.2/spec.html), however there are numerous online resources with simpler descriptions of its formatting rules. * **Ensure all YAML (this includes Salt states and pillars) is properly formatted**. The spec for YAML v1.2 can be found [here](https://yaml.org/spec/1.2/spec.html), however there are numerous online resources with simpler descriptions of its formatting rules.
* **All code of any language should match the style of other code of that same language within the project.** Be sure that any changes you make do not break from the pre-existing style of Security Onion code.
+1
View File
@@ -0,0 +1 @@
20220202 20220203 20220301
+2 -2
View File
@@ -1,6 +1,6 @@
## Security Onion 2.3.80 ## Security Onion 2.3.100
Security Onion 2.3.80 is here! Security Onion 2.3.100 is here!
## Screenshots ## Screenshots
+11 -11
View File
@@ -1,18 +1,18 @@
### 2.3.80 ISO image built on 2021/09/27 ### 2.3.100-20220301 ISO image built on 2022/03/01
### Download and Verify ### Download and Verify
2.3.80 ISO image: 2.3.100-20220301 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.80.iso https://download.securityonion.net/file/securityonion/securityonion-2.3.100-20220301.iso
MD5: 24F38563860416F4A8ABE18746913E14 MD5: 53A992D6321B7C33440219BAD9157769
SHA1: F923C005F54EA2A17AB225ADA0DA46042707AAD9 SHA1: D730157F4847EB91393CF0C1A22410708312F605
SHA256: 8E95D10AF664D9A406C168EC421D943CB23F0D0C1813C6C2DBA9B4E131984018 SHA256: F6C0E55968ED1F0AA35CB9E1F7FF5BEB27673638A4F2223302B301360BC401A1
Signature for ISO image: Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.80.iso.sig https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.100-20220301.iso.sig
Signing key: Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO: Download the signature file for the ISO:
``` ```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.80.iso.sig wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.100-20220301.iso.sig
``` ```
Download the ISO image: Download the ISO image:
``` ```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.80.iso wget https://download.securityonion.net/file/securityonion/securityonion-2.3.100-20220301.iso
``` ```
Verify the downloaded ISO image using the signature file: Verify the downloaded ISO image using the signature file:
``` ```
gpg --verify securityonion-2.3.80.iso.sig securityonion-2.3.80.iso gpg --verify securityonion-2.3.100-20220301.iso.sig securityonion-2.3.100-20220301.iso
``` ```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below: The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
``` ```
gpg: Signature made Mon 27 Sep 2021 08:55:01 AM EDT using RSA key ID FE507013 gpg: Signature made Tue 01 Mar 2022 03:14:02 PM EST using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>" gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature! gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner. gpg: There is no indication that the signature belongs to the owner.
+1 -1
View File
@@ -1 +1 @@
2.3.80 2.3.100
@@ -16,6 +16,7 @@ role:
import: import:
manager: manager:
managersearch: managersearch:
receiver:
standalone: standalone:
searchnode: searchnode:
sensor: sensor:
+8
View File
@@ -16,6 +16,10 @@ firewall:
ips: ips:
delete: delete:
insert: insert:
endgame:
ips:
delete:
insert:
fleet: fleet:
ips: ips:
delete: delete:
@@ -40,6 +44,10 @@ firewall:
ips: ips:
delete: delete:
insert: insert:
receiver:
ips:
delete:
insert:
search_node: search_node:
ips: ips:
delete: delete:
+1
View File
@@ -1,6 +1,7 @@
elasticsearch: elasticsearch:
templates: templates:
- so/so-beats-template.json.jinja - so/so-beats-template.json.jinja
- so/so-case-template.json.jinja
- so/so-common-template.json.jinja - so/so-common-template.json.jinja
- so/so-firewall-template.json.jinja - so/so-firewall-template.json.jinja
- so/so-flow-template.json.jinja - so/so-flow-template.json.jinja
+2
View File
@@ -1,7 +1,9 @@
elasticsearch: elasticsearch:
templates: templates:
- so/so-beats-template.json.jinja - so/so-beats-template.json.jinja
- so/so-case-template.json.jinja
- so/so-common-template.json.jinja - so/so-common-template.json.jinja
- so/so-endgame-template.json.jinja
- so/so-firewall-template.json.jinja - so/so-firewall-template.json.jinja
- so/so-flow-template.json.jinja - so/so-flow-template.json.jinja
- so/so-ids-template.json.jinja - so/so-ids-template.json.jinja
+2
View File
@@ -1,7 +1,9 @@
elasticsearch: elasticsearch:
templates: templates:
- so/so-beats-template.json.jinja - so/so-beats-template.json.jinja
- so/so-case-template.json.jinja
- so/so-common-template.json.jinja - so/so-common-template.json.jinja
- so/so-endgame-template.json.jinja
- so/so-firewall-template.json.jinja - so/so-firewall-template.json.jinja
- so/so-flow-template.json.jinja - so/so-flow-template.json.jinja
- so/so-ids-template.json.jinja - so/so-ids-template.json.jinja
+1
View File
@@ -1,6 +1,7 @@
logstash: logstash:
docker_options: docker_options:
port_bindings: port_bindings:
- 0.0.0.0:3765:3765
- 0.0.0.0:5044:5044 - 0.0.0.0:5044:5044
- 0.0.0.0:5644:5644 - 0.0.0.0:5644:5644
- 0.0.0.0:6050:6050 - 0.0.0.0:6050:6050
+1 -1
View File
@@ -1,9 +1,9 @@
{%- set PIPELINE = salt['pillar.get']('global:pipeline', 'redis') %}
logstash: logstash:
pipelines: pipelines:
manager: manager:
config: config:
- so/0009_input_beats.conf - so/0009_input_beats.conf
- so/0010_input_hhbeats.conf - so/0010_input_hhbeats.conf
- so/0011_input_endgame.conf
- so/9999_output_redis.conf.jinja - so/9999_output_redis.conf.jinja
+31
View File
@@ -0,0 +1,31 @@
{% set node_types = {} %}
{% set cached_grains = salt.saltutil.runner('cache.grains', tgt='*') %}
{% for minionid, ip in salt.saltutil.runner(
'mine.get',
tgt='G@role:so-manager or G@role:so-managersearch or G@role:so-standalone or G@role:so-node or G@role:so-heavynode or G@role:so-receiver or G@role:so-helix ',
fun='network.ip_addrs',
tgt_type='compound') | dictsort()
%}
{% set hostname = cached_grains[minionid]['host'] %}
{% set node_type = minionid.split('_')[1] %}
{% if node_type not in node_types.keys() %}
{% do node_types.update({node_type: {hostname: ip[0]}}) %}
{% else %}
{% if hostname not in node_types[node_type] %}
{% do node_types[node_type].update({hostname: ip[0]}) %}
{% else %}
{% do node_types[node_type][hostname].update(ip[0]) %}
{% endif %}
{% endif %}
{% endfor %}
logstash:
nodes:
{% for node_type, values in node_types.items() %}
{{node_type}}:
{% for hostname, ip in values.items() %}
{{hostname}}:
ip: {{ip}}
{% endfor %}
{% endfor %}
+9
View File
@@ -0,0 +1,9 @@
logstash:
pipelines:
receiver:
config:
- so/0009_input_beats.conf
- so/0010_input_hhbeats.conf
- so/0011_input_endgame.conf
- so/9999_output_redis.conf.jinja
+1 -1
View File
@@ -1,4 +1,3 @@
{%- set PIPELINE = salt['pillar.get']('global:pipeline', 'minio') %}
logstash: logstash:
pipelines: pipelines:
search: search:
@@ -14,3 +13,4 @@ logstash:
- so/9600_output_ossec.conf.jinja - so/9600_output_ossec.conf.jinja
- so/9700_output_strelka.conf.jinja - so/9700_output_strelka.conf.jinja
- so/9800_output_logscan.conf.jinja - so/9800_output_logscan.conf.jinja
- so/9900_output_endgame.conf.jinja
+33
View File
@@ -0,0 +1,33 @@
{% set node_types = {} %}
{% set manage_alived = salt.saltutil.runner('manage.alived', show_ip=True) %}
{% set manager = grains.master %}
{% set manager_type = manager.split('_')|last %}
{% for minionid, ip in salt.saltutil.runner('mine.get', tgt='*', fun='network.ip_addrs', tgt_type='glob') | dictsort() %}
{% set hostname = minionid.split('_')[0] %}
{% set node_type = minionid.split('_')[1] %}
{% set is_alive = False %}
{% if minionid in manage_alived.keys() %}
{% if ip[0] == manage_alived[minionid] %}
{% set is_alive = True %}
{% endif %}
{% endif %}
{% if node_type not in node_types.keys() %}
{% do node_types.update({node_type: {hostname: {'ip':ip[0], 'alive':is_alive }}}) %}
{% else %}
{% if hostname not in node_types[node_type] %}
{% do node_types[node_type].update({hostname: {'ip':ip[0], 'alive':is_alive}}) %}
{% else %}
{% do node_types[node_type][hostname].update({'ip':ip[0], 'alive':is_alive}) %}
{% endif %}
{% endif %}
{% endfor %}
node_data:
{% for node_type, host_values in node_types.items() %}
{{node_type}}:
{% for hostname, details in host_values.items() %}
{{hostname}}:
ip: {{details.ip}}
alive: {{ details.alive }}
{% endfor %}
{% endfor %}
+22
View File
@@ -3,6 +3,9 @@ base:
- patch.needs_restarting - patch.needs_restarting
- logrotate - logrotate
'* and not *_eval and not *_import':
- logstash.nodes
'*_eval or *_helixsensor or *_heavynode or *_sensor or *_standalone or *_import': '*_eval or *_helixsensor or *_heavynode or *_sensor or *_standalone or *_import':
- match: compound - match: compound
- zeek - zeek
@@ -24,6 +27,9 @@ base:
- data.* - data.*
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %} {% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
- elasticsearch.auth - elasticsearch.auth
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
- kibana.secrets
{% endif %} {% endif %}
- secrets - secrets
- global - global
@@ -43,6 +49,9 @@ base:
- elasticsearch.eval - elasticsearch.eval
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %} {% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
- elasticsearch.auth - elasticsearch.auth
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
- kibana.secrets
{% endif %} {% endif %}
- global - global
- minions.{{ grains.id }} - minions.{{ grains.id }}
@@ -54,6 +63,9 @@ base:
- elasticsearch.search - elasticsearch.search
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %} {% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
- elasticsearch.auth - elasticsearch.auth
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
- kibana.secrets
{% endif %} {% endif %}
- data.* - data.*
- zeeklogs - zeeklogs
@@ -95,12 +107,22 @@ base:
- minions.{{ grains.id }} - minions.{{ grains.id }}
- data.nodestab - data.nodestab
'*_receiver':
- logstash
- logstash.receiver
- elasticsearch.auth
- global
- minions.{{ grains.id }}
'*_import': '*_import':
- zeeklogs - zeeklogs
- secrets - secrets
- elasticsearch.eval - elasticsearch.eval
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %} {% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
- elasticsearch.auth - elasticsearch.auth
{% endif %}
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
- kibana.secrets
{% endif %} {% endif %}
- global - global
- minions.{{ grains.id }} - minions.{{ grains.id }}
+22 -9
View File
@@ -35,6 +35,7 @@
'influxdb', 'influxdb',
'grafana', 'grafana',
'soc', 'soc',
'kratos',
'firewall', 'firewall',
'idstools', 'idstools',
'suricata.manager', 'suricata.manager',
@@ -49,7 +50,6 @@
'learn' 'learn'
], ],
'so-heavynode': [ 'so-heavynode': [
'ca',
'ssl', 'ssl',
'nginx', 'nginx',
'telegraf', 'telegraf',
@@ -79,7 +79,6 @@
'docker_clean' 'docker_clean'
], ],
'so-fleet': [ 'so-fleet': [
'ca',
'ssl', 'ssl',
'nginx', 'nginx',
'telegraf', 'telegraf',
@@ -100,6 +99,7 @@
'manager', 'manager',
'nginx', 'nginx',
'soc', 'soc',
'kratos',
'firewall', 'firewall',
'idstools', 'idstools',
'suricata.manager', 'suricata.manager',
@@ -123,6 +123,7 @@
'influxdb', 'influxdb',
'grafana', 'grafana',
'soc', 'soc',
'kratos',
'firewall', 'firewall',
'idstools', 'idstools',
'suricata.manager', 'suricata.manager',
@@ -142,6 +143,7 @@
'influxdb', 'influxdb',
'grafana', 'grafana',
'soc', 'soc',
'kratos',
'firewall', 'firewall',
'manager', 'manager',
'idstools', 'idstools',
@@ -153,7 +155,6 @@
'learn' 'learn'
], ],
'so-node': [ 'so-node': [
'ca',
'ssl', 'ssl',
'nginx', 'nginx',
'telegraf', 'telegraf',
@@ -172,6 +173,7 @@
'influxdb', 'influxdb',
'grafana', 'grafana',
'soc', 'soc',
'kratos',
'firewall', 'firewall',
'idstools', 'idstools',
'suricata.manager', 'suricata.manager',
@@ -186,7 +188,6 @@
'learn' 'learn'
], ],
'so-sensor': [ 'so-sensor': [
'ca',
'ssl', 'ssl',
'telegraf', 'telegraf',
'firewall', 'firewall',
@@ -200,9 +201,16 @@
'tcpreplay', 'tcpreplay',
'docker_clean' 'docker_clean'
], ],
'so-receiver': [
'ssl',
'telegraf',
'firewall',
'schedule',
'docker_clean'
],
}, grain='role') %} }, grain='role') %}
{% if FILEBEAT and grains.role in ['so-helixsensor', 'so-eval', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-import'] %} {% if FILEBEAT and grains.role in ['so-helixsensor', 'so-eval', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-import', 'so-receiver'] %}
{% do allowed_states.append('filebeat') %} {% do allowed_states.append('filebeat') %}
{% endif %} {% endif %}
@@ -210,7 +218,7 @@
{% do allowed_states.append('mysql') %} {% do allowed_states.append('mysql') %}
{% endif %} {% endif %}
{% if (FLEETMANAGER or FLEETNODE) and grains.role in ['so-sensor', 'so-eval', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode'] %} {% if (FLEETMANAGER or FLEETNODE) and grains.role in ['so-sensor', 'so-eval', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-receiver'] %}
{% do allowed_states.append('fleet.install_package') %} {% do allowed_states.append('fleet.install_package') %}
{% endif %} {% endif %}
@@ -230,7 +238,7 @@
{% do allowed_states.append('strelka') %} {% do allowed_states.append('strelka') %}
{% endif %} {% endif %}
{% if WAZUH and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode']%} {% if WAZUH and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-receiver']%}
{% do allowed_states.append('wazuh') %} {% do allowed_states.append('wazuh') %}
{% endif %} {% endif %}
@@ -238,8 +246,13 @@
{% do allowed_states.append('elasticsearch') %} {% do allowed_states.append('elasticsearch') %}
{% endif %} {% endif %}
{% if ELASTICSEARCH and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-import'] %}
{% do allowed_states.append('elasticsearch.auth') %}
{% endif %}
{% if KIBANA and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-import'] %} {% if KIBANA and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-import'] %}
{% do allowed_states.append('kibana') %} {% do allowed_states.append('kibana') %}
{% do allowed_states.append('kibana.secrets') %}
{% endif %} {% endif %}
{% if grains.role in ['so-eval', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-manager'] %} {% if grains.role in ['so-eval', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-manager'] %}
@@ -270,11 +283,11 @@
{% do allowed_states.append('domainstats') %} {% do allowed_states.append('domainstats') %}
{% endif %} {% endif %}
{% if LOGSTASH and grains.role in ['so-helixsensor', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode'] %} {% if LOGSTASH and grains.role in ['so-helixsensor', 'so-manager', 'so-standalone', 'so-node', 'so-managersearch', 'so-heavynode', 'so-receiver'] %}
{% do allowed_states.append('logstash') %} {% do allowed_states.append('logstash') %}
{% endif %} {% endif %}
{% if REDIS and grains.role in ['so-manager', 'so-standalone', 'so-managersearch', 'so-heavynode'] %} {% if REDIS and grains.role in ['so-manager', 'so-standalone', 'so-managersearch', 'so-heavynode', 'so-receiver'] %}
{% do allowed_states.append('redis') %} {% do allowed_states.append('redis') %}
{% endif %} {% endif %}
+4
View File
@@ -0,0 +1,4 @@
pki_issued_certs:
file.directory:
- name: /etc/pki/issued_certs
- makedirs: True
+3
View File
@@ -1,3 +1,6 @@
mine_functions:
x509.get_pem_entries: [/etc/pki/ca.crt]
x509_signing_policies: x509_signing_policies:
filebeat: filebeat:
- minions: '*' - minions: '*'
+6 -14
View File
@@ -1,17 +1,14 @@
{% from 'allowed_states.map.jinja' import allowed_states %} {% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls in allowed_states %} {% if sls in allowed_states %}
include:
- ca.dirs
{% set manager = salt['grains.get']('master') %} {% set manager = salt['grains.get']('master') %}
/etc/salt/minion.d/signing_policies.conf: /etc/salt/minion.d/signing_policies.conf:
file.managed: file.managed:
- source: salt://ca/files/signing_policies.conf - source: salt://ca/files/signing_policies.conf
/etc/pki:
file.directory: []
/etc/pki/issued_certs:
file.directory: []
pki_private_key: pki_private_key:
x509.private_key_managed: x509.private_key_managed:
- name: /etc/pki/ca.key - name: /etc/pki/ca.key
@@ -24,8 +21,9 @@ pki_private_key:
- x509: /etc/pki/ca.crt - x509: /etc/pki/ca.crt
{%- endif %} {%- endif %}
/etc/pki/ca.crt: pki_public_ca_crt:
x509.certificate_managed: x509.certificate_managed:
- name: /etc/pki/ca.crt
- signing_private_key: /etc/pki/ca.key - signing_private_key: /etc/pki/ca.key
- CN: {{ manager }} - CN: {{ manager }}
- C: US - C: US
@@ -41,18 +39,12 @@ pki_private_key:
- backup: True - backup: True
- replace: False - replace: False
- require: - require:
- file: /etc/pki - sls: ca.dirs
- timeout: 30 - timeout: 30
- retry: - retry:
attempts: 5 attempts: 5
interval: 30 interval: 30
x509_pem_entries:
module.run:
- mine.send:
- name: x509.get_pem_entries
- glob_path: /etc/pki/ca.crt
cakeyperms: cakeyperms:
file.managed: file.managed:
- replace: False - replace: False
+7
View File
@@ -0,0 +1,7 @@
pki_private_key:
file.absent:
- name: /etc/pki/ca.key
pki_public_ca_crt:
file.absent:
- name: /etc/pki/ca.crt
+31
View File
@@ -4,11 +4,22 @@
{% set role = grains.id.split('_') | last %} {% set role = grains.id.split('_') | last %}
{% from 'elasticsearch/auth.map.jinja' import ELASTICAUTH with context %} {% from 'elasticsearch/auth.map.jinja' import ELASTICAUTH with context %}
include:
- common.soup_scripts
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-import'] %}
- manager.elasticsearch # needed for elastic_curl_config state
{% endif %}
# Remove variables.txt from /tmp - This is temp # Remove variables.txt from /tmp - This is temp
rmvariablesfile: rmvariablesfile:
file.absent: file.absent:
- name: /tmp/variables.txt - name: /tmp/variables.txt
dockergroup:
group.present:
- name: docker
- gid: 920
# Add socore Group # Add socore Group
socoregroup: socoregroup:
group.present: group.present:
@@ -101,16 +112,24 @@ commonpkgs:
- python3-m2crypto - python3-m2crypto
- python3-mysqldb - python3-mysqldb
- python3-packaging - python3-packaging
- python3-lxml
- git - git
- vim - vim
heldpackages: heldpackages:
pkg.installed: pkg.installed:
- pkgs: - pkgs:
{% if grains['oscodename'] == 'bionic' %}
- containerd.io: 1.4.4-1 - containerd.io: 1.4.4-1
- docker-ce: 5:20.10.5~3-0~ubuntu-bionic - docker-ce: 5:20.10.5~3-0~ubuntu-bionic
- docker-ce-cli: 5:20.10.5~3-0~ubuntu-bionic - docker-ce-cli: 5:20.10.5~3-0~ubuntu-bionic
- docker-ce-rootless-extras: 5:20.10.5~3-0~ubuntu-bionic - docker-ce-rootless-extras: 5:20.10.5~3-0~ubuntu-bionic
{% elif grains['oscodename'] == 'focal' %}
- containerd.io: 1.4.9-1
- docker-ce: 5:20.10.8~3-0~ubuntu-focal
- docker-ce-cli: 5:20.10.5~3-0~ubuntu-focal
- docker-ce-rootless-extras: 5:20.10.5~3-0~ubuntu-focal
{% endif %}
- hold: True - hold: True
- update_holds: True - update_holds: True
@@ -136,6 +155,7 @@ commonpkgs:
- python36-m2crypto - python36-m2crypto
- python36-mysql - python36-mysql
- python36-packaging - python36-packaging
- python36-lxml
- yum-utils - yum-utils
- device-mapper-persistent-data - device-mapper-persistent-data
- lvm2 - lvm2
@@ -168,6 +188,7 @@ alwaysupdated:
Etc/UTC: Etc/UTC:
timezone.system timezone.system
{% if salt['pillar.get']('elasticsearch:auth:enabled', False) %}
elastic_curl_config: elastic_curl_config:
file.managed: file.managed:
- name: /opt/so/conf/elasticsearch/curl.config - name: /opt/so/conf/elasticsearch/curl.config
@@ -175,6 +196,11 @@ elastic_curl_config:
- mode: 600 - mode: 600
- show_changes: False - show_changes: False
- makedirs: True - makedirs: True
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-import'] %}
- require:
- file: elastic_curl_config_distributed
{% endif %}
{% endif %}
# Sync some Utilities # Sync some Utilities
utilsyncscripts: utilsyncscripts:
@@ -189,6 +215,11 @@ utilsyncscripts:
ELASTICCURL: 'curl' ELASTICCURL: 'curl'
- context: - context:
ELASTICCURL: {{ ELASTICAUTH.elasticcurl }} ELASTICCURL: {{ ELASTICAUTH.elasticcurl }}
- exclude_pat:
- so-common
- so-firewall
- so-image-common
- soup
{% if role in ['eval', 'standalone', 'sensor', 'heavynode'] %} {% if role in ['eval', 'standalone', 'sensor', 'heavynode'] %}
# Add sensor cleanup # Add sensor cleanup
+13
View File
@@ -0,0 +1,13 @@
# Sync some Utilities
soup_scripts:
file.recurse:
- name: /usr/sbin
- user: root
- group: root
- file_mode: 755
- source: salt://common/tools/sbin
- include_pat:
- so-common
- so-firewall
- so-image-common
- soup
+182 -141
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/usr/bin/env python3
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -15,152 +15,193 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
. /usr/sbin/so-common import ipaddress
import textwrap
import os
import subprocess
import sys
import argparse
import re
from lxml import etree as ET
from datetime import datetime as dt
from datetime import timezone as tz
local_salt_dir=/opt/so/saltstack/local
SKIP=0
function usage {
cat << EOF
Usage: $0 [-abefhoprsw] [ -i IP ]
This program allows you to add a firewall rule to allow connections from a new IP address or CIDR range.
If you run this program with no arguments, it will present a menu for you to choose your options.
If you want to automate and skip the menu, you can pass the desired options as command line arguments.
EXAMPLES
To add 10.1.2.3 to the analyst role:
so-allow -a -i 10.1.2.3
To add 10.1.2.0/24 to the osquery role:
so-allow -o -i 10.1.2.0/24
EOF
LOCAL_SALT_DIR='/opt/so/saltstack/local'
WAZUH_CONF='/nsm/wazuh/etc/ossec.conf'
VALID_ROLES = {
'a': { 'role': 'analyst','desc': 'Analyst - 80/tcp, 443/tcp' },
'b': { 'role': 'beats_endpoint', 'desc': 'Logstash Beat - 5044/tcp' },
'e': { 'role': 'elasticsearch_rest', 'desc': 'Elasticsearch REST API - 9200/tcp' },
'f': { 'role': 'strelka_frontend', 'desc': 'Strelka frontend - 57314/tcp' },
'o': { 'role': 'osquery_endpoint', 'desc': 'Osquery endpoint - 8090/tcp' },
's': { 'role': 'syslog', 'desc': 'Syslog device - 514/tcp/udp' },
'w': { 'role': 'wazuh_agent', 'desc': 'Wazuh agent - 1514/tcp/udp' },
'p': { 'role': 'wazuh_api', 'desc': 'Wazuh API - 55000/tcp' },
'r': { 'role': 'wazuh_authd', 'desc': 'Wazuh registration service - 1515/tcp' }
} }
while getopts "ahfesprbowi:" OPTION
do
case $OPTION in
h)
usage
exit 0
;;
a)
FULLROLE="analyst"
SKIP=1
;;
b)
FULLROLE="beats_endpoint"
SKIP=1
;;
e)
FULLROLE="elasticsearch_rest"
SKIP=1
;;
f)
FULLROLE="strelka_frontend"
SKIP=1
;;
i) IP=$OPTARG
;;
o)
FULLROLE="osquery_endpoint"
SKIP=1
;;
w)
FULLROLE="wazuh_agent"
SKIP=1
;;
s)
FULLROLE="syslog"
SKIP=1
;;
p)
FULLROLE="wazuh_api"
SKIP=1
;;
r)
FULLROLE="wazuh_authd"
SKIP=1
;;
*)
usage
exit 0
;;
esac
done
if [ "$SKIP" -eq 0 ]; then def validate_ip_cidr(ip_cidr: str) -> bool:
try:
ipaddress.ip_address(ip_cidr)
except ValueError:
try:
ipaddress.ip_network(ip_cidr)
except ValueError:
return False
return True
echo "This program allows you to add a firewall rule to allow connections from a new IP address."
echo ""
echo "Choose the role for the IP or Range you would like to add"
echo ""
echo "[a] - Analyst - ports 80/tcp and 443/tcp"
echo "[b] - Logstash Beat - port 5044/tcp"
echo "[e] - Elasticsearch REST API - port 9200/tcp"
echo "[f] - Strelka frontend - port 57314/tcp"
echo "[o] - Osquery endpoint - port 8090/tcp"
echo "[s] - Syslog device - 514/tcp/udp"
echo "[w] - Wazuh agent - port 1514/tcp/udp"
echo "[p] - Wazuh API - port 55000/tcp"
echo "[r] - Wazuh registration service - 1515/tcp"
echo ""
echo "Please enter your selection:"
read -r ROLE
echo "Enter a single ip address or range to allow (example: 10.10.10.10 or 10.10.0.0/16):"
read -r IP
if [ "$ROLE" == "a" ]; then def role_prompt() -> str:
FULLROLE=analyst print()
elif [ "$ROLE" == "b" ]; then print('Choose the role for the IP or Range you would like to allow')
FULLROLE=beats_endpoint print()
elif [ "$ROLE" == "e" ]; then for role in VALID_ROLES:
FULLROLE=elasticsearch_rest print(f'[{role}] - {VALID_ROLES[role]["desc"]}')
elif [ "$ROLE" == "f" ]; then print()
FULLROLE=strelka_frontend role = input('Please enter your selection: ')
elif [ "$ROLE" == "o" ]; then if role in VALID_ROLES.keys():
FULLROLE=osquery_endpoint return VALID_ROLES[role]['role']
elif [ "$ROLE" == "w" ]; then else:
FULLROLE=wazuh_agent print(f'Invalid role \'{role}\', please try again.', file=sys.stderr)
elif [ "$ROLE" == "s" ]; then sys.exit(1)
FULLROLE=syslog
elif [ "$ROLE" == "p" ]; then
FULLROLE=wazuh_api
elif [ "$ROLE" == "r" ]; then
FULLROLE=wazuh_authd
else
echo "I don't recognize that role"
exit 1
fi
fi
echo "Adding $IP to the $FULLROLE role. This can take a few seconds" def ip_prompt() -> str:
/usr/sbin/so-firewall includehost $FULLROLE $IP ip = input('Enter a single ip address or range to allow (ex: 10.10.10.10 or 10.10.0.0/16): ')
salt-call state.apply firewall queue=True if validate_ip_cidr(ip):
return ip
else:
print(f'Invalid IP address or CIDR block \'{ip}\', please try again.', file=sys.stderr)
sys.exit(1)
def wazuh_enabled() -> bool:
file = f'{LOCAL_SALT_DIR}/pillar/global.sls'
with open(file, 'r') as pillar:
if 'wazuh: 1' in pillar.read():
return True
return False
def root_to_str(root: ET.ElementTree) -> str:
return ET.tostring(root, encoding='unicode', method='xml', xml_declaration=False, pretty_print=True)
def add_wl(ip):
parser = ET.XMLParser(remove_blank_text=True)
with open(WAZUH_CONF, 'rb') as wazuh_conf:
tree = ET.parse(wazuh_conf, parser)
root = tree.getroot()
source_comment = ET.Comment(f'Address {ip} added by /usr/sbin/so-allow on {dt.utcnow().replace(tzinfo=tz.utc).strftime("%a %b %e %H:%M:%S %Z %Y")}')
new_global = ET.Element("global")
new_wl = ET.SubElement(new_global, 'white_list')
new_wl.text = ip
root.append(source_comment)
root.append(new_global)
with open(WAZUH_CONF, 'w') as add_out:
add_out.write(root_to_str(root))
def apply(role: str, ip: str) -> int:
firewall_cmd = ['so-firewall', 'includehost', role, ip]
salt_cmd = ['salt-call', 'state.apply', '-l', 'quiet', 'firewall', 'queue=True']
restart_wazuh_cmd = ['so-wazuh-restart']
print(f'Adding {ip} to the {role} role. This can take a few seconds...')
cmd = subprocess.run(firewall_cmd)
if cmd.returncode == 0:
cmd = subprocess.run(salt_cmd, stdout=subprocess.DEVNULL)
else:
return cmd.returncode
if cmd.returncode == 0:
if wazuh_enabled() and role=='analyst':
try:
add_wl(ip)
print(f'Added whitelist entry for {ip} from {WAZUH_CONF}', file=sys.stderr)
except Exception as e:
print(f'Failed to add whitelist entry for {ip} from {WAZUH_CONF}', file=sys.stderr)
print(e)
return 1
print('Restarting OSSEC Server...')
cmd = subprocess.run(restart_wazuh_cmd)
else:
return cmd.returncode
else:
print(f'Commmand \'{" ".join(salt_cmd)}\' failed.', file=sys.stderr)
return cmd.returncode
if cmd.returncode != 0:
print('Failed to restart OSSEC server.')
return cmd.returncode
def main():
if os.geteuid() != 0:
print('You must run this script as root', file=sys.stderr)
sys.exit(1)
main_parser = argparse.ArgumentParser(
formatter_class=argparse.RawDescriptionHelpFormatter,
epilog=textwrap.dedent(f'''\
additional information:
To use this script in interactive mode call it with no arguments
'''
))
group = main_parser.add_argument_group(title='roles')
group.add_argument('-a', dest='roles', action='append_const', const=VALID_ROLES['a']['role'], help="Analyst - 80/tcp, 443/tcp")
group.add_argument('-b', dest='roles', action='append_const', const=VALID_ROLES['b']['role'], help="Logstash Beat - 5044/tcp")
group.add_argument('-e', dest='roles', action='append_const', const=VALID_ROLES['e']['role'], help="Elasticsearch REST API - 9200/tcp")
group.add_argument('-f', dest='roles', action='append_const', const=VALID_ROLES['f']['role'], help="Strelka frontend - 57314/tcp")
group.add_argument('-o', dest='roles', action='append_const', const=VALID_ROLES['o']['role'], help="Osquery endpoint - 8090/tcp")
group.add_argument('-s', dest='roles', action='append_const', const=VALID_ROLES['s']['role'], help="Syslog device - 514/tcp/udp")
group.add_argument('-w', dest='roles', action='append_const', const=VALID_ROLES['w']['role'], help="Wazuh agent - 1514/tcp/udp")
group.add_argument('-p', dest='roles', action='append_const', const=VALID_ROLES['p']['role'], help="Wazuh API - 55000/tcp")
group.add_argument('-r', dest='roles', action='append_const', const=VALID_ROLES['r']['role'], help="Wazuh registration service - 1515/tcp")
ip_g = main_parser.add_argument_group(title='allow')
ip_g.add_argument('-i', help="IP or CIDR block to disallow connections from, requires at least one role argument", metavar='', dest='ip')
args = main_parser.parse_args(sys.argv[1:])
if args.roles is None:
role = role_prompt()
ip = ip_prompt()
try:
return_code = apply(role, ip)
except Exception as e:
print(f'Unexpected exception occurred: {e}', file=sys.stderr)
return_code = e.errno
sys.exit(return_code)
elif args.roles is not None and args.ip is None:
if os.environ.get('IP') is None:
main_parser.print_help()
sys.exit(1)
else:
args.ip = os.environ['IP']
if validate_ip_cidr(args.ip):
try:
for role in args.roles:
return_code = apply(role, args.ip)
if return_code > 0:
break
except Exception as e:
print(f'Unexpected exception occurred: {e}', file=sys.stderr)
return_code = e.errno
else:
print(f'Invalid IP address or CIDR block \'{args.ip}\', please try again.', file=sys.stderr)
return_code = 1
sys.exit(return_code)
if __name__ == '__main__':
try:
main()
except KeyboardInterrupt:
sys.exit(1)
# Check if Wazuh enabled
if grep -q -R "wazuh: 1" $local_salt_dir/pillar/*; then
# If analyst, add to Wazuh AR whitelist
if [ "$FULLROLE" == "analyst" ]; then
WAZUH_MGR_CFG="/nsm/wazuh/etc/ossec.conf"
if ! grep -q "<white_list>$IP</white_list>" $WAZUH_MGR_CFG ; then
DATE=$(date)
sed -i 's/<\/ossec_config>//' $WAZUH_MGR_CFG
sed -i '/^$/N;/^\n$/D' $WAZUH_MGR_CFG
echo -e "<!--Address $IP added by /usr/sbin/so-allow on \"$DATE\"-->\n <global>\n <white_list>$IP</white_list>\n </global>\n</ossec_config>" >> $WAZUH_MGR_CFG
echo "Added whitelist entry for $IP in $WAZUH_MGR_CFG."
echo
echo "Restarting OSSEC Server..."
/usr/sbin/so-wazuh-restart
fi
fi
fi
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+2 -2
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014-2020 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -108,7 +108,7 @@ CANCURL=$(curl -sI https://securityonionsolutions.com/ | grep "200 OK")
while [[ $CURLCONTINUE != "yes" ]] && [[ $CURLCONTINUE != "no" ]]; do while [[ $CURLCONTINUE != "yes" ]] && [[ $CURLCONTINUE != "no" ]]; do
if [[ "$FIRSTPASS" == "yes" ]]; then if [[ "$FIRSTPASS" == "yes" ]]; then
echo "We could not access https://securityonionsolutions.com/." echo "We could not access https://securityonionsolutions.com/."
echo "Since packages are downloaded from the internet, internet acceess is required." echo "Since packages are downloaded from the internet, internet access is required."
echo "If you would like to ignore this warning and continue anyway, please type 'yes'." echo "If you would like to ignore this warning and continue anyway, please type 'yes'."
echo "Otherwise, type 'no' to exit." echo "Otherwise, type 'no' to exit."
FIRSTPASS=no FIRSTPASS=no
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+68 -9
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -298,6 +298,7 @@ retry() {
sleepDelay=$2 sleepDelay=$2
cmd=$3 cmd=$3
expectedOutput=$4 expectedOutput=$4
failedOutput=$5
attempt=0 attempt=0
local exitcode=0 local exitcode=0
while [[ $attempt -lt $maxAttempts ]]; do while [[ $attempt -lt $maxAttempts ]]; do
@@ -308,12 +309,28 @@ retry() {
echo "Results: $output ($exitcode)" echo "Results: $output ($exitcode)"
if [ -n "$expectedOutput" ]; then if [ -n "$expectedOutput" ]; then
if [[ "$output" =~ "$expectedOutput" ]]; then if [[ "$output" =~ "$expectedOutput" ]]; then
return $exitCode return $exitcode
else else
echo "Expected '$expectedOutput' but got '$output'" echo "Did not find expectedOutput: '$expectedOutput' in the output below from running the command: '$cmd'"
echo "<Start of output>"
echo "$output"
echo "<End of output>"
fi
elif [ -n "$failedOutput" ]; then
if [[ "$output" =~ "$failedOutput" ]]; then
echo "Found failedOutput: '$failedOutput' in the output below from running the command: '$cmd'"
echo "<Start of output>"
echo "$output"
echo "<End of output>"
if [[ $exitcode -eq 0 ]]; then
echo "The exitcode was 0, but we are setting to 1 since we found $failedOutput in the output."
exitcode=1
fi
else
return $exitcode
fi fi
elif [[ $exitcode -eq 0 ]]; then elif [[ $exitcode -eq 0 ]]; then
return $exitCode return $exitcode
fi fi
echo "Command failed with exit code $exitcode; will retry in $sleepDelay seconds ($attempt / $maxAttempts)..." echo "Command failed with exit code $exitcode; will retry in $sleepDelay seconds ($attempt / $maxAttempts)..."
sleep $sleepDelay sleep $sleepDelay
@@ -343,6 +360,13 @@ run_check_net_err() {
exit $exit_code exit $exit_code
fi fi
} }
set_cron_service_name() {
if [[ "$OS" == "centos" ]]; then
cron_service_name="crond"
else
cron_service_name="cron"
fi
}
set_os() { set_os() {
if [ -f /etc/redhat-release ]; then if [ -f /etc/redhat-release ]; then
@@ -381,6 +405,21 @@ set_version() {
fi fi
} }
systemctl_func() {
local action=$1
local echo_action=$1
local service_name=$2
if [[ "$echo_action" == "stop" ]]; then
echo_action="stopp"
fi
echo ""
echo "${echo_action^}ing $service_name service at $(date +"%T.%6N")"
systemctl $action $service_name && echo "Successfully ${echo_action}ed $service_name." || echo "Failed to $action $service_name."
echo ""
}
has_uppercase() { has_uppercase() {
local string=$1 local string=$1
@@ -393,14 +432,17 @@ valid_cidr() {
# Verify there is a backslash in the string # Verify there is a backslash in the string
echo "$1" | grep -qP "^[^/]+/[^/]+$" || return 1 echo "$1" | grep -qP "^[^/]+/[^/]+$" || return 1
local cidr valid_ip4_cidr_mask "$1" && return 0 || return 1
local ip
cidr=$(echo "$1" | sed 's/.*\///') local cidr="$1"
ip=$(echo "$1" | sed 's/\/.*//' ) local ip
ip=$(echo "$cidr" | sed 's/\/.*//' )
if valid_ip4 "$ip"; then if valid_ip4 "$ip"; then
[[ $cidr =~ ([0-9]|[1-2][0-9]|3[0-2]) ]] && return 0 || return 1 local ip1 ip2 ip3 ip4 N
IFS="./" read -r ip1 ip2 ip3 ip4 N <<< "$cidr"
ip_total=$((ip1 * 256 ** 3 + ip2 * 256 ** 2 + ip3 * 256 + ip4))
[[ $((ip_total % 2**(32-N))) == 0 ]] && return 0 || return 1
else else
return 1 return 1
fi fi
@@ -450,6 +492,23 @@ valid_ip4() {
echo "$ip" | grep -qP '^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$' && return 0 || return 1 echo "$ip" | grep -qP '^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$' && return 0 || return 1
} }
valid_ip4_cidr_mask() {
# Verify there is a backslash in the string
echo "$1" | grep -qP "^[^/]+/[^/]+$" || return 1
local cidr
local ip
cidr=$(echo "$1" | sed 's/.*\///')
ip=$(echo "$1" | sed 's/\/.*//' )
if valid_ip4 "$ip"; then
[[ $cidr =~ ^([0-9]|[1-2][0-9]|3[0-2])$ ]] && return 0 || return 1
else
return 1
fi
}
valid_int() { valid_int() {
local num=$1 local num=$1
local min=${2:-1} local min=${2:-1}
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+213
View File
@@ -0,0 +1,213 @@
#!/usr/bin/env python3
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
import ipaddress
import textwrap
import os
import subprocess
import sys
import argparse
import re
from lxml import etree as ET
from xml.dom import minidom
LOCAL_SALT_DIR='/opt/so/saltstack/local'
WAZUH_CONF='/nsm/wazuh/etc/ossec.conf'
VALID_ROLES = {
'a': { 'role': 'analyst','desc': 'Analyst - 80/tcp, 443/tcp' },
'b': { 'role': 'beats_endpoint', 'desc': 'Logstash Beat - 5044/tcp' },
'e': { 'role': 'elasticsearch_rest', 'desc': 'Elasticsearch REST API - 9200/tcp' },
'f': { 'role': 'strelka_frontend', 'desc': 'Strelka frontend - 57314/tcp' },
'o': { 'role': 'osquery_endpoint', 'desc': 'Osquery endpoint - 8090/tcp' },
's': { 'role': 'syslog', 'desc': 'Syslog device - 514/tcp/udp' },
'w': { 'role': 'wazuh_agent', 'desc': 'Wazuh agent - 1514/tcp/udp' },
'p': { 'role': 'wazuh_api', 'desc': 'Wazuh API - 55000/tcp' },
'r': { 'role': 'wazuh_authd', 'desc': 'Wazuh registration service - 1515/tcp' }
}
def validate_ip_cidr(ip_cidr: str) -> bool:
try:
ipaddress.ip_address(ip_cidr)
except ValueError:
try:
ipaddress.ip_network(ip_cidr)
except ValueError:
return False
return True
def role_prompt() -> str:
print()
print('Choose the role for the IP or Range you would like to deny')
print()
for role in VALID_ROLES:
print(f'[{role}] - {VALID_ROLES[role]["desc"]}')
print()
role = input('Please enter your selection: ')
if role in VALID_ROLES.keys():
return VALID_ROLES[role]['role']
else:
print(f'Invalid role \'{role}\', please try again.', file=sys.stderr)
sys.exit(1)
def ip_prompt() -> str:
ip = input('Enter a single ip address or range to deny (ex: 10.10.10.10 or 10.10.0.0/16): ')
if validate_ip_cidr(ip):
return ip
else:
print(f'Invalid IP address or CIDR block \'{ip}\', please try again.', file=sys.stderr)
sys.exit(1)
def wazuh_enabled() -> bool:
for file in os.listdir(f'{LOCAL_SALT_DIR}/pillar'):
with open(file, 'r') as pillar:
if 'wazuh: 1' in pillar.read():
return True
return False
def root_to_str(root: ET.ElementTree) -> str:
xml_str = ET.tostring(root, encoding='unicode', method='xml').replace('\n', '')
xml_str = re.sub(r'(?:(?<=>) *)', '', xml_str)
# Remove specific substrings to better format comments on intial parse/write
xml_str = re.sub(r' -', '', xml_str)
xml_str = re.sub(r' -->', ' -->', xml_str)
dom = minidom.parseString(xml_str)
return dom.toprettyxml(indent=" ")
def rem_wl(ip):
parser = ET.XMLParser(remove_blank_text=True)
with open(WAZUH_CONF, 'rb') as wazuh_conf:
tree = ET.parse(wazuh_conf, parser)
root = tree.getroot()
global_elems = root.findall(f"global/white_list[. = '{ip}']/..")
if len(global_elems) > 0:
for g_elem in global_elems:
ge_index = list(root).index(g_elem)
if ge_index > 0 and root[list(root).index(g_elem) - 1].tag == ET.Comment:
root.remove(root[ge_index - 1])
root.remove(g_elem)
with open(WAZUH_CONF, 'w') as out:
out.write(root_to_str(root))
def apply(role: str, ip: str) -> int:
firewall_cmd = ['so-firewall', 'excludehost', role, ip]
salt_cmd = ['salt-call', 'state.apply', '-l', 'quiet', 'firewall', 'queue=True']
restart_wazuh_cmd = ['so-wazuh-restart']
print(f'Removing {ip} from the {role} role. This can take a few seconds...')
cmd = subprocess.run(firewall_cmd)
if cmd.returncode == 0:
cmd = subprocess.run(salt_cmd, stdout=subprocess.DEVNULL)
else:
return cmd.returncode
if cmd.returncode == 0:
if wazuh_enabled and role=='analyst':
try:
rem_wl(ip)
print(f'Removed whitelist entry for {ip} from {WAZUH_CONF}', file=sys.stderr)
except Exception as e:
print(f'Failed to remove whitelist entry for {ip} from {WAZUH_CONF}', file=sys.stderr)
print(e)
return 1
print('Restarting OSSEC Server...')
cmd = subprocess.run(restart_wazuh_cmd)
else:
return cmd.returncode
else:
print(f'Commmand \'{" ".join(salt_cmd)}\' failed.', file=sys.stderr)
return cmd.returncode
if cmd.returncode != 0:
print('Failed to restart OSSEC server.')
return cmd.returncode
def main():
if os.geteuid() != 0:
print('You must run this script as root', file=sys.stderr)
sys.exit(1)
main_parser = argparse.ArgumentParser(
formatter_class=argparse.RawDescriptionHelpFormatter,
epilog=textwrap.dedent(f'''\
additional information:
To use this script in interactive mode call it with no arguments
'''
))
group = main_parser.add_argument_group(title='roles')
group.add_argument('-a', dest='roles', action='append_const', const=VALID_ROLES['a']['role'], help="Analyst - 80/tcp, 443/tcp")
group.add_argument('-b', dest='roles', action='append_const', const=VALID_ROLES['b']['role'], help="Logstash Beat - 5044/tcp")
group.add_argument('-e', dest='roles', action='append_const', const=VALID_ROLES['e']['role'], help="Elasticsearch REST API - 9200/tcp")
group.add_argument('-f', dest='roles', action='append_const', const=VALID_ROLES['f']['role'], help="Strelka frontend - 57314/tcp")
group.add_argument('-o', dest='roles', action='append_const', const=VALID_ROLES['o']['role'], help="Osquery endpoint - 8090/tcp")
group.add_argument('-s', dest='roles', action='append_const', const=VALID_ROLES['s']['role'], help="Syslog device - 514/tcp/udp")
group.add_argument('-w', dest='roles', action='append_const', const=VALID_ROLES['w']['role'], help="Wazuh agent - 1514/tcp/udp")
group.add_argument('-p', dest='roles', action='append_const', const=VALID_ROLES['p']['role'], help="Wazuh API - 55000/tcp")
group.add_argument('-r', dest='roles', action='append_const', const=VALID_ROLES['r']['role'], help="Wazuh registration service - 1515/tcp")
ip_g = main_parser.add_argument_group(title='allow')
ip_g.add_argument('-i', help="IP or CIDR block to disallow connections from, requires at least one role argument", metavar='', dest='ip')
args = main_parser.parse_args(sys.argv[1:])
if args.roles is None:
role = role_prompt()
ip = ip_prompt()
try:
return_code = apply(role, ip)
except Exception as e:
print(f'Unexpected exception occurred: {e}', file=sys.stderr)
return_code = e.errno
sys.exit(return_code)
elif args.roles is not None and args.ip is None:
if os.environ.get('IP') is None:
main_parser.print_help()
sys.exit(1)
else:
args.ip = os.environ['IP']
if validate_ip_cidr(args.ip):
try:
for role in args.roles:
return_code = apply(role, args.ip)
if return_code > 0:
break
except Exception as e:
print(f'Unexpected exception occurred: {e}', file=sys.stderr)
return_code = e.errno
else:
print(f'Invalid IP address or CIDR block \'{args.ip}\', please try again.', file=sys.stderr)
return_code = 1
sys.exit(return_code)
if __name__ == '__main__':
try:
main()
except KeyboardInterrupt:
sys.exit(1)
+1 -1
View File
@@ -1,6 +1,6 @@
#!/usr/bin/env python3 #!/usr/bin/env python3
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -70,7 +70,7 @@ do
done done
docker_exec(){ docker_exec(){
CMD="docker exec -it so-elastalert elastalert-test-rule /opt/elastalert/rules/$RULE_NAME --config /opt/config/elastalert_config.yaml $OPTIONS" CMD="docker exec -it so-elastalert elastalert-test-rule /opt/elastalert/rules/$RULE_NAME --config /opt/elastalert/config.yaml $OPTIONS"
if [ "${RESULTS_TO_LOG,,}" = "y" ] ; then if [ "${RESULTS_TO_LOG,,}" = "y" ] ; then
$CMD > "$FILE_SAVE_LOCATION" $CMD > "$FILE_SAVE_LOCATION"
else else
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -0,0 +1,155 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
source $(dirname $0)/so-common
require_manager
user=$1
elasticUsersFile=${ELASTIC_USERS_FILE:-/opt/so/saltstack/local/salt/elasticsearch/files/users}
elasticAuthPillarFile=${ELASTIC_AUTH_PILLAR_FILE:-/opt/so/saltstack/local/pillar/elasticsearch/auth.sls}
if [[ $# -ne 1 ]]; then
echo "Usage: $0 <user>"
echo ""
echo " where <user> is one of the following:"
echo ""
echo " all: Reset the password for the so_elastic, so_kibana, so_logstash, so_beats, and so_monitor users"
echo " so_elastic: Reset the password for the so_elastic user"
echo " so_kibana: Reset the password for the so_kibana user"
echo " so_logstash: Reset the password for the so_logstash user"
echo " so_beats: Reset the password for the so_beats user"
echo " so_monitor: Reset the password for the so_monitor user"
echo ""
exit 1
fi
# function to create a lock so that the so-user sync cronjob can't run while this is running
function lock() {
# Obtain file descriptor lock
exec 99>/var/tmp/so-user.lock || fail "Unable to create lock descriptor; if the system was not shutdown gracefully you may need to remove /var/tmp/so-user.lock manually."
flock -w 10 99 || fail "Another process is using so-user; if the system was not shutdown gracefully you may need to remove /var/tmp/so-user.lock manually."
trap 'rm -f /var/tmp/so-user.lock' EXIT
}
function unlock() {
rm -f /var/tmp/so-user.lock
}
function fail() {
msg=$1
echo "$1"
exit 1
}
function removeSingleUserPass() {
local user=$1
sed -i '/user: '"${user}"'/{N;/pass: /d}' "${elasticAuthPillarFile}"
}
function removeAllUserPass() {
local userList=("so_elastic" "so_kibana" "so_logstash" "so_beats" "so_monitor")
for u in ${userList[@]}; do
removeSingleUserPass "$u"
done
}
function removeElasticUsersFile() {
rm -f "$elasticUsersFile"
}
function createElasticAuthPillar() {
salt-call state.apply elasticsearch.auth queue=True
}
# this will disable highstate to prevent a highstate from starting while the script is running
# will also disable salt.minion-state-apply-test allow so-salt-minion-check cronjob to restart salt-minion service incase
function disableSaltStates() {
printf "\nDisabling salt.minion-state-apply-test and highstate from running.\n\n"
salt-call state.disable salt.minion-state-apply-test
salt-call state.disable highstate
}
function enableSaltStates() {
printf "\nEnabling salt.minion-state-apply-test and highstate.\n\n"
salt-call state.enable salt.minion-state-apply-test
salt-call state.enable highstate
}
function killAllSaltJobs() {
printf "\nKilling all running salt jobs.\n\n"
salt-call saltutil.kill_all_jobs
}
function soUserSync() {
# apply this state to update /opt/so/saltstack/local/salt/elasticsearch/curl.config on the manager
salt-call state.sls_id elastic_curl_config_distributed manager queue=True
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode' saltutil.kill_all_jobs
# apply this state to get the curl.config
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode' state.sls_id elastic_curl_config common queue=True
$(dirname $0)/so-user sync
printf "\nApplying logstash state to the appropriate nodes.\n\n"
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode' state.apply logstash queue=True
printf "\nApplying filebeat state to the appropriate nodes.\n\n"
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode or G@role:so-sensor or G@role:so-fleet' state.apply filebeat queue=True
printf "\nApplying kibana state to the appropriate nodes.\n\n"
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch' state.apply kibana queue=True
printf "\nApplying curator state to the appropriate nodes.\n\n"
salt -C 'G@role:so-standalone or G@role:so-eval or G@role:so-import or G@role:so-manager or G@role:so-managersearch or G@role:so-node or G@role:so-heavynode' state.apply curator queue=True
}
function highstateManager() {
killAllSaltJobs
printf "\nRunning highstate on the manager to finalize password reset.\n\n"
salt-call state.highstate -linfo queue=True
}
case "${user}" in
so_elastic | so_kibana | so_logstash | so_beats | so_monitor)
lock
killAllSaltJobs
disableSaltStates
removeSingleUserPass "$user"
createElasticAuthPillar
removeElasticUsersFile
unlock
soUserSync
enableSaltStates
highstateManager
;;
all)
lock
killAllSaltJobs
disableSaltStates
removeAllUserPass
createElasticAuthPillar
removeElasticUsersFile
unlock
soUserSync
enableSaltStates
highstateManager
;;
*)
fail "Unsupported user: $user"
;;
esac
exit 0
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,7 +1,7 @@
#!/bin/bash #!/bin/bash
# #
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,5 +1,5 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -54,7 +54,7 @@ PIPELINES=$({{ ELASTICCURL }} -sk https://"$ELASTICSEARCH_HOST":"$ELASTICSEARCH_
if [[ "$PIPELINES" -lt 5 ]]; then if [[ "$PIPELINES" -lt 5 ]]; then
echo "Setting up ingest pipeline(s)" echo "Setting up ingest pipeline(s)"
for MODULE in activemq apache auditd aws azure barracuda bluecoat cef checkpoint cisco coredns crowdstrike cyberark cylance elasticsearch envoyproxy f5 fortinet gcp google_workspace googlecloud gsuite haproxy ibmmq icinga iis imperva infoblox iptables juniper kafka kibana logstash microsoft misp mongodb mssql mysql nats netscout nginx o365 okta osquery panw postgresql rabbitmq radware redis santa snort snyk sonicwall sophos squid suricata system tomcat traefik zeek zscaler for MODULE in activemq apache auditd aws azure barracuda bluecoat cef checkpoint cisco coredns crowdstrike cyberark cylance elasticsearch envoyproxy f5 fortinet gcp google_workspace googlecloud gsuite haproxy ibmmq icinga iis imperva infoblox iptables juniper kafka kibana logstash microsoft mongodb mssql mysql nats netscout nginx o365 okta osquery panw postgresql rabbitmq radware redis santa snort snyk sonicwall sophos squid suricata system threatintel tomcat traefik zeek zscaler
do do
echo "Loading $MODULE" echo "Loading $MODULE"
docker exec -i so-filebeat filebeat setup modules -pipelines -modules $MODULE -c $FB_MODULE_YML docker exec -i so-filebeat filebeat setup modules -pipelines -modules $MODULE -c $FB_MODULE_YML
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+2 -2
View File
@@ -1,6 +1,6 @@
#!/usr/bin/env python3 #!/usr/bin/env python3
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -71,7 +71,7 @@ def checkApplyOption(options):
def loadYaml(filename): def loadYaml(filename):
file = open(filename, "r") file = open(filename, "r")
return yaml.load(file.read()) return yaml.safe_load(file.read())
def writeYaml(filename, content): def writeYaml(filename, content):
file = open(filename, "w") file = open(filename, "w")
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+14 -1
View File
@@ -2,11 +2,16 @@
#so-fleet-setup $FleetEmail $FleetPassword #so-fleet-setup $FleetEmail $FleetPassword
. /usr/sbin/so-common
if [[ $# -ne 2 ]] ; then if [[ $# -ne 2 ]] ; then
echo "Username or Password was not set - exiting now." echo "Username or Password was not set - exiting now."
exit 1 exit 1
fi fi
USER_EMAIL=$1
USER_PW=$2
# Checking to see if required containers are started... # Checking to see if required containers are started...
if [ ! "$(docker ps -q -f name=so-fleet)" ]; then if [ ! "$(docker ps -q -f name=so-fleet)" ]; then
echo "Starting Docker Containers..." echo "Starting Docker Containers..."
@@ -17,8 +22,16 @@ fi
docker exec so-fleet fleetctl config set --address https://127.0.0.1:8080 --tls-skip-verify --url-prefix /fleet docker exec so-fleet fleetctl config set --address https://127.0.0.1:8080 --tls-skip-verify --url-prefix /fleet
docker exec so-fleet bash -c 'while [[ "$(curl -s -o /dev/null --insecure -w ''%{http_code}'' https://127.0.0.1:8080/fleet)" != "301" ]]; do sleep 5; done' docker exec so-fleet bash -c 'while [[ "$(curl -s -o /dev/null --insecure -w ''%{http_code}'' https://127.0.0.1:8080/fleet)" != "301" ]]; do sleep 5; done'
docker exec so-fleet fleetctl setup --email $1 --password $2
# Create Security Onion Fleet Service Account + Setup Fleet
FLEET_SA_EMAIL=$(lookup_pillar_secret fleet_sa_email)
FLEET_SA_PW=$(lookup_pillar_secret fleet_sa_password)
docker exec so-fleet fleetctl setup --email $FLEET_SA_EMAIL --password $FLEET_SA_PW --name SO_ServiceAccount --org-name SO
# Create User Account
echo "$USER_PW" | so-fleet-user-add "$USER_EMAIL"
# Import Packs & Configs
docker exec so-fleet fleetctl apply -f /packs/palantir/Fleet/Endpoints/MacOS/osquery.yaml docker exec so-fleet fleetctl apply -f /packs/palantir/Fleet/Endpoints/MacOS/osquery.yaml
docker exec so-fleet fleetctl apply -f /packs/palantir/Fleet/Endpoints/Windows/osquery.yaml docker exec so-fleet fleetctl apply -f /packs/palantir/Fleet/Endpoints/Windows/osquery.yaml
docker exec so-fleet fleetctl apply -f /packs/so/so-default.yml docker exec so-fleet fleetctl apply -f /packs/so/so-default.yml
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+21 -13
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -18,7 +18,7 @@
. /usr/sbin/so-common . /usr/sbin/so-common
usage() { usage() {
echo "Usage: $0 <new-user-name>" echo "Usage: $0 <new-user-email>"
echo "" echo ""
echo "Adds a new user to Fleet. The new password will be read from STDIN." echo "Adds a new user to Fleet. The new password will be read from STDIN."
exit 1 exit 1
@@ -28,34 +28,42 @@ if [ $# -ne 1 ]; then
usage usage
fi fi
USER=$1
MYSQL_PASS=$(lookup_pillar_secret mysql) USER_EMAIL=$1
FLEET_IP=$(lookup_pillar fleet_ip) FLEET_SA_EMAIL=$(lookup_pillar_secret fleet_sa_email)
FLEET_USER=$USER FLEET_SA_PW=$(lookup_pillar_secret fleet_sa_password)
MYSQL_PW=$(lookup_pillar_secret mysql)
# Read password for new user from stdin # Read password for new user from stdin
test -t 0 test -t 0
if [[ $? == 0 ]]; then if [[ $? == 0 ]]; then
echo "Enter new password:" echo "Enter new password:"
fi fi
read -rs FLEET_PASS read -rs USER_PASS
check_password_and_exit "$FLEET_PASS" check_password_and_exit "$USER_PASS"
# Config fleetctl & login with the SO Service Account
CONFIG_OUTPUT=$(docker exec so-fleet fleetctl config set --address https://127.0.0.1:8080 --tls-skip-verify --url-prefix /fleet 2>&1 )
SALOGIN_OUTPUT=$(docker exec so-fleet fleetctl login --email $FLEET_SA_EMAIL --password $FLEET_SA_PW 2>&1)
FLEET_HASH=$(docker exec so-soctopus python -c "import bcrypt; print(bcrypt.hashpw('$FLEET_PASS'.encode('utf-8'), bcrypt.gensalt()).decode('utf-8'));" 2>&1)
if [[ $? -ne 0 ]]; then if [[ $? -ne 0 ]]; then
echo "Failed to generate Fleet password hash" echo "Unable to add user to Fleet; Fleet Service account login failed"
echo "$SALOGIN_OUTPUT"
exit 2 exit 2
fi fi
MYSQL_OUTPUT=$(docker exec so-mysql mysql -u root --password=$MYSQL_PASS fleet -e \ # Create New User
"INSERT INTO users (password,salt,username,email,admin,enabled) VALUES ('$FLEET_HASH','','$FLEET_USER','$FLEET_USER',1,1)" 2>&1) CREATE_OUTPUT=$(docker exec so-fleet fleetctl user create --email $USER_EMAIL --name $USER_EMAIL --password $USER_PASS --global-role admin 2>&1)
if [[ $? -eq 0 ]]; then if [[ $? -eq 0 ]]; then
echo "Successfully added user to Fleet" echo "Successfully added user to Fleet"
else else
echo "Unable to add user to Fleet; user might already exist" echo "Unable to add user to Fleet; user might already exist"
echo "$MYSQL_OUTPUT" echo "$CREATE_OUTPUT"
exit 2 exit 2
fi fi
# Disable forced password reset
MYSQL_OUTPUT=$(docker exec so-mysql mysql -u root --password=$MYSQL_PW fleet -e \
"UPDATE users SET admin_forced_password_reset = 0 WHERE email = '$USER_EMAIL'" 2>&1)
@@ -0,0 +1,56 @@
#!/bin/bash
#
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
. /usr/sbin/so-common
usage() {
echo "Usage: $0 <user-email>"
echo ""
echo "Deletes a user in Fleet"
exit 1
}
if [ $# -ne 1 ]; then
usage
fi
USER_EMAIL=$1
FLEET_SA_EMAIL=$(lookup_pillar_secret fleet_sa_email)
FLEET_SA_PW=$(lookup_pillar_secret fleet_sa_password)
# Config fleetctl & login with the SO Service Account
CONFIG_OUTPUT=$(docker exec so-fleet fleetctl config set --address https://127.0.0.1:8080 --tls-skip-verify --url-prefix /fleet 2>&1 )
SALOGIN_OUTPUT=$(docker exec so-fleet fleetctl login --email $FLEET_SA_EMAIL --password $FLEET_SA_PW 2>&1)
if [[ $? -ne 0 ]]; then
echo "Unable to delete user from Fleet; Fleet Service account login failed"
echo "$SALOGIN_OUTPUT"
exit 2
fi
# Delete User
DELETE_OUTPUT=$(docker exec so-fleet fleetctl user delete --email $USER_EMAIL 2>&1)
if [[ $? -eq 0 ]]; then
echo "Successfully deleted user from Fleet"
else
echo "Unable to delete user from Fleet"
echo "$DELETE_OUTPUT"
exit 2
fi
@@ -1,58 +0,0 @@
#!/bin/bash
#
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
. /usr/sbin/so-common
usage() {
echo "Usage: $0 <user-name>"
echo ""
echo "Enables or disables a user in Fleet"
exit 1
}
if [ $# -ne 2 ]; then
usage
fi
USER=$1
MYSQL_PASS=$(lookup_pillar_secret mysql)
FLEET_IP=$(lookup_pillar fleet_ip)
FLEET_USER=$USER
case "${2^^}" in
FALSE | NO | 0)
FLEET_STATUS=0
;;
TRUE | YES | 1)
FLEET_STATUS=1
;;
*)
usage
;;
esac
MYSQL_OUTPUT=$(docker exec so-mysql mysql -u root --password=$MYSQL_PASS fleet -e \
"UPDATE users SET enabled=$FLEET_STATUS WHERE username='$FLEET_USER'" 2>&1)
if [[ $? -eq 0 ]]; then
echo "Successfully updated user in Fleet"
else
echo "Failed to update user in Fleet"
echo $resp
exit 2
fi
+4 -4
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -36,9 +36,9 @@ FLEET_USER=$USER
# test existence of user # test existence of user
MYSQL_OUTPUT=$(docker exec so-mysql mysql -u root --password=$MYSQL_PASS fleet -e \ MYSQL_OUTPUT=$(docker exec so-mysql mysql -u root --password=$MYSQL_PASS fleet -e \
"SELECT count(1) FROM users WHERE username='$FLEET_USER'" 2>/dev/null | tail -1) "SELECT count(1) FROM users WHERE email='$FLEET_USER'" 2>/dev/null | tail -1)
if [[ $? -ne 0 ]] || [[ $MYSQL_OUTPUT -ne 1 ]] ; then if [[ $? -ne 0 ]] || [[ $MYSQL_OUTPUT -ne 1 ]] ; then
echo "Test for username [${FLEET_USER}] failed" echo "Test for email [${FLEET_USER}] failed"
echo " expect 1 hit in users database, return $MYSQL_OUTPUT hit(s)." echo " expect 1 hit in users database, return $MYSQL_OUTPUT hit(s)."
echo "Unable to update Fleet user password." echo "Unable to update Fleet user password."
exit 2 exit 2
@@ -64,7 +64,7 @@ fi
MYSQL_OUTPUT=$(docker exec so-mysql mysql -u root --password=$MYSQL_PASS fleet -e \ MYSQL_OUTPUT=$(docker exec so-mysql mysql -u root --password=$MYSQL_PASS fleet -e \
"UPDATE users SET password='$FLEET_HASH', salt='' where username='$FLEET_USER'" 2>&1) "UPDATE users SET password='$FLEET_HASH', salt='' where email='$FLEET_USER'" 2>&1)
if [[ $? -eq 0 ]]; then if [[ $? -eq 0 ]]; then
echo "Successfully updated Fleet user password" echo "Successfully updated Fleet user password"
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+2 -2
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -132,7 +132,7 @@ update_docker_containers() {
# Let's make sure we have the public key # Let's make sure we have the public key
run_check_net_err \ run_check_net_err \
"curl --retry 5 --retry-delay 60 -sSL https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS -o $SIGNPATH/KEYS" \ "curl --retry 5 --retry-delay 60 -sSL https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS -o $SIGNPATH/KEYS" \
"Could not pull signature key file, please ensure connectivity to https://raw.gihubusercontent.com" \ "Could not pull signature key file, please ensure connectivity to https://raw.githubusercontent.com" \
noretry >> "$LOG_FILE" 2>&1 noretry >> "$LOG_FILE" 2>&1
result=$? result=$?
if [[ $result -eq 0 ]]; then if [[ $result -eq 0 ]]; then
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+8 -4
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -21,10 +21,11 @@
{%- set MANAGERIP = salt['pillar.get']('global:managerip') -%} {%- set MANAGERIP = salt['pillar.get']('global:managerip') -%}
{%- set URLBASE = salt['pillar.get']('global:url_base') %} {%- set URLBASE = salt['pillar.get']('global:url_base') %}
{% set ES_USER = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:user', '') %} {% set ES_USER = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:user', '') %}
{% set ES_PW = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %} {% set ES_PASS = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %}
INDEX_DATE=$(date +'%Y.%m.%d') INDEX_DATE=$(date +'%Y.%m.%d')
RUNID=$(cat /dev/urandom | tr -dc 'a-z0-9' | fold -w 8 | head -n 1) RUNID=$(cat /dev/urandom | tr -dc 'a-z0-9' | fold -w 8 | head -n 1)
LOG_FILE=/nsm/import/evtx-import.log
. /usr/sbin/so-common . /usr/sbin/so-common
@@ -41,14 +42,17 @@ function evtx2es() {
EVTX=$1 EVTX=$1
HASH=$2 HASH=$2
ES_PASS=$(lookup_pillar "auth:users:so_elastic_user:pass" "elasticsearch")
ES_USER=$(lookup_pillar "auth:users:so_elastic_user:user" "elasticsearch")
docker run --rm \ docker run --rm \
-v "$EVTX:/tmp/$RUNID.evtx" \ -v "$EVTX:/tmp/$RUNID.evtx" \
--entrypoint evtx2es \ --entrypoint evtx2es \
{{ MANAGER }}:5000/{{ IMAGEREPO }}/so-pcaptools:{{ VERSION }} \ {{ MANAGER }}:5000/{{ IMAGEREPO }}/so-pcaptools:{{ VERSION }} \
--host {{ MANAGERIP }} --scheme https \ --host {{ MANAGERIP }} --scheme https \
--index so-beats-$INDEX_DATE --pipeline import.wel \ --index so-beats-$INDEX_DATE --pipeline import.wel \
--login {{ES_USER}} --pwd {{ES_PW}} \ --login $ES_USER --pwd "$ES_PASS" \
"/tmp/$RUNID.evtx" 1>/dev/null 2>/dev/null "/tmp/$RUNID.evtx" >> $LOG_FILE 2>&1
docker run --rm \ docker run --rm \
-v "$EVTX:/tmp/import.evtx" \ -v "$EVTX:/tmp/import.evtx" \
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+10 -5
View File
@@ -8,9 +8,9 @@ fi
echo "This tool will update a manager's IP address to the new IP assigned to the management network interface." echo "This tool will update a manager's IP address to the new IP assigned to the management network interface."
echo echo ""
echo "WARNING: This tool is still undergoing testing, use at your own risk!" echo "WARNING: This tool is still undergoing testing, use at your own risk!"
echo echo ""
if [ -z "$OLD_IP" ]; then if [ -z "$OLD_IP" ]; then
OLD_IP=$(lookup_pillar "managerip") OLD_IP=$(lookup_pillar "managerip")
@@ -27,7 +27,7 @@ if [ -z "$NEW_IP" ]; then
NEW_IP=$(ip -4 addr list $iface | grep inet | cut -d' ' -f6 | cut -d/ -f1) NEW_IP=$(ip -4 addr list $iface | grep inet | cut -d' ' -f6 | cut -d/ -f1)
if [ -z "$NEW_IP" ]; then if [ -z "$NEW_IP" ]; then
fail "Unable to detect new IP on interface $iface. " fail "Unable to detect new IP on interface $iface."
fi fi
echo "Detected new IP $NEW_IP on interface $iface." echo "Detected new IP $NEW_IP on interface $iface."
@@ -39,9 +39,9 @@ fi
echo "About to change old IP $OLD_IP to new IP $NEW_IP." echo "About to change old IP $OLD_IP to new IP $NEW_IP."
echo echo ""
read -n 1 -p "Would you like to continue? (y/N) " CONTINUE read -n 1 -p "Would you like to continue? (y/N) " CONTINUE
echo echo ""
if [ "$CONTINUE" == "y" ]; then if [ "$CONTINUE" == "y" ]; then
for file in $(grep -rlI $OLD_IP /opt/so/saltstack /etc); do for file in $(grep -rlI $OLD_IP /opt/so/saltstack /etc); do
@@ -49,6 +49,11 @@ if [ "$CONTINUE" == "y" ]; then
sed -i "s|$OLD_IP|$NEW_IP|g" $file sed -i "s|$OLD_IP|$NEW_IP|g" $file
done done
echo "Granting MySQL root user permissions on $NEW_IP"
docker exec -i so-mysql mysql --user=root --password=$(lookup_pillar_secret 'mysql') -e "GRANT ALL PRIVILEGES ON *.* TO 'root'@'$NEW_IP' IDENTIFIED BY '$(lookup_pillar_secret 'mysql')' WITH GRANT OPTION;" &> /dev/null
echo "Removing MySQL root user from $OLD_IP"
docker exec -i so-mysql mysql --user=root --password=$(lookup_pillar_secret 'mysql') -e "DROP USER 'root'@'$OLD_IP';" &> /dev/null
echo "The IP has been changed from $OLD_IP to $NEW_IP." echo "The IP has been changed from $OLD_IP to $NEW_IP."
echo echo
@@ -5,7 +5,7 @@
# {%- set FLEET_IP = salt['pillar.get']('global:fleet_ip', '') %} # {%- set FLEET_IP = salt['pillar.get']('global:fleet_ip', '') %}
# {%- set MANAGER = salt['pillar.get']('global:url_base', '') %} # {%- set MANAGER = salt['pillar.get']('global:url_base', '') %}
# #
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+1 -1
View File
@@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Copyright 2014,2015,2016,2017,2018,2019,2020,2021 Security Onion Solutions, LLC # Copyright 2014-2022 Security Onion Solutions, LLC
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
+30
View File
@@ -0,0 +1,30 @@
#!/bin/bash
# Copyright 2014-2022 Security Onion Solutions, LLC
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
. /usr/sbin/so-common
echo $banner
echo "Running kibana.so_savedobjects_defaults Salt state to restore default saved objects."
printf "This could take a while if another Salt job is running. \nRun this command with --force to stop all Salt jobs before proceeding.\n"
echo $banner
if [ "$1" = "--force" ]; then
printf "\nForce-stopping all Salt jobs before proceeding\n\n"
salt-call saltutil.kill_all_jobs
fi
salt-call state.apply kibana.so_savedobjects_defaults -linfo queue=True
@@ -1,5 +1,5 @@
. /usr/sbin/so-common . /usr/sbin/so-common
{% set HIGHLANDER = salt['pillar.get']('global:highlander', False) %}
wait_for_web_response "http://localhost:5601/app/kibana" "Elastic" 300 "{{ ELASTICCURL }}" wait_for_web_response "http://localhost:5601/app/kibana" "Elastic" 300 "{{ ELASTICCURL }}"
## This hackery will be removed if using Elastic Auth ## ## This hackery will be removed if using Elastic Auth ##
@@ -9,5 +9,9 @@ SESSIONCOOKIE=$({{ ELASTICCURL }} -c - -X GET http://localhost:5601/ | grep sid
# Disable certain Features from showing up in the Kibana UI # Disable certain Features from showing up in the Kibana UI
echo echo
echo "Setting up default Space:" echo "Setting up default Space:"
{% if HIGHLANDER %}
{{ ELASTICCURL }} -b "sid=$SESSIONCOOKIE" -L -X PUT "localhost:5601/api/spaces/space/default" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d' {"id":"default","name":"Default","disabledFeatures":["enterpriseSearch"]} ' >> /opt/so/log/kibana/misc.log
{% else %}
{{ ELASTICCURL }} -b "sid=$SESSIONCOOKIE" -L -X PUT "localhost:5601/api/spaces/space/default" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d' {"id":"default","name":"Default","disabledFeatures":["ml","enterpriseSearch","siem","logs","infrastructure","apm","uptime","monitoring","stackAlerts","actions","fleet"]} ' >> /opt/so/log/kibana/misc.log {{ ELASTICCURL }} -b "sid=$SESSIONCOOKIE" -L -X PUT "localhost:5601/api/spaces/space/default" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d' {"id":"default","name":"Default","disabledFeatures":["ml","enterpriseSearch","siem","logs","infrastructure","apm","uptime","monitoring","stackAlerts","actions","fleet"]} ' >> /opt/so/log/kibana/misc.log
{% endif %}
echo echo

Some files were not shown because too many files have changed in this diff Show More