Compare commits

...

1310 Commits

Author SHA1 Message Date
Mike Reeves
16da0b469a Merge pull request #11040 from Security-Onion-Solutions/2.4/dev
2.4.10
2023-08-15 07:14:03 -04:00
Mike Reeves
5c2c2908b8 Merge pull request #11044 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update DOWNLOAD_AND_VERIFY_ISO.md
2023-08-14 16:52:53 -04:00
Mike Reeves
ad9da07de1 Update DOWNLOAD_AND_VERIFY_ISO.md 2023-08-14 16:51:24 -04:00
Jason Ertel
d1210e946c Merge pull request #11043 from Security-Onion-Solutions/jertel/up
Jertel/up
2023-08-14 16:46:21 -04:00
Jason Ertel
5d6fe4d9ae Merge branch '2.4/main' into jertel/up 2023-08-14 16:44:13 -04:00
Mike Reeves
193f9c08fb Merge pull request #11042 from Security-Onion-Solutions/2.4.10
2.4.10
2023-08-14 16:41:21 -04:00
Mike Reeves
4808c21cf4 2.4.10 2023-08-14 16:34:32 -04:00
Mike Reeves
4106d1f69d 2.4.10 2023-08-14 16:33:08 -04:00
Jason Ertel
007720132b Merge pull request #11034 from Security-Onion-Solutions/dougburks-patch-1
soup should respect current indentation in soc_global.sls
2023-08-13 16:56:50 -04:00
Doug Burks
f3a58cd336 soup should respect current indentation in soc_global.sls 2023-08-13 16:46:32 -04:00
Josh Brower
faca36e74c Merge pull request #11021 from Security-Onion-Solutions/2.4/esurlfixup
Set default for import and eval only
2023-08-12 08:41:54 -04:00
Josh Brower
f38b77892b Move back 2023-08-11 17:14:48 -04:00
Josh Brower
00297cd864 Move from post to pre 2023-08-11 16:10:16 -04:00
Josh Brower
ce63e47fcd Enable forced update 2023-08-11 14:47:33 -04:00
Jason Ertel
d53489d674 Merge pull request #11023 from Security-Onion-Solutions/jertel/fixann
add missing annotations to avoid soc crash
2023-08-11 13:58:40 -04:00
Jason Ertel
1fb3a59573 add missing annotations to avoid soc crash 2023-08-11 13:41:58 -04:00
Jason Ertel
a5e60363cf add missing annotations to avoid soc crash 2023-08-11 13:38:16 -04:00
Josh Brower
3f054031a0 Set default for import and eval only 2023-08-11 13:32:22 -04:00
Josh Patterson
4a54febf38 Merge pull request #11016 from Security-Onion-Solutions/issue/10957
set SO desktop wallpaper for iso install
2023-08-11 09:22:05 -04:00
m0duspwnens
fdb2ca4167 set SO desktop wallpaper for iso install 2023-08-11 09:15:41 -04:00
Josh Brower
7112d53d4d Merge pull request #11014 from Security-Onion-Solutions/2.4/templateloadfix
Upgrade integration packages
2023-08-10 20:00:57 -04:00
Josh Brower
1d83b2f2e6 Add elasticsearch integration 2023-08-10 19:51:12 -04:00
Josh Brower
a724b95441 Merge branch '2.4/dev' into 2.4/templateloadfix 2023-08-10 19:01:24 -04:00
Josh Brower
0d894b7f52 Upgrade integration packages 2023-08-10 18:57:17 -04:00
Josh Patterson
e32d7eb127 Merge pull request #11012 from Security-Onion-Solutions/issue/10957
set desktop background
2023-08-10 16:27:56 -04:00
m0duspwnens
caced64d11 set desktop background 2023-08-10 16:10:39 -04:00
Doug Burks
3ec3f8bcd8 Merge pull request #11011 from Security-Onion-Solutions/dougburks-patch-1
Update motd.md
2023-08-10 15:17:20 -04:00
Doug Burks
4426437ad3 Update motd.md 2023-08-10 15:04:31 -04:00
Josh Patterson
1f0f74ff04 Merge pull request #11009 from Security-Onion-Solutions/fix/soruleupdate
ensure only 1 instance of so-rule-update runs. execute the cmd at the end of state run
2023-08-10 12:04:42 -04:00
m0duspwnens
e43900074a ensure only 1 instance of so-rule-update runs. execute the cmd at the end of state run 2023-08-10 11:54:49 -04:00
Josh Patterson
732d2605a7 Merge pull request #11008 from Security-Onion-Solutions/fix/esanno
Fix/esanno
2023-08-10 11:32:14 -04:00
m0duspwnens
4d497022db replace . with _x_ for soc ui compat 2023-08-10 09:52:18 -04:00
Josh Brower
2680a50927 Merge pull request #11004 from Security-Onion-Solutions/2.4/esurlfix
Unset defaults
2023-08-10 08:50:56 -04:00
Josh Brower
874dab7535 Unset defaults 2023-08-09 19:02:53 -04:00
Josh Brower
fe9917ef1c Merge pull request #11002 from Security-Onion-Solutions/2.4/fixfqdn
Move base_url to cert SAN
2023-08-09 16:41:09 -04:00
Josh Brower
e844cf11db Move base_url to cert SAN 2023-08-09 16:38:27 -04:00
m0duspwnens
f9e272dd8f add additional annotations for elasticsearch index settings 2023-08-09 16:09:23 -04:00
m0duspwnens
dfe916d7c8 add annotation for so-logs index 2023-08-09 15:19:17 -04:00
Josh Patterson
c3c769922d Merge pull request #11000 from Security-Onion-Solutions/issue/10954
Issue/10954
2023-08-09 11:31:55 -04:00
m0duspwnens
30e3fbb41c remove extra ) 2023-08-09 11:21:16 -04:00
m0duspwnens
78694807ff Merge remote-tracking branch 'origin/2.4/dev' into issue/10954 2023-08-09 11:19:19 -04:00
m0duspwnens
8844e305ab use sensor.interface for suricata. make af-packet.interface ro in soc ui 2023-08-09 11:18:47 -04:00
Josh Brower
1a37c43c98 Merge pull request #10997 from Security-Onion-Solutions/2.4/autoupgrade
Enable Agent Upgrade Check during highstate
2023-08-09 10:58:26 -04:00
Josh Brower
bf78faa0f0 Enable upgrade check during state run 2023-08-09 10:43:34 -04:00
Josh Brower
204ef7e68f Merge pull request #10994 from Security-Onion-Solutions/2.4/autoupgrade
RC2 Fixes
2023-08-09 09:47:57 -04:00
Josh Patterson
176608d2f9 Merge pull request #10995 from Security-Onion-Solutions/fix/desktop
Fix/desktop
2023-08-09 09:34:44 -04:00
m0duspwnens
28dfdbf06d securityonion_desktop is just desktop 2023-08-09 08:51:39 -04:00
m0duspwnens
a443c654e5 fix desktop pillar in setup 2023-08-09 08:48:00 -04:00
m0duspwnens
6413050f2e set doc_desktop_url before jinja 2023-08-09 08:39:46 -04:00
m0duspwnens
fe7a940082 add details for enabling in soc gui 2023-08-09 08:31:54 -04:00
Josh Brower
e586d6b967 Extract Elastic Agent tarball for airgap soup 2023-08-09 08:30:19 -04:00
m0duspwnens
2d25e352d4 write to adv_ pillar file since that is where it would be stored from using the soc ui 2023-08-09 08:18:13 -04:00
Josh Brower
4297d51a2d Refactor for multiple agents 2023-08-09 08:14:52 -04:00
m0duspwnens
1440c72559 changes for desktop referencing Rocky/CentOS to OEL 2023-08-09 08:06:51 -04:00
m0duspwnens
00efc2f88f rename workstation to desktop for firewall 2023-08-09 07:31:31 -04:00
Josh Patterson
d55c2f889c Merge pull request #10989 from Security-Onion-Solutions/issue/10973
Issue/10973
2023-08-08 19:35:02 -04:00
Josh Brower
e1e535b009 Retry if exit code is error 2023-08-08 18:38:18 -04:00
m0duspwnens
789fff561e ensure ownership of /opt/so/log/strelka/filecheck.log 2023-08-08 17:55:30 -04:00
m0duspwnens
58fe25623b ensure ownership of /opt/so/log/strelka/filecheck_stdout.log 2023-08-08 17:48:34 -04:00
m0duspwnens
553b758c61 update cronjobs first, the kill filecheck 2023-08-08 17:28:14 -04:00
m0duspwnens
6da2f117f2 change which user runs filecheck cron based on md engine 2023-08-08 17:25:08 -04:00
Doug Burks
6ad22edf8e Merge pull request #10987 from Security-Onion-Solutions/dougburks-patch-1
Update soup for 2.4.10
2023-08-08 17:18:38 -04:00
m0duspwnens
2dbe679849 force restart of filecheck if the config changes 2023-08-08 17:05:03 -04:00
Doug Burks
2f74b69cc3 Update soup for 2.4.10 2023-08-08 16:27:11 -04:00
bryant-treacle
4320dab856 Merge pull request #10986 from Security-Onion-Solutions/fix/windows_event_table
Fix/windows event table
2023-08-08 16:23:14 -04:00
bryant-treacle
036b81707b Update defaults.yaml 2023-08-08 16:10:54 -04:00
Josh Brower
8455d3da6f Merge pull request #10977 from Security-Onion-Solutions/2.4/squashbug
Set as default
2023-08-08 15:55:58 -04:00
bryant-treacle
3d4fd08547 Update defaults.yaml 2023-08-08 15:28:06 -04:00
m0duspwnens
21c80e4953 run so-rule-update after idstools container restart 2023-08-08 15:27:23 -04:00
m0duspwnens
5c704d7e58 run so-rule-update if idstools configs change 2023-08-08 15:20:44 -04:00
m0duspwnens
230f5868f9 sync sorules 2023-08-08 15:14:27 -04:00
m0duspwnens
20dedab4b2 remove previously add rules files 2023-08-08 15:03:06 -04:00
m0duspwnens
9118ac2b56 filter.rules to filters.rules 2023-08-08 13:59:43 -04:00
m0duspwnens
aab89d2483 rule-files does not go under profiling 2023-08-08 13:54:58 -04:00
m0duspwnens
b2e75e77e8 add local.rules and filter.rules to suricata defaults. add extraction.rules, local.rules and filter.rules for suricata metadata 2023-08-08 13:50:19 -04:00
Josh Patterson
bcd1ccd91b Merge pull request #10983 from Security-Onion-Solutions/fix/tgrafzeekcloss
Fix/tgrafzeekcloss
2023-08-08 10:19:46 -04:00
m0duspwnens
673b45af09 import ZEEKMERGED 2023-08-08 09:41:42 -04:00
m0duspwnens
a06040c035 add WORKERS calculation back to zeekcaptureloss script 2023-08-08 09:37:37 -04:00
m0duspwnens
e286b8f2ba Merge remote-tracking branch 'origin/2.4/dev' into fix/tgrafzeekcloss 2023-08-08 09:36:12 -04:00
m0duspwnens
69553f9017 removes spaces from zeekcaptureloss script 2023-08-08 09:34:59 -04:00
m0duspwnens
609a2bf32e only import ZEEKMERGED if a sensor type node 2023-08-08 09:27:03 -04:00
Jason Ertel
dad541423d Merge pull request #10978 from Security-Onion-Solutions/jertel/bumpver
update version
2023-08-07 16:36:10 -04:00
Jason Ertel
b9d0d03223 update version 2023-08-07 16:35:05 -04:00
Josh Brower
8611d1848c Set as default 2023-08-07 15:55:53 -04:00
m0duspwnens
5278601e5d manage telegraf scripts with a defaults file assigned per node type 2023-08-07 11:18:35 -04:00
Doug Burks
a13b3f305a Merge pull request #10970 from Security-Onion-Solutions/2.4/dev
2.4.5 RC2
2023-08-07 10:21:29 -04:00
Doug Burks
38089c6662 Merge pull request #10971 from Security-Onion-Solutions/2.4/main
2.4/main to 2.4/dev
2023-08-07 10:17:51 -04:00
Doug Burks
2d863f09eb Merge pull request #10969 from Security-Onion-Solutions/dougburks-patch-1
add spaces for proper rendering DOWNLOAD_AND_VERIFY_ISO.md
2023-08-07 09:31:33 -04:00
Doug Burks
37b98ba188 add spaces for proper rendering DOWNLOAD_AND_VERIFY_ISO.md 2023-08-07 09:29:34 -04:00
Doug Burks
65d1e57ccd Merge pull request #10968 from Security-Onion-Solutions/dougburks-patch-1
prepare for 2.4.5 ISO image release
2023-08-07 09:15:53 -04:00
Doug Burks
9ae32e2bd6 create sigs directory and add sig for 2.4.5 2023-08-07 09:02:52 -04:00
Doug Burks
6e8f31e083 Delete sigs 2023-08-07 08:59:24 -04:00
Doug Burks
3c5cd941c7 Update DOWNLOAD_AND_VERIFY_ISO.md for 2.4.5 2023-08-07 08:45:30 -04:00
Doug Burks
2ea2a4d0a7 Merge pull request #10964 from Security-Onion-Solutions/dougburks-patch-1
Revert yesterday's change to zeekcaptureloss.sh
2023-08-05 09:23:58 -04:00
Doug Burks
90102b1148 Finish reverting yesterday's change to zeekcaptureloss.sh 2023-08-05 09:23:27 -04:00
Doug Burks
ec81cbd70d Revert yesterday's change to zeekcaptureloss.sh 2023-08-05 09:11:58 -04:00
Josh Patterson
59c0109c91 Merge pull request #10961 from Security-Onion-Solutions/fix/tgrafzeekcloss
fix count of WORKERS for zeekcaptureloss script for telegraf
2023-08-04 16:39:26 -04:00
m0duspwnens
9af2a731ca fix count of WORKERS for zeekcaptureloss script for telegraf 2023-08-04 16:29:30 -04:00
Josh Brower
9b656ebbc0 Merge pull request #10960 from Security-Onion-Solutions/2.4/fleetcustomfqdn
Refactor to remove new line
2023-08-04 16:16:43 -04:00
Josh Brower
9d3744aa25 Refactor to remove new line 2023-08-04 16:05:28 -04:00
Josh Patterson
9fddd56c96 Merge pull request #10959 from Security-Onion-Solutions/desktopyummv
Desktopyummv
2023-08-04 16:03:20 -04:00
m0duspwnens
89c4f58296 fix indents 2023-08-04 15:41:10 -04:00
m0duspwnens
0ba1e7521a set default session for preexisting users 2023-08-04 15:36:44 -04:00
m0duspwnens
36747cf940 add networkminer to desktop.packages 2023-08-04 13:52:01 -04:00
Doug Burks
118088c35f Merge pull request #10953 from Security-Onion-Solutions/dougburks-patch-1
FEATURE: soup should rotate its log file #10951
2023-08-04 12:38:21 -04:00
Doug Burks
63373710b4 Update soup to rotate log file 2023-08-04 12:26:36 -04:00
Doug Burks
209da766ba Update soup to rotate log file 2023-08-04 12:16:14 -04:00
m0duspwnens
433cde0f9e Merge remote-tracking branch 'origin/2.4/dev' into desktopyummv 2023-08-04 11:25:06 -04:00
Josh Patterson
9fe9256a0f Merge pull request #10950 from Security-Onion-Solutions/fix/idhfirewall
Fix/idhfirewall
2023-08-04 11:00:58 -04:00
m0duspwnens
014aeffb2a add analyst back 2023-08-04 09:56:33 -04:00
m0duspwnens
3b86b60207 Merge remote-tracking branch 'origin/2.4/dev' into fix/idhfirewall 2023-08-04 09:40:01 -04:00
m0duspwnens
0f52530d07 soc_firewall.yaml update adding idh and rename analyst to workstation 2023-08-04 09:37:58 -04:00
m0duspwnens
726ec72350 allow idh to connect to salt_manager ports on managres 2023-08-04 09:22:59 -04:00
Doug Burks
560ec9106d Merge pull request #10948 from Security-Onion-Solutions/dougburks-patch-1
Update so-whiptail
2023-08-04 09:21:55 -04:00
m0duspwnens
a51acfc314 rename analyst to workstation for fw rules. allow workstation to connect to salt_manager port on managers 2023-08-04 09:17:22 -04:00
Doug Burks
78950ebfbb Update so-whiptail 2023-08-04 09:16:58 -04:00
Josh Brower
d3ae2b03f0 Merge pull request #10947 from Security-Onion-Solutions/2.4/comm_id
Generate community_id for defend endpoint logs
2023-08-04 09:07:35 -04:00
Josh Brower
dd1fa51eb5 Generate community_id for defend endpoint logs 2023-08-04 09:03:17 -04:00
m0duspwnens
682289ef23 add sensoroni ports where missing 2023-08-04 09:01:09 -04:00
m0duspwnens
593cdbd060 add rules for idh to connect to managers, change idh from sensor to idh in so-firewall-minion 2023-08-04 08:50:06 -04:00
Josh Brower
4ed0ba5040 Merge pull request #10946 from Security-Onion-Solutions/2.4/logstashfix
Don't watch certs on search nodes
2023-08-03 19:01:13 -04:00
Josh Brower
2472d6a727 Don't watch certs on search nodes 2023-08-03 18:52:29 -04:00
Mike Reeves
18e31a4490 Merge pull request #10944 from Security-Onion-Solutions/raid
Raid refactor + yara and rule proxy
2023-08-03 17:18:19 -04:00
Mike Reeves
2caca92082 Raid refactor + yara and rule proxy 2023-08-03 17:11:43 -04:00
weslambert
abf74e0ae4 Merge pull request #10940 from Security-Onion-Solutions/foxtrot
Add time shift for so-import-evtx
2023-08-03 16:56:40 -04:00
Josh Brower
dc7ce5ba8f Merge pull request #10941 from Security-Onion-Solutions/2.4/defendupdate
Update for 8.8.2
2023-08-03 16:28:56 -04:00
Josh Brower
6b5343f582 Update for 8.8.2 2023-08-03 16:25:02 -04:00
weslambert
ca6276b922 Update VERSION 2023-08-03 15:58:33 -04:00
weslambert
3e4136e641 Update help text 2023-08-03 15:56:05 -04:00
m0duspwnens
15b8e1a753 add convert-gnome-classic.sh 2023-08-03 15:37:26 -04:00
Doug Burks
b7197bbd16 Merge pull request #10939 from Security-Onion-Solutions/dougburks-patch-1
Update soup for airgap
2023-08-03 15:28:28 -04:00
Josh Brower
8966617508 Merge pull request #10926 from Security-Onion-Solutions/2.4/FleetEnhancments
2.4/fleet-Enhancements
2023-08-03 15:28:03 -04:00
Doug Burks
9319c3f2e1 Update soup for airgap 2023-08-03 15:27:24 -04:00
m0duspwnens
d4fbf7d6a6 convert to gnome classic 2023-08-03 15:26:43 -04:00
Josh Brower
e78fcbc6cb Refactor for Jinja instead 2023-08-03 15:25:11 -04:00
Josh Brower
27b70cbf68 Use jinja instead 2023-08-03 15:21:20 -04:00
Josh Patterson
ffb54135d1 Merge pull request #10938 from Security-Onion-Solutions/desktopyummv
Desktopyummv
2023-08-03 14:54:29 -04:00
m0duspwnens
d40a8927c3 install salt version specified in master.defaults.yaml for desktop 2023-08-03 14:51:43 -04:00
m0duspwnens
9172e10dba check if there are files in yum.repos.d before trying to move them 2023-08-03 14:47:53 -04:00
Doug Burks
1907ea805c Merge pull request #10937 from Security-Onion-Solutions/dougburks-patch-1
Update soup for airgap
2023-08-03 14:39:53 -04:00
Doug Burks
80598d7f8d Update soup for airgap 2023-08-03 14:36:47 -04:00
Josh Patterson
13c3e7f5ff Merge pull request #10934 from Security-Onion-Solutions/fix/soupairgap
ensure AIRGAP is lowercase and check for true
2023-08-03 12:00:06 -04:00
m0duspwnens
d4389d5057 ensure AIRGAP is lowercase and check for true 2023-08-03 11:56:48 -04:00
weslambert
cf2233bbb6 Add help information for time shift 2023-08-03 08:54:54 -04:00
weslambert
3847863b3d Add time shift 2023-08-03 08:51:23 -04:00
weslambert
3368789b43 Update VERSION 2023-08-03 08:49:45 -04:00
Josh Brower
1bc7bbc76e Refactor custom_fqdn 2023-08-02 20:02:37 -04:00
Jason Ertel
e108bb9bcd Merge pull request #10932 from Security-Onion-Solutions/jertel/agentcommon
remove unused vars
2023-08-02 19:29:03 -04:00
Jason Ertel
5414b0756c remove unused vars 2023-08-02 19:25:07 -04:00
Jason Ertel
11c827927c Merge pull request #10931 from Security-Onion-Solutions/jertel/agentcommon
refactor elastic-agent download for soup ctrl+c anomalies
2023-08-02 19:20:45 -04:00
Jason Ertel
3054b8dcb9 refactor elastic-agent download for soup ctrl+c anomalies 2023-08-02 18:57:46 -04:00
Josh Brower
399758cd5f Merge remote-tracking branch 'origin/2.4/dev' into 2.4/FleetEnhancments 2023-08-02 17:58:48 -04:00
Josh Brower
1c8a8c460c Restart logstash when certs change 2023-08-02 17:53:29 -04:00
Josh Brower
ab28cee7cf Allow multiple Custom Fleet FQDN 2023-08-02 17:45:37 -04:00
Mike Reeves
5a3c1f0373 Merge pull request #10930 from Security-Onion-Solutions/m0duspwnens-patch-2
add gtk2
2023-08-02 16:58:38 -04:00
Josh Patterson
435da77388 add gtk2 2023-08-02 16:53:45 -04:00
Mike Reeves
da2910e36f Merge pull request #10927 from Security-Onion-Solutions/m0duspwnens-patch-1
add mono-devel
2023-08-02 16:22:09 -04:00
Josh Patterson
eb512d9aa2 add mono-devel 2023-08-02 16:21:23 -04:00
Mike Reeves
03f5e44be7 Merge pull request #10924 from Security-Onion-Solutions/2.4/regenagent
Regen Agent Installers
2023-08-02 15:28:29 -04:00
Josh Brower
f153c1125d Allow multiple Custom Fleet FQDN 2023-08-02 15:23:18 -04:00
Jason Ertel
99b61b5e1d Merge pull request #10925 from Security-Onion-Solutions/jertel/fiximportsuri
ensure suri rules are synced for import installs
2023-08-02 15:13:59 -04:00
Jason Ertel
8036df4b20 ensure suri rules are synced for import installs 2023-08-02 15:10:31 -04:00
Josh Brower
aab55c8cf6 Regen Agent Installers 2023-08-02 15:09:26 -04:00
Josh Patterson
f3c5d26a4e Merge pull request #10923 from Security-Onion-Solutions/soupaloop
Soupaloop
2023-08-02 14:44:49 -04:00
m0duspwnens
64776936cc no longer need so-user migrate in 2.4 2023-08-02 14:09:43 -04:00
m0duspwnens
c17b324108 dont count adv_ sls files for number of minions in deployment 2023-08-02 14:04:19 -04:00
weslambert
72e1cbbfb6 Merge pull request #10920 from Security-Onion-Solutions/fix/pfsense
Pfsense fix
2023-08-02 13:27:33 -04:00
weslambert
f102351052 Add event 2023-08-02 13:25:44 -04:00
weslambert
ac28f90af3 Remove override 2023-08-02 13:15:11 -04:00
m0duspwnens
f6c6204555 procps to procps-ng 2023-08-02 13:05:24 -04:00
m0duspwnens
9873121000 change pgrep for salt-minion PID 2023-08-02 12:54:31 -04:00
m0duspwnens
5630b353c4 change how pgrep finds salt-master PID 2023-08-02 11:20:51 -04:00
Josh Patterson
04ed5835ae Merge pull request #10918 from Security-Onion-Solutions/issue/10917
force portgroups added to hostgroups in roles to be list of strings
2023-08-02 11:00:41 -04:00
m0duspwnens
407cb2a537 force portgroups added to hostgroups in roles to be list of strings 2023-08-02 10:56:41 -04:00
Josh Brower
b520c1abb7 Allow multiple Custom Fleet FQDN 2023-08-02 10:36:40 -04:00
weslambert
25b11c35fb Merge pull request #10915 from Security-Onion-Solutions/fix/ea_elastic_defend
Set version for Elastic Defend and enable updates
2023-08-02 10:32:30 -04:00
weslambert
ef0301d364 Merge pull request #10914 from Security-Onion-Solutions/feature/package_list
Add package list
2023-08-02 10:03:38 -04:00
Wes
e694019027 Add package list 2023-08-02 13:50:14 +00:00
weslambert
22ebb2faf6 Merge pull request #10907 from Security-Onion-Solutions/fix/ea_container_logs
EA Container Logs
2023-08-02 09:26:53 -04:00
Wes
0d5ed2e835 Set version for Elastic Defend and enable updates 2023-08-02 13:21:03 +00:00
Josh Patterson
8ab1769d70 Merge pull request #10912 from Security-Onion-Solutions/mineerror
Mine error
2023-08-01 17:21:31 -04:00
Jason Ertel
6692fffb9b Merge pull request #10910 from Security-Onion-Solutions/jertel/noautoredirforapi
Fix login flicker; so-status sluggishness
2023-08-01 17:05:48 -04:00
Jason Ertel
23414599ee use simple json (w/o template) to resolve sluggishness 2023-08-01 16:53:26 -04:00
Jason Ertel
8b3a38f573 resolve login page flicker 2023-08-01 16:30:24 -04:00
m0duspwnens
9ec4322bf4 Merge remote-tracking branch 'origin/2.4/dev' into mineerror 2023-08-01 16:21:22 -04:00
m0duspwnens
7037fc52f8 sync all modules before running states 2023-08-01 16:21:06 -04:00
Wes
0e047cffad Add to logrotate 2023-08-01 20:14:53 +00:00
Wes
44b086a028 Change path 2023-08-01 20:13:50 +00:00
Wes
4e2eb86b36 Move LOGS_PATH to environment vars 2023-08-01 20:11:51 +00:00
weslambert
1cbf60825d Add log dir 2023-08-01 14:40:52 -04:00
weslambert
2d13bf1a61 Present logs to the host 2023-08-01 14:40:12 -04:00
Josh Brower
968fee3488 Regen Agent Installers when Fleet URLs change 2023-08-01 13:10:41 -04:00
Doug Burks
da51fd59a0 Merge pull request #10905 from Security-Onion-Solutions/dougburks-patch-1
Update verbiage and links in soc_sensor.yaml
2023-08-01 12:52:22 -04:00
Doug Burks
3fa0a98830 Update verbiage and links in soc_sensor.yaml 2023-08-01 12:45:09 -04:00
weslambert
e7bef745eb Merge pull request #10904 from Security-Onion-Solutions/fix/syslog
Move syslog to the INPUT chain where needed
2023-08-01 12:14:48 -04:00
Mike Reeves
82b335ed04 Merge pull request #10899 from Security-Onion-Solutions/offload
Fix Offload
2023-08-01 10:32:53 -04:00
Mike Reeves
f35f42c83d Sensor NIC offload 2023-08-01 10:23:45 -04:00
weslambert
4adaddf13f Move syslog to the INPUT chain where needed 2023-08-01 10:14:59 -04:00
Mike Reeves
b6579d7d45 Sensor NIC offload 2023-08-01 10:13:44 -04:00
Mike Reeves
87a5d20ac9 Sensor NIC offload 2023-08-01 10:03:59 -04:00
Mike Reeves
2875a7a2e5 Sensor NIC offload 2023-08-01 09:48:44 -04:00
Josh Brower
f27ebc47c1 Merge pull request #10897 from Security-Onion-Solutions/2.4/heavyrc2
2.4/heavyrc2
2023-08-01 09:15:10 -04:00
Josh Brower
63b4bdcebe Merge remote-tracking branch 'origin/2.4/dev' into 2.4/heavyrc2 2023-08-01 08:53:07 -04:00
weslambert
ba3660d0da Merge pull request #10894 from Security-Onion-Solutions/fix/soc_auth
SOC Auth msg fix
2023-08-01 08:35:41 -04:00
weslambert
83265d9d6c Merge pull request #10893 from Security-Onion-Solutions/foxtrot
Elastic 8.2.2
2023-08-01 08:20:07 -04:00
weslambert
527a6ba454 Use asterisk when searching 'msg' since it is now a keyword 2023-07-31 23:52:38 -04:00
weslambert
f84b0a3219 Update VERSION 2023-07-31 23:16:46 -04:00
weslambert
ae6997a6b7 Merge pull request #10892 from Security-Onion-Solutions/feature/elastic_8.8.2
Elastic 8.8.2
2023-07-31 22:24:21 -04:00
weslambert
9d59e4250f Update VERSION 2023-07-31 22:23:54 -04:00
Wes
48d9c14563 Enable log package by default 2023-08-01 02:20:43 +00:00
Wes
29b64eadd4 Change log.log to log.logs 2023-08-01 02:20:22 +00:00
weslambert
5dd5f9fc1c Elastic 8.8.2 2023-07-31 22:18:43 -04:00
weslambert
44c926ba8d Elastic 8.8.2 2023-07-31 22:18:07 -04:00
weslambert
6a55a8e5c0 Elastic 8.2.2 2023-07-31 22:17:22 -04:00
Josh Brower
64bad0a9cf Merge remote-tracking branch 'origin/2.4/dev' into 2.4/heavyrc2 2023-07-31 15:24:32 -04:00
Josh Brower
b6dd347eb8 Heavy Node add manager 2023-07-31 15:22:29 -04:00
Josh Brower
a89508f1ae Heavy Node fixes 2023-07-31 15:17:24 -04:00
Josh Patterson
ed7b674fbb Merge pull request #10891 from Security-Onion-Solutions/fix/idh
import DOCKER in idh.enabled
2023-07-31 15:06:26 -04:00
Josh Patterson
0c2a4cbaba Merge pull request #10889 from Security-Onion-Solutions/searchnodefw
add managersearch and standlone fw rules for searchnode
2023-07-31 13:37:39 -04:00
m0duspwnens
57562ad5e3 add managersearch and standlone fw rules for searchnode 2023-07-31 13:34:08 -04:00
m0duspwnens
95581f505a import DOCKER in idh.enabled 2023-07-31 13:18:57 -04:00
Mike Reeves
599de60dc8 Merge pull request #10888 from Security-Onion-Solutions/soups
Update Soup
2023-07-31 13:14:54 -04:00
Mike Reeves
77101fec12 Update Soup 2023-07-31 13:12:32 -04:00
Mike Reeves
069d32be1a Merge pull request #10887 from Security-Onion-Solutions/soups
Soup
2023-07-31 13:10:02 -04:00
Mike Reeves
e78e6b74ed Update Soup 2023-07-31 13:07:29 -04:00
Mike Reeves
16217912db Update Soup 2023-07-31 13:04:33 -04:00
Josh Patterson
635ddc9b21 Merge pull request #10886 from Security-Onion-Solutions/iptables
Iptables
2023-07-31 11:36:22 -04:00
Mike Reeves
18d8f0d448 Merge pull request #10885 from Security-Onion-Solutions/sensorfix
Sensor Fix
2023-07-31 10:37:28 -04:00
Mike Reeves
1c42d70d30 Update soc_sensor.yaml 2023-07-31 10:36:00 -04:00
Mike Reeves
282f13a774 Merge pull request #10881 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update so-yara-download
2023-07-31 10:23:32 -04:00
Mike Reeves
f867be9e04 Fix no_proxy 2023-07-31 10:19:51 -04:00
Mike Reeves
4939447764 Update so-yara-download 2023-07-31 10:16:37 -04:00
Mike Reeves
5a59975cb8 Update so-yara-download 2023-07-31 10:14:31 -04:00
coreyogburn
20f3cedc01 Merge pull request #10842 from Security-Onion-Solutions/cogburn/7992
New Action "Add to Case"
2023-07-28 14:54:28 -06:00
Doug Burks
e563d71856 Merge pull request #10871 from Security-Onion-Solutions/dougburks-patch-1
Update README.md to 2.4 RC2
2023-07-28 16:33:06 -04:00
Doug Burks
1ca78fd297 Update README.md to 2.4 RC2 2023-07-28 16:29:46 -04:00
Mike Reeves
e76ee718e0 Merge pull request #10870 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-07-28 16:08:53 -04:00
Mike Reeves
5c90a5f27e Update VERSION 2023-07-28 16:08:01 -04:00
Mike Reeves
bee429fe29 Merge pull request #10868 from Security-Onion-Solutions/2.4/dev
2.4.4
2023-07-28 16:00:45 -04:00
m0duspwnens
ecbb353d68 Merge remote-tracking branch 'origin/2.4/dev' into iptables 2023-07-28 15:12:08 -04:00
Mike Reeves
ed21b94c28 Merge pull request #10867 from Security-Onion-Solutions/2.4.4
2.4.4
2023-07-28 14:53:23 -04:00
Mike Reeves
2a282a29c3 2.4.4 2023-07-28 14:49:50 -04:00
Mike Reeves
bc09b418ca Merge pull request #10866 from Security-Onion-Solutions/rockyepel
Rockyepel
2023-07-28 14:06:36 -04:00
m0duspwnens
6f6db61a69 remove epel-next 2023-07-28 14:04:27 -04:00
m0duspwnens
9fce80dba3 install epel-next after epel-release 2023-07-28 14:01:14 -04:00
Mike Reeves
abfec85e28 Merge pull request #10863 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update so-functions
2023-07-28 12:21:20 -04:00
Mike Reeves
9aa655365b Update so-functions 2023-07-28 12:20:15 -04:00
Corey Ogburn
aa56085758 New Action "Add to Case" 2023-07-28 09:55:44 -06:00
Mike Reeves
9a3760951a Merge pull request #10861 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update so-functions
2023-07-28 11:35:49 -04:00
m0duspwnens
4c8373452d change to iptables-nft-services 2023-07-28 11:35:34 -04:00
Mike Reeves
0bb5db2e72 Update so-functions 2023-07-28 11:34:30 -04:00
Mike Reeves
2dbc7d8485 Merge pull request #10859 from Security-Onion-Solutions/ordesk
Ordesk
2023-07-28 10:56:15 -04:00
Mike Reeves
858e884ec2 Fix Desktop ISO install 2023-07-28 10:52:37 -04:00
Mike Reeves
4672eeb99b Fix Desktop ISO install 2023-07-28 10:51:45 -04:00
Mike Reeves
aa824e7b6c Merge pull request #10857 from Security-Onion-Solutions/ordesk
Oracle Desktop
2023-07-28 09:58:46 -04:00
Mike Reeves
bb2a1b9521 Fix Desktop ISO install 2023-07-28 09:46:27 -04:00
m0duspwnens
3a22ef8e86 change iptables package name for redhat fam 2023-07-28 08:40:32 -04:00
m0duspwnens
54080c42fe enable, not enabled 2023-07-27 17:01:19 -04:00
Mike Reeves
a1fa87c150 Merge pull request #10853 from Security-Onion-Solutions/TOoSmOotH-patch-1
Don't restart suricata if it doesn't exist
2023-07-27 16:38:45 -04:00
Mike Reeves
0c553633b1 Don't restart suricata if it doesn't exist 2023-07-27 16:16:46 -04:00
m0duspwnens
12486599e0 Merge remote-tracking branch 'origin/2.4/dev' into iptables 2023-07-27 16:13:58 -04:00
m0duspwnens
3c16218c5a map services,pkg,config for firewall state 2023-07-27 15:45:18 -04:00
Josh Patterson
f9850025ea Merge pull request #10852 from Security-Onion-Solutions/2.4/debian
2.4/debian
2023-07-27 15:05:23 -04:00
Mike Reeves
65b76d72ca Merge pull request #10850 from Security-Onion-Solutions/ordesk
Fix packages for desktop
2023-07-27 14:44:44 -04:00
Mike Reeves
afca15f444 Fix packages for desktop 2023-07-27 14:17:43 -04:00
Mike Reeves
65b9843f14 Fix packages for desktop 2023-07-27 14:11:53 -04:00
m0duspwnens
653e2d8205 Merge remote-tracking branch 'origin/2.4/dev' into 2.4/debian 2023-07-27 10:26:12 -04:00
Josh Patterson
bbaf6df914 Merge pull request #10849 from Security-Onion-Solutions/iptables
Iptables
2023-07-27 10:00:46 -04:00
m0duspwnens
bc182c1c43 only run firewalld states if os_family is RedHat 2023-07-27 09:24:41 -04:00
m0duspwnens
fe9b934af6 Merge remote-tracking branch 'origin/2.4/dev' into iptables 2023-07-26 16:32:03 -04:00
m0duspwnens
373298430b only run iptables-restore if config file is valid 2023-07-26 16:31:22 -04:00
Mike Reeves
4a18eb02f3 Merge pull request #10847 from Security-Onion-Solutions/ordesk
SO Desktop
2023-07-26 15:53:40 -04:00
m0duspwnens
0aab3e185e dont manage interfaces listed in /etc/network/interfaces for debian 2023-07-26 15:16:44 -04:00
Josh Brower
b1fb05dd28 Merge pull request #10841 from Security-Onion-Solutions/2.4/eqlfields
Fix formatting
2023-07-26 11:25:20 -04:00
Josh Brower
9437a47946 Fix formatting 2023-07-26 10:54:24 -04:00
Josh Brower
bdf4f6190d Merge pull request #10829 from Security-Onion-Solutions/2.4/heavynoderedux
Heavy Node fixes
2023-07-26 10:41:42 -04:00
Josh Brower
f24a3a51ce Heavy Node fixes 2023-07-25 18:28:41 -04:00
m0duspwnens
ba6043392c reorder whiptail text 2023-07-25 16:18:01 -04:00
m0duspwnens
60eb1611ea upgrade packages for debian and reboot prior to so installation 2023-07-25 16:06:38 -04:00
Josh Brower
3ef6ea9155 Merge pull request #10826 from Security-Onion-Solutions/2.4/navfix
Upgrade Nav
2023-07-25 12:26:07 -04:00
Josh Brower
2b38bc778d Upgrade Nav 2023-07-25 12:24:23 -04:00
m0duspwnens
e334d44c95 need quotes for logCmd 2023-07-25 11:03:10 -04:00
m0duspwnens
39662ccf14 import rpm logic change 2023-07-25 10:21:44 -04:00
m0duspwnens
fd69d1c714 remove quotes so sed will work in logCmd 2023-07-25 09:59:02 -04:00
m0duspwnens
63eebdf6ac installer_prereq_packages is run for debian during detect_os so not needed again 2023-07-25 09:58:26 -04:00
Josh Brower
e19845e41d Merge pull request #10819 from Security-Onion-Solutions/fix/elasticsearch_endpoint
Add endpoint to defaults
2023-07-25 09:11:06 -04:00
Josh Patterson
c1190064ad Merge pull request #10823 from Security-Onion-Solutions/2.4/dockerips
2.4/dockerips
2023-07-25 08:39:49 -04:00
Josh Brower
4f94d953c9 Merge remote-tracking branch 'origin/2.4/dev' into fix/elasticsearch_endpoint 2023-07-25 07:42:59 -04:00
Josh Brower
71a83c1fe9 Merge pull request #10815 from Security-Onion-Solutions/2.4/SigmaMappings
2.4/sigma mappings
2023-07-25 07:23:25 -04:00
Wes
5553be02ac Change how tags are added 2023-07-24 21:31:28 +00:00
m0duspwnens
b20fad2839 add missing do 2023-07-24 17:08:01 -04:00
m0duspwnens
16edca7834 fix failed copy paste 2023-07-24 17:06:49 -04:00
m0duspwnens
2545f9907f dont allow 172.17.0.0/24 for custom dockernet 2023-07-24 17:00:20 -04:00
Wes
4efc951eaf Add tags 2023-07-24 20:57:39 +00:00
Doug Burks
d75191d679 Merge pull request #10820 from Security-Onion-Solutions/dougburks-patch-1
Update README.md
2023-07-24 15:35:34 -04:00
Doug Burks
ee667a48c9 Update README.md 2023-07-24 15:33:50 -04:00
Josh Brower
067a83a87c Merge pull request #10818 from Security-Onion-Solutions/2.4/fixnavigator
Update & Fix Navigator
2023-07-24 15:13:09 -04:00
Wes
d84dbf9535 Add fleet 2023-07-24 18:53:52 +00:00
m0duspwnens
d71254ad29 only add custom docker net to pillar 2023-07-24 14:47:14 -04:00
Wes
de7b7ff989 Add endpoint 2023-07-24 18:35:02 +00:00
Josh Brower
510900e640 Update & Fix Navigator 2023-07-24 13:56:22 -04:00
m0duspwnens
00483018ca change docker bip to gateway 2023-07-24 13:38:14 -04:00
Mike Reeves
9416a14971 Merge pull request #10816 from Security-Onion-Solutions/gpgoracle
add oracle key
2023-07-24 11:02:10 -04:00
Mike Reeves
c9faa1a340 Add gui 2023-07-24 11:00:26 -04:00
m0duspwnens
9bda01bd29 change ranges 2023-07-24 10:40:23 -04:00
Josh Brower
eead0c42d4 Merge remote-tracking branch 'origin/2.4/dev' into 2.4/SigmaMappings 2023-07-24 09:27:14 -04:00
Josh Brower
741e6039c1 Cleanup for Sigma Rules 2023-07-24 09:25:58 -04:00
m0duspwnens
db09b465bd change default docker net/range 2023-07-24 09:23:13 -04:00
Doug Burks
a59f2ded38 Merge pull request #10813 from Security-Onion-Solutions/2.4/fix-packages-sls
Update packages.sls
2023-07-24 08:08:11 -04:00
Doug Burks
e2fe04dadc Update packages.sls 2023-07-24 07:10:48 -04:00
Doug Burks
563bf2ff3a Merge pull request #10812 from Security-Onion-Solutions/fuse
Update packages.sls
2023-07-24 06:48:47 -04:00
Mike Reeves
07eeb4e2a0 Update packages.sls 2023-07-23 21:07:19 -04:00
Mike Reeves
5dc5b99b05 Add gui 2023-07-21 18:00:01 -04:00
Mike Reeves
ba69c67dc2 Add gui 2023-07-21 17:30:17 -04:00
Mike Reeves
d1d5f8a2b6 Add gui 2023-07-21 17:28:09 -04:00
Mike Reeves
48324911ce Add gui 2023-07-21 17:18:03 -04:00
m0duspwnens
4b0126a2e7 fix split 2023-07-21 17:10:51 -04:00
Mike Reeves
8a3c2e7242 Add gui 2023-07-21 17:06:38 -04:00
m0duspwnens
f55c1a4078 DOCKERBIP change 2023-07-21 16:59:22 -04:00
m0duspwnens
c4d81a249a remove /24 from DOCKERBIP 2023-07-21 16:36:03 -04:00
m0duspwnens
4c9d172721 sorange to range 2023-07-21 16:21:18 -04:00
m0duspwnens
36a936d3d6 docker ips changes 2023-07-21 16:06:52 -04:00
coreyogburn
d6164446c6 Merge pull request #10809 from Security-Onion-Solutions/cogburn/8655
Added ReverseLookup Option
2023-07-21 13:38:38 -06:00
Corey Ogburn
bb7a918a16 Added ReverseLookup Option
Defaults to false, has metadata to show up in the config section of soc.
2023-07-21 13:18:08 -06:00
weslambert
be254b15f2 Merge pull request #10804 from Security-Onion-Solutions/fix/fleet_logging
Fleet logging
2023-07-20 15:51:56 -04:00
weslambert
83e1e3efdc Merge pull request #10788 from Security-Onion-Solutions/fix/elastic_mappings
Fix user name mapping and remove security subfield
2023-07-20 15:51:42 -04:00
Mike Reeves
7c48f9d6ec Merge pull request #10806 from Security-Onion-Solutions/newrhel
For Phil
2023-07-20 14:41:05 -04:00
Mike Reeves
f2947de0ca Add epel-next 2023-07-20 12:13:36 -04:00
Wes
d07c46f27e Change playbook and sysmon 2023-07-20 16:08:50 +00:00
Mike Reeves
47e418a441 Add epel-next 2023-07-20 12:07:26 -04:00
Mike Reeves
87b1207ac0 Merge pull request #10805 from Security-Onion-Solutions/alma
Test Alma
2023-07-20 10:57:19 -04:00
Mike Reeves
a86cbaa6fa Merge pull request #10803 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update needs_restarting.py
2023-07-20 10:55:11 -04:00
Wes
c68cd6cf33 Fix typo 2023-07-20 14:39:35 +00:00
Josh Patterson
3071a1de41 Update map.jinja 2023-07-20 08:42:27 -04:00
Josh Patterson
e75d0c8094 Update needs_restarting.py 2023-07-20 08:36:27 -04:00
Mike Reeves
14c685ab10 Update needs_restarting.py 2023-07-20 08:32:19 -04:00
Mike Reeves
54082858dc Update needs_restarting.py 2023-07-20 08:25:13 -04:00
Wes
4b7e7978ef Add final pipeline 2023-07-19 19:56:54 +00:00
Josh Patterson
066de70638 Merge pull request #10799 from Security-Onion-Solutions/2.4/mysql
whiptails for ubuntu focal
2023-07-19 15:55:32 -04:00
m0duspwnens
19c6796927 only allow existing deployment for focal 2023-07-19 15:38:18 -04:00
m0duspwnens
77c9b4fb54 remove OTHER 2023-07-19 15:35:28 -04:00
m0duspwnens
3104137190 install type whiptail for focal 2023-07-19 15:31:09 -04:00
Josh Patterson
c8b65ecca0 Merge pull request #10798 from Security-Onion-Solutions/2.4/mysql
2.4/mysql
2023-07-19 14:55:35 -04:00
Mike Reeves
555c881235 Test Alma 2023-07-19 14:48:12 -04:00
m0duspwnens
0ac9a1f9cc Merge remote-tracking branch 'origin/2.4/dev' into 2.4/mysql 2023-07-19 14:41:03 -04:00
m0duspwnens
3c0554a42c queue states during so-playbook-reset 2023-07-19 14:40:29 -04:00
Wes
0b19179630 Add logrotate 2023-07-19 15:17:42 +00:00
Wes
30a14f8aaf Add logging 2023-07-19 15:00:20 +00:00
Wes
877fc36013 Add log dir 2023-07-19 14:57:24 +00:00
Mike Reeves
a892adb66f Merge pull request #10668 from Security-Onion-Solutions/centos
CentOS Stream Support
2023-07-19 10:41:38 -04:00
Mike Reeves
a49b05661d Merge pull request #10794 from Security-Onion-Solutions/2.4/mysql
2.4/mysql
2023-07-19 10:40:37 -04:00
Jason Ertel
266fc4e866 Merge pull request #10792 from Security-Onion-Solutions/regup
upgrade registry version
2023-07-19 10:00:40 -04:00
Wes
b738325880 Remove keyword 2023-07-19 13:55:12 +00:00
m0duspwnens
ad7821391d Merge remote-tracking branch 'origin/2.4/dev' into 2.4/mysql 2023-07-19 09:54:54 -04:00
m0duspwnens
1b0c146b54 get rid of mysql error: mbind: Operation not permitted 2023-07-19 09:54:00 -04:00
Wes
1848a835f5 Remove keyword 2023-07-19 13:52:15 +00:00
Jason Ertel
23cc75c68d upgrade registry version 2023-07-19 09:51:07 -04:00
weslambert
17fcf12608 Merge pull request #10791 from Security-Onion-Solutions/fix/elastic_clear
Set delete for interactive
2023-07-19 08:27:00 -04:00
Wes
6a8737e9a2 Set delete for interactive 2023-07-19 12:21:47 +00:00
m0duspwnens
9543058a2c Merge remote-tracking branch 'origin/2.4/dev' into 2.4/mysql 2023-07-18 16:51:52 -04:00
m0duspwnens
b66cd82110 fix depreciations 2023-07-18 16:50:34 -04:00
weslambert
41ebb403ca Merge pull request #10787 from Security-Onion-Solutions/fix/elastic_clear
Use new agent scripts for Elastic clear command
2023-07-18 16:15:27 -04:00
Mike Reeves
c94436fcbd fix other OS installs 2023-07-18 15:19:10 -04:00
Wes
a59eda319e Remove security subfield 2023-07-18 19:00:50 +00:00
Wes
8a76975d8c Use new agent scripts 2023-07-18 18:43:57 +00:00
Mike Reeves
737da45e7f fix other OS installs 2023-07-18 14:02:13 -04:00
m0duspwnens
df1bf8e67b restart mysql container if config or pass changes 2023-07-18 13:41:26 -04:00
Mike Reeves
f95757c551 fix other OS installs 2023-07-18 11:58:49 -04:00
Mike Reeves
5e46138961 fix other OS installs 2023-07-18 11:55:51 -04:00
Mike Reeves
dc8aa4d923 fix other OS installs 2023-07-18 11:53:55 -04:00
Wes
1d3e39b6bd Map user name to keyword and remove security subfield generation 2023-07-18 14:46:47 +00:00
Mike Reeves
9ad7303cf2 fix other OS installs 2023-07-17 16:44:55 -04:00
Mike Reeves
b1daa22dfc fix other OS installs 2023-07-17 16:40:35 -04:00
Mike Reeves
49c4edbcbe fix other OS installs 2023-07-17 16:33:47 -04:00
Mike Reeves
f4c3103f84 fix other OS installs 2023-07-17 16:24:51 -04:00
Mike Reeves
a2aea5530b Merge pull request #10779 from Security-Onion-Solutions/palletethings
Palletethings
2023-07-17 16:20:44 -04:00
Mike Reeves
01234f87f9 fix other OS installs 2023-07-17 16:20:32 -04:00
m0duspwnens
5d4186ac07 different whiptail warning if ubuntu 20.04 2023-07-17 15:56:29 -04:00
m0duspwnens
425ca35a22 Merge remote-tracking branch 'origin/centos' into palletethings 2023-07-17 13:58:00 -04:00
m0duspwnens
fe5ca3a0c8 set palette after detecting os and before whiptail 2023-07-17 13:51:14 -04:00
Mike Reeves
7fad710ca1 fix other OS installs 2023-07-17 13:51:01 -04:00
Mike Reeves
8d6c2600c9 fix other OS installs 2023-07-17 13:49:08 -04:00
Mike Reeves
38c7ea0801 fix other OS installs 2023-07-17 13:44:02 -04:00
Mike Reeves
abe0a9ec27 fix other OS installs 2023-07-17 11:03:28 -04:00
Mike Reeves
f0f8513370 fix other OS installs 2023-07-17 11:02:34 -04:00
Mike Reeves
bffd24e0d5 fix other OS installs 2023-07-17 10:55:04 -04:00
Mike Reeves
71cbab8fcc fix other OS installs 2023-07-17 10:47:24 -04:00
weslambert
6816d06710 Merge pull request #10766 from Security-Onion-Solutions/fix/elastic-agent-scripts
Add agent scripts
2023-07-17 10:46:54 -04:00
Wes
d19615f743 Fix typo 2023-07-17 14:42:27 +00:00
Mike Reeves
894e009b95 fix other OS installs 2023-07-17 10:34:14 -04:00
Wes
1a4515fc8a Split restart into stop and start 2023-07-17 14:30:51 +00:00
Wes
31696803e1 Use correct name 2023-07-17 14:28:12 +00:00
Wes
e715dfa354 Remove sbin 2023-07-17 14:27:39 +00:00
Wes
c723a09107 Remove agent installer generation script 2023-07-14 21:45:25 +00:00
Wes
8cf3ceeb71 Update agent scripts 2023-07-14 21:43:03 +00:00
Mike Reeves
921fc95668 Fix logic 2023-07-14 14:35:51 -04:00
Doug Burks
9e42fb927d Add RPM-GPG-KEY-oracle 2023-07-14 14:04:36 -04:00
Mike Reeves
87d72e852c Fix logic 2023-07-14 13:45:31 -04:00
m0duspwnens
ba2782c5e7 patch x509_v2.py 2023-07-14 13:22:40 -04:00
Mike Reeves
9169fca9f8 Merge branch '2.4/dev' into centos 2023-07-14 13:17:52 -04:00
Mike Reeves
1028fb1346 Fix ISO install 2023-07-14 13:17:20 -04:00
Josh Brower
6846487909 Merge pull request #10765 from Security-Onion-Solutions/2.4/FleetEnhancements
Retry install
2023-07-14 13:07:25 -04:00
Josh Brower
2cc0c4c0ac Automatically Update ES URLs 2023-07-14 12:07:32 -04:00
Mike Reeves
5a5b643155 Fix ISO install 2023-07-14 12:04:30 -04:00
Josh Patterson
e97bec2bc1 Merge pull request #10769 from Security-Onion-Solutions/wtinstalltype
Wtinstalltype
2023-07-14 09:22:40 -04:00
Josh Brower
78db64a419 Auto-managed Fleet Server URLs 2023-07-14 08:40:26 -04:00
m0duspwnens
55d32c5b98 merge and fix conflicts 2023-07-14 08:37:03 -04:00
Mike Reeves
333213d1dd Multi OS Support 2023-07-13 18:40:48 -04:00
Mike Reeves
03b16a5582 Multi OS Support 2023-07-13 18:29:02 -04:00
Mike Reeves
20c76abac4 Multi OS Support 2023-07-13 18:27:21 -04:00
m0duspwnens
4158e18675 warn of unsupported os 2023-07-13 16:38:51 -04:00
Mike Reeves
f0c391e801 Multi OS Support 2023-07-13 15:05:51 -04:00
weslambert
922a77ac55 Merge pull request #10762 from Security-Onion-Solutions/fix/integration_elasticsearch
Allow Elasticsearch integration policy
2023-07-13 14:42:23 -04:00
weslambert
a62f96595c Merge pull request #10763 from Security-Onion-Solutions/fix/strelka_pe
Strelka entropy and pe fixes
2023-07-13 14:42:12 -04:00
Josh Brower
fb8a79e112 Retry install 2023-07-13 13:15:01 -04:00
Mike Reeves
782a3eccfe Initial Oracle support 2023-07-13 11:29:18 -04:00
Mike Reeves
2c996fe7ad Initial Oracle support 2023-07-13 10:54:04 -04:00
weslambert
0c177ec923 Allow Elasticsearch integration policy 2023-07-13 10:46:59 -04:00
Wes
41f00c0aa1 Add agent scripts 2023-07-13 14:32:22 +00:00
Mike Reeves
05b30771c5 Initial Oracle support 2023-07-13 10:29:06 -04:00
Wes
e3249c8e4c Wrap values in quotes for proper conversion 2023-07-13 14:18:57 +00:00
Mike Reeves
a0b6e1076f Initial Oracle support 2023-07-13 10:04:55 -04:00
weslambert
85bb5a327c Fix long vs float for pe version 2023-07-13 09:38:09 -04:00
Mike Reeves
68f5c9965a Initial Oracle support 2023-07-13 09:24:01 -04:00
Mike Reeves
727d0443a2 Merge pull request #10757 from Security-Onion-Solutions/TOoSmOotH-patch-5
Update VERSION
2023-07-13 08:53:35 -04:00
Mike Reeves
b915cea52f Initial Oracle support 2023-07-13 08:44:20 -04:00
Mike Reeves
d98a1d5ae5 Initial Oracle support 2023-07-13 08:40:09 -04:00
Josh Brower
6f5bb136ff Merge pull request #10753 from Security-Onion-Solutions/2.4/integrationfixes
Update Integration JSON
2023-07-13 07:34:32 -04:00
Mike Reeves
695ec149f1 Initial Oracle support 2023-07-12 15:07:26 -04:00
Mike Reeves
50103aebb3 Initial Oracle support 2023-07-12 14:59:36 -04:00
Mike Reeves
6f81e234cd Initial Oracle support 2023-07-12 14:52:23 -04:00
Mike Reeves
7732435b64 Initial Oracle support 2023-07-12 14:49:59 -04:00
Mike Reeves
2cf36f1e8f Initial Oracle support 2023-07-12 14:12:24 -04:00
Mike Reeves
43d63a3187 Update VERSION 2023-07-12 10:59:12 -04:00
Mike Reeves
37116a9bdd Merge pull request #10755 from Security-Onion-Solutions/2.4/dev
2.4.3
2023-07-12 10:57:42 -04:00
Jason Ertel
6297a2632b Merge pull request #10756 from Security-Onion-Solutions/kilo
catch up branch
2023-07-12 10:38:18 -04:00
Jason Ertel
5cc752f128 Merge branch '2.4/main' into 2.4/dev 2023-07-12 10:19:39 -04:00
Mike Reeves
68d95cd1cb Merge pull request #10754 from Security-Onion-Solutions/2.4.3
2.4.3
2023-07-12 10:05:31 -04:00
Mike Reeves
1a68c3cd24 2.4.3 2023-07-12 10:02:19 -04:00
Josh Brower
40294e2762 Update Integration JSON 2023-07-12 08:49:36 -04:00
Josh Patterson
87eec4ae88 Merge pull request #10751 from Security-Onion-Solutions/yararules
Yararules
2023-07-11 15:55:00 -04:00
m0duspwnens
676696b24a restart strelka backend if rules change 2023-07-11 15:48:22 -04:00
m0duspwnens
da27fce95f run so-yara-download/update if scripts change 2023-07-11 13:48:26 -04:00
weslambert
8acc37a7d1 Merge pull request #10749 from Security-Onion-Solutions/fix/yara_update
Fix syntax for conditional
2023-07-11 13:41:38 -04:00
weslambert
5f1b467e64 Fix syntax for conditional 2023-07-11 13:37:50 -04:00
weslambert
fe7fb7f54d Merge pull request #10748 from Security-Onion-Solutions/fix/elasticsearch_strelka
Update logic for YARA matches
2023-07-11 13:02:24 -04:00
Wes
577bfac886 Update logic for YARA matches 2023-07-11 17:00:13 +00:00
Josh Patterson
468b6e4831 Merge pull request #10741 from Security-Onion-Solutions/m0duspwnens-patch-1
import ELASTICFLEETMERGED
2023-07-11 11:04:26 -04:00
Josh Patterson
c75d209d7f import ELASTICFLEETMERGED 2023-07-11 11:01:27 -04:00
Josh Brower
b29b264d5c Merge pull request #10740 from Security-Onion-Solutions/2.4/removecomments
Remove Comments
2023-07-11 10:28:41 -04:00
Josh Brower
c99e7da5a7 Remove Comments 2023-07-11 10:26:18 -04:00
Josh Patterson
60d66b973c Merge pull request #10739 from Security-Onion-Solutions/yararules
include *.yara
2023-07-11 10:21:35 -04:00
m0duspwnens
304830d2ee remove old rules prior to copy 2023-07-11 10:20:04 -04:00
m0duspwnens
d7285d69a7 include *.yara 2023-07-11 09:59:13 -04:00
weslambert
7cdd1f89d7 Merge pull request #10736 from Security-Onion-Solutions/fix/strelka_path
Change path to old one
2023-07-11 09:13:36 -04:00
weslambert
b7cab1d118 Change path to old one 2023-07-11 09:10:20 -04:00
weslambert
f03a472ee5 Merge pull request #10731 from Security-Onion-Solutions/fix/kibana_file_search
Kibana dashboard changes
2023-07-11 08:50:03 -04:00
Mike Reeves
c7a0801eed Merge pull request #10725 from Security-Onion-Solutions/yararules
Yararules
2023-07-11 08:49:20 -04:00
Josh Brower
5e0015e9ac Merge pull request #10735 from Security-Onion-Solutions/2.4/TagPlaybookAlerts
2.4/tag playbook alerts
2023-07-11 08:37:37 -04:00
Josh Brower
5a72c558cb Tag at top level 2023-07-11 08:35:47 -04:00
Josh Brower
a6e907f76c Tag Playbook Alerts 2023-07-11 08:03:15 -04:00
Mike Reeves
a3f79850fe Initial Oracle support 2023-07-10 20:31:49 -04:00
Josh Brower
2d3eb22057 Merge pull request #10732 from Security-Onion-Solutions/2.4/autogenfix
Exclude Import and Eval from autoupdate
2023-07-10 17:18:10 -04:00
Josh Brower
8437fcd94c Exclude Import and Eval from autoupdate 2023-07-10 17:10:08 -04:00
Josh Brower
1b25db4573 Merge pull request #10680 from Security-Onion-Solutions/2.4/fleetautogen
Automatically manage Fleet Logstash Config
2023-07-10 16:26:20 -04:00
m0duspwnens
f8ed2e6e8e make parent dirs 2023-07-10 16:11:45 -04:00
m0duspwnens
f22c61a0a2 use su instead of runuser since logCmd has issues with runuser 2023-07-10 15:19:41 -04:00
m0duspwnens
5069d1163c only *.yar files 2023-07-10 14:36:34 -04:00
Josh Brower
31edf2e8ea Tighten & Document Pipelines 2023-07-10 14:17:42 -04:00
Wes
6b8893ded5 Update saved objects 2023-07-10 18:13:34 +00:00
m0duspwnens
1f8b7bda89 fix output_dir var 2023-07-10 13:39:31 -04:00
Mike Reeves
b9204cbe99 Initial RHEL support 2023-07-10 12:57:59 -04:00
m0duspwnens
59233d6550 use full path 2023-07-10 11:43:56 -04:00
m0duspwnens
1ac72e5b24 ensure /nsm/rules/yara directory exists 2023-07-10 11:10:37 -04:00
Josh Brower
7805ca8beb Add Failover Support 2023-07-10 10:38:14 -04:00
m0duspwnens
47b2481cdd nothing in strelka/tools/sbin_jinja to file.recurse 2023-07-10 10:29:19 -04:00
m0duspwnens
fa933d3f53 use file_mode 2023-07-10 10:26:30 -04:00
Mike Reeves
6f7914f3c4 Initial RHEL support 2023-07-10 10:18:09 -04:00
Mike Reeves
0c9e230294 Initial RHEL support 2023-07-10 10:14:47 -04:00
m0duspwnens
f4dc73a206 yara download and update 2023-07-10 09:42:37 -04:00
Doug Burks
437c9cab68 Merge pull request #10726 from Security-Onion-Solutions/dougburks-patch-1
Update README.md
2023-07-10 09:07:11 -04:00
Wes
6da96a733f Use tags instead of dataset 2023-07-10 13:06:38 +00:00
Doug Burks
82796370ce Update README.md 2023-07-10 09:04:55 -04:00
Josh Brower
8c16feb772 Rename Fleet pipelines 2023-07-09 12:22:55 -04:00
Josh Brower
ce1f363424 Allow base_url 2023-07-08 13:30:19 -04:00
Josh Brower
e8860a7d2c Fix perms 2023-07-08 09:04:55 -04:00
Josh Brower
beb26596fd Merge remote-tracking branch 'origin/2.4/dev' into 2.4/fleetautogen 2023-07-07 19:12:47 -04:00
m0duspwnens
6a5ff04804 remove unneeded function 2023-07-07 16:45:51 -04:00
Josh Brower
ff3bb11fbb Elastic Fleet Certs Refactor 2023-07-07 16:44:16 -04:00
m0duspwnens
8be5082b60 yara scripts 2023-07-07 16:43:26 -04:00
coreyogburn
5faa4f0a30 Merge pull request #10720 from Security-Onion-Solutions/cogburn/8908
Allow an additional kratos endpoint through
2023-07-07 13:17:32 -06:00
Corey Ogburn
da7770a900 Allow an additional kratos endpoint through
The /auth/self-service/errors route is used to lookup auth issues so the route must also be proxied to kratos.
2023-07-07 12:47:55 -06:00
weslambert
8178338971 Merge pull request #10717 from Security-Onion-Solutions/fix/strelka_rules
Change path
2023-07-07 13:45:02 -04:00
weslambert
79ed17b506 Change path 2023-07-07 13:31:43 -04:00
Mike Reeves
fa1d53a309 Add Debian 2023-07-07 13:00:39 -04:00
Mike Reeves
a41b0dbfea Add Debian 2023-07-07 12:59:41 -04:00
Mike Reeves
d28375b304 Add Debian 2023-07-07 12:54:47 -04:00
Mike Reeves
07c0b539d7 Add Debian 2023-07-07 12:53:23 -04:00
Mike Reeves
d18ebd6e36 Add Debian 2023-07-07 12:52:45 -04:00
Mike Reeves
5a642b151b Add Debian 2023-07-07 12:51:17 -04:00
Mike Reeves
0aa4ea3e87 Add Debian 2023-07-07 12:49:11 -04:00
Mike Reeves
efcef90ead Add Debian 2023-07-07 11:37:33 -04:00
Mike Reeves
af56aa4f16 Add Debian 2023-07-07 11:35:11 -04:00
Mike Reeves
d5257468eb Add Debian 2023-07-07 11:31:18 -04:00
Mike Reeves
a3b0db7949 Add Debian 2023-07-07 11:27:42 -04:00
Mike Reeves
5f509eb2d8 Add Debian 2023-07-07 11:24:59 -04:00
Mike Reeves
a38d561684 Add Debian 2023-07-07 11:21:47 -04:00
Mike Reeves
4b559ec182 Add Debian 2023-07-07 11:19:36 -04:00
Mike Reeves
0b209d69e5 Add Debian 2023-07-07 11:02:26 -04:00
Josh Patterson
2785587840 Merge pull request #10714 from Security-Onion-Solutions/remove_so-logstash-get-unparsed
remove so-logstash-get-unparsed, use so-redis-count instead
2023-07-07 09:53:54 -04:00
weslambert
9f95306458 Merge pull request #10708 from Security-Onion-Solutions/fix/elasticsearch_templates_hn
Fix heavy node Elasticsearch template load
2023-07-07 09:52:54 -04:00
m0duspwnens
55bed0771b remove so-logstash-get-unparsed, use so-redis-count instead 2023-07-07 09:52:21 -04:00
Wes
0b5ee49873 Fix inverted logic for component template 2023-07-06 20:46:35 +00:00
Jason Ertel
1646459052 Merge pull request #10707 from Security-Onion-Solutions/kilo
add default pillar file
2023-07-06 14:49:40 -04:00
Jason Ertel
8ec003d89f add default pillar file 2023-07-06 14:47:21 -04:00
Jason Ertel
224f0606c2 Merge pull request #10706 from Security-Onion-Solutions/kilo
incorporate features pillar
2023-07-06 14:04:12 -04:00
Wes
910125f13a Restructure logic 2023-07-06 17:49:06 +00:00
Jason Ertel
5eca1acbeb incorporate features pillar 2023-07-06 13:24:45 -04:00
Wes
d551faeb16 Heavy node template considerations 2023-07-06 17:19:28 +00:00
Josh Patterson
6a6afeef75 Merge pull request #10704 from Security-Onion-Solutions/patch/x509_v2
Patch/x509 v2
2023-07-06 11:43:33 -04:00
m0duspwnens
869f60ccaa cipher deprecated for x509_+v2 2023-07-06 10:51:44 -04:00
m0duspwnens
12c82d2812 bits deprecation to keysize 2023-07-06 10:49:32 -04:00
m0duspwnens
a2b50c6d40 remove quote 2023-07-06 10:25:19 -04:00
m0duspwnens
ab7ae6cddd fix cp for x509_v2.py 2023-07-06 10:17:14 -04:00
m0duspwnens
7a9a12ae3d fix cp for x509_v2.py 2023-07-06 10:03:12 -04:00
m0duspwnens
b49a296276 we can remove the unless in ssl state since x509_v2 is patched 2023-07-06 09:44:58 -04:00
Josh Patterson
9b9321d23a Merge pull request #10698 from Security-Onion-Solutions/issue/10468
disable salt schedule after highstate then enable later in setup
2023-07-05 14:56:31 -04:00
m0duspwnens
1922ad95d5 disable salt schedule after highstate then enable later in setup 2023-07-05 13:43:54 -04:00
Josh Patterson
11493cb615 Merge pull request #10697 from Security-Onion-Solutions/jppcentos
Jppcentos
2023-07-05 09:52:01 -04:00
m0duspwnens
0def41f03c Merge remote-tracking branch 'origin/centos' into jppcentos 2023-07-05 08:44:49 -04:00
Mike Reeves
1c191e426f Add some Ubuntu 2023-07-03 16:20:44 -04:00
m0duspwnens
de98baaad4 Merge remote-tracking branch 'origin/centos' into jppcentos 2023-07-03 15:46:30 -04:00
m0duspwnens
df0e19ff80 update-alternatives for python3.10 2023-07-03 15:44:51 -04:00
Mike Reeves
d22d864ba6 Add some Ubuntu 2023-07-03 15:23:56 -04:00
Mike Reeves
898b352af9 Add some Ubuntu 2023-07-03 15:16:12 -04:00
Mike Reeves
76a8e315b7 Add some Ubuntu 2023-07-03 15:12:56 -04:00
Mike Reeves
edaf695463 Add some Ubuntu 2023-07-03 15:12:55 -04:00
Mike Reeves
53fcac4a02 Add some Ubuntu 2023-07-03 15:12:55 -04:00
Mike Reeves
44054ba95f Add some Ubuntu 2023-07-03 15:12:54 -04:00
Mike Reeves
10aa77977e Add some Ubuntu 2023-07-03 15:12:54 -04:00
Mike Reeves
8e90658856 Add some Ubuntu 2023-07-03 15:12:54 -04:00
Mike Reeves
965d0543f4 Add some Ubuntu 2023-07-03 15:12:53 -04:00
Mike Reeves
e353855855 Add some Ubuntu 2023-07-03 15:12:53 -04:00
Mike Reeves
c54217a8cb Add some Ubuntu 2023-07-03 15:12:52 -04:00
Mike Reeves
710b3bac3d fix repo state 2023-07-03 15:12:52 -04:00
Mike Reeves
8a90579df7 fix repo state 2023-07-03 15:12:51 -04:00
Mike Reeves
39c8766914 fix repo state 2023-07-03 15:12:51 -04:00
Mike Reeves
694ea743cc add more OS logic 2023-07-03 15:12:51 -04:00
Mike Reeves
3d9e7d1e97 add fuse 2023-07-03 15:12:50 -04:00
Mike Reeves
ca71c00f1c add fuse 2023-07-03 15:12:50 -04:00
Mike Reeves
2f2394dca2 add OS logic 2023-07-03 15:12:49 -04:00
Mike Reeves
fee4c20912 add OS logic 2023-07-03 15:12:49 -04:00
Mike Reeves
03342fd477 Add more packages 2023-07-03 15:12:49 -04:00
Mike Reeves
6dbff3b9df Add more packages 2023-07-03 15:12:48 -04:00
Mike Reeves
2f375b89a8 Add more packages 2023-07-03 15:12:48 -04:00
Mike Reeves
f67ac80c56 Add more packages 2023-07-03 15:12:47 -04:00
Mike Reeves
b06a35099f Add more packages 2023-07-03 15:12:47 -04:00
Mike Reeves
087099b9b6 Fix keys 2023-07-03 15:12:47 -04:00
Mike Reeves
04fe2ca996 Fix gpg things 2023-07-03 15:12:46 -04:00
Mike Reeves
bdb5748b44 Fix whiptail logic 2023-07-03 15:12:46 -04:00
Mike Reeves
1cbe5580a6 Fix whiptail logic 2023-07-03 15:12:45 -04:00
Mike Reeves
b57674a7cc Fix syntax error 2023-07-03 15:12:45 -04:00
Mike Reeves
53bd7bcc29 Initial Support 2023-07-03 15:12:45 -04:00
Mike Reeves
6787b97c6a Initial Support 2023-07-03 15:12:44 -04:00
m0duspwnens
0d43f9aaf4 add repo noninteractively 2023-07-03 14:23:24 -04:00
Mike Reeves
40540f47bf Add some Ubuntu 2023-07-03 13:51:01 -04:00
Mike Reeves
24e05c9491 Add some Ubuntu 2023-07-03 13:45:04 -04:00
Mike Reeves
02c9465dfb Add some Ubuntu 2023-07-03 12:30:53 -04:00
Mike Reeves
a4d484ea47 Add some Ubuntu 2023-07-03 12:00:57 -04:00
Mike Reeves
c9d650f4c8 Add some Ubuntu 2023-07-03 11:59:07 -04:00
Josh Patterson
9de8814412 Merge pull request #10692 from Security-Onion-Solutions/issue/10545
Issue/10545
2023-07-03 11:05:55 -04:00
Josh Brower
35e7659904 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/fleetautogen 2023-07-03 10:36:29 -04:00
Mike Reeves
ed1d2d0a8b Add some Ubuntu 2023-07-03 10:06:16 -04:00
Mike Reeves
903de330c2 Add some Ubuntu 2023-07-03 09:49:24 -04:00
Mike Reeves
8621352701 Add some Ubuntu 2023-07-03 09:38:23 -04:00
Mike Reeves
564ab105ba Add some Ubuntu 2023-07-02 09:34:14 -04:00
Mike Reeves
b637e27c8d Merge branch '2.4/dev' of github.com:Security-Onion-Solutions/securityonion into centos 2023-07-02 09:13:06 -04:00
weslambert
d31ea4097d Merge pull request #10683 from Security-Onion-Solutions/fix/kibana_http_search
Kibana dashboard changes
2023-06-30 17:17:37 -04:00
Wes
c277b7acfa Change Zeek file from evet dataset to tags 2023-06-30 20:24:10 +00:00
m0duspwnens
97a9e0989d Merge remote-tracking branch 'origin/2.4/dev' into issue/10545 2023-06-30 15:46:41 -04:00
Wes
6bdccec6b1 Add asterisk back to Modbus search 2023-06-30 19:01:53 +00:00
m0duspwnens
35945ed224 create local logrotate pillar dir 2023-06-30 14:43:00 -04:00
m0duspwnens
7319d7ae9b replace . with _x_ 2023-06-30 14:18:20 -04:00
Wes
8b38cbe8cf Fix Modbus since the previous fix was reverted 2023-06-30 17:38:05 +00:00
Wes
35ea084466 Update from exported saved objects again 2023-06-30 16:55:00 +00:00
Jason Ertel
c89582ffb6 Merge pull request #10685 from Security-Onion-Solutions/kilo
remove use of pipe
2023-06-30 12:23:48 -04:00
Jason Ertel
d6db94a4d4 reset ver 2023-06-30 12:11:32 -04:00
Wes
e2acf027a9 Update from exported saved objects 2023-06-30 16:01:50 +00:00
m0duspwnens
d6d8ba7479 Merge remote-tracking branch 'origin/2.4/dev' into issue/10545 2023-06-30 11:29:25 -04:00
m0duspwnens
41a4321b03 configure logrotate through soc 2023-06-30 11:26:55 -04:00
Jason Ertel
2ae049071d Merge branch '2.4t/dev' into kilo 2023-06-30 11:10:01 -04:00
Jason Ertel
e82df53997 switch version to kilo 2023-06-30 11:08:42 -04:00
Wes
273e78da94 Modbus dashboard - use asterisk 2023-06-30 15:03:20 +00:00
Wes
446376395e Modbus dashboard - use tags 2023-06-30 13:56:08 +00:00
Wes
a13001dce0 PE dashboard - use tags 2023-06-30 13:40:36 +00:00
Wes
8819e1d4d6 HTTP search - use tags 2023-06-30 13:02:00 +00:00
Josh Brower
1baea3bcd5 Add Fleet to Logstash Nodes 2023-06-29 17:24:52 -04:00
Josh Patterson
1c37c05824 Merge pull request #10682 from Security-Onion-Solutions/addbackunless
add back unless in ssl state
2023-06-29 16:13:39 -04:00
m0duspwnens
cd1db36c13 add back unless in ssl state 2023-06-29 15:26:16 -04:00
m0duspwnens
5898c9ef31 start of logrotate configurable via ui 2023-06-29 12:54:37 -04:00
Jason Ertel
951f04c265 remove use of pipe 2023-06-29 12:10:12 -04:00
Josh Brower
4b069d91ab Check the correct pillar 2023-06-29 11:00:34 -04:00
Mike Reeves
34ab949dfc fix repo state 2023-06-29 08:56:38 -04:00
Mike Reeves
59191008a0 fix repo state 2023-06-29 08:55:00 -04:00
Mike Reeves
17a04a75c9 fix repo state 2023-06-29 08:53:00 -04:00
Josh Brower
7561ec0512 Automatically manage Fleet Logstash Config 2023-06-29 08:52:51 -04:00
Mike Reeves
884d669ae9 add more OS logic 2023-06-29 08:48:46 -04:00
Mike Reeves
8a88b16b9e add fuse 2023-06-28 16:16:59 -04:00
Mike Reeves
6545ae588d add fuse 2023-06-28 16:10:23 -04:00
Mike Reeves
5ab54fcfc5 add OS logic 2023-06-28 16:02:25 -04:00
Mike Reeves
ae4befe377 add OS logic 2023-06-28 15:57:43 -04:00
Mike Reeves
0c320e3501 Add more packages 2023-06-28 15:46:29 -04:00
Mike Reeves
933f4fa6c8 Add more packages 2023-06-28 15:45:32 -04:00
Mike Reeves
d80c88f613 Add more packages 2023-06-28 15:43:56 -04:00
Mike Reeves
6d2e851a43 Add more packages 2023-06-28 15:36:51 -04:00
Mike Reeves
209aae50bc Add more packages 2023-06-28 15:32:01 -04:00
Josh Patterson
eef1b40436 Merge pull request #10677 from Security-Onion-Solutions/issue/10533
Issue/10533
2023-06-28 15:17:42 -04:00
m0duspwnens
34db6fb823 dont need the unless for ssl since using x509v2 now 2023-06-28 15:06:13 -04:00
m0duspwnens
eeaf077baf dont need the unless for ssl since using x509v2 now 2023-06-28 15:02:09 -04:00
m0duspwnens
120d21c0da use minion id instead of hostname for ca_server in nginx state 2023-06-28 13:52:30 -04:00
Mike Reeves
6fc988740d Fix keys 2023-06-28 13:46:25 -04:00
m0duspwnens
66457ad8f8 use watch_in instead of watch 2023-06-28 12:27:14 -04:00
m0duspwnens
69670c481d fix require logic for nginx container 2023-06-28 11:32:08 -04:00
m0duspwnens
cae011babb force bool for nginx ssl replace_cert 2023-06-28 11:30:36 -04:00
m0duspwnens
02ea939abc watch crt and key for nginx container 2023-06-28 11:11:20 -04:00
m0duspwnens
be028aa23e define ca_server for nginx.ssl 2023-06-28 10:58:13 -04:00
m0duspwnens
24b7f7a7ce move replace_cert under ssl for nginx defaults 2023-06-28 10:32:16 -04:00
m0duspwnens
12cce111db custom crt and key for nginx 2023-06-28 10:28:50 -04:00
weslambert
add72d7a5c Merge pull request #10670 from Security-Onion-Solutions/fix/kibana_dashboards
Kibana Dashboards - Remove Wazuh reference and use tags
2023-06-28 09:41:19 -04:00
Josh Brower
c7a1d4758b Merge pull request #10598 from Security-Onion-Solutions/2.4/fix-naming
Remove old var
2023-06-28 07:09:37 -04:00
Wes
8436b647dd Remove Wazuh and use tags 2023-06-27 18:05:04 +00:00
Mike Reeves
387ce22385 Fix gpg things 2023-06-27 13:57:53 -04:00
Mike Reeves
cc3c28135d Fix whiptail logic 2023-06-27 12:53:18 -04:00
Mike Reeves
6b6724afcf Fix whiptail logic 2023-06-27 12:52:53 -04:00
Mike Reeves
c37a179a3c Fix syntax error 2023-06-27 12:46:13 -04:00
Doug Burks
77e6ee3c36 Merge pull request #10669 from Security-Onion-Solutions/dougburks-patch-1
Update so-desktop-install
2023-06-27 09:26:44 -04:00
Doug Burks
3e71663669 Update so-desktop-install 2023-06-27 09:24:47 -04:00
Mike Reeves
d519369c6f Initial Support 2023-06-26 19:22:33 -04:00
Mike Reeves
883d9560a0 Initial Support 2023-06-26 19:20:40 -04:00
Mike Reeves
984971c63c Merge pull request #10667 from Security-Onion-Solutions/desktop
Fix some installs
2023-06-26 18:51:55 -04:00
Mike Reeves
6adef20a06 Fix the rest of the analyst entries 2023-06-26 16:26:55 -04:00
Mike Reeves
cb8faf7c5f Fix the rest of the analyst entries 2023-06-26 16:14:04 -04:00
Mike Reeves
740723ecd6 Fix some installs 2023-06-26 16:01:58 -04:00
Mike Reeves
d70371c540 Merge pull request #10665 from Security-Onion-Solutions/desktop
Desktop Install
2023-06-26 15:42:14 -04:00
Mike Reeves
b6986d5c61 Merge branch '2.4/dev' into desktop 2023-06-26 15:36:48 -04:00
Mike Reeves
02e6e11be7 so-desktop-install 2023-06-26 15:34:48 -04:00
Mike Reeves
d26484fe1a so-desktop-install 2023-06-26 15:27:18 -04:00
Mike Reeves
12d10d7d42 Merge branch '2.4/dev' into desktop 2023-06-26 15:20:43 -04:00
Mike Reeves
7ea37ac2dd Merge pull request #10663 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update packages.sls
2023-06-26 11:25:14 -04:00
Mike Reeves
7aae72cfcf Update packages.sls 2023-06-26 11:23:02 -04:00
Mike Reeves
ec427cde08 Merge pull request #10662 from Security-Onion-Solutions/desktop
Desktop State
2023-06-26 10:48:41 -04:00
weslambert
c2efd7ef64 Merge pull request #10655 from Security-Onion-Solutions/feature/supported_integrations
Restructure Elasticsearch templates for supported integrations
2023-06-26 09:43:10 -04:00
Mike Reeves
77c58e665e Merge pull request #10654 from Security-Onion-Solutions/24soup
soup updates
2023-06-26 09:26:47 -04:00
Mike Reeves
9530901d1d Remove local file check 2023-06-26 09:09:55 -04:00
Doug Burks
e83afa3e30 Merge pull request #10660 from Security-Onion-Solutions/dougburks-patch-1
Update README.md
2023-06-26 08:33:22 -04:00
Doug Burks
70fb28a8b3 Update README.md 2023-06-26 08:31:41 -04:00
Josh Brower
8355432356 Merge pull request #10657 from Security-Onion-Solutions/2.4/policy-name-fix
2.4/policy name fix
2023-06-24 19:00:00 -04:00
Josh Brower
2247cafe5f Change policy name 2023-06-24 17:13:28 -04:00
Josh Brower
85a8da6331 Change policy name 2023-06-24 16:58:36 -04:00
Josh Brower
ddabab253c Merge pull request #10653 from Security-Onion-Solutions/2.4/heavynode
2.4/heavynode
2023-06-23 19:55:24 -04:00
Jason Ertel
2e42eddbc2 Merge pull request #10656 from Security-Onion-Solutions/jertel/fix-import
fix agent extract error during install; simplify logic
2023-06-23 17:21:39 -04:00
Jason Ertel
07a590dda8 fix agent extract error during install; simplify logic 2023-06-23 17:17:59 -04:00
Mike Reeves
ec8eac3430 soup fix 2023-06-23 17:05:41 -04:00
weslambert
05b84327b8 Fix typo 2023-06-23 16:32:57 -04:00
Mike Reeves
0607532e4a soup fix 2023-06-23 16:20:41 -04:00
Mike Reeves
3018886f72 soup fix 2023-06-23 16:13:04 -04:00
weslambert
e02bdffe34 Fix typos 2023-06-23 16:10:22 -04:00
Mike Reeves
5073d62ee8 soup fix 2023-06-23 16:09:57 -04:00
weslambert
e2ff48164b Only load if so-elastic-fleet-common exists 2023-06-23 16:03:58 -04:00
Mike Reeves
43832f9c34 soup fix 2023-06-23 16:03:51 -04:00
Mike Reeves
5da5a04025 soup fix 2023-06-23 16:00:02 -04:00
Mike Reeves
25b51135fc soup fix 2023-06-23 15:58:20 -04:00
weslambert
aa91c1fef2 Add empty object for index_settings 2023-06-23 15:57:30 -04:00
Mike Reeves
801a5a6824 soup fix 2023-06-23 15:56:15 -04:00
Mike Reeves
f63c26b7f2 soup fix 2023-06-23 15:50:54 -04:00
Josh Brower
336a40d646 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/heavynode 2023-06-23 15:50:14 -04:00
Josh Brower
bb0cfc5253 Create & assign Heavy Node Fleet Policy 2023-06-23 15:49:03 -04:00
coreyogburn
106aaa9c3e Merge pull request #10652 from Security-Onion-Solutions/cogburn/10122
FIX: Exclude System logs from Hunt/Dashboard Queries.
2023-06-23 13:48:17 -06:00
weslambert
ff7db0be63 Remove old index settings 2023-06-23 15:31:11 -04:00
Wes
b96d3473f2 Fix indentation 2023-06-23 18:38:04 +00:00
Corey Ogburn
fb27e7c479 Also add to dashboard
Duplicate new queryToggleFilter from hunt to dashboard.
2023-06-23 11:30:26 -06:00
Corey Ogburn
261acee8a0 New Hunt queryToggleFilter
New filter to exclude soc logs from hunt results.
2023-06-23 11:30:26 -06:00
Josh Brower
a9585b2a7f Fix Elastic Agent for Heavy 2023-06-23 10:45:58 -04:00
Wes
62fa15c63e Add more templates 2023-06-23 14:43:15 +00:00
weslambert
e995576b1d Remove extra templates 2023-06-23 09:41:49 -04:00
Jason Ertel
d247c9d704 Merge pull request #10648 from Security-Onion-Solutions/jertel/fix-import
use cluster-unique password for import encryption
2023-06-23 09:40:26 -04:00
Jason Ertel
b21b545756 use cluster-unique password for import encryption 2023-06-23 09:37:41 -04:00
Wes
5e8748c436 Load Elasticsearch templates 2023-06-23 13:28:01 +00:00
Wes
e2cca917c1 Add package load command to Fleet setup 2023-06-23 13:26:06 +00:00
Wes
d8700137d2 Add updated so-elasticsearch-templates-load 2023-06-23 13:23:29 +00:00
Wes
2c42d4b19e Add package check to so-elasticsearch-templates-load 2023-06-23 13:22:51 +00:00
Wes
a3c7e40c40 Add package load command 2023-06-23 13:20:05 +00:00
Wes
94fe456e28 Add package functions 2023-06-23 13:19:20 +00:00
Wes
662db41857 Add default packages 2023-06-23 13:17:38 +00:00
Jason Ertel
7623dd20b9 Merge pull request #10644 from Security-Onion-Solutions/cogburn/salt-relay-fix
WIP: Fix `salt cmd.run` commands for importing
2023-06-22 20:31:19 -04:00
Corey Ogburn
2b323ab661 Fix salt cmd.run commands for importing
Functional and easy to read.
2023-06-22 17:30:56 -06:00
Josh Brower
8de01625a8 Add Elastic Agent container for Heavy Nodes 2023-06-22 16:02:42 -04:00
Josh Brower
d0d7ab57ca Add Elastic Agent container for Heavy Nodes 2023-06-22 16:02:17 -04:00
Jason Ertel
f4cbe20ddf Merge pull request #10641 from Security-Onion-Solutions/jertel/fix-import
fix quotations
2023-06-22 14:46:41 -04:00
Jason Ertel
0d92a1594a fix quotations 2023-06-22 14:41:39 -04:00
m0duspwnens
daaead618e Merge remote-tracking branch 'origin/2.4/dev' into 2.4/heavynode 2023-06-22 13:26:56 -04:00
m0duspwnens
19469205e1 include eval and import in so-elasticsearch-cluster-settings 2023-06-22 13:12:47 -04:00
Jason Ertel
cae9e6230f Merge pull request #10638 from Security-Onion-Solutions/cogburn/import-fix
Change upload path
2023-06-22 13:04:22 -04:00
m0duspwnens
6c4c815683 change so-elasticsearch-cluster settings to include heavynode, and only run on managers 2023-06-22 13:04:20 -04:00
Corey Ogburn
6769386c86 Change upload path 2023-06-22 10:59:24 -06:00
m0duspwnens
36272efda7 create ES_LOGSTASH_NODES which removes heavynodes 2023-06-22 09:46:42 -04:00
weslambert
6b97d07a89 Merge pull request #10629 from Security-Onion-Solutions/fix/elasticsearch_ingest_suricata_xff_ip
Parse xff
2023-06-22 08:45:58 -04:00
coreyogburn
da82395dcf Merge pull request #10633 from Security-Onion-Solutions/cogburn/10413
Cogburn/10413
2023-06-21 15:48:53 -06:00
Corey Ogburn
b5e5bd57ad Fix for Upload Import
Needed to mount /nsm/soc/uploads into soc container.

Made the upload route configurable.

Added gpg logging to salt-relay.
2023-06-21 15:41:16 -06:00
Josh Patterson
ad4fb52b81 Merge pull request #10631 from Security-Onion-Solutions/2.4/repos
2.4/repos
2023-06-21 16:06:30 -04:00
m0duspwnens
4e849ecc90 issues with exclude rocky-repos 2023-06-21 15:14:53 -04:00
weslambert
7e37cd0f05 Parse xff 2023-06-21 14:29:54 -04:00
Mike Reeves
3952c1a9b7 Fix desktop state 2023-06-21 13:52:10 -04:00
Mike Reeves
c13c37f406 Fix desktop state 2023-06-21 13:49:01 -04:00
Mike Reeves
9240c3c6f0 Fix desktop package list 2023-06-21 13:42:51 -04:00
Mike Reeves
2aa01280e7 Fix desktop package list 2023-06-21 13:34:47 -04:00
m0duspwnens
1675b787bf exclude rocky-repos and remove files 2023-06-21 13:27:34 -04:00
Mike Reeves
4866eb2315 Fix desktop package list 2023-06-21 12:52:42 -04:00
Mike Reeves
f785fb2772 Fix desktop package list 2023-06-21 12:27:15 -04:00
Mike Reeves
8c9f863808 Fix desktop package list 2023-06-21 12:22:03 -04:00
Mike Reeves
1751e35121 Fix desktop package list 2023-06-21 12:20:57 -04:00
Mike Reeves
6676afc7de Fix desktop package list 2023-06-21 12:19:48 -04:00
Mike Reeves
699ea1ac3e Fix desktop package list 2023-06-21 11:48:37 -04:00
Mike Reeves
90fdb9c465 Update paths 2023-06-21 11:47:22 -04:00
Mike Reeves
48291f5271 Merge branch '2.4/dev' of https://github.com/Security-Onion-Solutions/securityonion into desktop 2023-06-21 11:43:05 -04:00
Mike Reeves
3a41b090c1 Update paths 2023-06-21 11:42:51 -04:00
Josh Brower
139b36b189 Merge pull request #10627 from Security-Onion-Solutions/2.4/import-evtx
Refactor EVTX Import
2023-06-21 11:42:10 -04:00
Josh Brower
6ddf887342 Refactor EVTX Import 2023-06-21 09:32:42 -04:00
Josh Brower
6ba9e057a9 Merge pull request #10600 from Security-Onion-Solutions/fix/dataset_tags
Change format of event dataset and assign dataset to tags
2023-06-21 09:22:40 -04:00
Mike Reeves
6600484f8e Update Docker 2023-06-21 09:15:31 -04:00
Mike Reeves
b02c38175c Merge pull request #10624 from Security-Onion-Solutions/TOoSmOotH-patch-2
Salt Defunct Workaround
2023-06-20 17:44:53 -04:00
Mike Reeves
4497f6561f Salt Defunct Workaround
This can be removed once they patch salt
2023-06-20 17:27:02 -04:00
Mike Reeves
0fc03baf58 Desktop Packages 2023-06-20 13:41:10 -04:00
coreyogburn
fb81c6e2e3 Merge pull request #10601 from Security-Onion-Solutions/cogburn/10413
Cogburn/10413
2023-06-20 11:08:53 -06:00
Corey Ogburn
ad28ea275f Better state management
When salt-cp runs it's course and finds it can't send a file, it outputs a report saying as much but the exit code will be zero. Now we remove the filename and node from the response and look for `True` to know if it succeeded. Also, respect the cleanup flag on success or failure.

Check the status of the decryption process before importing.

No longer decrypt locally, issue salt command for the remote client to do the decrypting.
2023-06-20 09:41:14 -06:00
Corey Ogburn
41951659ec Use importer's new --json flag.
Using the new --json flag is not only more reliable than using a regex, the way the import script was written even re-imports will provide a url. This means that in more cases we can provide the results to the users (even if nothing changed).
2023-06-20 09:41:14 -06:00
Corey Ogburn
451a4784a1 send-file and import-file security
Encrypt the file with a passphrase before sending and decrypt the file with the same passphrase before importing.
2023-06-20 09:41:14 -06:00
Corey Ogburn
1b7095fa81 Improved import-file url regex
sed doesn't remove ALL whitespace, only newlines. It's better to stop at the first whitespace than to stop at a particular, maybe-not-last query string parameter.
2023-06-20 09:41:14 -06:00
Corey Ogburn
89d789fe0f New folder for salt to maintain
This folder is where a manager will initially store uploaded PCAP/EVTX files before sending to sensors. Sensors will store uploads in this folder on their own system.
2023-06-20 09:41:14 -06:00
Corey Ogburn
49055e260f salt-relay import-file reporting
On successful import, return dashboard URL
2023-06-20 09:41:14 -06:00
Corey Ogburn
a465039887 2 new capabilities: send-file and import-file 2023-06-20 09:41:14 -06:00
Doug Burks
b60cf29598 Merge pull request #10618 from Security-Onion-Solutions/dougburks-patch-1
Resolve conflicts with dataset PR
2023-06-20 07:42:30 -04:00
Doug Burks
0e09d73aa0 Resolve conflicts with dataset PR 2023-06-20 07:40:10 -04:00
Doug Burks
520a5671ca Merge pull request #10617 from Security-Onion-Solutions/dougburks-patch-1
Fix SOC Auth queries in Dashboards and Hunt
2023-06-20 07:32:46 -04:00
Doug Burks
fc824359ed Update default fields for kratos.audit 2023-06-20 07:30:56 -04:00
Doug Burks
7caa7cec6b Fix SOC Auth queries in Dashboards and Hunt
Change `event.dataset:audit` to `event.dataset:kratos.audit`.
2023-06-20 07:13:33 -04:00
Josh Patterson
0695140f83 Merge pull request #10611 from Security-Onion-Solutions/2.4/ubuntu
2.4/ubuntu
2023-06-16 14:00:52 -04:00
m0duspwnens
ed1e2c8908 ignore failure notification for Ubuntu Failed to restart snapd 2023-06-16 13:58:45 -04:00
Jason Ertel
594900a8d4 Merge pull request #10609 from Security-Onion-Solutions/kilo
webauthn for SOC
2023-06-16 13:15:25 -04:00
Jason Ertel
6894fa4e4d Update VERSION 2023-06-16 13:09:01 -04:00
m0duspwnens
2334d82d36 fix salt install for ubuntu 2023-06-16 11:13:34 -04:00
Josh Patterson
c0a2ea3138 Merge pull request #10604 from Security-Onion-Solutions/2.4/receiver
2.4/receiver
2023-06-15 15:42:34 -04:00
m0duspwnens
d4acb1a33a Merge remote-tracking branch 'origin/2.4/dev' into 2.4/receiver 2023-06-15 15:32:49 -04:00
m0duspwnens
5de9e5baf4 allow sensor to logstash on receiver 2023-06-15 14:46:46 -04:00
Wes
3a34da354f Use append instead of set 2023-06-15 16:35:43 +00:00
m0duspwnens
469390696e 2.4 receiver changes 2023-06-15 11:04:16 -04:00
Josh Brower
0a4a48b61e Remove old var 2023-06-15 10:24:50 -04:00
Wes
58a63e0765 Remove extra comma 2023-06-15 14:22:37 +00:00
Doug Burks
251bc6f45e Merge pull request #10597 from Security-Onion-Solutions/dougburks-patch-1
Update so_motd.jinja
2023-06-15 09:59:25 -04:00
Doug Burks
b84d997f87 Update so_motd.jinja 2023-06-15 09:54:23 -04:00
Wes
b5bccc5e05 Use module in dataset name and add dataset tag 2023-06-15 13:06:57 +00:00
Jason Ertel
b4e5ac9796 Add note to advise against changing settings 2023-06-14 16:11:50 -04:00
m0duspwnens
2db95fe1b4 fw rules for receiver to managers 2023-06-14 15:24:14 -04:00
m0duspwnens
934b0f45a1 allow receiver to connect to salt manager 2023-06-14 15:08:07 -04:00
Jason Ertel
a88227d13f Merge branch '2.4/dev' into kilo 2023-06-14 13:34:15 -04:00
Jason Ertel
21a7b76352 webauthn 2023-06-14 13:33:31 -04:00
weslambert
03082339ca Merge pull request #10592 from Security-Onion-Solutions/fix/analyzer_dependencies
Update analyzer dependencies
2023-06-14 12:22:06 -04:00
m0duspwnens
8f6226b531 Merge remote-tracking branch 'origin/2.4/dev' into 2.4/heavynode 2023-06-14 10:40:22 -04:00
m0duspwnens
2c4eccd7e0 2.4 heavynode changes 2023-06-14 10:40:05 -04:00
Josh Brower
fa57494694 Merge pull request #10584 from Security-Onion-Solutions/2.4/elasticagent-renaming
Change Elastic Fleet Tarball naming
2023-06-14 09:42:57 -04:00
weslambert
3f1741e75a Merge pull request #10585 from Security-Onion-Solutions/fix/elasticsearch_templates
Update Elasticsearch templates for Fleet
2023-06-14 09:33:23 -04:00
Wes
48331ce35b Add system.system component templates 2023-06-14 13:29:11 +00:00
Wes
c2ac60b82e Add system.system template and add event-mappings 2023-06-14 13:28:00 +00:00
Josh Brower
fedfbe9fec Fix tarball output name 2023-06-14 08:52:56 -04:00
Josh Brower
9947f9def4 Rework tarball naming schema 2023-06-14 07:38:03 -04:00
Wes
c205438771 Update dependencies 2023-06-14 02:35:29 +00:00
Wes
8cde05807c Remove elastic-agent dir 2023-06-13 21:33:04 +00:00
Wes
2ac0aba916 Add osquery files 2023-06-13 21:32:02 +00:00
Wes
af003cc2a1 Add osquery templates 2023-06-13 20:43:39 +00:00
Josh Brower
0d4f6b4fe6 Change Elastic Fleet Tarball naming 2023-06-13 16:32:19 -04:00
Jason Ertel
7093254439 Merge pull request #10582 from Security-Onion-Solutions/jertel/pcap
ensure status line shows dates for new and existing imports
2023-06-13 15:16:43 -04:00
Wes
bd7644a557 Add another template 2023-06-13 19:13:20 +00:00
Jason Ertel
90b740a997 ensure status line shows dates for new and existing imports 2023-06-13 15:11:13 -04:00
Wes
5547a1b7ab Add event mappings 2023-06-13 18:23:50 +00:00
Wes
1b90fd8581 Add custom component templates 2023-06-13 18:21:45 +00:00
Doug Burks
bbdf7bb5a7 Merge pull request #10580 from Security-Onion-Solutions/dougburks-patch-1
Set START and END variables earlier in so-import-pcap
2023-06-13 13:31:16 -04:00
Doug Burks
fb8ad71b27 Set START and END variables earlier in so-import-pcap 2023-06-13 13:19:18 -04:00
Wes
e43b7607bb Add more component templates 2023-06-13 17:04:03 +00:00
Wes
a265c06e31 Add other component templates 2023-06-13 15:47:25 +00:00
Wes
2aa954cb0a Add component templates 2023-06-13 15:25:23 +00:00
Wes
73812b11a3 Allow ingest node pipelines that start with a period 2023-06-13 13:37:56 +00:00
Wes
38ab426470 Add final Fleet pipeline 2023-06-13 13:36:26 +00:00
Wes
d0a6881c2c Add event mappings and remove meta information for now 2023-06-13 13:35:46 +00:00
m0duspwnens
c7c4e65df1 single-node for heavynode 2023-06-13 09:22:17 -04:00
m0duspwnens
49b150797d 2.4 heavynode changes 2023-06-12 16:25:51 -04:00
Wes
57268ba934 Change priority of templates 2023-06-12 14:29:45 +00:00
Wes
1208915896 Remove Elastic Agent package templates 2023-06-12 14:24:59 +00:00
Wes
42f5ad9939 Add templates for system.auth and systen.syslog 2023-06-12 14:23:24 +00:00
Doug Burks
8e0d895afb Merge pull request #10572 from Security-Onion-Solutions/dougburks-patch-1
FIX: Add more Zeek logs to excluded list #10569
2023-06-12 09:33:13 -04:00
Doug Burks
998c85e3f8 Update defaults.yaml 2023-06-12 09:31:19 -04:00
weslambert
32f3ee0b01 Merge pull request #10564 from Security-Onion-Solutions/fix/elasticsearch_templates
Update templates for integrations
2023-06-12 09:05:31 -04:00
Doug Burks
a90aed25fb Merge pull request #10570 from Security-Onion-Solutions/dougburks-patch-1
FIX: Add Zeek ocsp.log to excluded list #10569
2023-06-12 08:46:49 -04:00
Doug Burks
ae14e4870d Add ocsp to logging.zeek.exclued in defaults.yaml 2023-06-12 08:44:46 -04:00
Doug Burks
273a1d7e9c Merge pull request #10568 from Security-Onion-Solutions/2.4/fix-suricata-dhcp
FIX: Suricata DHCP logs not ingesting #10565
2023-06-12 07:50:44 -04:00
Doug Burks
b3f8ed7dcd FIX: Suricata DHCP logs not ingesting #10565 2023-06-10 11:42:41 -04:00
Wes
ad5a424c03 Update templates for integrations 2023-06-09 18:32:50 +00:00
Jason Ertel
e06787445c Merge pull request #10561 from Security-Onion-Solutions/jertel/pcap
Node description config setting should not accept a grid-wide value
2023-06-09 12:02:51 -04:00
Jason Ertel
8a4f5d6dcb Merge branch '2.4/dev' into jertel/pcap 2023-06-09 11:51:37 -04:00
Doug Burks
81dd951064 Merge pull request #10560 from Security-Onion-Solutions/dougburks-patch-1
FIX: Setup re-runs when SSH'ing into a successfully installed minion …
2023-06-09 11:49:54 -04:00
Doug Burks
c12f138899 FIX: Setup re-runs when SSH'ing into a successfully installed minion node #10498 2023-06-09 11:20:54 -04:00
Jason Ertel
884a7041af Merge branch '2.4/dev' into jertel/pcap 2023-06-09 10:47:26 -04:00
Jason Ertel
023008c54c do not allow node_description to be set at global grid-wide level 2023-06-09 10:46:56 -04:00
Jason Ertel
6f7de954d9 Merge pull request #10559 from Security-Onion-Solutions/jertel/pcap
Telegraf should monitor all mount points
2023-06-09 09:18:54 -04:00
Jason Ertel
46371aaaf5 Monitor all mount points for simplicity 2023-06-09 09:14:36 -04:00
Doug Burks
1fde2e2755 Merge pull request #10553 from Security-Onion-Solutions/2.4/update-readme
2.4/update readme
2023-06-08 13:44:39 -04:00
Doug Burks
1aad9d1b2f Update README.md 2023-06-08 13:41:08 -04:00
Doug Burks
9703e70163 Update README.md 2023-06-08 13:38:11 -04:00
Doug Burks
f6735207d7 Merge pull request #10552 from Security-Onion-Solutions/2.4/fix-suricata-dataset
FIX: Suricata dataset values for certain types of metadata#10551
2023-06-08 13:33:53 -04:00
Doug Burks
e5f76a9c6e change suricata parsers from dataset to event.dataset 2023-06-08 12:31:31 -04:00
weslambert
d1c86cb9ff Merge pull request #10550 from Security-Onion-Solutions/kilo
Elastalert and EQL
2023-06-08 11:21:18 -04:00
weslambert
8ccb24dda2 Update version to 2.4.3 2023-06-08 11:05:05 -04:00
weslambert
932054e9da Update version to 2.4.0 2023-06-08 11:04:45 -04:00
Josh Brower
8b35002169 EQL Refactor 2023-06-07 13:44:37 -04:00
weslambert
f68527d366 Merge pull request #10541 from Security-Onion-Solutions/fix/curator_action_ignore_empty_list
Use ignore_empty_list
2023-06-07 10:36:38 -04:00
Wes
81e3d26540 Ignore empty list 2023-06-07 13:14:52 +00:00
weslambert
96b60fa39a Restore original URL syntax, but use data stream 2023-06-06 20:53:05 -04:00
weslambert
f172a74fbc Remove EQL setting 2023-06-06 20:51:29 -04:00
weslambert
c4be56ec7b Update host syntax 2023-06-06 20:51:03 -04:00
weslambert
96195806ab Update version to 2.4.0-kilo 2023-06-06 20:50:10 -04:00
weslambert
88bbd3440d Merge pull request #10522 from Security-Onion-Solutions/fix/playbook_index
Change Playbook index to a data stream and update mapping for event.severity_label
2023-06-06 09:03:49 -04:00
Wes
495a9c0783 Add mapping for event.severity_label 2023-06-05 21:19:37 +00:00
Wes
905bc564fc Change data stream name 2023-06-05 21:18:47 +00:00
Wes
f6f387428f Update Playbook alerter to write to a data stream 2023-06-05 21:17:10 +00:00
Jason Ertel
db5abcb3cf Merge pull request #10503 from Security-Onion-Solutions/jertel/pcap
add ability to output PCAP import results in JSON format
2023-06-05 14:32:32 -04:00
Jason Ertel
27e310c2a1 add json output option to so-import-evtx; clean up other issues 2023-06-05 13:54:44 -04:00
weslambert
236eb0cbcc Merge pull request #10515 from Security-Onion-Solutions/fix/analyzers
Update requests and whoisit
2023-06-05 12:12:59 -04:00
Wes
841d0b4b1f Update dependencies after git add 2023-06-05 15:42:55 +00:00
Wes
272f97e2d7 Update dependencies 2023-06-05 15:42:38 +00:00
Wes
eac9a3fc86 Update requests and whoisit 2023-06-05 15:41:01 +00:00
Doug Burks
32dc26f2e7 Merge pull request #10514 from Security-Onion-Solutions/2.4/fix-VERIFY_ISO
Rename VERIFY_ISO.md to DOWNLOAD_AND_VERIFY_ISO.md
2023-06-05 10:12:43 -04:00
Doug Burks
1b14142e4c Rename VERIFY_ISO.md to DOWNLOAD_AND_VERIFY_ISO.md 2023-06-05 10:08:20 -04:00
Jason Ertel
2fef1d5fa7 silence grep output 2023-06-02 15:43:48 -04:00
Jason Ertel
3bbfc3865d use proper URL spacing 2023-06-02 15:26:14 -04:00
Jason Ertel
6947fd6414 add ability to output PCAP import results in JSON format 2023-06-02 15:21:41 -04:00
Doug Burks
d3e5be78fd Merge pull request #10500 from Security-Onion-Solutions/dougburks-patch-1
Update soc_zeek.yaml
2023-06-02 07:54:11 -04:00
Doug Burks
09e005127e Update soc_zeek.yaml 2023-06-02 07:41:55 -04:00
Mike Reeves
d3ea596deb Merge pull request #10491 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-06-01 09:44:13 -04:00
Mike Reeves
d6d315e8d5 Update VERSION 2023-06-01 09:43:32 -04:00
Mike Reeves
58dc073678 Merge pull request #10481 from Security-Onion-Solutions/2.4/dev
2.4.2
2023-06-01 09:37:38 -04:00
Mike Reeves
8c9186d8dd Merge pull request #10489 from Security-Onion-Solutions/2.4.2
2.4.2
2023-06-01 09:27:56 -04:00
Mike Reeves
aee842b912 2.4.2 2023-06-01 09:26:24 -04:00
weslambert
3a5a59af59 Merge pull request #10485 from Security-Onion-Solutions/fix/elastic_fleet_dedicated
Add so-fleet role logic
2023-05-31 16:04:40 -04:00
Josh Patterson
8f3a874e61 Merge pull request #10483 from Security-Onion-Solutions/dedfleetES
exclude elasticsearch.ca state from fleet and receiver nodes
2023-05-31 16:02:57 -04:00
m0duspwnens
66dc6274e6 exclude elasticsearch.ca state from fleet and receiver nodes 2023-05-31 15:59:36 -04:00
Wes
302e580d8f Add so-fleet role logic 2023-05-31 19:56:17 +00:00
Mike Reeves
4cf60a6054 Merge pull request #10480 from Security-Onion-Solutions/mreeves/mergefrommain
Mreeves/mergefrommain
2023-05-31 15:32:30 -04:00
Mike Reeves
8f6d82af97 Merge branch '2.4/main' into mreeves/mergefrommain 2023-05-31 15:28:07 -04:00
Mike Reeves
8ab54dcead Merge pull request #10477 from Security-Onion-Solutions/2.4.2
2.4.2
2023-05-31 14:49:34 -04:00
Mike Reeves
9704c8917e 2.4.2 2023-05-31 14:47:34 -04:00
weslambert
540ee156db Merge pull request #10469 from Security-Onion-Solutions/fix/elastic_fleet_dynamic_configuration
Use Fleet pillar instead of Zeek
2023-05-31 12:36:39 -04:00
Wes
344e2bf1d0 Update defaults file 2023-05-31 15:30:03 +00:00
Wes
3441c0684e Create elasticfleet pillar dir 2023-05-31 15:10:35 +00:00
Wes
ed560f19d3 Remove where not applicable 2023-05-31 14:28:43 +00:00
Wes
b3f6012856 Change ordering 2023-05-31 14:22:47 +00:00
Wes
9ae26ec866 Add Fleet to top file 2023-05-31 14:21:39 +00:00
Wes
20aaa79476 Add pillar files for Fleet 2023-05-31 13:45:19 +00:00
Wes
2bb77251b0 Move Elastic Fleet logging exclusions to the Fleet pillar 2023-05-31 13:38:58 +00:00
weslambert
36791665f3 Merge pull request #10462 from Security-Onion-Solutions/feature/elastic_agent_zeek_logging
Dynamic integration configuration and Zeek log exclusions for Elastic Agent
2023-05-30 19:27:13 -04:00
Josh Patterson
4d4744a89b Merge pull request #10465 from Security-Onion-Solutions/suricataimport
dont apply suricata.enabled on import nodes
2023-05-30 16:51:17 -04:00
Wes
f3be63051b Remove Fleet configuration 2023-05-30 20:48:43 +00:00
m0duspwnens
743ed316f8 dont apply suricata.enabled on import nodes 2023-05-30 16:10:41 -04:00
Wes
e4b4bbcfdc Use ZEEKMERGED from zeek/config.map.jinja 2023-05-30 19:51:13 +00:00
Wes
b6e090f29f Move Elastic Fleet logic in so-common to so-elastic-fleet-common 2023-05-30 18:43:56 +00:00
weslambert
25006ed20b Merge pull request #10455 from Security-Onion-Solutions/fix/curator_cluster_delete_delete
Update so-elasticsearch-cluster-space-used and so-curator-cluster-delete-delete
2023-05-30 14:28:22 -04:00
Wes
4469a93a75 Fix typo 2023-05-30 18:24:30 +00:00
Mike Reeves
0027016b5a Merge pull request #10463 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update so-setup
2023-05-30 13:52:30 -04:00
Mike Reeves
0143e2412d Update so-setup 2023-05-30 13:51:20 -04:00
Mike Reeves
20212414c4 Update so-setup 2023-05-30 13:46:24 -04:00
Mike Reeves
8a63ed5124 Update so-setup 2023-05-30 13:33:30 -04:00
Wes
096dadf9bd Change 1024 to 1000 for gigabytes 2023-05-30 17:29:42 +00:00
Wes
b441fe662f Change 1024 to 1000 for gigabytes 2023-05-30 17:28:59 +00:00
Wes
e5117a343d Change description 2023-05-30 17:10:17 +00:00
Wes
b9d692eb0e Remove default value 2023-05-30 17:08:52 +00:00
Wes
36a7f54160 Add extension 2023-05-30 16:46:38 +00:00
Josh Brower
96134684dc Merge pull request #10459 from Security-Onion-Solutions/2.4/fixes
Change Fleet Host URL API Endpoint
2023-05-30 12:13:52 -04:00
Jason Ertel
374ab0779a Merge pull request #10458 from Security-Onion-Solutions/jertel/debugrsa
Add short sleeps around show_top to isolate if there's a race conditi…
2023-05-30 12:09:34 -04:00
Jason Ertel
d0d1cc9106 Add short sleeps around show_top to isolate if there's a race condition causing intermittent RSA key format errors 2023-05-30 12:08:39 -04:00
Jason Ertel
162a32fd08 Merge branch '2.4/dev' into kilo 2023-05-30 11:51:57 -04:00
Wes
9035fa3037 Don't load Elasticsearch integration 2023-05-30 15:46:00 +00:00
Wes
b4b87e5620 Only provide JSON output 2023-05-30 15:43:31 +00:00
Wes
97c53d70a4 Remove integrations 2023-05-30 14:05:40 +00:00
Wes
53b4f7bd5c Add spacing 2023-05-30 14:05:11 +00:00
Mike Reeves
192c8c78c7 Merge pull request #10456 from Security-Onion-Solutions/airgaps
Update verifications
2023-05-30 09:52:07 -04:00
Mike Reeves
62a063dae4 Update verifications 2023-05-30 09:50:43 -04:00
Wes
79014a53ec Remove extra lines 2023-05-30 12:35:32 +00:00
Wes
e910f04beb Add default description and Zeek log exclusions for Elastic Fleet 2023-05-30 03:10:52 +00:00
Wes
ef5b63337b Add check for integration existence and integration update functionality 2023-05-30 02:58:00 +00:00
Wes
799e92e595 Add files 2023-05-30 02:56:23 +00:00
Wes
c835c523a9 Elastic Fleet integration update improvements 2023-05-30 02:54:39 +00:00
Josh Brower
9ec1492fad Change Fleet Host URL API Endpoint 2023-05-29 07:44:18 -04:00
Wes
5af1bfe142 Move alert generation outside of the inner loop 2023-05-27 21:15:45 +00:00
Jason Ertel
482c5324db Merge pull request #10442 from Security-Onion-Solutions/airgaps
Rule Updates
2023-05-26 20:32:39 -04:00
Mike Reeves
3c1f1cd50e Rule Updates 2023-05-26 20:11:22 -04:00
Mike Reeves
aecd900203 Merge pull request #10387 from Security-Onion-Solutions/airgaps
Docker Enhancements
2023-05-26 17:35:23 -04:00
Mike Reeves
89f5d9f292 Rule Updates 2023-05-26 17:14:10 -04:00
Josh Brower
de43a202a3 Merge pull request #10441 from Security-Onion-Solutions/2.4/fleet-retry
Add Fleet download retry
2023-05-26 17:03:58 -04:00
Josh Brower
6176fa7ca5 Add Fleet download retry 2023-05-26 16:46:02 -04:00
Mike Reeves
9ff27e5b6a Rule Updates 2023-05-26 16:34:48 -04:00
Mike Reeves
5922fc0e45 Rule Updates 2023-05-26 16:29:13 -04:00
Mike Reeves
b48e259fee Rule Updates 2023-05-26 16:27:29 -04:00
Mike Reeves
b4d85a7bf8 Rule Updates 2023-05-26 16:21:07 -04:00
Mike Reeves
38881231ac Merge branch '2.4/dev' of https://github.com/Security-Onion-Solutions/securityonion into airgaps 2023-05-26 15:16:38 -04:00
Mike Reeves
b2d2a9f0ed Rule Updates 2023-05-26 15:16:14 -04:00
Jason Ertel
32021cf272 Merge pull request #10438 from Security-Onion-Solutions/jertel/redircurl
support forwarding urls
2023-05-26 13:42:57 -04:00
Jason Ertel
4410e136b1 Merge branch '2.4/dev' into jertel/redircurl 2023-05-26 12:12:09 -04:00
Jason Ertel
81d4584819 allow following redirects 2023-05-26 12:11:40 -04:00
Jason Ertel
f765dc23ea kilofy version 2023-05-26 09:54:50 -04:00
Jason Ertel
657ef97d17 Merge pull request #10433 from Security-Onion-Solutions/kilo
Use common fail routine when explicitly aborting setup; Enhance cloud detection
2023-05-26 09:54:15 -04:00
Jason Ertel
8f247f962a undo version for PR 2023-05-26 09:50:12 -04:00
Josh Patterson
bcbdab1682 Merge pull request #10435 from Security-Onion-Solutions/issue/10429
Issue/10429
2023-05-26 09:47:33 -04:00
m0duspwnens
5b4ec70ca6 fix typo on suricata annotations. add to global annotations 2023-05-26 09:37:57 -04:00
Wes
ce114a2601 Fix total space logic and rename TOTAL_AVAILABLE_SPACE to TOTAL_USED_SPACE 2023-05-26 13:19:45 +00:00
Wes
5de59a879a Break out of index deletion when unable to bring space below the disk space threshold 2023-05-26 13:15:27 +00:00
Jason Ertel
a2e6469a38 provide custom cloud detection path 2023-05-26 08:05:34 -04:00
m0duspwnens
5c933910aa simplify map for updating suricata config if md engine is suricata 2023-05-25 17:25:54 -04:00
m0duspwnens
a3c3f08511 convert list to dict to work better with ui. regex on suricata vars HOME_NET for soc 2023-05-25 17:00:48 -04:00
Jason Ertel
9aa58be286 correct kilo version 2023-05-25 16:14:07 -04:00
Jason Ertel
db56b3d6a3 pin version to kilo 2023-05-25 15:27:05 -04:00
Jason Ertel
7d6182a18f redir err to out to avoid leaks to console 2023-05-25 15:24:09 -04:00
Jason Ertel
074f84ae4d flag all forced setup aborts 2023-05-25 14:57:58 -04:00
Mike Reeves
8ce0d76287 Zeek Annotations 2023-05-25 12:12:18 -04:00
Mike Reeves
3be3df00d1 Zeek Annotations 2023-05-25 12:10:15 -04:00
m0duspwnens
d99d4756c3 set defaults as example in soc ui for suricata cpu affinity 2023-05-25 11:11:53 -04:00
m0duspwnens
0d83b13585 Merge remote-tracking branch 'origin/2.4/dev' into issue/10229 2023-05-25 11:04:04 -04:00
m0duspwnens
6505d3e2ce update annotations for suricata 2023-05-25 11:03:37 -04:00
Josh Patterson
6edfadd18b Merge pull request #10432 from Security-Onion-Solutions/distribsetup
Update so-functions
2023-05-25 10:44:33 -04:00
Josh Patterson
9552510c7d Update so-functions
assign proper hostgroups for setup
2023-05-25 10:43:47 -04:00
Doug Burks
36ddcfa4e5 Merge pull request #10431 from Security-Onion-Solutions/dougburks-patch-1
Update README.md for Beta 3
2023-05-25 08:36:14 -04:00
Doug Burks
fcc1337e1a Update README.md for Beta 3 2023-05-25 07:51:08 -04:00
Mike Reeves
10f9d0f4bd Suricata Airgap 2023-05-24 16:21:51 -04:00
Mike Reeves
edf531739c Suricata Airgap 2023-05-24 15:47:07 -04:00
Mike Reeves
11d7e66ea0 Suricata Airgap 2023-05-24 15:30:52 -04:00
Mike Reeves
caaedee5a7 Suricata Airgap 2023-05-24 15:18:52 -04:00
Mike Reeves
1bdd79c578 Suricata Airgap 2023-05-24 15:05:40 -04:00
Mike Reeves
c199acc64e Suricata Airgap 2023-05-24 14:58:11 -04:00
Josh Patterson
a01704a1d7 Merge pull request #10427 from Security-Onion-Solutions/issue/10229
Issue/10229
2023-05-24 13:23:29 -04:00
Wes
53f258b08f Add eligible_indices to index deletion requirements 2023-05-24 17:02:11 +00:00
Wes
a308a39bbe Use disk space taken up by indices if the script is not running on a manager 2023-05-24 16:48:45 +00:00
m0duspwnens
5c00655ad0 Merge remote-tracking branch 'origin/2.4/dev' into issue/10229 2023-05-24 12:22:52 -04:00
m0duspwnens
67a608ea56 adjust suricata defaults 2023-05-24 12:22:42 -04:00
Josh Brower
01d983fc00 Merge pull request #10426 from Security-Onion-Solutions/2.4/fleet-punchlist
2.4/fleet punchlist
2023-05-24 12:15:50 -04:00
Mike Reeves
d6f1bcfdf0 Merge branch '2.4/dev' of https://github.com/Security-Onion-Solutions/securityonion into airgaps 2023-05-24 11:42:44 -04:00
Josh Brower
f156573f8d Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/fleet-punchlist 2023-05-24 11:28:38 -04:00
Josh Brower
b3e0e68896 Change Fleet Host URL API 2023-05-24 11:27:41 -04:00
Mike Reeves
86803f1fb5 Add Suricata 2023-05-24 10:48:01 -04:00
Jason Ertel
aad08a830b Merge pull request #10425 from Security-Onion-Solutions/kilo
fix malformed alert templates
2023-05-24 10:21:21 -04:00
Mike Reeves
c9db6c0f18 Add Suricata 2023-05-24 10:18:58 -04:00
Jason Ertel
d9a9c8738c fix malformed alert templates 2023-05-24 10:17:59 -04:00
Mike Reeves
cb0ed9ae6d Merge branch '2.4/dev' of https://github.com/Security-Onion-Solutions/securityonion into airgaps 2023-05-24 10:04:15 -04:00
Josh Brower
4f72fca2d7 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/fleet-punchlist 2023-05-24 09:55:29 -04:00
Josh Patterson
1dc426b8ce Merge pull request #10422 from Security-Onion-Solutions/issue/10229
fix suricata sostatus
2023-05-24 09:54:14 -04:00
m0duspwnens
8995012c80 fix suricata sostatus 2023-05-24 09:52:07 -04:00
Mike Reeves
2c4ba2e8b2 Add Suricata 2023-05-24 09:35:50 -04:00
Mike Reeves
c42959d040 soup skeleton 2023-05-24 09:29:50 -04:00
Mike Reeves
fa6dcd7f83 Merge branch '2.4/dev' of https://github.com/Security-Onion-Solutions/securityonion into airgaps 2023-05-24 09:04:04 -04:00
Josh Brower
9c6365aa2f Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/fleet-punchlist 2023-05-24 09:03:57 -04:00
Josh Patterson
6e4c4febfb Merge pull request #10421 from Security-Onion-Solutions/issue/10229
rename state to resolve conflicting / duplicate state ids
2023-05-24 09:02:47 -04:00
m0duspwnens
732d2aadf8 rename state to resolve conflicting / duplicate state ids 2023-05-24 08:58:43 -04:00
Mike Reeves
cace817c79 Merge branch '2.4/dev' of https://github.com/Security-Onion-Solutions/securityonion into airgaps 2023-05-24 08:43:03 -04:00
Josh Brower
e1c361e555 Fix variable 2023-05-23 16:50:40 -04:00
Josh Brower
502277b1b7 Hash check, use url base 2023-05-23 16:38:37 -04:00
bryant-treacle
57f5a22f0f Merge pull request #10396 from Security-Onion-Solutions/2.4/Influxdb_alerts
2.4/influxdb alerts
2023-05-23 14:14:48 -04:00
Josh Patterson
4b18a0e758 Merge pull request #10417 from Security-Onion-Solutions/issue/10229
Issue/10229
2023-05-23 13:47:48 -04:00
Josh Brower
f6a9a764de Merge pull request #10416 from Security-Onion-Solutions/2.4/smallfixes
2.4/EQL
2023-05-23 13:28:11 -04:00
m0duspwnens
e65214b097 Merge remote-tracking branch 'origin/2.4/dev' into issue/10229 2023-05-23 12:10:29 -04:00
m0duspwnens
cc47f9a595 fix suricata thresholding 2023-05-23 11:16:32 -04:00
m0duspwnens
eb633be437 enable/disable suricata in ui. assign threads properly 2023-05-22 17:48:22 -04:00
Josh Brower
df0dc2e4d1 Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/smallfixes 2023-05-22 16:02:30 -04:00
Josh Brower
766f4dd661 Add Elastic Defend Integration 2023-05-22 16:02:08 -04:00
Jason Ertel
f53fb69ffb Merge pull request #10407 from Security-Onion-Solutions/kilo
Ignore Synchronize button clicks when an active salt job is running and another is already in queue
2023-05-22 14:59:42 -04:00
Jason Ertel
ba0ec18a33 Ignore Synchronize button clicks when an active salt job is running and another is already in queue 2023-05-22 14:52:07 -04:00
weslambert
79182cecfd Merge pull request #10397 from Security-Onion-Solutions/fix/elastic_exclude_zeek_reporter_log
Exclude Zeek's reporter.log from being picked up by Elastic Agent
2023-05-22 07:56:54 -04:00
weslambert
8cf82c4b6a Merge pull request #10398 from Security-Onion-Solutions/fix/elasticsearch_ingest_dns_query
Check if 'dns.query' is null
2023-05-22 07:56:44 -04:00
weslambert
78d4586033 Merge pull request #10399 from Security-Onion-Solutions/fix/elastalert_playbook_alerter
Update 'url' to use 'es_hosts'
2023-05-22 07:56:31 -04:00
Jason Ertel
02cf1074f2 Merge pull request #10400 from Security-Onion-Solutions/kilo
use the same requests version that's already packaged with the analyzer
2023-05-20 08:45:21 -04:00
Jason Ertel
a881cab469 use the same requests version that's already packaged with the analyzer 2023-05-19 23:54:30 -04:00
weslambert
00bd93c026 Update 'url' to use 'es_hosts' 2023-05-19 17:14:13 -04:00
weslambert
2c10ad7eec Check if 'dns.query' is null 2023-05-19 15:50:33 -04:00
weslambert
167051af28 Exclude Zeek's reporter.log from being picked up by Elastic Agent 2023-05-19 15:44:09 -04:00
weslambert
eb9c5e9af0 Merge pull request #10307 from Security-Onion-Solutions/fix/elastic_fleet_ignore_zeek_logs
Don't read from 'known_hosts.log', 'known_services.log', or 'ntp.log'
2023-05-19 15:09:15 -04:00
Jason Ertel
2f942a3e37 Merge pull request #10393 from Security-Onion-Solutions/kilo
fix lib dependency issue with whoisit
2023-05-19 14:34:42 -04:00
Jason Ertel
03f97b309a fix lib dependency issue with whoisit 2023-05-19 14:18:19 -04:00
weslambert
c6a962a46b Merge pull request #10392 from Security-Onion-Solutions/fix/elastalert_index
Change Elastalert writeback index name from 'elastalert_status' to 'elastalert'
2023-05-19 13:31:29 -04:00
weslambert
1ddf45bbbe Change Elastalert writeback index name from 'elastalert_status' to 'elastalert' 2023-05-19 12:39:27 -04:00
Doug Burks
f0c4cebaca Merge pull request #10391 from Security-Onion-Solutions/2.4/elastic-8.7.1
UPGRADE: Elastic 8.7.1 #10269
2023-05-19 12:29:01 -04:00
Doug Burks
87c42ece00 Update so-kibana-config-load 2023-05-19 12:21:09 -04:00
Doug Burks
4f8fcd3369 Update config_saved_objects.ndjson 2023-05-19 12:19:44 -04:00
bryant-treacle
5b2d91b5b5 Update alarm_zeek_packet_loss.json 2023-05-19 10:32:53 -04:00
bryant-treacle
a84322f9b7 Update alarm_suricata_packet_loss.json 2023-05-19 10:32:29 -04:00
bryant-treacle
2de95bcb63 Update alarm_steno_packet_loss.json 2023-05-19 10:32:13 -04:00
bryant-treacle
1e9e2facde Update alarm_low_monitor_traffic.json 2023-05-19 10:29:53 -04:00
bryant-treacle
592c67d1f2 Update alarm_pcap_retention.json 2023-05-19 10:29:15 -04:00
bryant-treacle
e91dd29cb2 Update alarm_high_redis_memory_usage.json 2023-05-19 10:25:22 -04:00
bryant-treacle
13c9142814 Update alarm_low_monitor_traffic.json 2023-05-19 10:21:43 -04:00
bryant-treacle
ef4f2491f3 Update alarm_high_redis_memory_usage.json 2023-05-19 10:12:44 -04:00
bryant-treacle
645555b990 Update alarm_zeek_packet_loss.json 2023-05-19 10:10:44 -04:00
bryant-treacle
839275814c Update redis.sh - Added percent of used memory. 2023-05-19 08:51:49 -04:00
bryant-treacle
9b973e07e2 Add files via upload 2023-05-19 08:49:43 -04:00
Josh Patterson
0027385da9 Merge pull request #10389 from Security-Onion-Solutions/issue/10229
enable playbook on eval in pillar during setup
2023-05-18 17:38:05 -04:00
m0duspwnens
4ef77f9050 enable playbook on eval in pillar during setup 2023-05-18 17:34:59 -04:00
Mike Reeves
debbdec350 Allow additional docker parameters 2023-05-18 17:10:18 -04:00
Mike Reeves
bf4ac0c2dd Allow additional docker parameters 2023-05-18 17:08:39 -04:00
Mike Reeves
cb9e7e63db Allow additional docker parameters 2023-05-18 17:00:54 -04:00
Mike Reeves
32560af767 Allow additional docker parameters 2023-05-18 16:59:45 -04:00
Mike Reeves
1e5ac61ff5 Allow additional docker parameters 2023-05-18 16:57:48 -04:00
Mike Reeves
5315c51197 Allow additional docker parameters 2023-05-18 16:52:38 -04:00
Mike Reeves
8917f9b9d2 Allow additional docker parameters 2023-05-18 16:46:28 -04:00
Mike Reeves
c0dc05f26a Allow additional docker parameters 2023-05-18 16:39:42 -04:00
Mike Reeves
2aa801d906 Allow additional docker parameters 2023-05-18 16:31:29 -04:00
weslambert
c192ec9109 Merge pull request #10385 from Security-Onion-Solutions/feature/elastalert_eql
Add initial support for EQL queries for Elastalert
2023-05-18 15:36:28 -04:00
Mike Reeves
7ab31e36af Merge branch '2.4/dev' of https://github.com/Security-Onion-Solutions/securityonion into airgaps 2023-05-18 15:19:15 -04:00
Mike Reeves
0fd9fb9294 Allow additional docker parameters 2023-05-18 15:19:09 -04:00
Josh Patterson
059f80bfc4 Merge pull request #10384 from Security-Onion-Solutions/issue/10334
Issue/10334
2023-05-18 13:28:47 -04:00
m0duspwnens
bab2f7282c fix spaciong 2023-05-18 13:27:48 -04:00
m0duspwnens
02920b5ac9 confirm manager ip when found in setup 2023-05-18 13:25:12 -04:00
m0duspwnens
25b0934cda confirm manager ip when found in setup 2023-05-18 13:06:20 -04:00
Wes
d3c7ea4805 Add EQL option 2023-05-18 16:55:26 +00:00
Wes
82c3d78672 Change Elasticsearch host syntax 2023-05-18 16:52:27 +00:00
Josh Brower
97b68609bc Merge pull request #10381 from Security-Onion-Solutions/2.4/smallfixes
2.4/ElasticFleetPunchList
2023-05-18 09:04:30 -04:00
Josh Patterson
1d611e618f Merge pull request #10383 from Security-Onion-Solutions/issue/10229
remove conditional on cacertz and capemz
2023-05-18 08:45:41 -04:00
m0duspwnens
f4b8d385ee remove conditional on cacertz and capemz 2023-05-18 08:36:24 -04:00
Jason Ertel
b7e0923ec4 Merge pull request #10382 from Security-Onion-Solutions/kilo
add missing var for local dev
2023-05-17 18:58:29 -04:00
Jason Ertel
4930ae4ba6 add missing var for local dev 2023-05-17 18:14:21 -04:00
Josh Brower
d11479ec5f Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/smallfixes 2023-05-17 16:11:46 -04:00
Josh Brower
901e3c4a20 Set Fleet Host timeouts to 120 seconds 2023-05-17 16:07:59 -04:00
Josh Patterson
81842462ba Merge pull request #10380 from Security-Onion-Solutions/issue/10229
Issue/10229
2023-05-17 15:53:15 -04:00
m0duspwnens
e15c14cc2e fix indent 2023-05-17 15:50:31 -04:00
m0duspwnens
f7ddf57f39 move files out of config 2023-05-17 15:49:22 -04:00
Josh Brower
47e67fda46 Rework restart scripts for Elastic Fleet 2023-05-17 15:37:39 -04:00
Josh Brower
7d0251952c Filter out uneeded Logstash metadata 2023-05-17 11:06:16 -04:00
Josh Brower
5536f5a8c2 Add Fleet node to other roles 2023-05-17 09:32:20 -04:00
Josh Patterson
2c932fae9d Merge pull request #10371 from Security-Onion-Solutions/salt3006.1
Salt3006.1
2023-05-16 16:59:31 -04:00
Josh Brower
24445cf36a Rename Fleet pipelines 2023-05-16 16:43:21 -04:00
m0duspwnens
0feb25c962 Merge remote-tracking branch 'origin/2.4/dev' into salt3006.1 2023-05-16 16:07:31 -04:00
m0duspwnens
3abb4d79ba change path where SALTVERSION is pulled from 2023-05-16 16:07:06 -04:00
Josh Patterson
1df183deb3 Merge pull request #10370 from Security-Onion-Solutions/issue/10229
fix grep logic for so-elastic-fleet sostatus.sls
2023-05-16 15:46:41 -04:00
m0duspwnens
77834c1e58 fix grep logic for so-elastic-fleet sostatus.sls 2023-05-16 15:05:14 -04:00
Josh Patterson
d6207705cd Merge pull request #10369 from Security-Onion-Solutions/salt3006.1
specify salt version to install during setup
2023-05-16 14:47:35 -04:00
m0duspwnens
e4b61aa08d specify salt version to install during setup 2023-05-16 14:28:57 -04:00
Josh Patterson
736ff2930d Merge pull request #10368 from Security-Onion-Solutions/salt3006.1
Salt3006.1
2023-05-16 13:48:11 -04:00
m0duspwnens
6aff526d9e Merge remote-tracking branch 'origin/2.4/dev' into salt3006.1 2023-05-16 13:08:28 -04:00
Josh Brower
8101171c97 Merge pull request #10367 from Security-Onion-Solutions/2.4/integrationfix
Update Integrations
2023-05-16 12:56:47 -04:00
Josh Brower
000507c366 Update Integrations 2023-05-16 12:50:40 -04:00
Josh Patterson
82fdee45aa Merge pull request #10366 from Security-Onion-Solutions/issue/10229
cwd for catrustscript
2023-05-16 12:11:20 -04:00
m0duspwnens
2419fa43b6 cwd for catrustscript 2023-05-16 12:08:44 -04:00
m0duspwnens
acc7619023 salt 3006.1 2023-05-16 12:04:02 -04:00
Jason Ertel
dcd761ad74 Merge pull request #10364 from Security-Onion-Solutions/kilo
import installs do not use monitor ifaces
2023-05-16 10:15:26 -04:00
Jason Ertel
9871ecd223 import installs do not use monitor ifaces 2023-05-16 10:14:31 -04:00
Josh Patterson
56a7fdcfcd Merge pull request #10363 from Security-Onion-Solutions/issue/10229
Issue/10229
2023-05-16 09:36:31 -04:00
m0duspwnens
6325f6db16 run elasticfleet.config so elasticfleet setup script gets put in place 2023-05-16 09:30:27 -04:00
m0duspwnens
b253cd45ca Merge remote-tracking branch 'origin/2.4/dev' into issue/10229 2023-05-16 09:22:48 -04:00
Jason Ertel
1724565331 Merge pull request #10362 from Security-Onion-Solutions/kilo
ensure automated tests have passwordless sudo
2023-05-16 08:49:00 -04:00
Jason Ertel
00a7beaca2 ensure automated tests have passwordless sudo 2023-05-16 08:43:13 -04:00
Mike Reeves
c129bba7e5 Merge pull request #10361 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update defaults.yaml
2023-05-16 08:19:07 -04:00
Mike Reeves
fb298224fc Update defaults.yaml 2023-05-16 08:17:50 -04:00
Josh Brower
1feed47185 Merge pull request #10360 from Security-Onion-Solutions/2.4/retry
2.4/retry
2023-05-16 08:15:42 -04:00
Josh Brower
923de356e1 Fix typos 2023-05-16 08:06:31 -04:00
Jason Ertel
cea9af4e01 Merge pull request #10359 from Security-Onion-Solutions/kilo
missing braces
2023-05-16 07:25:36 -04:00
Jason Ertel
0f6d894322 missing braces 2023-05-16 07:22:17 -04:00
Josh Brower
9f879164ec Fix broken loop 2023-05-16 06:45:17 -04:00
Jason Ertel
1ddc4b6ff8 Merge pull request #10357 from Security-Onion-Solutions/kilo
ISO tests also use DHCP
2023-05-15 19:04:31 -04:00
Jason Ertel
58f80120bd ISO tests also use DHCP 2023-05-15 18:58:04 -04:00
m0duspwnens
a0e08e4f41 enable elasticfleet via pillar, fix sostatus for elasticfleet 2023-05-15 17:41:09 -04:00
m0duspwnens
2813d67670 import GLOBALS 2023-05-15 16:47:33 -04:00
m0duspwnens
c49b134122 move so-catrust 2023-05-15 16:43:47 -04:00
Mike Reeves
48ce377b02 Merge pull request #10340 from Security-Onion-Solutions/airgaps
Fix IDS Tools
2023-05-15 16:10:03 -04:00
Josh Brower
40de01e8c4 Temp fix 2023-05-15 15:56:21 -04:00
Mike Reeves
2fe88a1e66 Fix verify so copying sigma rules isnt fail 2023-05-15 15:33:52 -04:00
Mike Reeves
214117e0e0 Fix verify so copying sigma rules isnt fail 2023-05-15 15:33:32 -04:00
Josh Brower
bc2d3e43f0 Merge pull request #10356 from Security-Onion-Solutions/2.4/retry
Fix path
2023-05-15 15:20:43 -04:00
Josh Brower
b3528b2139 Fix path 2023-05-15 15:18:49 -04:00
Josh Brower
7ecd067e2b Merge pull request #10355 from Security-Onion-Solutions/2.4/retry
Add retry
2023-05-15 14:57:46 -04:00
Josh Brower
576c1d7cc1 Add retry 2023-05-15 14:55:43 -04:00
m0duspwnens
6320528263 move so-catrust 2023-05-15 14:08:30 -04:00
Josh Brower
6528632861 Merge pull request #10352 from Security-Onion-Solutions/2.4/taglogs
Refactor wrapper
2023-05-15 13:56:38 -04:00
m0duspwnens
928b3b5471 create local kibana pillar dirs before touching pillar files 2023-05-15 13:40:52 -04:00
m0duspwnens
f1c8467e9b create and assign kibana.soc and kibana.adv 2023-05-15 13:13:38 -04:00
m0duspwnens
f5337eba1a Merge remote-tracking branch 'origin/2.4/dev' into issue/10229 2023-05-15 13:08:53 -04:00
Jason Ertel
de28e15805 Merge pull request #10354 from Security-Onion-Solutions/kilo
Relax rate limiting thresholds when installing in test mode
2023-05-15 13:02:07 -04:00
Jason Ertel
09ba15f9bb Merge branch '2.4/dev' into kilo 2023-05-15 12:57:46 -04:00
Jason Ertel
ba9892941d relax login rate limiting when testing 2023-05-15 12:57:41 -04:00
Josh Brower
b381c51246 Merge branch '2.4/dev' into 2.4/taglogs 2023-05-15 12:13:44 -04:00
Josh Brower
64726af69c Change from tmp 2023-05-15 12:09:16 -04:00
m0duspwnens
7a4fea7a12 fix nginx merge conflicts 2023-05-15 11:40:12 -04:00
m0duspwnens
db47256cdd rename 2023-05-15 11:23:27 -04:00
m0duspwnens
ba2392997b enabled/disable elastic-fleet-package-registry via ui 2023-05-15 11:14:21 -04:00
m0duspwnens
1a1bcb3526 enable/disable idh via ui 2023-05-15 10:53:39 -04:00
m0duspwnens
997e6c141a enable/disable idstools in ui 2023-05-15 10:19:15 -04:00
Doug Burks
9a3c997779 Merge pull request #10351 from Security-Onion-Solutions/dougburks-patch-1
Update install_agent_grid.sls
2023-05-15 10:13:55 -04:00
Doug Burks
53ed4d49c2 Update install_agent_grid.sls 2023-05-15 10:10:27 -04:00
m0duspwnens
0cee5b54a1 make advnaced 2023-05-15 10:00:15 -04:00
m0duspwnens
3f8e15d16f enabled/disable elaticfleet in ui 2023-05-15 09:41:44 -04:00
Doug Burks
f8f6a1433a Merge pull request #10350 from Security-Onion-Solutions/2.4/fix-agent-iso
2.4/fix agent iso
2023-05-15 08:47:05 -04:00
Doug Burks
83188401c5 update status messages 2023-05-15 08:43:53 -04:00
Doug Burks
b01367a294 remove the temp directory when finished 2023-05-15 08:41:05 -04:00
Doug Burks
d8e0e320f4 so-elastic-agent-gen-installers should use /nsm to avoid filling /tmp 2023-05-15 07:31:32 -04:00
m0duspwnens
b033f0d20f fix import 2023-05-12 16:57:31 -04:00
m0duspwnens
b71b4225c4 enabled/disable kratos in ui 2023-05-12 16:53:18 -04:00
m0duspwnens
2a39f5f0b5 enabled/disable mysql in ui 2023-05-12 16:27:18 -04:00
m0duspwnens
e27e690bc8 fix disabled for registry 2023-05-12 16:07:49 -04:00
m0duspwnens
57371ffe5a fix so-status for dockerregistry 2023-05-12 16:05:23 -04:00
m0duspwnens
4440ecd433 enabled/disable registry in ui 2023-05-12 15:51:00 -04:00
m0duspwnens
277ad61920 enabled/disable registry in ui 2023-05-12 15:49:13 -04:00
m0duspwnens
0860b1501e fix so-status state name 2023-05-12 15:17:51 -04:00
m0duspwnens
b06610088a fix so-status state names 2023-05-12 15:15:21 -04:00
m0duspwnens
aa2f168b73 make node_description a string 2023-05-12 15:12:12 -04:00
m0duspwnens
d1f7e5f4a7 fix and rename timeout_ms and parallel_limit 2023-05-12 14:57:55 -04:00
m0duspwnens
05a81596e5 place and access sensoronikey from sensoroni.config 2023-05-12 14:38:39 -04:00
m0duspwnens
00d1ca0b62 configure and enable/disable sensoroni via ui 2023-05-12 14:26:46 -04:00
Josh Brower
dbd4a5bd98 Refactor wrapper 2023-05-12 12:11:28 -04:00
Doug Burks
3db34a3346 Merge pull request #10341 from Security-Onion-Solutions/dougburks-patch-1
revert last change to so-verify
2023-05-11 16:47:50 -04:00
Doug Burks
f9890778ad revert last change to so-verify 2023-05-11 16:45:46 -04:00
m0duspwnens
e342dae818 put srvKey under soc:config:server 2023-05-11 16:14:52 -04:00
Mike Reeves
64e294ef48 Fix verify so copying sigma rules isnt fail 2023-05-11 16:02:58 -04:00
Mike Reeves
992bbdfac1 Merge branch '2.4/dev' of https://github.com/Security-Onion-Solutions/securityonion into airgaps 2023-05-11 16:00:15 -04:00
Mike Reeves
a4cd695cc8 Airgap Rules Fix 2023-05-11 16:00:07 -04:00
Doug Burks
9f85b3cb4f Merge pull request #10339 from Security-Onion-Solutions/dougburks-patch-1
add another error exclusion to so-verify
2023-05-11 15:59:14 -04:00
Doug Burks
e9fd7d8b8b add another error exclusion to so-verify 2023-05-11 15:38:57 -04:00
m0duspwnens
fa1a428133 fix import 2023-05-11 15:36:20 -04:00
m0duspwnens
8e18986671 enabled/disable soc in ui 2023-05-11 15:33:16 -04:00
m0duspwnens
a3b97b40ba enabled/disable soctopus in ui 2023-05-11 13:57:08 -04:00
Doug Burks
634dd9907d Merge pull request #10338 from Security-Onion-Solutions/dougburks-patch-1
fix typo in so-elastic-fleet-setup
2023-05-11 13:40:15 -04:00
Doug Burks
1d12dcd243 fix typo in so-elastic-fleet-setup 2023-05-11 13:39:07 -04:00
Jason Ertel
2ec8d6abf0 Merge pull request #10337 from Security-Onion-Solutions/kilo
Prevent duplicate telegraph data from elastic from distorting Influx graphs
2023-05-11 13:38:14 -04:00
Jason Ertel
98c19e5934 handle duplicate telegraph data for elastic 2023-05-11 13:34:44 -04:00
m0duspwnens
03e7636a18 include nginx.config in soctopus 2023-05-11 13:19:16 -04:00
m0duspwnens
6ce9561ba7 enabled/disable nginx via ui 2023-05-11 13:15:26 -04:00
m0duspwnens
b80dd996cc fix import 2023-05-11 12:46:05 -04:00
m0duspwnens
63cea88c1d enable/disable influxdb in ui 2023-05-11 12:43:06 -04:00
m0duspwnens
f41c75c633 fix include 2023-05-11 12:14:30 -04:00
m0duspwnens
20f706f165 enable/disable telegraf in ui 2023-05-11 12:12:25 -04:00
m0duspwnens
c74b440922 configure and enable/disable curator in ui 2023-05-11 10:17:28 -04:00
Mike Reeves
badaab94de Merge pull request #10331 from Security-Onion-Solutions/airgaps
Fix so_user shennanigans
2023-05-10 18:34:39 -04:00
Mike Reeves
2be6c603ab Fix so_user shennanigans 2023-05-10 17:47:41 -04:00
Jason Ertel
7700a5a1bf Merge pull request #10328 from Security-Onion-Solutions/kilo
add missing dollar sign
2023-05-10 17:06:35 -04:00
Jason Ertel
687a89e30b add missing dollar sign 2023-05-10 17:00:13 -04:00
m0duspwnens
06a0492226 import DOCKER and GLOBALS for filestream enabled 2023-05-10 16:04:53 -04:00
m0duspwnens
4e4034e054 cleanup strelka in top and allowed_states 2023-05-10 15:59:10 -04:00
m0duspwnens
5b06aa518e makedirs if needed 2023-05-10 15:55:21 -04:00
m0duspwnens
c91fb438bb update map file with new strelka format 2023-05-10 15:53:28 -04:00
m0duspwnens
54c9a3ec71 enable/disable each strelka container in ui 2023-05-10 15:50:07 -04:00
Mike Reeves
cc1babbea6 Merge pull request #10325 from Security-Onion-Solutions/airgaps
Initial airgap support
2023-05-10 15:00:57 -04:00
Mike Reeves
bde67266d4 Add elastic agent logic 2023-05-10 14:28:46 -04:00
Josh Brower
1de1e2fdc2 Merge pull request #10324 from Security-Onion-Solutions/2.4/taglogs
tag container logs
2023-05-10 14:21:16 -04:00
Josh Brower
2293574f2e tag container logs 2023-05-10 14:19:17 -04:00
Mike Reeves
3077c21bd9 Add official key 2023-05-10 14:15:06 -04:00
Mike Reeves
a52ca6e298 Add official key 2023-05-10 13:29:22 -04:00
m0duspwnens
02e1a29f0c configure redis in ui 2023-05-10 11:54:21 -04:00
m0duspwnens
1b9ed1c72b uncomment so-playbook when enabled 2023-05-10 11:24:14 -04:00
Mike Reeves
9564158c32 Don't sync down the repo for airgap 2023-05-10 11:19:36 -04:00
m0duspwnens
ce1f75aab6 fix indent for description and helplink 2023-05-10 11:19:00 -04:00
m0duspwnens
a0ce46e702 enable/disable logstash in ui 2023-05-10 11:16:03 -04:00
Mike Reeves
f501fac9cd Don't sync down the repo for airgap 2023-05-10 11:07:03 -04:00
Mike Reeves
8b95edd91a Fix setup whiptail for airgap 2023-05-10 10:46:29 -04:00
m0duspwnens
c5e5763014 uncomment so-kibana in so-status 2023-05-10 09:55:20 -04:00
m0duspwnens
2322ed4b6d fix require 2023-05-09 17:13:36 -04:00
m0duspwnens
38d69701a4 fix require 2023-05-09 17:09:00 -04:00
m0duspwnens
4dc0f06331 add add_kibana_to_minion to so-minion 2023-05-09 16:51:41 -04:00
m0duspwnens
ec7bcd9b0c enabled/disable kibana in ui 2023-05-09 16:46:48 -04:00
Doug Burks
24140c4cda Merge pull request #10319 from Security-Onion-Solutions/dougburks-patch-1
Update soc_idstools.yaml
2023-05-09 12:18:36 -04:00
m0duspwnens
6909d3ed14 move cacertz and capemz to ssl state 2023-05-09 12:16:18 -04:00
Doug Burks
cf5feafb1e Update soc_idstools.yaml 2023-05-09 12:11:42 -04:00
Josh Brower
ebc20a86eb Merge pull request #10316 from Security-Onion-Solutions/2.4/integrationversions
Remove Hardcoded Versions
2023-05-09 12:04:24 -04:00
Mike Reeves
e792fbe023 Merge pull request #10317 from Security-Onion-Solutions/airgaps
Remove escaping from nmcli
2023-05-09 11:58:02 -04:00
Mike Reeves
02b619193d Remove escaping from nmcli 2023-05-09 11:55:51 -04:00
Mike Reeves
e5aab3b707 Merge pull request #10315 from Security-Onion-Solutions/airgaps
Fix NIC escaping
2023-05-09 11:40:20 -04:00
Mike Reeves
089fcbd0c5 Fix NIC escaping 2023-05-09 11:37:50 -04:00
Josh Brower
62bafb94f9 Remove Hardcoded Versions 2023-05-09 11:30:25 -04:00
m0duspwnens
9d6fb98e3b move cacertz and capemz to ca state 2023-05-09 11:13:57 -04:00
m0duspwnens
7bd9a84aa1 changes to top and allow_states for enable/disable elasticsearch in ui 2023-05-09 10:01:30 -04:00
m0duspwnens
328b714306 import ELASTICSEARCHMERGED 2023-05-09 09:51:53 -04:00
m0duspwnens
2a979197a0 enabled/disable elasticsearch in ui 2023-05-09 09:33:37 -04:00
Jason Ertel
6f7f09f1cd Merge pull request #10310 from Security-Onion-Solutions/kilo
nginx changes: add rate limiting, remove old HH html
2023-05-08 16:32:27 -04:00
m0duspwnens
f9804c218d only append to so-status.conf if needed 2023-05-08 16:20:17 -04:00
Jason Ertel
dfc4498921 Clarify auth throttle desc 2023-05-08 16:06:10 -04:00
m0duspwnens
9049f9cf03 enabled/disable elastalert via web ui 2023-05-08 15:56:26 -04:00
Jason Ertel
79a5f3a89f add missing slash 2023-05-08 15:55:00 -04:00
Jason Ertel
c7cb11e919 remove obsolete code 2023-05-08 15:34:19 -04:00
Jason Ertel
da81d93930 adjust var name 2023-05-08 15:32:04 -04:00
Jason Ertel
44344612b7 adjust var name 2023-05-08 15:31:08 -04:00
Jason Ertel
7ac4bc52a3 add missing file 2023-05-08 14:55:37 -04:00
m0duspwnens
9aaa33c224 fix allowed_states logic in playbook config 2023-05-08 14:51:10 -04:00
weslambert
a13e6257c3 Don't read from 'known_hosts.log', 'known_services.log', or 'ntp.log' 2023-05-08 14:38:55 -04:00
m0duspwnens
ef18cb3704 top and allow_states changes for playbook 2023-05-08 14:12:46 -04:00
m0duspwnens
d5c7eec4ef enabled false by default, enabled via pillar in so-minion 2023-05-08 13:43:53 -04:00
m0duspwnens
a2c444e03b enabled/disable playbook in ui 2023-05-08 13:43:08 -04:00
Jason Ertel
40c3f9a156 Merge branch '2.4/dev' into kilo 2023-05-08 12:19:00 -04:00
Jason Ertel
bd23d1ab7b implement selective rate limiting 2023-05-08 12:18:46 -04:00
weslambert
a1e0041b14 Merge pull request #10287 from Security-Onion-Solutions/fix/strelka_ignore_yara_rules_2.4
Ignore "expl_outlook_cve_2023_23397.yar" and "gen_mal_3cx_compromise_mar23.yar" since they are causing problems with YARA compilation
2023-05-08 11:58:17 -04:00
weslambert
7483dbf442 Merge pull request #10304 from Security-Onion-Solutions/fix/kibana_pivot_to_pcap_url_2.4
Surround _id field in double quotes to prevent errors associated with values beginning with a hyphen
2023-05-08 11:55:35 -04:00
Wes
0f30e787b3 Surround _id field in double quotes to prevent errors associated with values beginning with a hyphen 2023-05-08 15:34:35 +00:00
m0duspwnens
5d50dbb69e enabled/disable zeek 2023-05-08 10:12:32 -04:00
Mike Reeves
867ea5a1ac Merge pull request #10298 from Security-Onion-Solutions/dockerbinds
Add custom volume binds to all containers
2023-05-08 09:48:45 -04:00
Doug Burks
52cfc59113 Merge pull request #10300 from Security-Onion-Solutions/dougburks-patch-2
FIX: Improve soup's local file modification logic #8972
2023-05-08 09:47:57 -04:00
Mike Reeves
789eafa8c2 Fix string entry 2023-05-08 09:45:08 -04:00
Doug Burks
ed712477d6 FIX: Improve soup's local file modification logic #8972 2023-05-08 09:43:20 -04:00
Mike Reeves
e3cb0a9953 Fix string entry 2023-05-08 09:35:07 -04:00
m0duspwnens
743bbfea35 add zeek.enabled to zeek annotation file 2023-05-05 17:09:01 -04:00
m0duspwnens
e8a5a5bffb import GLOBALS 2023-05-05 16:44:46 -04:00
m0duspwnens
a97fa9675b enable/disable zeek in ui 2023-05-05 16:33:59 -04:00
Mike Reeves
2418d9a096 Add volume mounts 2023-05-05 16:01:23 -04:00
m0duspwnens
2a8ed24045 import GLOBALS 2023-05-05 15:35:04 -04:00
Mike Reeves
f1c91e91b1 Remove port bindings from logstash config section 2023-05-05 15:10:21 -04:00
m0duspwnens
5405bc4e20 handle import node and merge with 2.4/dev 2023-05-05 14:41:26 -04:00
m0duspwnens
47a580d110 fix enabled and disable steno in ui 2023-05-05 13:59:52 -04:00
Mike Reeves
61a43f7df5 Merge pull request #10233 from Security-Onion-Solutions/mkrfixes
Several Fixes
2023-05-05 13:52:56 -04:00
Mike Reeves
21ffcbf2fd Update so-setup 2023-05-05 13:16:45 -04:00
Mike Reeves
563c0631ba Update so-functions 2023-05-05 13:01:40 -04:00
Mike Reeves
77cbf35625 Update so-functions 2023-05-05 11:26:10 -04:00
Mike Reeves
d7972032e4 Update init.sls 2023-05-05 10:33:11 -04:00
Mike Reeves
f6dcefe0f8 Update so-user 2023-05-05 09:34:33 -04:00
Mike Reeves
d5a1406095 Update so-user 2023-05-05 09:15:52 -04:00
Josh Patterson
3d3be6bd29 Merge pull request #10290 from Security-Onion-Solutions/ui/logstash
UI/logstash
2023-05-05 09:01:57 -04:00
m0duspwnens
52fec5fef0 Merge remote-tracking branch 'origin/mkrfixes' into ui/logstash 2023-05-05 09:00:23 -04:00
m0duspwnens
ddb776c80e add redis pillars to searchnode. move redis scripts with jinja to sbin_jinja 2023-05-04 17:26:18 -04:00
Mike Reeves
469258ee5e Update init.sls 2023-05-04 16:46:54 -04:00
Mike Reeves
4fec2a18a5 Update so-functions 2023-05-04 16:26:40 -04:00
weslambert
c7ed29dfa8 Ignore "expl_outlook_cve_2023_23397.yar" and "gen_mal_3cx_compromise_mar23.yar" since they are causing problems with YARA compilation 2023-05-04 16:16:06 -04:00
Mike Reeves
80cbe5f6e8 Update so-functions 2023-05-04 15:45:05 -04:00
Mike Reeves
a64eb0ba97 Update so-setup 2023-05-04 15:30:44 -04:00
Josh Patterson
dbb1b82e1b Merge pull request #10285 from Security-Onion-Solutions/ui/logstash
source from sbin_jinja and exlude pat
2023-05-04 15:14:47 -04:00
m0duspwnens
f34627f709 source from sbin_jinja and exlude pat 2023-05-04 15:13:42 -04:00
Josh Patterson
59451fc4d0 Merge pull request #10284 from Security-Onion-Solutions/ui/logstash
remove extra " from so-elasticsearch-roles-load
2023-05-04 15:02:34 -04:00
m0duspwnens
dc77b20723 remove extra " from so-elasticsearch-roles-load 2023-05-04 14:54:37 -04:00
Josh Patterson
51869ce5b2 Merge pull request #10282 from Security-Onion-Solutions/ui/logstash
UI/logstash
2023-05-04 13:55:28 -04:00
m0duspwnens
98705608a6 Merge remote-tracking branch 'origin/mkrfixes' into ui/logstash 2023-05-04 13:53:55 -04:00
Mike Reeves
8055088d25 Fix some errors 2023-05-04 13:35:44 -04:00
Mike Reeves
d0cfaaeb26 Fix some errors 2023-05-04 13:28:11 -04:00
Mike Reeves
fbacfce0e4 Fix some errors 2023-05-04 13:18:08 -04:00
m0duspwnens
082704ce1f logstash jinja for ui 2023-05-04 13:07:07 -04:00
m0duspwnens
71b6311edc add logstash.nodes to pillar top 2023-05-04 13:05:16 -04:00
Mike Reeves
7e71c60334 Fix some errors 2023-05-04 12:57:35 -04:00
Mike Reeves
c5c2600799 Fix some errors 2023-05-04 12:56:04 -04:00
Josh Brower
c6c3cc82e4 Merge pull request #10281 from Security-Onion-Solutions/2.4/airgapfix
Reenable Elastic Package Registry - all managers
2023-05-04 12:25:00 -04:00
Josh Brower
b17b68034e Reenable Elastic Package Registry - all managers 2023-05-04 12:19:45 -04:00
Mike Reeves
cbd1c05929 Sbin Changes 2023-05-04 10:36:03 -04:00
m0duspwnens
b14d33ced8 add logstash jinja for ui changes 2023-05-03 15:22:03 -04:00
Mike Reeves
a5b1660778 Fix firewall changes 2023-05-03 14:12:32 -04:00
Mike Reeves
d5c4a2887e Fix annotations and defaults for logstash 2023-05-03 13:37:06 -04:00
Josh Brower
b4b84038ed Merge pull request #10277 from Security-Onion-Solutions/2.4/package-registry
Reenable Elastic Package Registry
2023-05-03 12:57:21 -04:00
Josh Patterson
85ce0bb472 Merge pull request #10274 from Security-Onion-Solutions/ui/firewall
UI/firewall
2023-05-03 12:44:18 -04:00
m0duspwnens
b0bd64bc10 define and assign elastic_agent_update port 2023-05-03 12:40:56 -04:00
Josh Brower
17dd21703d Reenable Elastic Package Registry 2023-05-03 12:08:46 -04:00
m0duspwnens
767c922083 add idh to firewall annotation 2023-05-03 11:55:29 -04:00
Josh Brower
a57ba7e35d Merge pull request #10273 from Security-Onion-Solutions/2.4/fleet-airgap
Fleet Airgap - Phase 1
2023-05-03 11:24:52 -04:00
Josh Brower
81c1678ec7 Merge branch '2.4/dev' into 2.4/fleet-airgap 2023-05-03 11:19:57 -04:00
m0duspwnens
1593da4597 idh services are no longer selected in setup 2023-05-03 11:05:21 -04:00
m0duspwnens
8359f1983c idh firewall 2023-05-03 10:53:13 -04:00
Josh Brower
87a20ffede Refactor Wrapper gen script 2023-05-03 10:44:46 -04:00
m0duspwnens
c597766390 assign firewall pillars to * in top 2023-05-03 10:17:45 -04:00
Mike Reeves
3d10a60502 Fix annotations and defaults for logstash 2023-05-03 10:01:44 -04:00
Mike Reeves
220c534ad4 Fix annotations and defaults for logstash 2023-05-03 09:32:03 -04:00
Mike Reeves
c7604e893e Fix annotations and defaults for logstash 2023-05-03 09:17:37 -04:00
Josh Brower
b56486d88e Set Elastic Agent Artifact Registry URL 2023-05-03 08:55:29 -04:00
Josh Brower
c99f19251b More visibility 2023-05-02 17:04:41 -04:00
Josh Brower
544fa824ea Initial cut for Artifact Registry 2023-05-02 14:17:59 -04:00
Mike Reeves
dd034edad6 Fix some files 2023-05-02 13:12:14 -04:00
Mike Reeves
2419cf86ee Fix some files 2023-05-02 12:41:49 -04:00
m0duspwnens
61f9573ace Merge remote-tracking branch 'origin/2.4/dev' into ui/firewall 2023-05-02 12:21:09 -04:00
Mike Reeves
7595072e85 Fix some files 2023-05-02 12:15:05 -04:00
Mike Reeves
e60e21d9ff Move files out of common 2023-05-02 09:40:02 -04:00
Jason Ertel
b46a5c4b2a Merge pull request #10267 from Security-Onion-Solutions/kilo
more detection improvements
2023-05-02 08:17:09 -04:00
Jason Ertel
40ff2677c4 more detection improvements 2023-05-02 07:57:49 -04:00
m0duspwnens
80b40503fb no more plural roles, update so-firewall-minion 2023-05-01 17:28:16 -04:00
m0duspwnens
6a501efa75 remove unneeded imports 2023-05-01 16:55:16 -04:00
m0duspwnens
1f6463a9bb rework so-firewall to work with pillar files 2023-05-01 16:49:06 -04:00
Mike Reeves
2d4f4791e0 Move files out of common 2023-05-01 15:21:31 -04:00
Mike Reeves
102906f5dd Change to new repo layout 2023-05-01 13:39:24 -04:00
Jason Ertel
6c151d3ebd Merge pull request #10260 from Security-Onion-Solutions/kilo
simplify cloud detection
2023-05-01 11:26:34 -04:00
Jason Ertel
17e6f5b899 simplify cloud detection 2023-05-01 11:06:00 -04:00
Mike Reeves
a38495ce39 Fix pillar top for firewall 2023-05-01 10:40:36 -04:00
Mike Reeves
38629a7676 fix defaults for logstash 2023-05-01 09:55:16 -04:00
m0duspwnens
9a4ae2b832 start with customhostgroup0 2023-04-28 16:44:02 -04:00
m0duspwnens
3fdcb92dfe dont apply firewall.soc state anymore for manager highstate 2023-04-28 15:33:54 -04:00
m0duspwnens
725f5414ba fw rework for ui, still need to add idh to map 2023-04-28 15:30:18 -04:00
Jason Ertel
73aceb9697 Merge pull request #10251 from Security-Onion-Solutions/kilo
Kilo
2023-04-28 14:44:25 -04:00
Jason Ertel
03c89a02ad Add privileged session config option to kratos config UI 2023-04-28 14:01:19 -04:00
Jason Ertel
666d4ea260 Add privileged session config option to kratos config UI 2023-04-28 13:56:28 -04:00
Jason Ertel
4c58aa2ccf Add privileged session config option to kratos config UI 2023-04-28 13:14:30 -04:00
Mike Reeves
26619e5f8d Merge pull request #10245 from Security-Onion-Solutions/2.4/Fix_zeek_idstools
2.4/fix zeek idstools
2023-04-28 09:38:08 -04:00
bryant-treacle
57d90a62f7 Update soc_zeek.yaml 2023-04-27 16:21:41 -04:00
bryant-treacle
a8b8a1d0b7 Update soc_idstools.yaml 2023-04-27 15:32:37 -04:00
Mike Reeves
e4375a6568 regex for hostgroups 2023-04-27 15:30:59 -04:00
Mike Reeves
b8f9a9a311 regex for hostgroups 2023-04-27 15:08:01 -04:00
Mike Reeves
3d7f2bc691 Fix annotations and file locations 2023-04-27 13:23:53 -04:00
Mike Reeves
e799edaf49 Fix globals order 2023-04-26 15:54:16 -04:00
Mike Reeves
be003f7ee4 Merge branch '2.4/dev' of https://github.com/Security-Onion-Solutions/securityonion into mkrfixes 2023-04-26 15:50:47 -04:00
Mike Reeves
868cb8183c Fix the top file 2023-04-26 14:15:34 -04:00
Mike Reeves
b3f94961ea Fix Kibana and friends 2023-04-26 13:30:23 -04:00
bryant-treacle
12120e94c8 Update soc_idstools.yaml 2023-04-26 09:32:08 -04:00
bryant-treacle
49a60bac76 Update soc_idstools.yaml 2023-04-26 08:49:04 -04:00
bryant-treacle
f07f0775ac Update top.sls 2023-04-26 08:30:28 -04:00
bryant-treacle
e93e58fedb Update node.cfg.jinja 2023-04-26 08:28:40 -04:00
Jason Ertel
8459054ff8 Merge pull request #10220 from Security-Onion-Solutions/kilo
timeout more quickly on aws imdsv2 detection
2023-04-26 07:56:22 -04:00
Jason Ertel
43ec897397 timeout more quickly on aws imdsv2 detection 2023-04-26 07:53:07 -04:00
Mike Reeves
4b73f859d1 don't sync the repo 2x 2023-04-25 15:33:08 -04:00
Jason Ertel
969cf25818 Merge pull request #10199 from Security-Onion-Solutions/jertel/imdsv2
Detect cloud install on forced imdsv2 instances
2023-04-24 16:33:56 -04:00
Jason Ertel
e25bbd8a0d Detect cloud install on forced imdsv2 instances 2023-04-24 16:19:20 -04:00
Mike Reeves
5b11c41434 Merge pull request #10197 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-04-24 13:40:36 -04:00
Mike Reeves
99f21ce46f Update VERSION 2023-04-24 13:39:51 -04:00
939 changed files with 42892 additions and 47804 deletions

View File

@@ -0,0 +1,52 @@
### 2.4.10-20230815 ISO image released on 2023/08/15
### Download and Verify
2.4.10-20230815 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.10-20230815.iso
MD5: 97AEC929FB1FC22F106C0C93E3476FAB
SHA1: 78AF37FD19FDC34BA324C1A661632D19D1F2284A
SHA256: D04BA45D1664FC3CF7EA2188CB7E570642F6390C3959B4AFBB8222A853859394
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.10-20230815.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
For example, here are the steps you can use on most Linux distributions to download and verify our Security Onion ISO image.
Download and import the signing key:
```
wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS -O - | gpg --import -
```
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.10-20230815.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.10-20230815.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.4.10-20230815.iso.sig securityonion-2.4.10-20230815.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Sun 13 Aug 2023 05:30:29 PM EDT using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: C804 A93D 36BE 0C73 3EA1 9644 7C10 60B7 FE50 7013
```
Once you've verified the ISO image, you're ready to proceed to our Installation guide:
https://docs.securityonion.net/en/2.4/installation.html

View File

@@ -1,20 +1,26 @@
## Security Onion 2.4 Beta 2
## Security Onion 2.4
Security Onion 2.4 Beta 2 is here!
Security Onion 2.4 is here!
## Screenshots
Alerts
![Alerts](./assets/images/screenshots/alerts.png)
![Alerts](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/50_alerts.png)
Dashboards
![Dashboards](./assets/images/screenshots/dashboards.png)
![Dashboards](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/51_dashboards.png)
Hunt
![Hunt](./assets/images/screenshots/hunt.png)
![Hunt](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/52_hunt.png)
Cases
![Cases](./assets/images/screenshots/cases-comments.png)
PCAP
![PCAP](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/53_pcap.png)
Grid
![Grid](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/57_grid.png)
Config
![Config](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/61_config.png)
### Release Notes

View File

@@ -1 +0,0 @@
### An ISO will be available starting in RC1.

View File

@@ -1 +1 @@
2.4.1
2.4.10

View File

@@ -1,13 +0,0 @@
logrotate:
conf: |
daily
rotate 14
missingok
copytruncate
compress
create
extension .log
dateext
dateyesterday
group_conf: |
su root socore

View File

@@ -1,6 +0,0 @@
logstash:
pipelines:
fleet:
config:
- so/0012_input_elastic_agent.conf
- so/9806_output_lumberjack_fleet.conf.jinja

View File

@@ -1,42 +0,0 @@
logstash:
pipelines:
helix:
config:
- so/0010_input_hhbeats.conf
- so/1033_preprocess_snort.conf
- so/1100_preprocess_bro_conn.conf
- so/1101_preprocess_bro_dhcp.conf
- so/1102_preprocess_bro_dns.conf
- so/1103_preprocess_bro_dpd.conf
- so/1104_preprocess_bro_files.conf
- so/1105_preprocess_bro_ftp.conf
- so/1106_preprocess_bro_http.conf
- so/1107_preprocess_bro_irc.conf
- so/1108_preprocess_bro_kerberos.conf
- so/1109_preprocess_bro_notice.conf
- so/1110_preprocess_bro_rdp.conf
- so/1111_preprocess_bro_signatures.conf
- so/1112_preprocess_bro_smtp.conf
- so/1113_preprocess_bro_snmp.conf
- so/1114_preprocess_bro_software.conf
- so/1115_preprocess_bro_ssh.conf
- so/1116_preprocess_bro_ssl.conf
- so/1117_preprocess_bro_syslog.conf
- so/1118_preprocess_bro_tunnel.conf
- so/1119_preprocess_bro_weird.conf
- so/1121_preprocess_bro_mysql.conf
- so/1122_preprocess_bro_socks.conf
- so/1123_preprocess_bro_x509.conf
- so/1124_preprocess_bro_intel.conf
- so/1125_preprocess_bro_modbus.conf
- so/1126_preprocess_bro_sip.conf
- so/1127_preprocess_bro_radius.conf
- so/1128_preprocess_bro_pe.conf
- so/1129_preprocess_bro_rfb.conf
- so/1130_preprocess_bro_dnp3.conf
- so/1131_preprocess_bro_smb_files.conf
- so/1132_preprocess_bro_smb_mapping.conf
- so/1133_preprocess_bro_ntlm.conf
- so/1134_preprocess_bro_dce_rpc.conf
- so/8001_postprocess_common_ip_augmentation.conf
- so/9997_output_helix.conf.jinja

View File

@@ -1,8 +0,0 @@
logstash:
pipelines:
manager:
config:
- so/0011_input_endgame.conf
- so/0012_input_elastic_agent.conf
- so/0013_input_lumberjack_fleet.conf
- so/9999_output_redis.conf.jinja

View File

@@ -2,7 +2,7 @@
{% set cached_grains = salt.saltutil.runner('cache.grains', tgt='*') %}
{% for minionid, ip in salt.saltutil.runner(
'mine.get',
tgt='G@role:so-manager or G@role:so-managersearch or G@role:so-standalone or G@role:so-searchnode or G@role:so-heavynode or G@role:so-receiver or G@role:so-helix ',
tgt='G@role:so-manager or G@role:so-managersearch or G@role:so-standalone or G@role:so-searchnode or G@role:so-heavynode or G@role:so-receiver or G@role:so-fleet ',
fun='network.ip_addrs',
tgt_type='compound') | dictsort()
%}

View File

@@ -1,8 +0,0 @@
logstash:
pipelines:
receiver:
config:
- so/0011_input_endgame.conf
- so/0012_input_elastic_agent.conf
- so/9999_output_redis.conf.jinja

View File

@@ -1,7 +0,0 @@
logstash:
pipelines:
search:
config:
- so/0900_input_redis.conf.jinja
- so/9805_output_elastic_agent.conf.jinja
- so/9900_output_endgame.conf.jinja

14
pillar/soc/license.sls Normal file
View File

@@ -0,0 +1,14 @@
# Copyright Jason Ertel (github.com/jertel).
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with
# the Elastic License 2.0.
# Note: Per the Elastic License 2.0, the second limitation states:
#
# "You may not move, change, disable, or circumvent the license key functionality
# in the software, and you may not remove or obscure any functionality in the
# software that is protected by the license key."
# This file is generated by Security Onion and contains a list of license-enabled features.
features: []

View File

@@ -1,44 +1,26 @@
base:
'*':
- patch.needs_restarting
- ntp.soc_ntp
- ntp.adv_ntp
- logrotate
- global.soc_global
- global.adv_global
- docker.soc_docker
- docker.adv_docker
- firewall.soc_firewall
- firewall.adv_firewall
- influxdb.token
- logrotate.soc_logrotate
- logrotate.adv_logrotate
- nginx.soc_nginx
- nginx.adv_nginx
- node_data.ips
- ntp.soc_ntp
- ntp.adv_ntp
- patch.needs_restarting
- patch.soc_patch
- patch.adv_patch
- sensoroni.soc_sensoroni
- sensoroni.adv_sensoroni
- telegraf.soc_telegraf
- telegraf.adv_telegraf
- influxdb.token
- node_data.ips
'* and not *_eval and not *_import':
- logstash.nodes
'*_eval or *_heavynode or *_sensor or *_standalone or *_import':
- match: compound
- zeek
- bpf.soc_bpf
- bpf.adv_bpf
'*_managersearch or *_heavynode':
- match: compound
- logstash
- logstash.manager
- logstash.search
- logstash.soc_logstash
- logstash.adv_logstash
- elasticsearch.index_templates
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
'*_manager':
- logstash
- logstash.manager
- logstash.soc_logstash
- logstash.adv_logstash
- elasticsearch.index_templates
'*_manager or *_managersearch':
- match: compound
@@ -49,14 +31,20 @@ base:
- kibana.secrets
{% endif %}
- secrets
- global.soc_global
- global.adv_global
- manager.soc_manager
- manager.adv_manager
- idstools.soc_idstools
- idstools.adv_idstools
- logstash.nodes
- logstash.soc_logstash
- logstash.adv_logstash
- soc.soc_soc
- soc.adv_soc
- soc.license
- soctopus.soc_soctopus
- soctopus.adv_soctopus
- kibana.soc_kibana
- kibana.adv_kibana
- kratos.soc_kratos
- kratos.adv_kratos
- redis.soc_redis
@@ -65,17 +53,31 @@ base:
- influxdb.adv_influxdb
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- elasticfleet.soc_elasticfleet
- elasticfleet.adv_elasticfleet
- elastalert.soc_elastalert
- elastalert.adv_elastalert
- backup.soc_backup
- backup.adv_backup
- firewall.soc_firewall
- firewall.adv_firewall
- curator.soc_curator
- curator.adv_curator
- soctopus.soc_soctopus
- soctopus.adv_soctopus
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_sensor':
- healthcheck.sensor
- global.soc_global
- global.adv_global
- strelka.soc_strelka
- strelka.adv_strelka
- zeek.soc_zeek
- zeek.adv_zeek
- bpf.soc_bpf
- bpf.adv_bpf
- pcap.soc_pcap
- pcap.adv_pcap
- suricata.soc_suricata
- suricata.adv_suricata
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
@@ -89,16 +91,28 @@ base:
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
- kibana.secrets
{% endif %}
- global.soc_global
- global.adv_global
- kratos.soc_kratos
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- elasticfleet.soc_elasticfleet
- elasticfleet.adv_elasticfleet
- elastalert.soc_elastalert
- elastalert.adv_elastalert
- manager.soc_manager
- manager.adv_manager
- idstools.soc_idstools
- idstools.adv_idstools
- soc.soc_soc
- soc.adv_soc
- soc.license
- soctopus.soc_soctopus
- soctopus.adv_soctopus
- kibana.soc_kibana
- kibana.adv_kibana
- strelka.soc_strelka
- strelka.adv_strelka
- curator.soc_curator
- curator.adv_curator
- kratos.soc_kratos
- kratos.adv_kratos
- redis.soc_redis
@@ -107,15 +121,19 @@ base:
- influxdb.adv_influxdb
- backup.soc_backup
- backup.adv_backup
- firewall.soc_firewall
- firewall.adv_firewall
- zeek.soc_zeek
- zeek.adv_zeek
- bpf.soc_bpf
- bpf.adv_bpf
- pcap.soc_pcap
- pcap.adv_pcap
- suricata.soc_suricata
- suricata.adv_suricata
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_standalone':
- logstash
- logstash.manager
- logstash.search
- logstash.nodes
- logstash.soc_logstash
- logstash.adv_logstash
- elasticsearch.index_templates
@@ -127,8 +145,6 @@ base:
{% endif %}
- secrets
- healthcheck.standalone
- global.soc_global
- global.adv_global
- idstools.soc_idstools
- idstools.adv_idstools
- kratos.soc_kratos
@@ -139,52 +155,82 @@ base:
- influxdb.adv_influxdb
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- elasticfleet.soc_elasticfleet
- elasticfleet.adv_elasticfleet
- elastalert.soc_elastalert
- elastalert.adv_elastalert
- manager.soc_manager
- manager.adv_manager
- soc.soc_soc
- soc.adv_soc
- soc.license
- soctopus.soc_soctopus
- soctopus.adv_soctopus
- kibana.soc_kibana
- kibana.adv_kibana
- strelka.soc_strelka
- strelka.adv_strelka
- curator.soc_curator
- curator.adv_curator
- backup.soc_backup
- backup.adv_backup
- firewall.soc_firewall
- firewall.adv_firewall
- zeek.soc_zeek
- zeek.adv_zeek
- bpf.soc_bpf
- bpf.adv_bpf
- pcap.soc_pcap
- pcap.adv_pcap
- suricata.soc_suricata
- suricata.adv_suricata
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_heavynode':
- elasticsearch.auth
- global.soc_global
- global.adv_global
- logstash.nodes
- logstash.soc_logstash
- logstash.adv_logstash
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- curator.soc_curator
- curator.adv_curator
- redis.soc_redis
- redis.adv_redis
- zeek.soc_zeek
- zeek.adv_zeek
- bpf.soc_bpf
- bpf.adv_bpf
- pcap.soc_pcap
- pcap.adv_pcap
- suricata.soc_suricata
- suricata.adv_suricata
- strelka.soc_strelka
- strelka.adv_strelka
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_idh':
- global.soc_global
- global.adv_global
- idh.soc_idh
- idh.adv_idh
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_searchnode':
- logstash
- logstash.search
- logstash.nodes
- logstash.soc_logstash
- logstash.adv_logstash
- elasticsearch.index_templates
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
- elasticsearch.auth
{% endif %}
- redis.soc_redis
- global.soc_global
- global.adv_global
- redis.adv_redis
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_receiver':
- logstash
- logstash.receiver
- logstash.nodes
- logstash.soc_logstash
- logstash.adv_logstash
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
@@ -192,8 +238,6 @@ base:
{% endif %}
- redis.soc_redis
- redis.adv_redis
- global.soc_global
- global.adv_global
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
@@ -209,11 +253,21 @@ base:
- kratos.soc_kratos
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- elasticfleet.soc_elasticfleet
- elasticfleet.adv_elasticfleet
- elastalert.soc_elastalert
- elastalert.adv_elastalert
- manager.soc_manager
- manager.adv_manager
- soc.soc_soc
- global.soc_global
- global.adv_global
- soc.adv_soc
- soc.license
- soctopus.soc_soctopus
- soctopus.adv_soctopus
- kibana.soc_kibana
- kibana.adv_kibana
- curator.soc_curator
- curator.adv_curator
- backup.soc_backup
- backup.adv_backup
- kratos.soc_kratos
@@ -222,23 +276,30 @@ base:
- redis.adv_redis
- influxdb.soc_influxdb
- influxdb.adv_influxdb
- firewall.soc_firewall
- firewall.adv_firewall
- zeek.soc_zeek
- zeek.adv_zeek
- bpf.soc_bpf
- bpf.adv_bpf
- pcap.soc_pcap
- pcap.adv_pcap
- suricata.soc_suricata
- suricata.adv_suricata
- strelka.soc_strelka
- strelka.adv_strelka
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_fleet':
- global.soc_global
- global.adv_global
- backup.soc_backup
- backup.adv_backup
- logstash
- logstash.fleet
- logstash.nodes
- logstash.soc_logstash
- logstash.adv_logstash
- elasticfleet.soc_elasticfleet
- elasticfleet.adv_elasticfleet
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
'*_workstation':
'*_desktop':
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}

View File

@@ -3,14 +3,14 @@ import subprocess
def check():
os = __grains__['os']
osfam = __grains__['os_family']
retval = 'False'
if os == 'Ubuntu':
if osfam == 'Debian':
if path.exists('/var/run/reboot-required'):
retval = 'True'
elif os == 'Rocky':
elif osfam == 'RedHat':
cmd = 'needs-restarting -r > /dev/null 2>&1'
try:

View File

@@ -3,16 +3,6 @@
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% set ZEEKVER = salt['pillar.get']('global:mdengine', '') %}
{% set PLAYBOOK = salt['pillar.get']('manager:playbook', '0') %}
{% set ELASTALERT = salt['pillar.get']('elastalert:enabled', True) %}
{% set ELASTICSEARCH = salt['pillar.get']('elasticsearch:enabled', True) %}
{% set KIBANA = salt['pillar.get']('kibana:enabled', True) %}
{% set LOGSTASH = salt['pillar.get']('logstash:enabled', True) %}
{% set CURATOR = salt['pillar.get']('curator:enabled', True) %}
{% set REDIS = salt['pillar.get']('redis:enabled', True) %}
{% set STRELKA = salt['pillar.get']('strelka:enabled', '0') %}
{% set ISAIRGAP = salt['pillar.get']('global:airgap', False) %}
{% import_yaml 'salt/minion.defaults.yaml' as saltversion %}
{% set saltversion = saltversion.salt.minion.version %}
@@ -35,6 +25,7 @@
'soc',
'kratos',
'elasticfleet',
'elastic-fleet-package-registry',
'firewall',
'idstools',
'suricata.manager',
@@ -55,23 +46,7 @@
'pcap',
'suricata',
'healthcheck',
'schedule',
'tcpreplay',
'docker_clean'
],
'so-helixsensor': [
'salt.master',
'ca',
'ssl',
'registry',
'telegraf',
'firewall',
'idstools',
'suricata.manager',
'zeek',
'redis',
'elasticsearch',
'logstash',
'elasticagent',
'schedule',
'tcpreplay',
'docker_clean'
@@ -105,7 +80,8 @@
'schedule',
'tcpreplay',
'docker_clean',
'elasticfleet'
'elasticfleet',
'elastic-fleet-package-registry'
],
'so-manager': [
'salt.master',
@@ -119,6 +95,7 @@
'soc',
'kratos',
'elasticfleet',
'elastic-fleet-package-registry',
'firewall',
'idstools',
'suricata.manager',
@@ -137,6 +114,7 @@
'influxdb',
'soc',
'kratos',
'elastic-fleet-package-registry',
'elasticfleet',
'firewall',
'manager',
@@ -166,6 +144,7 @@
'influxdb',
'soc',
'kratos',
'elastic-fleet-package-registry',
'elasticfleet',
'firewall',
'idstools',
@@ -208,31 +187,31 @@
'schedule',
'docker_clean'
],
'so-workstation': [
'so-desktop': [
],
}, grain='role') %}
{% if (PLAYBOOK != 0) and grains.role in ['so-eval', 'so-manager', 'so-managersearch', 'so-standalone'] %}
{% if grains.role in ['so-eval', 'so-manager', 'so-managersearch', 'so-standalone'] %}
{% do allowed_states.append('mysql') %}
{% endif %}
{%- if ZEEKVER != 'SURICATA' and grains.role in ['so-sensor', 'so-eval', 'so-standalone', 'so-heavynode'] %}
{%- if grains.role in ['so-sensor', 'so-eval', 'so-standalone', 'so-heavynode'] %}
{% do allowed_states.append('zeek') %}
{%- endif %}
{% if STRELKA and grains.role in ['so-sensor', 'so-eval', 'so-standalone', 'so-heavynode'] %}
{% if grains.role in ['so-sensor', 'so-eval', 'so-standalone', 'so-heavynode'] %}
{% do allowed_states.append('strelka') %}
{% endif %}
{% if ELASTICSEARCH and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-searchnode', 'so-managersearch', 'so-heavynode', 'so-import'] %}
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-searchnode', 'so-managersearch', 'so-heavynode', 'so-import'] %}
{% do allowed_states.append('elasticsearch') %}
{% endif %}
{% if ELASTICSEARCH and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-import'] %}
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-import'] %}
{% do allowed_states.append('elasticsearch.auth') %}
{% endif %}
{% if KIBANA and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-import'] %}
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch', 'so-import'] %}
{% do allowed_states.append('kibana') %}
{% do allowed_states.append('kibana.secrets') %}
{% endif %}
@@ -241,23 +220,19 @@
{% do allowed_states.append('curator') %}
{% endif %}
{% if ELASTALERT and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch'] %}
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch'] %}
{% do allowed_states.append('elastalert') %}
{% endif %}
{% if (PLAYBOOK !=0) and grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch'] %}
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch'] %}
{% do allowed_states.append('playbook') %}
{% endif %}
{% if (PLAYBOOK !=0) and grains.role in ['so-eval'] %}
{% do allowed_states.append('redis') %}
{% endif %}
{% if LOGSTASH and grains.role in ['so-helixsensor', 'so-manager', 'so-standalone', 'so-searchnode', 'so-managersearch', 'so-heavynode', 'so-receiver'] %}
{% if grains.role in ['so-manager', 'so-standalone', 'so-searchnode', 'so-managersearch', 'so-heavynode', 'so-receiver'] %}
{% do allowed_states.append('logstash') %}
{% endif %}
{% if REDIS and grains.role in ['so-manager', 'so-standalone', 'so-managersearch', 'so-heavynode', 'so-receiver'] %}
{% if grains.role in ['so-manager', 'so-standalone', 'so-managersearch', 'so-heavynode', 'so-receiver', 'so-eval'] %}
{% do allowed_states.append('redis') %}
{% endif %}

View File

@@ -20,7 +20,6 @@ pki_private_key:
- name: /etc/pki/ca.key
- keysize: 4096
- passphrase:
- cipher: aes_256_cbc
- backup: True
{% if salt['file.file_exists']('/etc/pki/ca.key') -%}
- prereq:

View File

@@ -1,2 +0,0 @@
#!/bin/bash
/usr/sbin/logrotate -f /opt/so/conf/log-rotate.conf > /dev/null 2>&1

View File

@@ -1,2 +0,0 @@
#!/bin/bash
/usr/sbin/logrotate -f /opt/so/conf/sensor-rotate.conf > /dev/null 2>&1

View File

@@ -1,79 +0,0 @@
The following GUI tools are available on the analyst workstation:
chromium
url: https://www.chromium.org/Home
To run chromium, click Applications > Internet > Chromium Web Browser
Wireshark
url: https://www.wireshark.org/
To run Wireshark, click Applications > Internet > Wireshark Network Analyzer
NetworkMiner
url: https://www.netresec.com
To run NetworkMiner, click Applications > Internet > NetworkMiner
The following CLI tools are available on the analyst workstation:
bit-twist
url: http://bittwist.sourceforge.net
To run bit-twist, open a terminal and type: bittwist -h
chaosreader
url: http://chaosreader.sourceforge.net
To run chaosreader, open a terminal and type: chaosreader -h
dnsiff
url: https://www.monkey.org/~dugsong/dsniff/
To run dsniff, open a terminal and type: dsniff -h
foremost
url: http://foremost.sourceforge.net
To run foremost, open a terminal and type: foremost -h
hping3
url: http://www.hping.org/hping3.html
To run hping3, open a terminal and type: hping3 -h
netsed
url: http://silicone.homelinux.org/projects/netsed/
To run netsed, open a terminal and type: netsed -h
ngrep
url: https://github.com/jpr5/ngrep
To run ngrep, open a terminal and type: ngrep -h
scapy
url: http://www.secdev.org/projects/scapy/
To run scapy, open a terminal and type: scapy
ssldump
url: http://www.rtfm.com/ssldump/
To run ssldump, open a terminal and type: ssldump -h
sslsplit
url: https://github.com/droe/sslsplit
To run sslsplit, open a terminal and type: sslsplit -h
tcpdump
url: http://www.tcpdump.org
To run tcpdump, open a terminal and type: tcpdump -h
tcpflow
url: https://github.com/simsong/tcpflow
To run tcpflow, open a terminal and type: tcpflow -h
tcpstat
url: https://frenchfries.net/paul/tcpstat/
To run tcpstat, open a terminal and type: tcpstat -h
tcptrace
url: http://www.tcptrace.org
To run tcptrace, open a terminal and type: tcptrace -h
tcpxtract
url: http://tcpxtract.sourceforge.net/
To run tcpxtract, open a terminal and type: tcpxtract -h
whois
url: http://www.linux.it/~md/software/
To run whois, open a terminal and type: whois -h

View File

@@ -1,13 +1,11 @@
{%- set DOCKERRANGE = salt['pillar.get']('docker:range', '172.17.0.0/24') %}
{%- set DOCKERBIND = salt['pillar.get']('docker:bip', '172.17.0.1/24') %}
{
"registry-mirrors": [
"https://:5000"
],
"bip": "{{ DOCKERBIND }}",
"bip": "172.17.0.1/24",
"default-address-pools": [
{
"base": "{{ DOCKERRANGE }}",
"base": "172.17.0.0/24",
"size": 24
}
]

View File

@@ -1,37 +0,0 @@
{%- set logrotate_conf = salt['pillar.get']('logrotate:conf') %}
{%- set group_conf = salt['pillar.get']('logrotate:group_conf') %}
/opt/so/log/aptcacher-ng/*.log
/opt/so/log/idstools/*.log
/opt/so/log/nginx/*.log
/opt/so/log/soc/*.log
/opt/so/log/kratos/*.log
/opt/so/log/kibana/*.log
/opt/so/log/influxdb/*.log
/opt/so/log/elastalert/*.log
/opt/so/log/soctopus/*.log
/opt/so/log/curator/*.log
/opt/so/log/fleet/*.log
/opt/so/log/suricata/*.log
/opt/so/log/mysql/*.log
/opt/so/log/telegraf/*.log
/opt/so/log/redis/*.log
/opt/so/log/sensoroni/*.log
/opt/so/log/stenographer/*.log
/opt/so/log/salt/so-salt-minion-check
/opt/so/log/salt/minion
/opt/so/log/salt/master
/opt/so/log/logscan/*.log
/nsm/idh/*.log
{
{{ logrotate_conf | indent(width=4) }}
}
# Playbook's log directory needs additional configuration
# because Playbook requires a more permissive directory
/opt/so/log/playbook/*.log
{
{{ logrotate_conf | indent(width=4) }}
{{ group_conf | indent(width=4) }}
}

View File

@@ -1,22 +0,0 @@
/opt/so/log/sensor_clean.log
{
daily
rotate 2
missingok
nocompress
create
sharedscripts
}
/nsm/strelka/log/strelka.log
{
daily
rotate 14
missingok
copytruncate
compress
create
extension .log
dateext
dateyesterday
}

View File

@@ -10,6 +10,10 @@ include:
- manager.elasticsearch # needed for elastic_curl_config state
{% endif %}
net.core.wmem_default:
sysctl.present:
- value: 26214400
# Remove variables.txt from /tmp - This is temp
rmvariablesfile:
file.absent:
@@ -49,13 +53,12 @@ so-status.conf:
- name: /opt/so/conf/so-status/so-status.conf
- unless: ls /opt/so/conf/so-status/so-status.conf
sosaltstackperms:
socore_opso_perms:
file.directory:
- name: /opt/so/saltstack
- name: /opt/so
- user: 939
- group: 939
- dir_mode: 770
so_log_perms:
file.directory:
- name: /opt/so/log
@@ -112,21 +115,23 @@ elastic_curl_config:
{% endif %}
{% endif %}
# Sync some Utilities
utilsyncscripts:
common_sbin:
file.recurse:
- name: /usr/sbin
- user: root
- group: root
- source: salt://common/tools/sbin
- user: 939
- group: 939
- file_mode: 755
common_sbin_jinja:
file.recurse:
- name: /usr/sbin
- source: salt://common/tools/sbin_jinja
- user: 939
- group: 939
- file_mode: 755
- template: jinja
- source: salt://common/tools/sbin
- exclude_pat:
- so-common
- so-firewall
- so-image-common
- soup
- so-status
so-status_script:
file.managed:
@@ -146,56 +151,8 @@ so-sensor-clean:
- daymonth: '*'
- month: '*'
- dayweek: '*'
sensorrotatescript:
file.managed:
- name: /usr/local/bin/sensor-rotate
- source: salt://common/cron/sensor-rotate
- mode: 755
sensorrotateconf:
file.managed:
- name: /opt/so/conf/sensor-rotate.conf
- source: salt://common/files/sensor-rotate.conf
- mode: 644
sensor-rotate:
cron.present:
- name: /usr/local/bin/sensor-rotate
- identifier: sensor-rotate
- user: root
- minute: '1'
- hour: '0'
- daymonth: '*'
- month: '*'
- dayweek: '*'
{% endif %}
commonlogrotatescript:
file.managed:
- name: /usr/local/bin/common-rotate
- source: salt://common/cron/common-rotate
- mode: 755
commonlogrotateconf:
file.managed:
- name: /opt/so/conf/log-rotate.conf
- source: salt://common/files/log-rotate.conf
- template: jinja
- mode: 644
common-rotate:
cron.present:
- name: /usr/local/bin/common-rotate
- identifier: common-rotate
- user: root
- minute: '1'
- hour: '0'
- daymonth: '*'
- month: '*'
- dayweek: '*'
# Create the status directory
sostatusdir:
file.directory:
@@ -238,7 +195,7 @@ soversionfile:
{% endif %}
{% if GLOBALS.so_model and GLOBALS.so_model not in ['SO2AMI01', 'SO2AZI01', 'SO2GCI01'] %}
{% if GLOBALS.os == 'Rocky' %}
{% if GLOBALS.os == 'OEL' %}
# Install Raid tools
raidpkgs:
pkg.installed:
@@ -260,8 +217,7 @@ so-raid-status:
- month: '*'
- dayweek: '*'
{% endif %}
{% endif %}
{% else %}
{{sls}}_state_not_allowed:

View File

@@ -1,6 +1,6 @@
{% from 'vars/globals.map.jinja' import GLOBALS %}
{% if GLOBALS.os == 'Ubuntu' %}
{% if GLOBALS.os_family == 'Debian' %}
commonpkgs:
pkg.installed:
- skip_suggestions: True
@@ -14,16 +14,25 @@ commonpkgs:
- software-properties-common
- apt-transport-https
- openssl
- netcat
- netcat-openbsd
- sqlite3
- libssl-dev
- procps
- python3-dateutil
- python3-docker
- python3-packaging
- python3-watchdog
- python3-lxml
- git
- rsync
- vim
- tar
- unzip
{% if grains.oscodename != 'focal' %}
- python3-rich
{% endif %}
{% if grains.oscodename == 'focal' %}
# since Ubuntu requires and internet connection we can use pip to install modules
python3-pip:
pkg.installed
@@ -34,34 +43,46 @@ python-rich:
- target: /usr/local/lib/python3.8/dist-packages/
- require:
- pkg: python3-pip
{% endif %}
{% endif %}
{% elif GLOBALS.os == 'Rocky' %}
{% if GLOBALS.os_family == 'RedHat' %}
commonpkgs:
pkg.installed:
- skip_suggestions: True
- pkgs:
- wget
- jq
- tcpdump
- httpd-tools
- net-tools
- curl
- sqlite
- mariadb-devel
- python3-dnf-plugin-versionlock
- nmap-ncat
- yum-utils
- device-mapper-persistent-data
- lvm2
- openssl
- fuse
- fuse-libs
- fuse-overlayfs
- fuse-common
- fuse3
- fuse3-libs
- git
- httpd-tools
- jq
- lvm2
{% if GLOBALS.os == 'CentOS Stream' %}
- MariaDB-devel
{% else %}
- mariadb-devel
{% endif %}
- net-tools
- nmap-ncat
- openssl
- procps-ng
- python3-dnf-plugin-versionlock
- python3-docker
- python3-m2crypto
- rsync
- python3-rich
- python3-pyyaml
- python3-watchdog
- python3-packaging
- python3-pyyaml
- python3-rich
- python3-watchdog
- rsync
- sqlite
- tcpdump
- unzip
- wget
- yum-utils
{% endif %}

View File

@@ -8,6 +8,15 @@ soup_scripts:
- source: salt://common/tools/sbin
- include_pat:
- so-common
- so-firewall
- so-image-common
- soup
soup_manager_scripts:
file.recurse:
- name: /usr/sbin
- user: root
- group: root
- file_mode: 755
- source: salt://manager/tools/sbin
- include_pat:
- so-firewall
- soup

View File

@@ -5,6 +5,16 @@
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
# Elastic agent is not managed by salt. Because of this we must store this base information in a
# script that accompanies the soup system. Since so-common is one of those special soup files,
# and since this same logic is required during installation, it's included in this file.
ELASTIC_AGENT_TARBALL_VERSION="8.8.2"
ELASTIC_AGENT_URL="https://repo.securityonion.net/file/so-repo/prod/2.4/elasticagent/elastic-agent_SO-$ELASTIC_AGENT_TARBALL_VERSION.tar.gz"
ELASTIC_AGENT_MD5_URL="https://repo.securityonion.net/file/so-repo/prod/2.4/elasticagent/elastic-agent_SO-$ELASTIC_AGENT_TARBALL_VERSION.md5"
ELASTIC_AGENT_FILE="/nsm/elastic-fleet/artifacts/elastic-agent_SO-$ELASTIC_AGENT_TARBALL_VERSION.tar.gz"
ELASTIC_AGENT_MD5="/nsm/elastic-fleet/artifacts/elastic-agent_SO-$ELASTIC_AGENT_TARBALL_VERSION.md5"
ELASTIC_AGENT_EXPANSION_DIR=/nsm/elastic-fleet/artifacts/beats/elastic-agent
DEFAULT_SALT_DIR=/opt/so/saltstack/default
DOC_BASE_URL="https://docs.securityonion.net/en/2.4"
@@ -160,39 +170,34 @@ disable_fastestmirror() {
sed -i 's/enabled=1/enabled=0/' /etc/yum/pluginconf.d/fastestmirror.conf
}
elastic_fleet_integration_create() {
download_and_verify() {
source_url=$1
source_md5_url=$2
dest_file=$3
md5_file=$4
expand_dir=$5
JSON_STRING=$1
if [[ -n "$expand_dir" ]]; then
mkdir -p "$expand_dir"
fi
curl -K /opt/so/conf/elasticsearch/curl.config -L -X POST "localhost:5601/api/fleet/package_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d "$JSON_STRING"
if ! verify_md5_checksum "$dest_file" "$md5_file"; then
retry 15 10 "curl --fail --retry 5 --retry-delay 15 -L '$source_url' --output '$dest_file'" "" ""
retry 15 10 "curl --fail --retry 5 --retry-delay 15 -L '$source_md5_url' --output '$md5_file'" "" ""
if verify_md5_checksum "$dest_file" "$md5_file"; then
echo "Source file and checksum are good."
else
echo "Unable to download and verify the source file and checksum."
return 1
fi
fi
if [[ -n "$expand_dir" ]]; then
tar -xf "$dest_file" -C "$expand_dir"
fi
}
elastic_fleet_policy_create() {
NAME=$1
DESC=$2
FLEETSERVER=$3
JSON_STRING=$( jq -n \
--arg NAME "$NAME" \
--arg DESC "$DESC" \
--arg FLEETSERVER "$FLEETSERVER" \
'{"name": $NAME,"id":$NAME,"description":$DESC,"namespace":"default","monitoring_enabled":["logs"],"inactivity_timeout":1209600,"has_fleet_server":$FLEETSERVER}'
)
# Create Fleet Policy
curl -K /opt/so/conf/elasticsearch/curl.config -L -X POST "localhost:5601/api/fleet/agent_policies" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d "$JSON_STRING"
}
elastic_fleet_policy_update() {
POLICYID=$1
JSON_STRING=$2
curl -K /opt/so/conf/elasticsearch/curl.config -L -X PUT "localhost:5601/api/fleet/agent_policies/$POLICYID" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d "$JSON_STRING"
}
elastic_license() {
read -r -d '' message <<- EOM
@@ -231,19 +236,20 @@ get_random_value() {
}
gpg_rpm_import() {
if [[ "$OS" == "rocky" ]]; then
if [[ $is_oracle ]]; then
if [[ "$WHATWOULDYOUSAYYAHDOHERE" == "setup" ]]; then
local RPMKEYSLOC="../salt/repo/client/files/rocky/keys"
local RPMKEYSLOC="../salt/repo/client/files/$OS/keys"
else
local RPMKEYSLOC="$UPDATE_DIR/salt/repo/client/files/rocky/keys"
local RPMKEYSLOC="$UPDATE_DIR/salt/repo/client/files/$OS/keys"
fi
RPMKEYS=('RPM-GPG-KEY-EPEL-9' 'SALT-PROJECT-GPG-PUBKEY-2023.pub' 'docker.pub' 'securityonion.pub')
for RPMKEY in "${RPMKEYS[@]}"; do
RPMKEYS=('RPM-GPG-KEY-oracle' 'RPM-GPG-KEY-EPEL-9' 'SALT-PROJECT-GPG-PUBKEY-2023.pub' 'docker.pub' 'securityonion.pub' 'MariaDB-Server-GPG-KEY')
for RPMKEY in "${RPMKEYS[@]}"; do
rpm --import $RPMKEYSLOC/$RPMKEY
echo "Imported $RPMKEY"
done
elif [[ $is_rpm ]]; then
echo "Importing the security onion GPG key"
rpm --import ../salt/repo/client/files/oracle/keys/securityonion.pub
fi
}
@@ -256,12 +262,15 @@ init_monitor() {
if [[ $MONITORNIC == "bond0" ]]; then
BIFACES=$(lookup_bond_interfaces)
for i in rx tx sg tso ufo gso gro lro rx-vlan-offload tx-vlan-offload generic-receive-offload generic-segmentation-offload tcp-segmentation-offload; do
ethtool -K "$MONITORNIC" "$i" off;
done
else
BIFACES=$MONITORNIC
fi
for DEVICE_IFACE in $BIFACES; do
for i in rx tx sg tso ufo gso gro lro; do
for i in rx tx sg tso ufo gso gro lro rx-vlan-offload tx-vlan-offload generic-receive-offload generic-segmentation-offload tcp-segmentation-offload; do
ethtool -K "$DEVICE_IFACE" "$i" off;
done
ip link set dev "$DEVICE_IFACE" arp off multicast off allmulticast off promisc on
@@ -275,7 +284,7 @@ is_manager_node() {
is_sensor_node() {
# Check to see if this is a sensor (forward) node
is_single_node_grid && return 0
grep "role: so-" /etc/salt/grains | grep -E "sensor|heavynode|helix" &> /dev/null
grep "role: so-" /etc/salt/grains | grep -E "sensor|heavynode" &> /dev/null
}
is_single_node_grid() {
@@ -333,6 +342,17 @@ lookup_role() {
echo ${pieces[1]}
}
is_feature_enabled() {
feature=$1
enabled=$(lookup_salt_value features)
for cur in $enabled; do
if [[ "$feature" == "$cur" ]]; then
return 0
fi
done
return 1
}
require_manager() {
if is_manager_node; then
echo "This is a manager, so we can proceed."
@@ -416,19 +436,22 @@ salt_minion_count() {
}
set_cron_service_name() {
if [[ "$OS" == "rocky" ]]; then
cron_service_name="crond"
else
cron_service_name="cron"
fi
}
set_os() {
if [ -f /etc/redhat-release ]; then
OS=rocky
if grep -q "Rocky Linux release 9" /etc/redhat-release; then
OS=rocky
OSVER=9
is_rocky=true
elif grep -q "CentOS Stream release 9" /etc/redhat-release; then
OS=centos
OSVER=9
is_centos=true
fi
cron_service_name="crond"
else
OS=ubuntu
is_ubuntu=true
cron_service_name="cron"
fi
}
@@ -437,7 +460,7 @@ set_minionid() {
}
set_palette() {
if [ "$OS" == ubuntu ]; then
if [[ $is_deb ]]; then
update-alternatives --set newt-palette /etc/newt/palette.original
fi
}
@@ -484,6 +507,11 @@ has_uppercase() {
|| return 1
}
update_elastic_agent() {
echo "Checking if Elastic Agent update is necessary..."
download_and_verify "$ELASTIC_AGENT_URL" "$ELASTIC_AGENT_MD5_URL" "$ELASTIC_AGENT_FILE" "$ELASTIC_AGENT_MD5" "$ELASTIC_AGENT_EXPANSION_DIR"
}
valid_cidr() {
# Verify there is a backslash in the string
echo "$1" | grep -qP "^[^/]+/[^/]+$" || return 1
@@ -637,6 +665,23 @@ valid_username() {
echo "$user" | grep -qP '^[a-z_]([a-z0-9_-]{0,31}|[a-z0-9_-]{0,30}\$)$' && return 0 || return 1
}
verify_md5_checksum() {
data_file=$1
md5_file=${2:-${data_file}.md5}
if [[ ! -f "$dest_file" || ! -f "$md5_file" ]]; then
return 2
fi
SOURCEHASH=$(md5sum "$data_file" | awk '{ print $1 }')
HASH=$(cat "$md5_file")
if [[ "$HASH" == "$SOURCEHASH" ]]; then
return 0
fi
return 1
}
wait_for_web_response() {
url=$1
expected=$2

View File

@@ -1,34 +0,0 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0; you may not use
# this file except in compliance with the Elastic License 2.0.
#so-elastic-agent-gen-installers $FleetHost $EnrollmentToken
{% from 'vars/globals.map.jinja' import GLOBALS %}
. /usr/sbin/so-common
ENROLLMENTOKEN=$(curl -K /opt/so/conf/elasticsearch/curl.config -L "localhost:5601/api/fleet/enrollment_api_keys" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' | jq .list | jq -r -c '.[] | select(.policy_id | contains("endpoints")) | .api_key')
#FLEETHOST=$(lookup_pillar "server:url" "elasticfleet")
FLEETHOST="{{ GLOBALS.manager_ip }}"
#FLEETHOST=$1
#ENROLLMENTOKEN=$2
CONTAINERGOOS=( "linux" "darwin" "windows" )
#rm -rf /tmp/elastic-agent-workspace
#mkdir -p /tmp/elastic-agent-workspace
for OS in "${CONTAINERGOOS[@]}"
do
printf "\n\nGenerating $OS Installer..."
#cp /opt/so/saltstack/default/salt/elasticfleet/files/elastic-agent/so-elastic-agent-*-$OS-x86_64.tar.gz /tmp/elastic-agent-workspace/$OS.tar.gz
docker run -e CGO_ENABLED=0 -e GOOS=$OS \
--mount type=bind,source=/etc/ssl/certs/,target=/workspace/files/cert/ \
--mount type=bind,source=/opt/so/saltstack/local/salt/elasticfleet/files/so_agent-installers/,target=/output/ \
{{ GLOBALS.registry_host }}:5000/{{ GLOBALS.image_repo }}/so-elastic-agent-builder:{{ GLOBALS.so_version }} go build -ldflags "-X main.fleetHost=$FLEETHOST -X main.enrollmentToken=$ENROLLMENTOKEN" -o /output/so-elastic-agent_$OS
printf "\n $OS Installer Generated..."
done

View File

@@ -1,21 +0,0 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
# Initial Endpoints
for INTEGRATION in /opt/so/saltstack/default/salt/elasticfleet/files/integrations/endpoints-initial/*.json
do
printf "\n\nInitial Endpoint Policy - Loading $INTEGRATION\n"
elastic_fleet_integration_create "@$INTEGRATION"
done
# Grid Nodes
for INTEGRATION in /opt/so/saltstack/default/salt/elasticfleet/files/integrations/grid-nodes/*.json
do
printf "\n\nGrid Nodes Policy - Loading $INTEGRATION\n"
elastic_fleet_integration_create "@$INTEGRATION"
done

View File

@@ -1,31 +0,0 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode', 'so-import']%}
/usr/sbin/so-restart elasticsearch $1
{%- endif %}
{%- if grains['role'] in ['so-eval', 'so-manager', 'so-managersearch', 'so-standalone', 'so-import']%}
/usr/sbin/so-restart kibana $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-restart logstash $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-restart curator $1
{%- endif %}
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone']%}
/usr/sbin/so-restart elastalert $1
{%- endif %}

View File

@@ -1,31 +0,0 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode', 'so-import']%}
/usr/sbin/so-start elasticsearch $1
{%- endif %}
{%- if grains['role'] in ['so-eval', 'so-manager', 'so-managersearch', 'so-standalone', 'so-import']%}
/usr/sbin/so-start kibana $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-start logstash $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-start curator $1
{%- endif %}
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone']%}
/usr/sbin/so-start elastalert $1
{%- endif %}

View File

@@ -1,31 +0,0 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode', 'so-import']%}
/usr/sbin/so-stop elasticsearch $1
{%- endif %}
{%- if grains['role'] in ['so-eval', 'so-manager', 'so-managersearch', 'so-standalone', 'so-import']%}
/usr/sbin/so-stop kibana $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-stop logstash $1
{%- endif %}
{%- if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-heavynode', 'so-searchnode']%}
/usr/sbin/so-stop curator $1
{%- endif %}
{%- if grains['role'] in ['so-eval','so-manager', 'so-managersearch', 'so-standalone']%}
/usr/sbin/so-stop elastalert $1
{%- endif %}

View File

@@ -1,15 +0,0 @@
#!/bin/bash
#
#
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
IP={{ salt['grains.get']('ip_interfaces').get(salt['pillar.get']('sensor:mainint', salt['pillar.get']('manager:mainint', salt['pillar.get']('elasticsearch:mainint', salt['pillar.get']('host:mainint')))))[0] }}
ESPORT=9200
echo "Removing read only attributes for indices..."
echo
curl -K /opt/so/conf/elasticsearch/curl.config -s -k -XPUT -H "Content-Type: application/json" -L https://$IP:9200/_all/_settings -d '{"index.blocks.read_only_allow_delete": null}' 2>&1 | if grep -q ack; then echo "Index settings updated..."; else echo "There was any issue updating the read-only attribute. Please ensure Elasticsearch is running.";fi;

View File

@@ -1,104 +0,0 @@
#!/usr/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
if [[ $# -lt 1 ]]; then
echo "Usage: $0 --role=<ROLE> --ip=<IP ADDRESS> --apply=<true|false>"
echo ""
echo " Example: so-firewall --role=sensor --ip=192.168.254.100 --apply=true"
echo ""
exit 1
fi
for i in "$@"; do
case $i in
-r=*|--role=*)
ROLE="${i#*=}"
shift
;;
-i=*|--ip=*)
IP="${i#*=}"
shift
;;
-a=*|--apply*)
APPLY="${i#*=}"
shift
;;
-*|--*)
echo "Unknown option $i"
exit 1
;;
*)
;;
esac
done
ROLE=${ROLE,,}
APPLY=${APPLY,,}
function rolecall() {
THEROLE=$1
THEROLES="analyst analyst_workstations beats_endpoint beats_endpoint_ssl elastic_agent_endpoint elasticsearch_rest endgame eval fleet heavynodes idh manager managersearch receivers searchnodes sensors standalone strelka_frontend syslog"
for AROLE in $THEROLES; do
if [ "$AROLE" = "$THEROLE" ]; then
return 0
fi
done
return 1
}
# Make sure the required options are specified
if [ -z "$ROLE" ]; then
echo "Please specify a role with --role="
exit 1
fi
if [ -z "$IP" ]; then
echo "Please specify an IP address with --ip="
exit 1
fi
# Are we dealing with a role that this script supports?
if rolecall "$ROLE"; then
echo "$ROLE is a supported role"
else
echo "This is not a supported role"
exit 1
fi
# Are we dealing with an IP?
if verify_ip4 "$IP"; then
echo "$IP is a valid IP or CIDR"
else
echo "$IP is not a valid IP or CIDR"
exit 1
fi
local_salt_dir=/opt/so/saltstack/local/salt/firewall
# Let's see if the file exists and if it does, let's see if the IP exists.
if [ -f "$local_salt_dir/hostgroups/$ROLE" ]; then
if grep -q $IP "$local_salt_dir/hostgroups/$ROLE"; then
echo "Host already exists"
exit 0
fi
fi
# If you have reached this part of your quest then let's add the IP
echo "Adding $IP to the $ROLE role"
echo "$IP" >> $local_salt_dir/hostgroups/$ROLE
# Check to see if we are applying this right away.
if [ "$APPLY" = "true" ]; then
echo "Applying the firewall rules"
salt-call state.apply firewall queue=True
echo "Firewall rules have been applied... Review logs further if there were errors."
echo ""
else
echo "Firewall rules will be applied next salt run"
fi

View File

@@ -1,27 +0,0 @@
#!/bin/bash
local_salt_dir=/opt/so/saltstack/local
got_root() {
# Make sure you are root
if [ "$(id -u)" -ne 0 ]; then
echo "This script must be run using sudo!"
exit 1
fi
}
got_root
if [ ! -f $local_salt_dir/pillar/fireeye/init.sls ]; then
echo "This is nto configured for Helix Mode. Please re-install."
exit
else
echo "Enter your Helix API Key: "
read APIKEY
sed -i "s/^ api_key.*/ api_key: $APIKEY/g" $local_salt_dir/pillar/fireeye/init.sls
docker stop so-logstash
docker rm so-logstash
echo "Restarting Logstash for updated key"
salt-call state.apply logstash queue=True
fi

View File

@@ -38,6 +38,7 @@ container_list() {
"so-zeek"
"so-elastic-agent"
"so-elastic-agent-builder"
"so-elastic-fleet-package-registry"
)
elif [ $MANAGERCHECK != 'so-helix' ]; then
TRUSTED_CONTAINERS=(
@@ -45,6 +46,7 @@ container_list() {
"so-elastalert"
"so-elastic-agent"
"so-elastic-agent-builder"
"so-elastic-fleet-package-registry"
"so-elasticsearch"
"so-idh"
"so-idstools"

View File

@@ -1,155 +0,0 @@
#!/bin/bash
#
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set MANAGER = salt['grains.get']('master') %}
{%- set VERSION = salt['pillar.get']('global:soversion') %}
{%- set IMAGEREPO = salt['pillar.get']('global:imagerepo') %}
{%- set MANAGERIP = salt['pillar.get']('global:managerip') %}
{%- set URLBASE = salt['pillar.get']('global:url_base') %}
{%- set ES_USER = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:user', '') %}
{%- set ES_PASS = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %}
INDEX_DATE=$(date +'%Y.%m.%d')
RUNID=$(cat /dev/urandom | tr -dc 'a-z0-9' | fold -w 8 | head -n 1)
LOG_FILE=/nsm/import/evtx-import.log
. /usr/sbin/so-common
function usage {
cat << EOF
Usage: $0 <evtx-file-1> [evtx-file-2] [evtx-file-*]
Imports one or more evtx files into Security Onion. The evtx files will be analyzed and made available for review in the Security Onion toolset.
EOF
}
function evtx2es() {
EVTX=$1
HASH=$2
docker run --rm \
-v "$EVTX:/tmp/data.evtx" \
-v "/nsm/import/$HASH/evtx/:/tmp/evtx/" \
-v "/nsm/import/evtx-end_newest:/tmp/newest" \
-v "/nsm/import/evtx-start_oldest:/tmp/oldest" \
--entrypoint "/evtx_calc_timestamps.sh" \
{{ MANAGER }}:5000/{{ IMAGEREPO }}/so-pcaptools:{{ VERSION }} >> $LOG_FILE 2>&1
}
# if no parameters supplied, display usage
if [ $# -eq 0 ]; then
usage
exit 1
fi
# ensure this is a Manager node
require_manager
# verify that all parameters are files
for i in "$@"; do
if ! [ -f "$i" ]; then
usage
echo "\"$i\" is not a valid file!"
exit 2
fi
done
# track if we have any valid or invalid evtx
INVALID_EVTXS="no"
VALID_EVTXS="no"
# track oldest start and newest end so that we can generate the Kibana search hyperlink at the end
START_OLDEST="2050-12-31"
END_NEWEST="1971-01-01"
touch /nsm/import/evtx-start_oldest
touch /nsm/import/evtx-end_newest
echo $START_OLDEST > /nsm/import/evtx-start_oldest
echo $END_NEWEST > /nsm/import/evtx-end_newest
# paths must be quoted in case they include spaces
for EVTX in "$@"; do
EVTX=$(/usr/bin/realpath "$EVTX")
echo "Processing Import: ${EVTX}"
# generate a unique hash to assist with dedupe checks
HASH=$(md5sum "${EVTX}" | awk '{ print $1 }')
HASH_DIR=/nsm/import/${HASH}
echo "- assigning unique identifier to import: $HASH"
if [ -d $HASH_DIR ]; then
echo "- this EVTX has already been imported; skipping"
INVALID_EVTXS="yes"
else
VALID_EVTXS="yes"
EVTX_DIR=$HASH_DIR/evtx
mkdir -p $EVTX_DIR
# import evtx and write them to import ingest pipeline
echo "- importing logs to Elasticsearch..."
evtx2es "${EVTX}" $HASH
# compare $START to $START_OLDEST
START=$(cat /nsm/import/evtx-start_oldest)
START_COMPARE=$(date -d $START +%s)
START_OLDEST_COMPARE=$(date -d $START_OLDEST +%s)
if [ $START_COMPARE -lt $START_OLDEST_COMPARE ]; then
START_OLDEST=$START
fi
# compare $ENDNEXT to $END_NEWEST
END=$(cat /nsm/import/evtx-end_newest)
ENDNEXT=`date +%Y-%m-%d --date="$END 1 day"`
ENDNEXT_COMPARE=$(date -d $ENDNEXT +%s)
END_NEWEST_COMPARE=$(date -d $END_NEWEST +%s)
if [ $ENDNEXT_COMPARE -gt $END_NEWEST_COMPARE ]; then
END_NEWEST=$ENDNEXT
fi
cp -f "${EVTX}" "${EVTX_DIR}"/data.evtx
chmod 644 "${EVTX_DIR}"/data.evtx
fi # end of valid evtx
echo
done # end of for-loop processing evtx files
# remove temp files
echo "Cleaning up:"
for TEMP_EVTX in ${TEMP_EVTXS[@]}; do
echo "- removing temporary evtx $TEMP_EVTX"
rm -f $TEMP_EVTX
done
# output final messages
if [ "$INVALID_EVTXS" = "yes" ]; then
echo
echo "Please note! One or more evtx was invalid! You can scroll up to see which ones were invalid."
fi
START_OLDEST_FORMATTED=`date +%Y-%m-%d --date="$START_OLDEST"`
START_OLDEST_SLASH=$(echo $START_OLDEST_FORMATTED | sed -e 's/-/%2F/g')
END_NEWEST_SLASH=$(echo $END_NEWEST | sed -e 's/-/%2F/g')
if [ "$VALID_EVTXS" = "yes" ]; then
cat << EOF
Import complete!
You can use the following hyperlink to view data in the time range of your import. You can triple-click to quickly highlight the entire hyperlink and you can then copy it into your browser:
https://{{ URLBASE }}/#/dashboards?q=import.id:${RUNID}%20%7C%20groupby%20-sankey%20event.dataset%20event.category%2a%20%7C%20groupby%20-pie%20event.category%20%7C%20groupby%20-bar%20event.module%20%7C%20groupby%20event.dataset%20%7C%20groupby%20event.module%20%7C%20groupby%20event.category%20%7C%20groupby%20observer.name%20%7C%20groupby%20source.ip%20%7C%20groupby%20destination.ip%20%7C%20groupby%20destination.port&t=${START_OLDEST_SLASH}%2000%3A00%3A00%20AM%20-%20${END_NEWEST_SLASH}%2000%3A00%3A00%20AM&z=UTC
or you can manually set your Time Range to be (in UTC):
From: $START_OLDEST_FORMATTED To: $END_NEWEST
Please note that it may take 30 seconds or more for events to appear in Security Onion Console.
EOF
fi

View File

@@ -1,17 +0,0 @@
#!/bin/bash
#
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% set MAININT = salt['pillar.get']('host:mainint') -%}
{% set NODEIP = salt['grains.get']('ip_interfaces').get(MAININT)[0] -%}
. /usr/sbin/so-common
if [ "$1" == "" ]; then
for i in $(curl -s -L http://{{ NODEIP }}:9600/_node/stats | jq .pipelines | jq '. | to_entries | .[].key' | sed 's/\"//g'); do echo ${i^}:; curl -s localhost:9600/_node/stats | jq .pipelines.$i.events; done
else
curl -s -L http://{{ NODEIP }}:9600/_node/stats | jq .pipelines.$1.events
fi

View File

@@ -1,12 +0,0 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
/usr/sbin/so-stop nodered $1

View File

@@ -1,109 +0,0 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
appliance_check() {
{%- if salt['grains.get']('sosmodel', '') %}
APPLIANCE=1
{%- if grains['sosmodel'] in ['SO2AMI01', 'SO2GCI01', 'SO2AZI01'] %}
exit 0
{%- endif %}
DUDEYOUGOTADELL=$(dmidecode |grep Dell)
if [[ -n $DUDEYOUGOTADELL ]]; then
APPTYPE=dell
else
APPTYPE=sm
fi
mkdir -p /opt/so/log/raid
{%- else %}
echo "This is not an appliance"
exit 0
{%- endif %}
}
check_nsm_raid() {
PERCCLI=$(/opt/raidtools/perccli/perccli64 /c0/v0 show|grep RAID|grep Optl)
MEGACTL=$(/opt/raidtools/megasasctl |grep optimal)
if [[ $APPLIANCE == '1' ]]; then
if [[ -n $PERCCLI ]]; then
HWRAID=0
elif [[ -n $MEGACTL ]]; then
HWRAID=0
else
HWRAID=1
fi
fi
}
check_boss_raid() {
MVCLI=$(/usr/local/bin/mvcli info -o vd |grep status |grep functional)
if [[ -n $DUDEYOUGOTADELL ]]; then
if [[ -n $MVCLI ]]; then
BOSSRAID=0
else
BOSSRAID=1
fi
fi
}
check_software_raid() {
if [[ -n $DUDEYOUGOTADELL ]]; then
SWRC=$(grep "_" /proc/mdstat)
if [[ -n $SWRC ]]; then
# RAID is failed in some way
SWRAID=1
else
SWRAID=0
fi
fi
}
# This script checks raid status if you use SO appliances
# See if this is an appliance
appliance_check
check_nsm_raid
check_boss_raid
{%- if salt['grains.get']('sosmodel', '') %}
{%- if grains['sosmodel'] in ['SOSMN', 'SOSSNNV'] %}
check_software_raid
{%- endif %}
{%- endif %}
if [[ -n $SWRAID ]]; then
if [[ $SWRAID == '0' && $BOSSRAID == '0' ]]; then
RAIDSTATUS=0
else
RAIDSTATUS=1
fi
elif [[ -n $DUDEYOUGOTADELL ]]; then
if [[ $BOSSRAID == '0' && $HWRAID == '0' ]]; then
RAIDSTATUS=0
else
RAIDSTATUS=1
fi
elif [[ "$APPTYPE" == 'sm' ]]; then
if [[ -n "$HWRAID" ]]; then
RAIDSTATUS=0
else
RAIDSTATUS=1
fi
fi
echo "nsmraid=$RAIDSTATUS" > /opt/so/log/raid/status.log

View File

@@ -24,6 +24,7 @@ if [ $# -ge 1 ]; then
case $1 in
"steno") docker stop so-steno && docker rm so-steno && salt-call state.apply pcap queue=True;;
"elastic-fleet") docker stop so-elastic-fleet && docker rm so-elastic-fleet && salt-call state.apply elasticfleet queue=True;;
*) docker stop so-$1 ; docker rm so-$1 ; salt-call state.apply $1 queue=True;;
esac
else

View File

@@ -1,10 +0,0 @@
#!/bin/bash
. /usr/sbin/so-common
argstr=""
for arg in "$@"; do
argstr="${argstr} \"${arg}\""
done
docker exec so-idstools /bin/bash -c "cd /opt/so/idstools/etc && idstools-rulecat --force ${argstr}"

View File

@@ -24,6 +24,7 @@ if [ $# -ge 1 ]; then
case $1 in
"all") salt-call state.highstate queue=True;;
"steno") if docker ps | grep -q so-$1; then printf "\n$1 is already running!\n\n"; else docker rm so-$1 >/dev/null 2>&1 ; salt-call state.apply pcap queue=True; fi ;;
"elastic-fleet") if docker ps | grep -q so-$1; then printf "\n$1 is already running!\n\n"; else docker rm so-$1 >/dev/null 2>&1 ; salt-call state.apply elasticfleet queue=True; fi ;;
*) if docker ps | grep -E -q '^so-$1$'; then printf "\n$1 is already running\n\n"; else docker rm so-$1 >/dev/null 2>&1 ; salt-call state.apply $1 queue=True; fi ;;
esac
else

View File

@@ -103,7 +103,7 @@ def output(options, console, code, data):
def check_container_status(options, console):
code = 0
cli = "docker"
proc = subprocess.run([cli, 'ps', '--format', '{{json .}}'], stdout=subprocess.PIPE, encoding="utf-8")
proc = subprocess.run([cli, 'ps', '--format', 'json'], stdout=subprocess.PIPE, encoding="utf-8")
if proc.returncode != 0:
fail("Container system error; unable to obtain container process statuses")

View File

@@ -5,18 +5,18 @@
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
source /usr/sbin/so-common
doc_desktop_url="$DOC_BASE_URL/desktop.html"
{# we only want the script to install the workstation if it is Rocky -#}
{% if grains.os == 'Rocky' -%}
{# we only want the script to install the desktop if it is OEL -#}
{% if grains.os == 'OEL' -%}
{# if this is a manager -#}
{% if grains.master == grains.id.split('_')|first -%}
source /usr/sbin/so-common
doc_workstation_url="$DOC_BASE_URL/analyst-vm.html"
pillar_file="/opt/so/saltstack/local/pillar/minions/{{grains.id}}.sls"
pillar_file="/opt/so/saltstack/local/pillar/minions/adv_{{grains.id}}.sls"
if [ -f "$pillar_file" ]; then
if ! grep -q "^workstation:$" "$pillar_file"; then
if ! grep -q "^desktop:$" "$pillar_file"; then
FIRSTPASS=yes
while [[ $INSTALL != "yes" ]] && [[ $INSTALL != "no" ]]; do
@@ -26,7 +26,7 @@ if [ -f "$pillar_file" ]; then
echo "## _______________________________ ##"
echo "## ##"
echo "## Installing the Security Onion ##"
echo "## analyst node on this device will ##"
echo "## Desktop on this device will ##"
echo "## make permanent changes to ##"
echo "## the system. ##"
echo "## A system reboot will be required ##"
@@ -42,50 +42,55 @@ if [ -f "$pillar_file" ]; then
done
if [[ $INSTALL == "no" ]]; then
echo "Exiting analyst node installation."
echo "Exiting desktop node installation."
exit 0
fi
# Add workstation pillar to the minion's pillar file
# Add desktop pillar to the minion's pillar file
printf '%s\n'\
"workstation:"\
"desktop:"\
" gui:"\
" enabled: true"\
"" >> "$pillar_file"
echo "Applying the workstation state. This could take some time since there are many packages that need to be installed."
if salt-call state.apply workstation -linfo queue=True; then # make sure the state ran successfully
echo "Applying the desktop state. This could take some time since there are many packages that need to be installed."
if salt-call state.apply desktop -linfo queue=True; then # make sure the state ran successfully
echo ""
echo "Analyst workstation has been installed!"
echo "Security Onion Desktop has been installed!"
echo "Press ENTER to reboot or Ctrl-C to cancel."
read pause
reboot;
else
echo "There was an issue applying the workstation state. Please review the log above or at /opt/so/log/salt/minion."
echo "There was an issue applying the desktop state. Please review the log above or at /opt/so/log/salt/minion."
fi
else # workstation is already added
echo "The workstation pillar already exists in $pillar_file."
echo "To enable/disable the gui, set 'workstation:gui:enabled' to true or false in $pillar_file."
echo "Additional documentation can be found at $doc_workstation_url."
else # desktop is already added
echo "The desktop pillar already exists in $pillar_file."
echo "To enable/disable the gui, set 'desktop:gui:enabled' to true or false in $pillar_file. Alternatively, this can be set in the SOC UI under advanced."
echo "Additional documentation can be found at $doc_desktop_url."
fi
else # if the pillar file doesn't exist
echo "Could not find $pillar_file and add the workstation pillar."
echo "Could not find $pillar_file and add the desktop pillar."
fi
{#- if this is not a manager #}
{% else -%}
echo "Since this is not a manager, the pillar values to enable analyst workstation must be set manually. Please view the documentation at $doc_workstation_url."
echo "Since this is not a manager, the pillar values to enable Security Onion Desktop must be set manually. This can be enabled in the SOC UI under advanced by adding the following:"
echo "desktop:"
echo " gui:"
echo " enabled: true"
echo ""
echo "Please view the documentation at $doc_desktop_url."
{#- endif if this is a manager #}
{% endif -%}
{#- if not Rocky #}
{#- if not OEL #}
{%- else %}
echo "The Analyst Workstation can only be installed on Rocky. Please view the documentation at $doc_workstation_url."
echo "The Security Onion Desktop can only be installed on Oracle Linux. Please view the documentation at $doc_desktop_url."
{#- endif grains.os == Rocky #}
{#- endif grains.os == OEL #}
{% endif -%}
exit 0

View File

@@ -0,0 +1,235 @@
#!/bin/bash
#
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set MANAGER = salt['grains.get']('master') %}
{%- set VERSION = salt['pillar.get']('global:soversion') %}
{%- set IMAGEREPO = salt['pillar.get']('global:imagerepo') %}
{%- set MANAGERIP = salt['pillar.get']('global:managerip') %}
{%- set URLBASE = salt['pillar.get']('global:url_base') %}
{%- set ES_USER = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:user', '') %}
{%- set ES_PASS = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %}
INDEX_DATE=$(date +'%Y.%m.%d')
LOG_FILE=/nsm/import/evtx-import.log
. /usr/sbin/so-common
function usage {
cat << EOF
Usage: $0 [options] <evtx-file-1> [evtx-file-2] [evtx-file-*]
Imports one or more evtx files into Security Onion. The evtx files will be analyzed and made available for review in the Security Onion toolset.
Options:
--json Outputs summary in JSON format. Implies --quiet.
--quiet Silences progress information to stdout.
--shift Adds a time shift. Accepts a single argument that is intended to be the date of the last record, and shifts the dates of the previous records accordingly.
Ex. sudo so-import-evtx --shift "2023-08-01 01:01:01" example.evtx
EOF
}
quiet=0
json=0
INPUT_FILES=
while [[ $# -gt 0 ]]; do
param=$1
shift
case "$param" in
--json)
json=1
quiet=1
;;
--quiet)
quiet=1
;;
--shift)
SHIFTDATE=$1
shift
;;
-*)
echo "Encountered unexpected parameter: $param"
usage
exit 1
;;
*)
if [[ "$INPUT_FILES" != "" ]]; then
INPUT_FILES="$INPUT_FILES $param"
else
INPUT_FILES="$param"
fi
;;
esac
done
function status {
msg=$1
[[ $quiet -eq 1 ]] && return
echo "$msg"
}
function evtx2es() {
EVTX=$1
HASH=$2
SHIFTDATE=$3
docker run --rm \
-e "SHIFTTS=$SHIFTDATE" \
-v "$EVTX:/tmp/data.evtx" \
-v "/nsm/import/$HASH/evtx/:/tmp/evtx/" \
-v "/nsm/import/evtx-end_newest:/tmp/newest" \
-v "/nsm/import/evtx-start_oldest:/tmp/oldest" \
--entrypoint "/evtx_calc_timestamps.sh" \
{{ MANAGER }}:5000/{{ IMAGEREPO }}/so-pcaptools:{{ VERSION }} >> $LOG_FILE 2>&1
}
# if no parameters supplied, display usage
if [ "$INPUT_FILES" == "" ]; then
usage
exit 1
fi
# ensure this is a Manager node
require_manager @> /dev/null
# verify that all parameters are files
for i in $INPUT_FILES; do
if ! [ -f "$i" ]; then
echo "\"$i\" is not a valid file!"
exit 2
fi
done
# track oldest start and newest end so that we can generate the Kibana search hyperlink at the end
START_OLDEST="2050-12-31"
END_NEWEST="1971-01-01"
INVALID_EVTXS_COUNT=0
VALID_EVTXS_COUNT=0
SKIPPED_EVTXS_COUNT=0
touch /nsm/import/evtx-start_oldest
touch /nsm/import/evtx-end_newest
echo $START_OLDEST > /nsm/import/evtx-start_oldest
echo $END_NEWEST > /nsm/import/evtx-end_newest
# paths must be quoted in case they include spaces
for EVTX in $INPUT_FILES; do
EVTX=$(/usr/bin/realpath "$EVTX")
status "Processing Import: ${EVTX}"
if ! [ -z "$SHIFTDATE" ]; then
status "- timeshifting logs to end date of $SHIFTDATE"
fi
# generate a unique hash to assist with dedupe checks
HASH=$(md5sum "${EVTX}" | awk '{ print $1 }')
HASH_DIR=/nsm/import/${HASH}
status "- assigning unique identifier to import: $HASH"
if [[ "$HASH_FILTERS" == "" ]]; then
HASH_FILTERS="import.id:${HASH}"
HASHES="${HASH}"
else
HASH_FILTERS="$HASH_FILTERS%20OR%20import.id:${HASH}"
HASHES="${HASHES} ${HASH}"
fi
if [ -d $HASH_DIR ]; then
status "- this EVTX has already been imported; skipping"
SKIPPED_EVTXS_COUNT=$((SKIPPED_EVTXS_COUNT + 1))
else
EVTX_DIR=$HASH_DIR/evtx
mkdir -p $EVTX_DIR
# import evtx and write them to import ingest pipeline
status "- importing logs to Elasticsearch..."
evtx2es "${EVTX}" $HASH "$SHIFTDATE"
if [[ $? -ne 0 ]]; then
INVALID_EVTXS_COUNT=$((INVALID_EVTXS_COUNT + 1))
status "- WARNING: This evtx file may not have fully imported successfully"
else
VALID_EVTXS_COUNT=$((VALID_EVTXS_COUNT + 1))
fi
# compare $START to $START_OLDEST
START=$(cat /nsm/import/evtx-start_oldest)
START_COMPARE=$(date -d $START +%s)
START_OLDEST_COMPARE=$(date -d $START_OLDEST +%s)
if [ $START_COMPARE -lt $START_OLDEST_COMPARE ]; then
START_OLDEST=$START
fi
# compare $ENDNEXT to $END_NEWEST
END=$(cat /nsm/import/evtx-end_newest)
ENDNEXT=`date +%Y-%m-%d --date="$END 1 day"`
ENDNEXT_COMPARE=$(date -d $ENDNEXT +%s)
END_NEWEST_COMPARE=$(date -d $END_NEWEST +%s)
if [ $ENDNEXT_COMPARE -gt $END_NEWEST_COMPARE ]; then
END_NEWEST=$ENDNEXT
fi
cp -f "${EVTX}" "${EVTX_DIR}"/data.evtx
chmod 644 "${EVTX_DIR}"/data.evtx
fi # end of valid evtx
status
done # end of for-loop processing evtx files
# output final messages
if [[ $INVALID_EVTXS_COUNT -gt 0 ]]; then
status
status "Please note! One or more evtx was invalid! You can scroll up to see which ones were invalid."
fi
START_OLDEST_FORMATTED=`date +%Y-%m-%d --date="$START_OLDEST"`
START_OLDEST_SLASH=$(echo $START_OLDEST_FORMATTED | sed -e 's/-/%2F/g')
END_NEWEST_SLASH=$(echo $END_NEWEST | sed -e 's/-/%2F/g')
if [[ $VALID_EVTXS_COUNT -gt 0 ]] || [[ $SKIPPED_EVTXS_COUNT -gt 0 ]]; then
URL="https://{{ URLBASE }}/#/dashboards?q=$HASH_FILTERS%20%7C%20groupby%20-sankey%20event.dataset%20event.category%2a%20%7C%20groupby%20-pie%20event.category%20%7C%20groupby%20-bar%20event.module%20%7C%20groupby%20event.dataset%20%7C%20groupby%20event.module%20%7C%20groupby%20event.category%20%7C%20groupby%20observer.name%20%7C%20groupby%20source.ip%20%7C%20groupby%20destination.ip%20%7C%20groupby%20destination.port&t=${START_OLDEST_SLASH}%2000%3A00%3A00%20AM%20-%20${END_NEWEST_SLASH}%2000%3A00%3A00%20AM&z=UTC"
status "Import complete!"
status
status "Use the following hyperlink to view the imported data. Triple-click to quickly highlight the entire hyperlink and then copy it into a browser:"
status
status "$URL"
status
status "or, manually set the Time Range to be (in UTC):"
status
status "From: $START_OLDEST_FORMATTED To: $END_NEWEST"
status
status "Note: It can take 30 seconds or more for events to appear in Security Onion Console."
RESULT=0
else
START_OLDEST=
END_NEWEST=
URL=
RESULT=1
fi
if [[ $json -eq 1 ]]; then
jq -n \
--arg success_count "$VALID_EVTXS_COUNT" \
--arg fail_count "$INVALID_EVTXS_COUNT" \
--arg skipped_count "$SKIPPED_EVTXS_COUNT" \
--arg begin_date "$START_OLDEST" \
--arg end_date "$END_NEWEST" \
--arg url "$URL" \
--arg hashes "$HASHES" \
'''{
success_count: $success_count,
fail_count: $fail_count,
skipped_count: $skipped_count,
begin_date: $begin_date,
end_date: $end_date,
url: $url,
hash: ($hashes / " ")
}'''
fi
exit $RESULT

View File

@@ -15,12 +15,51 @@
function usage {
cat << EOF
Usage: $0 <pcap-file-1> [pcap-file-2] [pcap-file-N]
Usage: $0 [options] <pcap-file-1> [pcap-file-2] [pcap-file-N]
Imports one or more PCAP files onto a sensor node. The PCAP traffic will be analyzed and made available for review in the Security Onion toolset.
Options:
--json Outputs summary in JSON format. Implies --quiet.
--quiet Silences progress information to stdout.
EOF
}
quiet=0
json=0
INPUT_FILES=
while [[ $# -gt 0 ]]; do
param=$1
shift
case "$param" in
--json)
json=1
quiet=1
;;
--quiet)
quiet=1
;;
-*)
echo "Encountered unexpected parameter: $param"
usage
exit 1
;;
*)
if [[ "$INPUT_FILES" != "" ]]; then
INPUT_FILES="$INPUT_FILES $param"
else
INPUT_FILES="$param"
fi
;;
esac
done
function status {
msg=$1
[[ $quiet -eq 1 ]] && return
echo "$msg"
}
function pcapinfo() {
PCAP=$1
ARGS=$2
@@ -84,7 +123,7 @@ function zeek() {
}
# if no parameters supplied, display usage
if [ $# -eq 0 ]; then
if [ "$INPUT_FILES" == "" ]; then
usage
exit 1
fi
@@ -96,31 +135,30 @@ if [ ! -d /opt/so/conf/suricata ]; then
fi
# verify that all parameters are files
for i in "$@"; do
for i in $INPUT_FILES; do
if ! [ -f "$i" ]; then
usage
echo "\"$i\" is not a valid file!"
exit 2
fi
done
# track if we have any valid or invalid pcaps
INVALID_PCAPS="no"
VALID_PCAPS="no"
# track oldest start and newest end so that we can generate the Kibana search hyperlink at the end
START_OLDEST="2050-12-31"
END_NEWEST="1971-01-01"
INVALID_PCAPS_COUNT=0
VALID_PCAPS_COUNT=0
SKIPPED_PCAPS_COUNT=0
# paths must be quoted in case they include spaces
for PCAP in "$@"; do
for PCAP in $INPUT_FILES; do
PCAP=$(/usr/bin/realpath "$PCAP")
echo "Processing Import: ${PCAP}"
echo "- verifying file"
status "Processing Import: ${PCAP}"
status "- verifying file"
if ! pcapinfo "${PCAP}" > /dev/null 2>&1; then
# try to fix pcap and then process the fixed pcap directly
PCAP_FIXED=`mktemp /tmp/so-import-pcap-XXXXXXXXXX.pcap`
echo "- attempting to recover corrupted PCAP file"
status "- attempting to recover corrupted PCAP file"
pcapfix "${PCAP}" "${PCAP_FIXED}"
# Make fixed file world readable since the Suricata docker container will runas a non-root user
chmod a+r "${PCAP_FIXED}"
@@ -131,33 +169,44 @@ for PCAP in "$@"; do
# generate a unique hash to assist with dedupe checks
HASH=$(md5sum "${PCAP}" | awk '{ print $1 }')
HASH_DIR=/nsm/import/${HASH}
echo "- assigning unique identifier to import: $HASH"
status "- assigning unique identifier to import: $HASH"
if [ -d $HASH_DIR ]; then
echo "- this PCAP has already been imported; skipping"
INVALID_PCAPS="yes"
elif pcapinfo "${PCAP}" |egrep -q "Last packet time: 1970-01-01|Last packet time: n/a"; then
echo "- this PCAP file is invalid; skipping"
INVALID_PCAPS="yes"
pcap_data=$(pcapinfo "${PCAP}")
if ! echo "$pcap_data" | grep -q "First packet time:" || echo "$pcap_data" |egrep -q "Last packet time: 1970-01-01|Last packet time: n/a"; then
status "- this PCAP file is invalid; skipping"
INVALID_PCAPS_COUNT=$((INVALID_PCAPS_COUNT + 1))
else
VALID_PCAPS="yes"
if [ -d $HASH_DIR ]; then
status "- this PCAP has already been imported; skipping"
SKIPPED_PCAPS_COUNT=$((SKIPPED_PCAPS_COUNT + 1))
else
VALID_PCAPS_COUNT=$((VALID_PCAPS_COUNT + 1))
PCAP_DIR=$HASH_DIR/pcap
mkdir -p $PCAP_DIR
PCAP_DIR=$HASH_DIR/pcap
mkdir -p $PCAP_DIR
# generate IDS alerts and write them to standard pipeline
echo "- analyzing traffic with Suricata"
suricata "${PCAP}" $HASH
{% if salt['pillar.get']('global:mdengine') == 'ZEEK' %}
# generate Zeek logs and write them to a unique subdirectory in /nsm/import/zeek/
# since each run writes to a unique subdirectory, there is no need for a lock file
echo "- analyzing traffic with Zeek"
zeek "${PCAP}" $HASH
{% endif %}
# generate IDS alerts and write them to standard pipeline
status "- analyzing traffic with Suricata"
suricata "${PCAP}" $HASH
{% if salt['pillar.get']('global:mdengine') == 'ZEEK' %}
# generate Zeek logs and write them to a unique subdirectory in /nsm/import/zeek/
# since each run writes to a unique subdirectory, there is no need for a lock file
status "- analyzing traffic with Zeek"
zeek "${PCAP}" $HASH
{% endif %}
fi
if [[ "$HASH_FILTERS" == "" ]]; then
HASH_FILTERS="import.id:${HASH}"
HASHES="${HASH}"
else
HASH_FILTERS="$HASH_FILTERS%20OR%20import.id:${HASH}"
HASHES="${HASHES} ${HASH}"
fi
START=$(pcapinfo "${PCAP}" -a |grep "First packet time:" | awk '{print $4}')
END=$(pcapinfo "${PCAP}" -e |grep "Last packet time:" | awk '{print $4}')
echo "- saving PCAP data spanning dates $START through $END"
status "- found PCAP data spanning dates $START through $END"
# compare $START to $START_OLDEST
START_COMPARE=$(date -d $START +%s)
@@ -179,37 +228,62 @@ for PCAP in "$@"; do
fi # end of valid pcap
echo
status
done # end of for-loop processing pcap files
# remove temp files
echo "Cleaning up:"
for TEMP_PCAP in ${TEMP_PCAPS[@]}; do
echo "- removing temporary pcap $TEMP_PCAP"
status "- removing temporary pcap $TEMP_PCAP"
rm -f $TEMP_PCAP
done
# output final messages
if [ "$INVALID_PCAPS" = "yes" ]; then
echo
echo "Please note! One or more pcaps was invalid! You can scroll up to see which ones were invalid."
if [[ $INVALID_PCAPS_COUNT -gt 0 ]]; then
status
status "WARNING: One or more pcaps was invalid. Scroll up to see which ones were invalid."
fi
START_OLDEST_SLASH=$(echo $START_OLDEST | sed -e 's/-/%2F/g')
END_NEWEST_SLASH=$(echo $END_NEWEST | sed -e 's/-/%2F/g')
if [[ $VALID_PCAPS_COUNT -gt 0 ]] || [[ $SKIPPED_PCAPS_COUNT -gt 0 ]]; then
URL="https://{{ URLBASE }}/#/dashboards?q=$HASH_FILTERS%20%7C%20groupby%20-sankey%20event.dataset%20event.category%2a%20%7C%20groupby%20-pie%20event.category%20%7C%20groupby%20-bar%20event.module%20%7C%20groupby%20event.dataset%20%7C%20groupby%20event.module%20%7C%20groupby%20event.category%20%7C%20groupby%20observer.name%20%7C%20groupby%20source.ip%20%7C%20groupby%20destination.ip%20%7C%20groupby%20destination.port&t=${START_OLDEST_SLASH}%2000%3A00%3A00%20AM%20-%20${END_NEWEST_SLASH}%2000%3A00%3A00%20AM&z=UTC"
if [ "$VALID_PCAPS" = "yes" ]; then
cat << EOF
Import complete!
You can use the following hyperlink to view data in the time range of your import. You can triple-click to quickly highlight the entire hyperlink and you can then copy it into your browser:
https://{{ URLBASE }}/#/dashboards?q=import.id:${HASH}%20%7C%20groupby%20-sankey%20event.dataset%20event.category%2a%20%7C%20groupby%20-pie%20event.category%20%7C%20groupby%20-bar%20event.module%20%7C%20groupby%20event.dataset%20%7C%20groupby%20event.module%20%7C%20groupby%20event.category%20%7C%20groupby%20observer.name%20%7C%20groupby%20source.ip%20%7C%20groupby%20destination.ip%20%7C%20groupby%20destination.port&t=${START_OLDEST_SLASH}%2000%3A00%3A00%20AM%20-%20${END_NEWEST_SLASH}%2000%3A00%3A00%20AM&z=UTC
or you can manually set your Time Range to be (in UTC):
From: $START_OLDEST To: $END_NEWEST
Please note that it may take 30 seconds or more for events to appear in Security Onion Console.
EOF
status "Import complete!"
status
status "Use the following hyperlink to view the imported data. Triple-click to quickly highlight the entire hyperlink and then copy it into a browser:"
status "$URL"
status
status "or, manually set the Time Range to be (in UTC):"
status "From: $START_OLDEST To: $END_NEWEST"
status
status "Note: It can take 30 seconds or more for events to appear in Security Onion Console."
RESULT=0
else
START_OLDEST=
END_NEWEST=
URL=
RESULT=1
fi
if [[ $json -eq 1 ]]; then
jq -n \
--arg success_count "$VALID_PCAPS_COUNT" \
--arg fail_count "$INVALID_PCAPS_COUNT" \
--arg skipped_count "$SKIPPED_PCAPS_COUNT" \
--arg begin_date "$START_OLDEST" \
--arg end_date "$END_NEWEST" \
--arg url "$URL" \
--arg hashes "$HASHES" \
'''{
success_count: $success_count,
fail_count: $fail_count,
skipped_count: $skipped_count,
begin_date: $begin_date,
end_date: $end_date,
url: $url,
hash: ($hashes / " ")
}'''
fi
exit $RESULT

View File

@@ -0,0 +1,93 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{%- if salt['grains.get']('sosmodel', '') %}
{%- set model = salt['grains.get']('sosmodel') %}
model={{ model }}
# Don't need cloud images to use this
if [[ $model =~ ^(SO2AMI01|SO2AZI01|SO2GCI01)$ ]]; then
exit 0
fi
{%- else %}
echo "This is not an appliance"
exit 0
{%- endif %}
if [[ $model =~ ^(SOS10K|SOS500|SOS1000|SOS1000F|SOS4000|SOSSN7200|SOSSNNV|SOSMN)$ ]]; then
is_bossraid=true
fi
if [[ $model =~ ^(SOSSNNV|SOSMN)$ ]]; then
is_swraid=true
fi
if [[ $model =~ ^(SOS10K|SOS500|SOS1000|SOS1000F|SOS4000|SOSSN7200)$ ]]; then
is_hwraid=true
fi
check_nsm_raid() {
PERCCLI=$(/opt/raidtools/perccli/perccli64 /c0/v0 show|grep RAID|grep Optl)
MEGACTL=$(/opt/raidtools/megasasctl |grep optimal)
if [[ $APPLIANCE == '1' ]]; then
if [[ -n $PERCCLI ]]; then
HWRAID=0
elif [[ -n $MEGACTL ]]; then
HWRAID=0
else
HWRAID=1
fi
fi
}
check_boss_raid() {
MVCLI=$(/usr/local/bin/mvcli info -o vd |grep status |grep functional)
if [[ -n $MVCLI ]]; then
BOSSRAID=0
else
BOSSRAID=1
fi
}
check_software_raid() {
SWRC=$(grep "_" /proc/mdstat)
if [[ -n $SWRC ]]; then
# RAID is failed in some way
SWRAID=1
else
SWRAID=0
fi
}
# Set everything to 0
SWRAID=0
BOSSRAID=0
HWRAID=0
if [[ $is_hwraid ]]; then
check_nsm_raid
fi
if [[ $is_bossraid ]]; then
check_boss_raid
fi
if [[ $is_swraid ]]; then
check_software_raid
fi
sum=$(($SWRAID + $BOSSRAID + $HWRAID))
if [[ $sum == "0" ]]; then
RAIDSTATUS=0
else
RAIDSTATUS=1
fi
echo "nsmraid=$RAIDSTATUS" > /opt/so/log/raid/status.log

81
salt/curator/config.sls Normal file
View File

@@ -0,0 +1,81 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls.split('.')[0] in allowed_states %}
{% from "curator/map.jinja" import CURATORMERGED %}
# Create the group
curatorgroup:
group.present:
- name: curator
- gid: 934
# Add user
curator:
user.present:
- uid: 934
- gid: 934
- home: /opt/so/conf/curator
- createhome: False
# Create the log directory
curlogdir:
file.directory:
- name: /opt/so/log/curator
- user: 934
- group: 939
curactiondir:
file.directory:
- name: /opt/so/conf/curator/action
- user: 934
- group: 939
- makedirs: True
actionconfs:
file.recurse:
- name: /opt/so/conf/curator/action
- source: salt://curator/files/action
- user: 934
- group: 939
- template: jinja
- defaults:
CURATORMERGED: {{ CURATORMERGED.elasticsearch.index_settings }}
curconf:
file.managed:
- name: /opt/so/conf/curator/curator.yml
- source: salt://curator/files/curator.yml
- user: 934
- group: 939
- mode: 660
- template: jinja
- show_changes: False
curator_sbin:
file.recurse:
- name: /usr/sbin
- source: salt://curator/tools/sbin
- user: 934
- group: 939
- file_mode: 755
curator_sbin_jinja:
file.recurse:
- name: /usr/sbin
- source: salt://curator/tools/sbin_jinja
- user: 934
- group: 939
- file_mode: 755
- template: jinja
{% else %}
{{sls}}_state_not_allowed:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
{% endif %}

View File

@@ -1,98 +1,100 @@
elasticsearch:
index_settings:
logs-import-so:
close: 73000
delete: 73001
logs-strelka-so:
close: 30
delete: 365
logs-suricata-so:
close: 30
delete: 365
logs-syslog-so:
close: 30
delete: 365
logs-zeek-so:
close: 30
delete: 365
logs-elastic_agent-metricbeat-default:
close: 30
delete: 365
logs-elastic_agent-osquerybeat-default:
close: 30
delete: 365
logs-elastic_agent-fleet_server-default:
close: 30
delete: 365
logs-elastic_agent-filebeat-default:
close: 30
delete: 365
logs-elastic_agent-default:
close: 30
delete: 365
logs-system-auth-default:
close: 30
delete: 365
logs-system-application-default:
close: 30
delete: 365
logs-system-security-default:
close: 30
delete: 365
logs-system-system-default:
close: 30
delete: 365
logs-system-syslog-default:
close: 30
delete: 365
logs-windows-powershell-default:
close: 30
delete: 365
logs-windows-sysmon_operational-default:
close: 30
delete: 365
so-beats:
close: 30
delete: 365
so-elasticsearch:
close: 30
delete: 365
so-firewall:
close: 30
delete: 365
so-ids:
close: 30
delete: 365
so-import:
close: 73000
delete: 73001
so-kratos:
close: 30
delete: 365
so-kibana:
close: 30
delete: 365
so-logstash:
close: 30
delete: 365
so-netflow:
close: 30
delete: 365
so-osquery:
close: 30
delete: 365
so-ossec:
close: 30
delete: 365
so-redis:
close: 30
delete: 365
so-strelka:
close: 30
delete: 365
so-syslog:
close: 30
delete: 365
so-zeek:
close: 30
delete: 365
curator:
enabled: False
elasticsearch:
index_settings:
logs-import-so:
close: 73000
delete: 73001
logs-strelka-so:
close: 30
delete: 365
logs-suricata-so:
close: 30
delete: 365
logs-syslog-so:
close: 30
delete: 365
logs-zeek-so:
close: 30
delete: 365
logs-elastic_agent-metricbeat-default:
close: 30
delete: 365
logs-elastic_agent-osquerybeat-default:
close: 30
delete: 365
logs-elastic_agent-fleet_server-default:
close: 30
delete: 365
logs-elastic_agent-filebeat-default:
close: 30
delete: 365
logs-elastic_agent-default:
close: 30
delete: 365
logs-system-auth-default:
close: 30
delete: 365
logs-system-application-default:
close: 30
delete: 365
logs-system-security-default:
close: 30
delete: 365
logs-system-system-default:
close: 30
delete: 365
logs-system-syslog-default:
close: 30
delete: 365
logs-windows-powershell-default:
close: 30
delete: 365
logs-windows-sysmon_operational-default:
close: 30
delete: 365
so-beats:
close: 30
delete: 365
so-elasticsearch:
close: 30
delete: 365
so-firewall:
close: 30
delete: 365
so-ids:
close: 30
delete: 365
so-import:
close: 73000
delete: 73001
so-kratos:
close: 30
delete: 365
so-kibana:
close: 30
delete: 365
so-logstash:
close: 30
delete: 365
so-netflow:
close: 30
delete: 365
so-osquery:
close: 30
delete: 365
so-ossec:
close: 30
delete: 365
so-redis:
close: 30
delete: 365
so-strelka:
close: 30
delete: 365
so-syslog:
close: 30
delete: 365
so-zeek:
close: 30
delete: 365

35
salt/curator/disabled.sls Normal file
View File

@@ -0,0 +1,35 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls.split('.')[0] in allowed_states %}
include:
- curator.sostatus
so-curator:
docker_container.absent:
- force: True
so-curator_so-status.disabled:
file.comment:
- name: /opt/so/conf/so-status/so-status.conf
- regex: ^so-curator$
so-curator-cluster-close:
cron.absent:
- identifier: so-curator-cluster-close
so-curator-cluster-delete:
cron.absent:
- identifier: so-curator-cluster-delete
{% else %}
{{sls}}_state_not_allowed:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
{% endif %}

88
salt/curator/enabled.sls Normal file
View File

@@ -0,0 +1,88 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls.split('.')[0] in allowed_states %}
{% from 'vars/globals.map.jinja' import GLOBALS %}
{% from 'docker/docker.map.jinja' import DOCKER %}
include:
- curator.config
- curator.sostatus
so-curator:
docker_container.running:
- image: {{ GLOBALS.registry_host }}:5000/{{ GLOBALS.image_repo }}/so-curator:{{ GLOBALS.so_version }}
- start: True
- hostname: curator
- name: so-curator
- user: curator
- networks:
- sobridge:
- ipv4_address: {{ DOCKER.containers['so-curator'].ip }}
- interactive: True
- tty: True
- binds:
- /opt/so/conf/curator/curator.yml:/etc/curator/config/curator.yml:ro
- /opt/so/conf/curator/action/:/etc/curator/action:ro
- /opt/so/log/curator:/var/log/curator:rw
{% if DOCKER.containers['so-curator'].custom_bind_mounts %}
{% for BIND in DOCKER.containers['so-curator'].custom_bind_mounts %}
- {{ BIND }}
{% endfor %}
{% endif %}
{% if DOCKER.containers['so-curator'].extra_hosts %}
- extra_hosts:
{% for XTRAHOST in DOCKER.containers['so-curator'].extra_hosts %}
- {{ XTRAHOST }}
{% endfor %}
{% endif %}
{% if DOCKER.containers['so-curator'].extra_env %}
- environment:
{% for XTRAENV in DOCKER.containers['so-curator'].extra_env %}
- {{ XTRAENV }}
{% endfor %}
{% endif %}
- require:
- file: actionconfs
- file: curconf
- file: curlogdir
- watch:
- file: curconf
delete_so-curator_so-status.disabled:
file.uncomment:
- name: /opt/so/conf/so-status/so-status.conf
- regex: ^so-curator$
so-curator-cluster-close:
cron.present:
- name: /usr/sbin/so-curator-cluster-close > /opt/so/log/curator/cron-close.log 2>&1
- identifier: so-curator-cluster-close
- user: root
- minute: '2'
- hour: '*/1'
- daymonth: '*'
- month: '*'
- dayweek: '*'
so-curator-cluster-delete:
cron.present:
- name: /usr/sbin/so-curator-cluster-delete > /opt/so/log/curator/cron-cluster-delete.log 2>&1
- identifier: so-curator-cluster-delete
- user: root
- minute: '*/5'
- hour: '*'
- daymonth: '*'
- month: '*'
- dayweek: '*'
{% else %}
{{sls}}_state_not_allowed:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
{% endif %}

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -13,7 +13,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -13,7 +13,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -12,7 +12,7 @@ actions:
options:
delete_aliases: False
timeout_override:
continue_if_exception: False
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern

View File

@@ -4,9 +4,9 @@
# Elastic License 2.0.
{% from 'vars/globals.map.jinja' import GLOBALS %}
{% if grains['role'] in ['so-searchnode', 'so-heavynode'] %}
{% if GLOBALS.role in ['so-searchnode', 'so-heavynode'] %}
{%- set elasticsearch = GLOBALS.node_ip -%}
{% elif grains['role'] in ['so-eval', 'so-managersearch', 'so-standalone', 'so-manager'] %}
{% elif GLOBALS.role in ['so-eval', 'so-managersearch', 'so-standalone', 'so-manager'] %}
{%- set elasticsearch = GLOBALS.manager_ip -%}
{%- endif %}
{%- set ES_USER = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:user', '') %}
@@ -30,10 +30,8 @@ elasticsearch:
id:
api_key:
master_only: False
{%- if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %}
username: "{{ ES_USER }}"
password: "{{ ES_PASS }}"
{%- endif %}
logging:
loglevel: INFO

View File

@@ -3,155 +3,11 @@
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls in allowed_states %}
{% from 'vars/globals.map.jinja' import GLOBALS %}
{% from 'docker/docker.map.jinja' import DOCKER %}
{% from "curator/map.jinja" import CURATOROPTIONS %}
{% from "curator/map.jinja" import CURATORMERGED %}
{% set REMOVECURATORCRON = False %}
# Curator
# Create the group
curatorgroup:
group.present:
- name: curator
- gid: 934
# Add user
curator:
user.present:
- uid: 934
- gid: 934
- home: /opt/so/conf/curator
- createhome: False
# Create the log directory
curlogdir:
file.directory:
- name: /opt/so/log/curator
- user: 934
- group: 939
curactiondir:
file.directory:
- name: /opt/so/conf/curator/action
- user: 934
- group: 939
- makedirs: True
actionconfs:
file.recurse:
- name: /opt/so/conf/curator/action
- source: salt://curator/files/action
- user: 934
- group: 939
- template: jinja
- defaults:
CURATORMERGED: {{ CURATORMERGED }}
curconf:
file.managed:
- name: /opt/so/conf/curator/curator.yml
- source: salt://curator/files/curator.yml
- user: 934
- group: 939
- mode: 660
- template: jinja
- show_changes: False
curclusterclose:
file.managed:
- name: /usr/sbin/so-curator-cluster-close
- source: salt://curator/files/bin/so-curator-cluster-close
- user: 934
- group: 939
- mode: 755
- template: jinja
curclusterdelete:
file.managed:
- name: /usr/sbin/so-curator-cluster-delete
- source: salt://curator/files/bin/so-curator-cluster-delete
- user: 934
- group: 939
- mode: 755
curclusterdeletedelete:
file.managed:
- name: /usr/sbin/so-curator-cluster-delete-delete
- source: salt://curator/files/bin/so-curator-cluster-delete-delete
- user: 934
- group: 939
- mode: 755
- template: jinja
so-curator:
docker_container.{{ CURATOROPTIONS.status }}:
- image: {{ GLOBALS.registry_host }}:5000/{{ GLOBALS.image_repo }}/so-curator:{{ GLOBALS.so_version }}
- start: {{ CURATOROPTIONS.start }}
- hostname: curator
- name: so-curator
- user: curator
- networks:
- sobridge:
- ipv4_address: {{ DOCKER.containers['so-curator'].ip }}
- interactive: True
- tty: True
- binds:
- /opt/so/conf/curator/curator.yml:/etc/curator/config/curator.yml:ro
- /opt/so/conf/curator/action/:/etc/curator/action:ro
- /opt/so/log/curator:/var/log/curator:rw
- require:
- file: actionconfs
- file: curconf
- file: curlogdir
- watch:
- file: curconf
append_so-curator_so-status.conf:
file.append:
- name: /opt/so/conf/so-status/so-status.conf
- text: so-curator
- unless: grep -q so-curator /opt/so/conf/so-status/so-status.conf
{% if not CURATOROPTIONS.start %}
so-curator_so-status.disabled:
file.comment:
- name: /opt/so/conf/so-status/so-status.conf
- regex: ^so-curator$
{% else %}
delete_so-curator_so-status.disabled:
file.uncomment:
- name: /opt/so/conf/so-status/so-status.conf
- regex: ^so-curator$
{% endif %}
so-curator-cluster-close:
cron.present:
- name: /usr/sbin/so-curator-cluster-close > /opt/so/log/curator/cron-close.log 2>&1
- identifier: so-curator-cluster-close
- user: root
- minute: '2'
- hour: '*/1'
- daymonth: '*'
- month: '*'
- dayweek: '*'
so-curator-cluster-delete:
cron.present:
- name: /usr/sbin/so-curator-cluster-delete > /opt/so/log/curator/cron-cluster-delete.log 2>&1
- identifier: so-curator-cluster-delete
- user: root
- minute: '*/5'
- hour: '*'
- daymonth: '*'
- month: '*'
- dayweek: '*'
{% from 'curator/map.jinja' import CURATORMERGED %}
include:
{% if CURATORMERGED.enabled %}
- curator.enabled
{% else %}
{{sls}}_state_not_allowed:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
- curator.disabled
{% endif %}

View File

@@ -1,18 +1,7 @@
{% set CURATOROPTIONS = {} %}
{% set ENABLED = salt['pillar.get']('curator:enabled', True) %}
{% do CURATOROPTIONS.update({'manage_sostatus': True}) %}
# don't start the docker container if curator is disabled via pillar
{% if not ENABLED %}
{% do CURATOROPTIONS.update({'start': False}) %}
{% do CURATOROPTIONS.update({'status': 'absent'}) %}
{% if (TRUECLUSTER and grains.id.split('_')|last == 'searchnode') or (not TRUECLUSTER and grains.id.split('_')|last == 'manager') %}
{% do CURATOROPTIONS.update({'manage_sostatus': False}) %}
{% endif %}
{% else %}
{% do CURATOROPTIONS.update({'start': True}) %}
{% do CURATOROPTIONS.update({'status': 'running'}) %}
{% endif %}
{# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
https://securityonion.net/license; you may not use this file except in compliance with the
Elastic License 2.0. #}
{% import_yaml 'curator/defaults.yaml' as CURATORDEFAULTS %}
{% set CURATORMERGED = salt['pillar.get']('elasticsearch:index_settings', CURATORDEFAULTS.elasticsearch.index_settings, merge=true) %}
{% set CURATORMERGED = salt['pillar.get']('curator', CURATORDEFAULTS.curator, merge=true) %}

View File

@@ -0,0 +1,108 @@
curator:
enabled:
description: You can enable or disable Curator.
helpLink: curator.html
elasticsearch:
index_settings:
logs-import-so:
close: &close
description: Age, in days, when Curator closes the index.
helpLink: curator.html
forcedType: int
delete: &delete
description: Age, in days, when Curator deletes the index.
helpLink: curator.html
forcedType: int
logs-strelka-so:
close: *close
delete: *delete
logs-suricata-so:
close: *close
delete: *delete
logs-syslog-so:
close: *close
delete: *delete
logs-zeek-so:
close: *close
delete: *delete
logs-elastic_agent-metricbeat-default:
close: *close
delete: *delete
logs-elastic_agent-osquerybeat-default:
close: *close
delete: *delete
logs-elastic_agent-fleet_server-default:
close: *close
delete: *delete
logs-elastic_agent-filebeat-default:
close: *close
delete: *delete
logs-elastic_agent-default:
close: *close
delete: *delete
logs-system-auth-default:
close: *close
delete: *delete
logs-system-application-default:
close: *close
delete: *delete
logs-system-security-default:
close: *close
delete: *delete
logs-system-system-default:
close: *close
delete: *delete
logs-system-syslog-default:
close: *close
delete: *delete
logs-windows-powershell-default:
close: *close
delete: *delete
logs-windows-sysmon_operational-default:
close: *close
delete: *delete
so-beats:
close: *close
delete: *delete
so-elasticsearch:
close: *close
delete: *delete
so-firewall:
close: *close
delete: *delete
so-ids:
close: *close
delete: *delete
so-import:
close: *close
delete: *delete
so-kratos:
close: *close
delete: *delete
so-kibana:
close: *close
delete: *delete
so-logstash:
close: *close
delete: *delete
so-netflow:
close: *close
delete: *delete
so-osquery:
close: *close
delete: *delete
so-ossec:
close: *close
delete: *delete
so-redis:
close: *close
delete: *delete
so-strelka:
close: *close
delete: *delete
so-syslog:
close: *close
delete: *delete
so-zeek:
close: *close
delete: *delete

21
salt/curator/sostatus.sls Normal file
View File

@@ -0,0 +1,21 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls.split('.')[0] in allowed_states %}
append_so-curator_so-status.conf:
file.append:
- name: /opt/so/conf/so-status/so-status.conf
- text: so-curator
- unless: grep -q so-curator /opt/so/conf/so-status/so-status.conf
{% else %}
{{sls}}_state_not_allowed:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
{% endif %}

View File

@@ -10,44 +10,58 @@
{%- set RETENTION = salt['pillar.get']('elasticsearch:retention', ELASTICDEFAULTS.elasticsearch.retention, merge=true) -%}
LOG="/opt/so/log/curator/so-curator-cluster-delete.log"
LOG_SIZE_LIMIT=$(/usr/sbin/so-elasticsearch-cluster-space-total {{ RETENTION.retention_pct}})
ALERT_LOG="/opt/so/log/curator/alert.log"
LOG_SIZE_LIMIT_GB=$(/usr/sbin/so-elasticsearch-cluster-space-total {{ RETENTION.retention_pct}})
LOG_SIZE_LIMIT=$(( "$LOG_SIZE_LIMIT_GB" * 1000 * 1000 * 1000 ))
ITERATION=0
MAX_ITERATIONS=10
overlimit() {
[[ $(/usr/sbin/so-elasticsearch-cluster-space-used) -gt "${LOG_SIZE_LIMIT}" ]]
[[ $(/usr/sbin/so-elasticsearch-cluster-space-used) -gt ${LOG_SIZE_LIMIT} ]]
}
# Check to see if Elasticsearch indices using more disk space than LOG_SIZE_LIMIT
# Closed indices will be deleted first. If we are able to bring disk space under LOG_SIZE_LIMIT, we will break out of the loop.
while overlimit; do
###########################
# Check for 2 conditions: #
###########################
# 1. Check if Elasticsearch indices are using more disk space than LOG_SIZE_LIMIT
# 2. Check if the maximum number of iterations - MAX_ITERATIONS - has been exceeded. If so, exit.
# Closed indices will be deleted first. If we are able to bring disk space under LOG_SIZE_LIMIT, or the number of iterations has exceeded the maximum allowed number of iterations, we will break out of the loop.
while overlimit && [[ $ITERATION -lt $MAX_ITERATIONS ]]; do
# If we can't query Elasticsearch, then immediately return false.
/usr/sbin/so-elasticsearch-query _cat/indices?h=index,status > /dev/null 2>&1
[ $? -eq 1 ] && echo "$(date) - Could not query Elasticsearch." >> ${LOG} && exit
# We iterate through the closed and open indices
CLOSED_INDICES=$(/usr/sbin/so-elasticsearch-query _cat/indices?h=index,status | grep 'close$' | awk '{print $1}' | grep -v "so-case" | grep -E "(logstash-|so-|.ds-logs-)" | sort -t- -k3)
OPEN_INDICES=$(/usr/sbin/so-elasticsearch-query _cat/indices?h=index,status | grep 'open$' | awk '{print $1}' | grep -v "so-case" | grep -E "(logstash-|so-|.ds-logs-)" | sort -t- -k3)
for INDEX in ${CLOSED_INDICES} ${OPEN_INDICES}; do
# Now that we've sorted the indices from oldest to newest, we need to check each index to see if it is assigned as the current write index for a data stream
CLOSED_INDICES=$(/usr/sbin/so-elasticsearch-query _cat/indices?h=index,status | grep 'close$' | awk '{print $1}' | grep -vE "playbook|so-case" | grep -E "(logstash-|so-|.ds-logs-)" | sort -t- -k3)
OPEN_INDICES=$(/usr/sbin/so-elasticsearch-query _cat/indices?h=index,status | grep 'open$' | awk '{print $1}' | grep -vE "playbook|so-case" | grep -E "(logstash-|so-|.ds-logs-)" | sort -t- -k3)
for INDEX in ${CLOSED_INDICES} ${OPEN_INDICES}; do
# Now that we've sorted the indices from oldest to newest, we need to check each index to see if it is assigned as the current write index for a data stream
# To do so, we need to identify to which data stream this index is associated
# We extract the data stream name using the pattern below
DATASTREAM_PATTERN="logs-[a-zA-Z_.]+-[a-zA-Z_.]+"
DATASTREAM=$(echo "${INDEX}" | grep -oE "$DATASTREAM_PATTERN")
# We look up the data stream, and determine the write index. If there is only one backing index, we delete the entire data stream
BACKING_INDICES=$(/usr/sbin/so-elasticsearch-query _data_stream/${DATASTREAM} | jq -r '.data_streams[0].indices | length')
if [ "$BACKING_INDICES" -gt 1 ]; then
BACKING_INDICES=$(/usr/sbin/so-elasticsearch-query _data_stream/${DATASTREAM} | jq -r '.data_streams[0].indices | length')
if [ "$BACKING_INDICES" -gt 1 ]; then
CURRENT_WRITE_INDEX=$(/usr/sbin/so-elasticsearch-query _data_stream/$DATASTREAM | jq -r .data_streams[0].indices[-1].index_name)
# We make sure we are not trying to delete a write index
# We make sure we are not trying to delete a write index
if [ "${INDEX}" != "${CURRENT_WRITE_INDEX}" ]; then
# This should not be a write index, so we should be allowed to delete it
printf "\n$(date) - Used disk space exceeds LOG_SIZE_LIMIT (${LOG_SIZE_LIMIT} GB) - Deleting ${INDEX} index...\n" >> ${LOG}
printf "\n$(date) - Used disk space exceeds LOG_SIZE_LIMIT (${LOG_SIZE_LIMIT_GB} GB) - Deleting ${INDEX} index...\n" >> ${LOG}
/usr/sbin/so-elasticsearch-query ${INDEX} -XDELETE >> ${LOG} 2>&1
fi
else
# We delete the entire data stream, since there is only one backing index
printf "\n$(date) - Used disk space exceeds LOG_SIZE_LIMIT (${LOG_SIZE_LIMIT} GB) - Deleting ${DATASTREAM} data stream...\n" >> ${LOG}
/usr/sbin/so-elasticsearch-query _data_stream/${DATASTREAM} -XDELETE >> ${LOG} 2>&1
fi
if ! overlimit; then
fi
if ! overlimit ; then
exit
fi
((ITERATION++))
done
if [[ $ITERATION -ge $MAX_ITERATIONS ]]; then
alert_id=$(uuidgen)
printf "\n$(date) -> Maximum iteration limit reached ($MAX_ITERATIONS). Unable to bring disk below threshold. Writing alert ($alert_id) to ${ALERT_LOG}\n" >> ${LOG}
printf "\n$(date),$alert_id,Maximum iteration limit reached ($MAX_ITERATIONS). Unable to bring disk below threshold.\n" >> ${ALERT_LOG}
fi
done

View File

@@ -0,0 +1,8 @@
# Specify the dconf path
[org/gnome/desktop/background]
# Specify the path to the desktop background image file
picture-uri='file:///usr/local/share/backgrounds/so-wallpaper.jpg'
# Specify one of the rendering options for the background image:
picture-options='zoom'

View File

@@ -0,0 +1,7 @@
# This file is managed by Salt in the desktop.xwindows state
# It will not be overwritten if it already exists
[User]
Session=gnome-classic
Icon=/home/{{USERNAME}}/.face
SystemAccount=false

View File

Before

Width:  |  Height:  |  Size: 269 KiB

After

Width:  |  Height:  |  Size: 269 KiB

View File

Before

Width:  |  Height:  |  Size: 1.7 KiB

After

Width:  |  Height:  |  Size: 1.7 KiB

Some files were not shown because too many files have changed in this diff Show More