Compare commits

...

606 Commits

Author SHA1 Message Date
m0duspwnens 50ab63162a users 2024-01-17 12:51:15 -05:00
Jason Ertel 38965ccab5 Merge pull request #12192 from Security-Onion-Solutions/needsrestarted
Needsrestarted
2024-01-16 18:49:22 -05:00
m0duspwnens eeb249e00d look for needs_restarted file 2024-01-16 17:22:09 -05:00
m0duspwnens dff06cb085 changes for telegraf os.sh 2024-01-16 17:03:36 -05:00
m0duspwnens 8c1d1c95db check needs_restarting rework 2024-01-16 17:02:27 -05:00
weslambert 790f5171a6 Merge pull request #12176 from Security-Onion-Solutions/fix/otx_pulses_template
FIX: OTX pulses template
2024-01-12 16:55:58 -05:00
weslambert 252c51dafb Change order of names 2024-01-12 16:45:18 -05:00
weslambert a07e6e1058 OTX pulses 2024-01-12 16:43:33 -05:00
weslambert 3f9678056d OTX pulses template 2024-01-12 16:42:32 -05:00
weslambert c895b6a274 Merge pull request #12173 from Security-Onion-Solutions/fix/endpoint_metrics_templates
Add endpoint metrics templates
2024-01-12 11:26:09 -05:00
Wes 418f41c7e4 Add SOC configuration for metrics 2024-01-12 15:03:18 +00:00
weslambert 05679e79fc Merge pull request #12171 from Security-Onion-Solutions/2.4/dev
Merge 2.4 dev
2024-01-12 08:50:15 -05:00
Josh Brower af3aa53612 Merge pull request #12170 from Security-Onion-Solutions/fix/nav
Remove old nav layers
2024-01-12 08:48:29 -05:00
Wes 5eae349938 Add endpoint metrics templates 2024-01-12 13:47:35 +00:00
Josh Brower 2f8ce33cf7 formatting 2024-01-12 08:47:09 -05:00
Josh Brower 61b2a76a09 Remove old nav layers-rev2 2024-01-12 08:46:23 -05:00
Josh Brower b89b7cab59 Remove old nav layers 2024-01-12 08:37:32 -05:00
weslambert 71c5e34e03 Merge pull request #12164 from Security-Onion-Solutions/fix/optional_integration_pillar_merge
Make sure optional integration pillar values are merged with defaults
2024-01-11 16:14:46 -05:00
weslambert 880300d644 Move ELASTICFLEETMERGED import under allowed states 2024-01-11 14:58:21 -05:00
weslambert f5b59cacec Move ELASTICFLEETMERGED import 2024-01-11 14:56:01 -05:00
weslambert ea5097f1b4 Add back curly brace 2024-01-11 14:51:01 -05:00
weslambert cc66daba1a Make sure optional integration pillar values are merged with defaults 2024-01-11 14:49:39 -05:00
Josh Brower ea54aafa86 Merge pull request #12161 from Security-Onion-Solutions/fix/kibana-restart
Check Kibana API not Web
2024-01-11 12:32:19 -05:00
Josh Brower 03f140161c Check Kibana API not Web 2024-01-11 12:30:23 -05:00
weslambert 7bdc306ad4 Merge pull request #12160 from Security-Onion-Solutions/feature/additional_integrations_3
Additional Supported Integrations #3
2024-01-11 12:26:14 -05:00
weslambert 5e1e685ce0 Exclude Cisco failed_attempts pipeline 2024-01-11 10:52:30 -05:00
Wes c89d674a92 Add settings for integrations 2024-01-11 14:18:06 +00:00
Wes 9b1ddcacb4 Add additional templates for integrations 2024-01-11 14:00:09 +00:00
Wes 5703023008 Add additional packages 2024-01-11 13:59:38 +00:00
Josh Brower 59fe9a0587 Merge pull request #12156 from Security-Onion-Solutions/fix/navigator
Upgrade Navigator and fix Playbook layer
2024-01-11 08:48:34 -05:00
Josh Brower b8e555e913 Upgrade Navigator and fix Playbook layer 2024-01-10 21:16:59 -05:00
Mike Reeves 16b15c786b Merge pull request #12155 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update soup
2024-01-10 14:44:51 -05:00
Mike Reeves 3e13ea5c7a Update soup 2024-01-10 14:36:49 -05:00
Josh Brower 9159eab9fd Merge pull request #12151 from Security-Onion-Solutions/fix/so-playbook-reset
Fix reinstall & reset stability
2024-01-10 14:23:53 -05:00
Mike Reeves 0519812866 Merge pull request #12154 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update so-functions
2024-01-10 14:21:49 -05:00
Mike Reeves fc2f02c0a0 Update so-functions 2024-01-10 14:19:47 -05:00
Mike Reeves 1e3a00a833 Update so-functions 2024-01-10 14:16:55 -05:00
Josh Brower f21f0a9a96 Replace sed for so-yaml 2024-01-10 11:15:51 -05:00
Josh Brower 6ff764e6a1 refactor for reinstall stability 2024-01-10 10:22:50 -05:00
Jason Ertel f5568995ac Merge pull request #12149 from Security-Onion-Solutions/jertel/logs
exempt transient license check errors
2024-01-10 09:12:46 -05:00
Jason Ertel 47eea80d03 exempt transient license check errors 2024-01-10 09:07:17 -05:00
Josh Patterson 0b919ff0fa Merge pull request #12144 from Security-Onion-Solutions/salt3006.5
Salt3006.5
2024-01-09 12:09:36 -05:00
m0duspwnens c9f2038990 remove outdated comment 2024-01-09 11:36:44 -05:00
Josh Brower bf05efa59f Merge pull request #12141 from Security-Onion-Solutions/fix/fleet-reset
Fix/fleet reset
2024-01-09 10:38:07 -05:00
Josh Brower b058bc8c05 Move to non-destructive 2024-01-09 10:22:43 -05:00
Josh Brower 7ddda03ee9 Merge pull request #12138 from Security-Onion-Solutions/fix/fim
Fix/fim
2024-01-09 08:26:55 -05:00
Josh Brower 5513e74807 comma 2024-01-09 08:12:33 -05:00
Josh Brower 31ee365a91 Fixup FIM events 2024-01-09 08:11:05 -05:00
m0duspwnens f46ac6b9d7 Merge remote-tracking branch 'origin/2.4/dev' into salt3006.5 2024-01-08 14:02:02 -05:00
m0duspwnens 31f314504e salt 3006.5 2024-01-08 14:01:40 -05:00
Mike Reeves 0d76ddd49f Merge pull request #12120 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update so-raid-status for SM based appliances
2024-01-05 10:27:21 -05:00
Mike Reeves b0447a9af5 Update so-raid-status for SM based appliances 2024-01-05 09:28:04 -05:00
Josh Patterson ef6eafeff1 Merge pull request #12118 from Security-Onion-Solutions/startupstates
enable startup_states: highstate on managers during setup and not wit…
2024-01-04 17:37:27 -05:00
m0duspwnens ccfdafea0a enable startup_states: highstate on managers during setup and not with salt 2024-01-04 16:24:48 -05:00
Josh Patterson 93cdac592e Merge pull request #12116 from Security-Onion-Solutions/issue/12033
Issue/12033
2024-01-04 09:54:29 -05:00
m0duspwnens 2eaf0e812a declare NEW_LIST outside jinja logic 2024-01-03 16:49:28 -05:00
Jorge Reyes cab7c9d573 Merge pull request #12109 from Security-Onion-Solutions/reyesj2-patch-1
Add brasero to packages list for SOD
2024-01-03 14:45:07 -05:00
Jorge Reyes 8c792a8cfa Add brasero to packages list for SOD 2024-01-03 12:17:57 -05:00
m0duspwnens c091a0845c allow user to disable elastic agent sending to manager 2024-01-03 11:48:16 -05:00
Mike Reeves cf23723c54 Merge pull request #12102 from Security-Onion-Solutions/2.4/main
2.4/main
2024-01-02 11:18:07 -05:00
Mike Reeves 30bc02178a Merge pull request #12100 from Security-Onion-Solutions/mkrtemp
2.4.30 hotfix
2024-01-02 11:16:13 -05:00
Mike Reeves 84e8013e46 Update DOWNLOAD_AND_VERIFY_ISO.md 2024-01-02 10:31:14 -05:00
Mike Reeves 80ec4cecec Merge pull request #12099 from Security-Onion-Solutions/2.4.30hf5
2.4.30 hotfix
2024-01-02 10:29:45 -05:00
Mike Reeves 82482d309a Update DOWNLOAD_AND_VERIFY_ISO.md 2024-01-02 10:09:13 -05:00
Mike Reeves d437a2856a 2.4.30 hotfix 2024-01-02 09:48:45 -05:00
Josh Patterson f0b44ad56c Merge pull request #12095 from Security-Onion-Solutions/startupstates
Change salt-minion startup_states
2024-01-02 09:18:21 -05:00
Jason Ertel cffc3353bc Merge pull request #12090 from Security-Onion-Solutions/jertel/lasths
show last highstate date/time on grid metrics screen; expose maxUploa…
2023-12-29 14:51:09 -05:00
Jason Ertel e075d07f5c show last highstate date/time on grid metrics screen; expose maxUploadSize and staleMetricsMs settings on config screen 2023-12-29 11:38:42 -05:00
Jason Ertel fe8f57c43b Merge pull request #12071 from Security-Onion-Solutions/jertel/influxerr
exclude transient influxdb error
2023-12-22 07:22:45 -05:00
Jason Ertel 3456de3a30 exclude transient influxdb error 2023-12-22 07:16:45 -05:00
Jason Ertel 14767dd8b5 Merge pull request #12067 from Security-Onion-Solutions/jertel/fixcurator
only run the file.absent state if there are files to delete
2023-12-21 09:41:46 -05:00
Jason Ertel 8189f46a03 only run the file.absent state if there are files to delete 2023-12-21 09:36:47 -05:00
weslambert cfb5c1c9d2 Merge pull request #12063 from Security-Onion-Solutions/fix/curator_log_check
Ignore Curator logs
2023-12-20 17:47:17 -05:00
weslambert 244968ce23 Remove unnecessary blank lines 2023-12-20 17:30:15 -05:00
weslambert 65f89b22b2 Ignore Curator logs 2023-12-20 17:28:55 -05:00
weslambert 7684aadb87 Merge pull request #12062 from Security-Onion-Solutions/fix/curator_remove
Curator Remove Changes
2023-12-20 15:16:47 -05:00
Wes 188744357f Remove post since function doesn't exist 2023-12-20 19:14:14 +00:00
Wes 4baf4657f6 Curator cleanup 2023-12-20 19:10:22 +00:00
Wes 1006710226 Change Curator disable config 2023-12-20 18:26:27 +00:00
weslambert cd661027a6 Remove post for 2.4.40 2023-12-20 12:23:20 -05:00
m0duspwnens 28fdf15304 remove comment 2023-12-19 16:37:32 -05:00
Mike Reeves 90edf7e8f1 Merge pull request #12053 from Security-Onion-Solutions/2.4/main
2.4/main
2023-12-19 14:40:21 -05:00
Mike Reeves 552e4c0d1c Merge pull request #12050 from Security-Onion-Solutions/hotfix/2.4.30
Hotfix/2.4.30
2023-12-19 14:37:35 -05:00
weslambert ba2c51bee2 Merge pull request #12052 from Security-Onion-Solutions/fix/analyzer_images
Fix analyzer images
2023-12-19 14:30:19 -05:00
m0duspwnens 7b9ac7ae6d remove checkin_at_boot function 2023-12-19 14:05:19 -05:00
Wes 62708ac97d Add new image 2023-12-19 18:58:17 +00:00
Wes f8fdc6d14e Remove old image 2023-12-19 18:57:54 +00:00
Mike Reeves 72fbf386eb Merge pull request #12051 from Security-Onion-Solutions/jertel/hotfixm
Jertel/hotfixm
2023-12-19 13:48:21 -05:00
Wes 15773bae34 Fix analyzer image links 2023-12-19 18:42:59 +00:00
Jason Ertel ce8a774129 Merge branch '2.4/main' into jertel/hotfixm 2023-12-19 13:42:13 -05:00
Wes c06de33318 Test EchoTrail image 2023-12-19 18:36:55 +00:00
Wes 41dc9df7cd Add images for analyzers 2023-12-19 18:35:10 +00:00
Mike Reeves cb956fb399 Merge pull request #12049 from Security-Onion-Solutions/2.4.30hf4
2.4.30 hotfix
2023-12-19 13:10:51 -05:00
Mike Reeves 5c34cdd943 2.4.30 hotfix 2023-12-19 13:07:25 -05:00
Doug Burks 5e8613f38b Merge pull request #12048 from Security-Onion-Solutions/2.4/improve-filterlog-parser
FIX: Update dashboard and hunt query for firewall logs #12021
2023-12-19 12:57:37 -05:00
weslambert 69472e70b4 Merge pull request #12003 from HoangLongVu/2.4/dev
2.4/dev Analyzers for Threatfox, MalwareBazaar, Echotrail, Elasticsearch
2023-12-19 12:09:16 -05:00
m0duspwnens 090f3a3e02 only run if in file 2023-12-19 12:08:17 -05:00
Wes 85242651b2 Add Sublime image to assets and change link 2023-12-19 15:49:57 +00:00
Jason Ertel 80cd9920b2 Merge pull request #12047 from Security-Onion-Solutions/jertel/eslogerror
exclude log false positives
2023-12-19 10:49:42 -05:00
Jason Ertel ca21e32d83 log false positives 2023-12-19 10:47:39 -05:00
Wes 6ab12ceec4 Add Elasticsearch image to assets and change link 2023-12-19 15:46:02 +00:00
Wes bfcf7d4668 Add EchoTrail image to assets and change link 2023-12-19 15:42:23 +00:00
Wes 4a23832267 Don't require advanced options for required values 2023-12-19 15:14:33 +00:00
m0duspwnens b3be999aea dont enable startup_states during setup. use salt to add it 2023-12-19 09:00:32 -05:00
Doug Burks ab5de4c104 update soc defaults.yaml 2023-12-19 07:27:07 -05:00
Wes 614589153b Update Malwarebazaar test and comply with flake8 2023-12-19 02:57:35 +00:00
Ryan Hoang 5e715036fb Update malwarebazaar_test.py 2023-12-18 19:54:14 -05:00
Ryan Hoang 748a67314f Update malwarebazaar_test.py 2023-12-18 19:27:13 -05:00
Ryan Hoang a561f8c783 Update malwarebazaar_test.py Removed Whitespace 2023-12-18 19:18:26 -05:00
Elijah Gibson fb5ee6b9e9 Flake8 linting + isInJson tail recursion update 2023-12-18 15:58:16 -05:00
Elijah Gibson 7d6f8d922b Update malwarebazaar_test.py
Flake8 linting
2023-12-18 15:57:41 -05:00
Elijah Gibson f86adf8053 Merge branch 'Security-Onion-Solutions:2.4/dev' into 2.4/dev 2023-12-18 15:57:00 -05:00
Wes 8f6b1a07b7 Don't use soup for removing Curator files 2023-12-18 20:54:24 +00:00
Wes 6c92672566 Remove Curator configuration and scripts 2023-12-18 20:53:56 +00:00
Wes aba5893965 Add disabled state for Curator 2023-12-18 20:50:49 +00:00
Josh Patterson 866c9988a0 Merge pull request #12037 from Security-Onion-Solutions/fix/receiver
Fix receivers
https://github.com/Security-Onion-Solutions/securityonion/issues/12038
2023-12-18 13:56:33 -05:00
Josh Patterson f032ff40a2 Merge branch '2.4/dev' into fix/receiver 2023-12-18 13:55:23 -05:00
Semphorin 03421c1bcd added isInJson tests 2023-12-18 13:54:38 -05:00
Doug Burks 4d8661d2e0 FIX: Update dashboard and hunt query for firewall logs #12021 2023-12-18 13:38:04 -05:00
Doug Burks 6a1073b616 FIX: Update dashboard and hunt query for firewall logs #12021 2023-12-18 12:57:40 -05:00
Wes 6a4e05d60f Remove control characters 2023-12-15 20:53:51 +00:00
Wes 981f3642a0 Update tests 2023-12-15 20:53:19 +00:00
m0duspwnens 33a9ac5701 use logstash nodes for logstash extra_hosts 2023-12-15 15:42:49 -05:00
Wes 020472085b ThreatFox test 2023-12-15 15:16:44 +00:00
Wes 8aaeee20b9 Fix import 2023-12-15 14:40:25 +00:00
Wes e32de6893b Remove control characters 2023-12-15 14:27:27 +00:00
Wes f05eb742dd Fix patch 2023-12-15 14:26:33 +00:00
Wes cd3a661dd6 Set malwarebazaar.py to be executable 2023-12-15 14:17:33 +00:00
weslambert 55c957170d Reduce complexity 2023-12-15 09:00:31 -05:00
Jackson d41daa37f1 malwarebazaar 2023-12-15 03:00:43 -05:00
Jackson b59896bb47 ThreatFox and EchoTrail 2023-12-15 02:47:54 -05:00
Jackson c59a6516fc fix Elasticsearch lint 2023-12-15 02:34:45 -05:00
Doug Burks 88684a6c19 Merge pull request #12023 from Security-Onion-Solutions/2.4/fix-firewall-queries
FIX: Update dashboard and hunt query for firewall logs #12021
2023-12-14 14:56:42 -05:00
weslambert d0d671a828 Merge pull request #12020 from Security-Onion-Solutions/fix/integration_force
Add force option to integrations
2023-12-14 13:44:32 -05:00
Doug Burks 8779fb8cbc Update defaults.yaml 2023-12-14 13:30:52 -05:00
Doug Burks 042e5ae9f0 https://github.com/Security-Onion-Solutions/securityonion/issues/12021 2023-12-14 12:46:28 -05:00
Josh Patterson 45f50cc121 Merge pull request #12019 from Security-Onion-Solutions/fix/extrahosts
fix extra_hosts
2023-12-14 12:03:07 -05:00
Wes 22fcccef1c Add force option 2023-12-14 16:53:19 +00:00
Jackson 977081b6e7 update Readme.md 2023-12-14 10:37:04 -05:00
m0duspwnens 3dbf97944d fix extra_hosts. https://github.com/Security-Onion-Solutions/securityonion/issues/12015 2023-12-14 10:26:29 -05:00
m0duspwnens 03b2a7d2de change 9805 pipeline to send to self. fix extra_hosts for logstash 2023-12-14 10:01:03 -05:00
Jason Ertel 395da2cca0 Merge pull request #12012 from Security-Onion-Solutions/jertel/eslogerror
more log false alarms
2023-12-14 08:59:12 -05:00
Jason Ertel 997d323763 more log false alarms 2023-12-14 08:55:18 -05:00
Elijah Gibson d5edf57ccb Update elasticsearch.py 2023-12-13 23:04:44 -05:00
Elijah Gibson 94b9089b79 Update elasticsearch.json 2023-12-13 23:03:42 -05:00
Jackson 81e4fe78e7 pushing everything at once 2023-12-13 13:45:48 -05:00
weslambert 5d3f2298b6 Merge pull request #12000 from Security-Onion-Solutions/feature/additional_integrations
Additional Integrations #2
2023-12-13 13:23:34 -05:00
Doug Burks b17e4006a1 Merge pull request #12001 from Security-Onion-Solutions/2.4/update-clear-scripts
FIX: Update clear scripts #11991
2023-12-13 12:01:11 -05:00
weslambert 8cf5d9c1a6 Annotations 2023-12-13 11:55:40 -05:00
weslambert cdac2bfa16 Add Anomali, Cybersixgill, Snort, and ThreatQuotient 2023-12-13 11:03:25 -05:00
weslambert b0a69d30c9 Add Anomali, Cybersixgill, Snort, and ThreatQuotient packages 2023-12-13 10:44:03 -05:00
Jason Ertel 196d59869a Merge pull request #11998 from Security-Onion-Solutions/kilo
upgrade cla action
2023-12-13 10:18:39 -05:00
Jason Ertel c0ab8f24e9 upgrade cla action 2023-12-13 10:10:51 -05:00
Jason Ertel bd26a52227 upgrade cla action 2023-12-13 10:10:23 -05:00
Jason Ertel 03279732b7 upgrade cla action 2023-12-13 10:09:36 -05:00
Doug Burks 2c4d0a0d71 Update so-elastic-fleet-reset 2023-12-12 16:37:50 -05:00
Doug Burks d49d13289e Update so-elastic-clear 2023-12-12 16:37:06 -05:00
Doug Burks aaf60bea87 Update so-nsm-clear 2023-12-12 16:30:17 -05:00
weslambert e95932f28c Merge pull request #11990 from Security-Onion-Solutions/fix/remove_curator
Remove Curator
2023-12-12 12:31:16 -05:00
Wes bbe091fa14 Fix accidental change 2023-12-12 15:08:47 +00:00
Wes 54c3167b10 Delete data streams when necessary 2023-12-12 05:25:50 +00:00
Wes b1721b6467 Fix directory 2023-12-11 21:43:25 +00:00
Jason Ertel 214404265a Merge pull request #11981 from Security-Onion-Solutions/jertel/importlogs
fix import stats
2023-12-11 14:54:29 -05:00
Jason Ertel 25c39540c8 fix import stats 2023-12-11 14:48:46 -05:00
Wes f7373ed79c Stop Curator, remove scripts and status 2023-12-11 19:20:52 +00:00
Wes d203aec44a Remove Curator 2023-12-08 19:37:06 +00:00
Jason Ertel be8ed1e1d8 Merge pull request #11970 from Security-Onion-Solutions/jertel/hfm
grid page enhancements
2023-12-08 09:56:39 -05:00
Jason Ertel a732985351 grid page enhancements 2023-12-08 08:38:42 -05:00
Jason Ertel 98947f3906 grid page enhancements 2023-12-08 08:37:42 -05:00
weslambert b80d7fd610 Merge pull request #11967 from Security-Onion-Solutions/fix/close_remove
Remove Curator close configuration
2023-12-07 15:05:38 -05:00
Wes 849e9e14ad Change soup to remove delete actions and run post_to_2.4.40 2023-12-07 16:49:44 +00:00
Wes 0ebc8c7beb Change path 2023-12-07 15:17:51 +00:00
Wes e0801282eb Remove files 2023-12-07 14:07:26 +00:00
Wes bdf4b2c68d Remove settings 2023-12-07 14:03:45 +00:00
Wes e49fc0dd27 Remove more settings 2023-12-07 14:03:09 +00:00
Wes f52da4a933 Remove close settings and cron 2023-12-07 13:58:39 +00:00
Wes f38758a9c7 Remove close scripts 2023-12-07 13:52:25 +00:00
Wes 1ac3a2d2f1 Remove delete files and allow deletion of indices managed by ILM 2023-12-07 13:51:24 +00:00
Wes 965ced94c4 Remove close files 2023-12-07 13:48:08 +00:00
Doug Burks bc3634b13d Merge pull request #11960 from Security-Onion-Solutions/2.4/fix-config-links
FIX: Documentation links under SOC - Administration - Configuration need updating #11828
2023-12-06 16:04:11 -05:00
Doug Burks 5c50060857 add description for soc_patch.yaml 2023-12-06 15:51:00 -05:00
Doug Burks 00fa75869b add description for http_x_skin 2023-12-06 15:44:36 -05:00
Doug Burks ab0e6f9bec update broken help links in SOC Config 2023-12-06 14:35:51 -05:00
Doug Burks 213cdb479d Update soc_manager.yaml 2023-12-06 14:19:15 -05:00
Mike Reeves 8da96e93c8 Merge pull request #11957 from Security-Onion-Solutions/mergeback
Merge Main into Dev
2023-12-06 13:40:30 -05:00
Mike Reeves 0160cae7d7 Merge branch '2.4/dev' into mergeback 2023-12-06 13:38:53 -05:00
Mike Reeves d7bf52de76 Merge pull request #11918 from Security-Onion-Solutions/hotfix/2.4.30
Hotfix/2.4.30
2023-12-06 13:31:33 -05:00
weslambert fea5a3026d Merge pull request #11955 from Security-Onion-Solutions/fix/sublime_analyzer_documentation
Sublime Analyzer Documentation
2023-12-06 13:27:03 -05:00
weslambert 7f21bee0d4 Add README 2023-12-06 13:14:17 -05:00
weslambert ade3a46a9a Add LocalFile link 2023-12-06 12:58:44 -05:00
weslambert e6a2e49d37 Add Sublime Platform 2023-12-06 12:57:59 -05:00
weslambert 1438913f6a Merge pull request #11954 from Security-Onion-Solutions/fix/sublime_analyzer_indentation
Fix indentation for rule_results
2023-12-06 12:50:44 -05:00
Wes 51fa4922b9 Fix indentation for rule_results 2023-12-06 17:37:07 +00:00
Mike Reeves b878728882 Merge pull request #11951 from Security-Onion-Solutions/2.4.30hf3
2.4.30 hotfix
2023-12-06 08:36:13 -05:00
Mike Reeves 386e9214fc 2.4.30 hotfix 2023-12-06 08:34:46 -05:00
weslambert 4becf3e20f Merge pull request #11950 from Security-Onion-Solutions/fix/eml_observable
Add eml observable type
2023-12-06 08:30:27 -05:00
weslambert 0334ef9677 Add eml observable type 2023-12-05 19:10:16 -05:00
weslambert 0537e1b3f6 Merge pull request #11945 from Security-Onion-Solutions/feature/sublime_platform_analyzer
Sublime Platform Analyzer
2023-12-05 16:51:03 -05:00
Wes 6fff05b444 Remove pytest.ini 2023-12-05 20:14:17 +00:00
Wes 01a37df7fc Add extra line 2023-12-05 20:02:12 +00:00
Wes b3e78c9cc3 Update live flow option 2023-12-05 19:55:23 +00:00
Wes d871b61150 Change author 2023-12-05 18:36:25 +00:00
Wes b2536a64d8 Remove extra space 2023-12-05 18:33:00 +00:00
Wes 3d1eecfad6 Add Sublime Platform analyzer 2023-12-05 18:31:50 +00:00
Mike Reeves 8eaa07a186 Merge pull request #11942 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update soup
2023-12-05 11:26:42 -05:00
Mike Reeves 9446b750c0 Update soup 2023-12-05 11:25:25 -05:00
Mike Reeves fdd4173632 Update soup 2023-12-05 11:20:56 -05:00
Mike Reeves b7227e15eb Merge pull request #11939 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update soup
2023-12-05 10:26:56 -05:00
Mike Reeves 90d9e5b927 Update soup 2023-12-05 10:24:31 -05:00
Mike Reeves 802bf9ce27 Merge pull request #11931 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update soup
2023-12-04 14:00:40 -05:00
Mike Reeves 0b6ba6d2f2 Update soup 2023-12-04 13:51:12 -05:00
Mike Reeves 55a8b1064d Update soup 2023-12-04 13:36:04 -05:00
Josh Patterson 11a3e12e94 Merge pull request #11929 from Security-Onion-Solutions/hf_soup
avoid exiting salt when ca state applied in post for 2.4.30
2023-12-04 11:46:27 -05:00
m0duspwnens 38868af08a avoid exiting salt when ca state applied in post for 2.4.30 2023-12-04 10:11:38 -05:00
Josh Patterson ace5dff351 Merge pull request #11923 from Security-Onion-Solutions/hf_soup
move wait_for_salt_minion for hotfix
2023-12-01 15:37:35 -05:00
m0duspwnens 265cde5296 move wait_for_salt_minion for hotfix 2023-12-01 15:31:15 -05:00
weslambert 55052c4811 Merge pull request #11919 from Security-Onion-Solutions/fix/remove_curator_changes
Remove Curator Changes
2023-12-01 11:15:23 -05:00
Wes e36044e164 Remove close changes 2023-12-01 16:10:56 +00:00
Wes 6fa4a69753 Remove action changes 2023-12-01 16:10:07 +00:00
Doug Burks 4fc3c852a1 Merge pull request #11890 from chateaulav/chateaulav-import-evtx-logs-11889
Update import-evtx-logs.json
2023-11-30 13:57:59 -05:00
weslambert 32b03f514e Merge pull request #11907 from Security-Onion-Solutions/fix/curator_close
Curator close fixes
2023-11-30 11:05:49 -05:00
Wes a605c5c62c Ensure indices managed by ILM can be managed by Curator 2023-11-29 22:13:20 +00:00
Wes 2368e8b793 Fix action file names 2023-11-29 22:06:11 +00:00
weslambert 317b6cb614 Merge pull request #11902 from Security-Onion-Solutions/fix/hotfix_version
Update HOTFIX
2023-11-29 17:03:59 -05:00
weslambert a6d20bdc71 Update HOTFIX 2023-11-29 17:01:29 -05:00
Doug Burks 93fb10de86 Merge pull request #11897 from Security-Onion-Solutions/2.4/nids-rule-reference
FIX: Update NIDS rule.reference in common.nids pipeline #11846
2023-11-29 12:19:12 -05:00
weslambert 1a4d009b7f Merge pull request #11896 from Security-Onion-Solutions/feature/elastic_certificate_fingerprints
Add certificate fingerprints
2023-11-29 12:07:50 -05:00
weslambert 9d63a47792 Certificate hash 2023-11-29 12:01:43 -05:00
weslambert 7001e90667 Client and server fingerprints 2023-11-29 12:00:46 -05:00
weslambert a0573212c0 Merge pull request #11891 from Security-Onion-Solutions/fix/elastic_ignore_analyzer
Ignore analyzer log
2023-11-29 10:05:01 -05:00
weslambert 5f79644aef Ignore analyzer log 2023-11-29 10:02:13 -05:00
Doug Burks 0603e96c08 FIX: Update NIDS rule.reference in common.nids pipeline #11846 2023-11-29 09:46:11 -05:00
Jonathan Race ece3c367b5 Update import-evtx-logs.json
version updates to match 2.4 release pipelines
2023-11-29 09:20:37 -05:00
Jason Ertel 8953ffcc49 Merge pull request #11855 from Security-Onion-Solutions/jertel/hfm
Jertel/hfm
2023-11-21 16:43:28 -05:00
Jason Ertel 9ee3423b32 Merge branch '2.4/dev' into jertel/hfm 2023-11-21 16:42:50 -05:00
Jason Ertel 7d759a99fe remove hotfix 2023-11-21 16:40:54 -05:00
Mike Reeves d3802c1668 Merge pull request #11854 from Security-Onion-Solutions/hotfix/2.4.30
Hotfix/2.4.30
2023-11-21 16:39:40 -05:00
Mike Reeves 874618d512 Merge pull request #11853 from Security-Onion-Solutions/2.4.30hf2
2.4.30 hotfix
2023-11-21 14:32:53 -05:00
Mike Reeves fa9032b323 2.4.30 hotfix 2023-11-21 14:28:23 -05:00
Mike Reeves 17942676c6 Merge pull request #11844 from Security-Onion-Solutions/TOoSmOotH-patch-5
Update soup
2023-11-21 10:32:24 -05:00
Mike Reeves 458c6de39d Update soup 2023-11-21 10:30:21 -05:00
Mike Reeves a39f696a34 Merge pull request #11843 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update soup
2023-11-21 10:19:21 -05:00
Mike Reeves 9aa193af3b Update soup 2023-11-21 10:18:02 -05:00
Mike Reeves 3f1f256748 Merge pull request #11842 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update HOTFIX
2023-11-21 10:01:13 -05:00
Mike Reeves c78ea0183f Update HOTFIX 2023-11-21 09:59:51 -05:00
Mike Reeves e9417dd437 Merge pull request #11841 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update soup
2023-11-21 09:56:45 -05:00
Mike Reeves 14b5aa476e Update soup 2023-11-21 09:55:44 -05:00
Jason Ertel 861e850f9a Merge pull request #11835 from Security-Onion-Solutions/jertel/yaml
add support for nested keys
2023-11-20 16:33:17 -05:00
Jason Ertel 6356a0bf95 add support for nested keys 2023-11-20 16:18:30 -05:00
Jason Ertel f31e288005 Merge pull request #11832 from Security-Onion-Solutions/jertel/hfm
Merge hoftix back to 2.4/dev
2023-11-20 15:32:40 -05:00
Jason Ertel b2ea7138f3 remove hotfix 2023-11-20 15:28:56 -05:00
Jason Ertel f29a91ea4c Merge branch '2.4/main' into jertel/hfm 2023-11-20 15:28:27 -05:00
Mike Reeves 4b0033c60a Merge pull request #11827 from Security-Onion-Solutions/hotfix/2.4.30
Hotfix 2.4.30
2023-11-20 15:26:16 -05:00
Mike Reeves c20004c210 Merge pull request #11826 from Security-Onion-Solutions/2.4.30hf
2.4.30 hotfix
2023-11-20 11:35:11 -05:00
Mike Reeves 45dc1ce036 2.4.30 hotfix 2023-11-20 11:32:21 -05:00
Jason Ertel 0cc10fbf80 Merge pull request #11823 from Security-Onion-Solutions/jertel/igwarn
ignore libwbclient upgrade warning
2023-11-19 19:46:19 -05:00
Jason Ertel e71ee97717 ignore libwbclient upgrade warning 2023-11-19 19:03:23 -05:00
Mike Reeves 77d0a7277a Merge pull request #11818 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update soup
2023-11-17 17:07:54 -05:00
Mike Reeves 2ae87de409 Merge branch 'hotfix/2.4.30' into TOoSmOotH-patch-2 2023-11-17 17:05:11 -05:00
Josh Brower a69a65c44f Merge pull request #11819 from Security-Onion-Solutions/hftesting
Remove state file
2023-11-17 16:54:08 -05:00
Mike Reeves d89beefc8c Update soup 2023-11-17 16:53:11 -05:00
Josh Brower 9c371fc374 Remove state file 2023-11-17 16:52:34 -05:00
Mike Reeves 4fb9cce41c Update signing_policies.conf 2023-11-17 16:38:50 -05:00
Mike Reeves e226efa799 Update soup 2023-11-17 16:35:12 -05:00
Josh Brower 82a41894f3 Merge pull request #11817 from Security-Onion-Solutions/hftesting
Hftesting
2023-11-17 13:12:06 -05:00
Josh Brower 7aadc3851f Remove state file 2023-11-17 13:08:15 -05:00
Josh Brower ca1498fca1 Dont update Defend Integration 2023-11-17 12:19:22 -05:00
Josh Brower 15fc4f2655 Merge pull request #11815 from Security-Onion-Solutions/hftesting
use updated code
2023-11-17 11:23:45 -05:00
Josh Brower 089a111ae8 use updated code 2023-11-17 11:20:13 -05:00
Josh Brower 33bd04b797 Merge pull request #11811 from Security-Onion-Solutions/hftesting
Move API check logic
2023-11-17 06:02:26 -05:00
Josh Brower 5920a14478 Move API check logic 2023-11-16 20:34:01 -05:00
Jason Ertel 67f116daed Merge pull request #11809 from Security-Onion-Solutions/jertel/srtmp
improve timing of responses
2023-11-16 16:00:27 -05:00
Jason Ertel c09e8f0d71 improve timing of responses 2023-11-16 15:58:48 -05:00
Jason Ertel de99cda766 improve timing of responses 2023-11-16 15:51:17 -05:00
Josh Brower 3ede19a106 Merge pull request #11808 from Security-Onion-Solutions/2.4/defendhotfix2
Update HOTFIX
2023-11-16 15:25:24 -05:00
weslambert b6e2df45c7 Update HOTFIX 2023-11-16 14:48:00 -05:00
Josh Brower af98c8e2da Merge pull request #11805 from Security-Onion-Solutions/2.4/defendhotfix2
.30 hotfix
2023-11-16 11:42:49 -05:00
Josh Brower 6b8e48c973 Remove highstate 2023-11-16 11:41:20 -05:00
Josh Brower 109ee55d8c Add to pre for .30 soup 2023-11-16 11:37:38 -05:00
Josh Brower ff8cd194f1 Make sure kibana API is up 2023-11-16 11:21:34 -05:00
Josh Brower d5dd0d88ed .30 hotfix 2023-11-16 10:58:23 -05:00
weslambert 46c5bf40e0 Merge pull request #11804 from Security-Onion-Solutions/fix/kibana_corrupt_integration
Discard corrupt integration
2023-11-16 10:49:39 -05:00
Wes 3ed7b36865 Discard corrupt integration 2023-11-16 15:45:38 +00:00
Jason Ertel 85649da2cb Merge pull request #11792 from Security-Onion-Solutions/jertel/auto
avoid startup error
2023-11-14 15:42:26 -05:00
Jason Ertel f7fa4d05fb avoid startup error 2023-11-14 15:40:52 -05:00
Doug Burks 96b456cd76 Merge pull request #11785 from Security-Onion-Solutions/dougburks-patch-1
FIX: SOC Hunt HTTP EXE query #11784
2023-11-14 10:03:46 -05:00
Doug Burks 4666b993e5 Update defaults.yaml 2023-11-14 09:58:45 -05:00
Mike Reeves 4fa6b265a0 Merge pull request #11778 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-11-13 15:38:53 -05:00
Mike Reeves 567e19e5d7 Update VERSION 2023-11-13 15:38:23 -05:00
Mike Reeves f036623d55 Merge pull request #11777 from Security-Onion-Solutions/2.4/dev
2.4.30
2023-11-13 15:27:24 -05:00
Mike Reeves 1204ce96f3 Merge pull request #11776 from Security-Onion-Solutions/2.4.30
2.4.30
2023-11-13 13:13:29 -05:00
Mike Reeves bc178a9784 2.4.30 2023-11-13 13:11:49 -05:00
Mike Reeves c338daabce Merge pull request #11769 from Security-Onion-Solutions/TOoSmOotH-patch-7
Update soup
2023-11-13 08:51:40 -05:00
Mike Reeves fe7af49a82 Update soup 2023-11-13 08:37:46 -05:00
weslambert aeb09b16db Merge pull request #11760 from Security-Onion-Solutions/fix/elastic_packages
Add Elastic Agent package and upgrade packages when elasticfleet.packages list changes
2023-11-10 10:20:17 -05:00
weslambert 583ec5176e Add package check 2023-11-10 10:15:52 -05:00
weslambert 4bb1dabb89 Add elastic_agent 2023-11-10 10:14:59 -05:00
Josh Brower 89c3d45abe Merge pull request #11751 from Security-Onion-Solutions/2.4/fleetresetfix2
Remove unneeded datastreams
2023-11-09 15:04:02 -05:00
Josh Brower 551f7831de Add more clarity to message 2023-11-09 15:01:56 -05:00
Josh Brower 193c9d202e Remove unneeded datastreams 2023-11-09 14:30:00 -05:00
Josh Brower b5912fc1e4 Merge pull request #11750 from Security-Onion-Solutions/2.4/defendpolicy
Upgrade Defend Integration policy
2023-11-09 12:48:57 -05:00
Josh Brower 33f538b73e Upgrade Defend Integration policy 2023-11-09 11:52:06 -05:00
Josh Brower d3ea5def69 Merge pull request #11747 from Security-Onion-Solutions/2.4/resetscriptfix
remove state file
2023-11-09 09:12:52 -05:00
Josh Brower d1b6ef411b remove state file 2023-11-09 09:01:57 -05:00
Jason Ertel 8ca825b9a1 Merge pull request #11745 from Security-Onion-Solutions/jertel/yaml
re-add source pkgs from accidental commit
2023-11-09 07:19:22 -05:00
Jason Ertel 209e237d0d re-add source pkgs from accidental commit 2023-11-09 00:34:52 -05:00
Jason Ertel 325dceb01b Merge pull request #11743 from Security-Onion-Solutions/fix/elastic_template_check
Additional fixes for index template check
2023-11-09 00:15:14 -05:00
weslambert 02baa18502 Add metrics 2023-11-08 22:41:24 -05:00
Jason Ertel 268dc03131 Merge pull request #11742 from Security-Onion-Solutions/jertel/yaml
add yaml helper script; refactor python testing
2023-11-08 21:06:04 -05:00
weslambert e39edab00d Exclude osquery and display failed name 2023-11-08 20:55:08 -05:00
weslambert acb6e84248 Don't load index template if component template doesn't exist 2023-11-08 20:34:08 -05:00
Jason Ertel 9231c8d2f2 replace reset sed with new script 2023-11-08 19:17:32 -05:00
Jason Ertel bc044fa2d5 more coverage 2023-11-08 18:42:06 -05:00
Jason Ertel 84b815c2ef add yaml helper script; refactor python testing 2023-11-08 18:30:05 -05:00
Jason Ertel 1ab44a40d3 add yaml helper script; refactor python testing 2023-11-08 18:29:06 -05:00
Jason Ertel 9317e51f20 add yaml helper script; refactor python testing 2023-11-08 18:26:37 -05:00
Jason Ertel 33a8ef1568 add yaml helper script; refactor python testing 2023-11-08 18:24:23 -05:00
Josh Patterson 01e846ba22 Merge pull request #11741 from Security-Onion-Solutions/issue/11738
remove comments from BPFs
2023-11-08 15:25:02 -05:00
weslambert 9df3a8fc18 Merge pull request #11740 from Security-Onion-Solutions/fix/elastic_templates
Remove template files
2023-11-08 15:20:01 -05:00
weslambert 36098e6314 Remove template files 2023-11-08 14:32:58 -05:00
Jason Ertel 32079a7bce Merge pull request #11734 from Security-Onion-Solutions/fix/elastic_scripts
Improve error handling and add retry logic
2023-11-08 12:19:00 -05:00
Jason Ertel 3701c1d847 ignore retry logging 2023-11-08 11:50:56 -05:00
m0duspwnens f46aef1611 remove comments from BPFs 2023-11-08 11:23:19 -05:00
Jason Ertel d256be3eb3 allow template loads to partially succeed only on the initial attempt 2023-11-08 10:32:11 -05:00
Wes 653fda124f Check expected with retry 2023-11-08 13:02:17 +00:00
Wes b46e86c39b Extend index template loading to 60 attempts and a total of ~5 minutes 2023-11-08 02:29:09 +00:00
Wes de9f9549af Extend template loading to 24 attempts and a total of ~2 minutes 2023-11-07 23:55:03 +00:00
weslambert 749e22e4b9 Fix if statement 2023-11-07 17:29:38 -05:00
weslambert 69ec1987af Fix if statement 2023-11-07 17:28:37 -05:00
Wes 570624da7e Remove RETURN_CODE 2023-11-07 21:09:29 +00:00
Wes 7772657b4b Remove RETURN_CODE 2023-11-07 21:06:35 +00:00
Jason Ertel 6d97667634 Merge branch '2.4/dev' into kilo 2023-11-07 15:59:52 -05:00
Wes 1676c84f9c Use the retry function so-elasticsearch-query 2023-11-07 19:56:50 +00:00
Jason Ertel e665899e4d Merge pull request #11735 from Security-Onion-Solutions/fix/elastic_agent_template
Change pipeline to 1.13.1
2023-11-07 14:11:47 -05:00
weslambert 1dcca0bfd3 Change pipeline to 1.13.1 2023-11-07 12:17:51 -05:00
Wes 0b4a246ddb State file changes and retry logic 2023-11-07 16:44:42 +00:00
weslambert f97dc70fcb Merge pull request #11732 from Security-Onion-Solutions/fix/elastic_agent_template
Change pipeline to 1.8.0
2023-11-07 09:08:25 -05:00
weslambert cce80eb2fb Change pipeline to 1.8.0 2023-11-07 09:02:48 -05:00
Jason Ertel 2f95512199 Merge branch '2.4/dev' into kilo 2023-11-06 11:27:58 -05:00
Jason Ertel b008661b6b Merge pull request #11726 from Security-Onion-Solutions/jertel/auto
improve verbosity of setup logs
2023-11-06 11:27:33 -05:00
Jason Ertel b99c7ce76e improve verbosity of setup logs 2023-11-06 11:22:35 -05:00
Wes c30a0d5b5b Better error handling and state file management 2023-11-06 14:29:01 +00:00
Wes 74eda68d84 Exit if unable to communicate with Elasticsearch 2023-11-06 13:16:35 +00:00
Josh Brower ef1dfc3152 Merge pull request #11722 from Security-Onion-Solutions/2.4/packageupgrade
Set execute permissions
2023-11-06 08:06:13 -05:00
Josh Brower f6cd35e143 Set execute permissions 2023-11-06 08:03:31 -05:00
Jason Ertel d010af9a24 Merge pull request #11718 from Security-Onion-Solutions/jertel/auto
disregard false positives
2023-11-04 16:32:02 -04:00
Jason Ertel 7a0b21647f disregard false positives 2023-11-04 10:05:37 -04:00
Josh Patterson 610374816d Merge pull request #11714 from Security-Onion-Solutions/change/so-minion
apply es and soc states to manager if new search or hn are added
2023-11-03 16:43:16 -04:00
Josh Brower 3ff74948d8 Merge pull request #11713 from Security-Onion-Solutions/2.4/agentupdate
Upgrade Elastic Agent
2023-11-03 15:23:55 -04:00
Josh Brower 0086c24729 Upgrade Elastic Agent 2023-11-03 15:21:06 -04:00
m0duspwnens 9d2b84818f apply es and soc states to manager if new search or hn are added 2023-11-03 15:00:13 -04:00
Mike Reeves b74aa32deb Merge pull request #11712 from Security-Onion-Solutions/TOoSmOotH-patch-5
Update soc_elasticsearch.yaml
2023-11-03 11:33:00 -04:00
Mike Reeves 3d8663db66 Update soc_elasticsearch.yaml 2023-11-03 11:29:45 -04:00
Josh Brower 65978a340f Merge pull request #11710 from Security-Onion-Solutions/2.4/navlayerfix
exit 0
2023-11-03 11:07:10 -04:00
Josh Brower a8b0e41dbe exit 0 2023-11-03 11:04:52 -04:00
Jason Ertel 1bc4b44be7 Merge pull request #11709 from Security-Onion-Solutions/jertel/auto
ignore malformed open canary log lines
2023-11-03 09:17:23 -04:00
Jason Ertel 1a3d4a2051 ignore malformed open canary log lines 2023-11-03 09:14:26 -04:00
Josh Brower 9d639df882 Merge pull request #11708 from Security-Onion-Solutions/2.4/metadatafix2
Dont overwrite metadata
2023-11-03 08:47:48 -04:00
Josh Brower 8c7767b381 Dont overwrite metadata 2023-11-03 08:41:33 -04:00
weslambert 96582add5e Merge pull request #11704 from Security-Onion-Solutions/feature/integrations_checkpoint_vsphere
Checkpoint and VSphere Integrations
2023-11-02 17:17:03 -04:00
Wes 5bfef3f527 Add checkpoint and vsphere templates 2023-11-02 21:10:01 +00:00
Wes 3875970dc5 Add checkpoint and vsphere packages 2023-11-02 21:09:37 +00:00
Jason Ertel 7aa4f28524 Merge pull request #11702 from Security-Onion-Solutions/jertel/auto
ignore connectivity problems to docker containers during startup
2023-11-02 16:48:09 -04:00
Jason Ertel 96fdfb3829 ignore connectivity problems to docker containers during startup 2023-11-02 16:46:41 -04:00
weslambert ac593e4632 Merge pull request #11701 from Security-Onion-Solutions/fix/elastic_templates_common
Don't source so-elastic-fleet-common if not there
2023-11-02 16:43:27 -04:00
weslambert 51e7861757 Don't source so-elastic-fleet-common if not there 2023-11-02 16:41:34 -04:00
Jason Ertel 6332df04d1 Merge pull request #11695 from Security-Onion-Solutions/jertel/auto
Jertel/auto
2023-11-02 13:07:09 -04:00
Jason Ertel 32701b5941 more log bypass 2023-11-02 12:50:12 -04:00
Josh Brower 0dec6693dc Merge pull request #11678 from Security-Onion-Solutions/2.4/fleetreset
Add Elastic Fleet reset script
2023-11-02 11:33:58 -04:00
Jason Ertel 41a6ab5b4f Merge pull request #11691 from Security-Onion-Solutions/jertel/auto
more log bypass
2023-11-02 10:41:17 -04:00
Jason Ertel e18e0fd69a more log bypass 2023-11-02 10:39:14 -04:00
Josh Brower 2c0e287f8c Fix name 2023-11-02 10:34:24 -04:00
Josh Patterson 9a76cfe3d3 Merge pull request #11690 from Security-Onion-Solutions/upgrade/salt3006.3v2
fix UPGRADECOMMAND used for distrib salt upgrade. remove unneeded vars
2023-11-02 10:28:29 -04:00
m0duspwnens 6c4dc7cc09 fix UPGRADECOMMAND used for distrib salt upgrade. remove unneeded vars 2023-11-02 10:23:03 -04:00
Josh Brower 5388b92865 Refactor & cleanup 2023-11-02 10:20:32 -04:00
Jason Ertel f932444101 Merge pull request #11689 from Security-Onion-Solutions/jertel/auto
more log bypass
2023-11-02 10:02:13 -04:00
Jason Ertel 1d2518310d more log bypass 2023-11-02 09:59:45 -04:00
weslambert e10f043b1c Merge pull request #11688 from Security-Onion-Solutions/fix/integrations_roles
Add eval and import roles
2023-11-02 09:58:40 -04:00
weslambert 65735fc4d3 Add eval and import roles 2023-11-02 09:54:01 -04:00
Jason Ertel b7f516fca4 Merge pull request #11687 from Security-Onion-Solutions/jertel/auto
adjust log filter to include all hosts
2023-11-02 09:24:08 -04:00
Jason Ertel c8d8997119 adjust log filter to include all hosts 2023-11-02 09:21:57 -04:00
Josh Brower c230cf4eb7 Formatting 2023-11-01 17:00:32 -04:00
Josh Brower 344dd7d61f Add Elastic Fleet reset script 2023-11-01 16:50:20 -04:00
Mike Reeves cd8949d26b Merge pull request #11677 from Security-Onion-Solutions/lowram
Allow 16GB of memory
2023-11-01 16:38:40 -04:00
weslambert f9e2940181 Merge pull request #11676 from Security-Onion-Solutions/feature/sublime_platform_integration
Sublime Platform Integration
2023-11-01 16:13:57 -04:00
Wes f33079f1e3 Make settings global 2023-11-01 20:09:56 +00:00
Mike Reeves e6a0838e4c Add memory restrictions 2023-11-01 15:26:24 -04:00
Mike Reeves cc93976db9 Add memory restrictions 2023-11-01 15:17:23 -04:00
Mike Reeves b3b67acf07 Add memory restrictions 2023-11-01 15:11:54 -04:00
Josh Patterson 64926941dc Merge pull request #11674 from Security-Onion-Solutions/foxtrot
Foxtrot
2023-11-01 15:03:30 -04:00
Wes c32935e2e6 Remove optional integration from configuration if not enabled 2023-11-01 17:02:43 +00:00
Mike Reeves 4f98beaf9e Merge pull request #11671 from Security-Onion-Solutions/TOoSmOotH-patch-4
Remove legacy pillar info
2023-11-01 13:00:34 -04:00
Wes 655c88cd09 Make sure enabled_nodes is populated 2023-11-01 16:47:51 +00:00
Mike Reeves f62e02a477 Delete pillar/thresholding/pillar.example 2023-11-01 10:42:29 -04:00
Mike Reeves 2b3e405b2d Delete pillar/thresholding/pillar.usage 2023-11-01 10:41:40 -04:00
Josh Patterson 59328d3909 Merge pull request #11670 from Security-Onion-Solutions/fix/soupagrepo
Fix/soupagrepo
2023-11-01 10:36:17 -04:00
m0duspwnens 4d7b1095b7 Merge remote-tracking branch 'origin/2.4/dev' into fix/soupagrepo 2023-11-01 10:31:59 -04:00
m0duspwnens 338146fedd fix repo update during soup for airgap 2023-11-01 10:19:56 -04:00
Wes bca1194a46 Sublime SOC Action 2023-11-01 14:01:55 +00:00
Wes a0926b7b87 Load optional integrations 2023-11-01 13:59:24 +00:00
Wes 44e45843bf Change optional integration Fleet configuration 2023-11-01 13:52:38 +00:00
Wes 9701d0ac20 Optional integration Fleet configuration 2023-11-01 13:47:20 +00:00
Wes 23ee9c2bb0 Sublime Platform integration 2023-11-01 13:41:40 +00:00
Wes 51247be6b9 Sublime Platform integration defaults 2023-11-01 13:37:52 +00:00
Wes 4dc64400c5 Support document_id 2023-11-01 13:36:32 +00:00
Wes ae45d40eca Add Sublime Platform ingest pipeline 2023-11-01 13:34:30 +00:00
Mike Reeves ebf982bf86 Merge pull request #11666 from Security-Onion-Solutions/TOoSmOotH-patch-3
Remove unused scripts and functions
2023-10-31 15:18:23 -04:00
Mike Reeves d07cfdd3fe Update so-functions 2023-10-31 13:10:55 -04:00
Mike Reeves 497294c363 Delete salt/common/tools/sbin/so-zeek-logs 2023-10-31 12:57:10 -04:00
Mike Reeves cc3a69683c Delete salt/manager/tools/sbin/so-allow-view 2023-10-31 12:55:47 -04:00
Mike Reeves 0c98bd96c7 Delete salt/idstools/tools/sbin/so-rule
UI does this now
2023-10-31 12:52:00 -04:00
Jason Ertel a6d456e108 Merge pull request #11665 from Security-Onion-Solutions/jertel/auto
ignore specific Suricata errors
2023-10-31 11:20:28 -04:00
Jason Ertel c420e198fb ignore specific Suricata errors 2023-10-31 11:18:39 -04:00
weslambert 5a85003952 Merge pull request #11664 from Security-Onion-Solutions/fix/elastic_import
Add import roles
2023-10-31 10:47:13 -04:00
weslambert c354924b68 Add import roles 2023-10-31 10:05:29 -04:00
Jason Ertel db0d687b87 Merge pull request #11661 from Security-Onion-Solutions/fix/elastic_eval_roles
Add roles for eval mode
2023-10-30 22:01:22 -04:00
weslambert ed6473a34b Add roles for eval mode 2023-10-30 20:41:49 -04:00
Josh Patterson 1b99d5081a Merge pull request #11659 from Security-Onion-Solutions/issue/11457
ensure networkminer is latest version
2023-10-30 16:20:36 -04:00
m0duspwnens 07e51121ba ensure networkminer is latest version 2023-10-30 16:11:36 -04:00
weslambert 9a1e95cd09 Merge pull request #11648 from Security-Onion-Solutions/fix/ilm_remove_policy
Remove ILM policies for Cases and OSQuery manager indices
2023-10-27 17:28:59 -04:00
weslambert 76dd6f07ab Remove policy for OSQuery manager indices 2023-10-27 17:26:33 -04:00
weslambert c955f9210a Remove policy for Cases indices 2023-10-27 17:24:27 -04:00
Josh Patterson d35483aa02 Merge pull request #11647 from Security-Onion-Solutions/upgrade/salt3006.3v2
Upgrade/salt3006.3v2
2023-10-27 14:37:16 -04:00
Jorge Reyes a9284b35a2 Merge pull request #11644 from Security-Onion-Solutions/bravo
UPGRADE: influxdb 2.7.1 & telegraf 1.28.2
2023-10-27 12:16:48 -04:00
Jason Ertel 58cab35a4c Merge pull request #11643 from Security-Onion-Solutions/kilo
oidc
2023-10-27 11:21:20 -04:00
Jason Ertel 6d7243038c switch back to kilo version 2023-10-27 11:20:49 -04:00
Jason Ertel 3a83c52660 minor updates 2023-10-27 11:20:05 -04:00
Jason Ertel d42b5ef901 remove unused url props to avoid kratos complaining about invalid urls when they're blank 2023-10-27 11:18:56 -04:00
m0duspwnens 2b511cef77 Merge branch 'upgrade/salt3006.3' into upgrade/salt3006.3v2 2023-10-27 10:58:09 -04:00
Josh Patterson 4bbcc5002a Revert "Revert "Upgrade/salt3006.3""
This reverts commit c41e19ad0b.
2023-10-27 10:56:45 -04:00
Mike Reeves f1dbea6e2d Merge pull request #11623 from Security-Onion-Solutions/warmui
Warm Node UI Changes
2023-10-27 10:36:23 -04:00
Mike Reeves 25f1a0251f Annotation changes for warm node 2023-10-27 09:08:07 -04:00
Mike Reeves 87494f64c7 Annotation changes for warm node 2023-10-27 09:06:12 -04:00
Mike Reeves ce1858fe05 Annotation changes for warm node 2023-10-27 09:02:39 -04:00
Mike Reeves 9fc3a73035 Annotation changes for warm node 2023-10-27 08:58:08 -04:00
Josh Brower 0d52efafa8 Merge pull request #11637 from Security-Onion-Solutions/2.4/kibanauser
2.4/kibanauser
2023-10-27 08:43:12 -04:00
defensivedepth 3b63ef149a Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/kibanauser 2023-10-27 07:50:58 -04:00
defensivedepth cc3ee43192 Make dirs as needed 2023-10-27 07:49:34 -04:00
Mike Reeves b37e38e3c3 Update defaults.yaml 2023-10-26 16:03:58 -04:00
Jorge Reyes 25982b79ab Merge pull request #11633 from Security-Onion-Solutions/reyesj2/influxdb_config
UPGRADE: Influxdb 2.7.1 & telegraf 1.28.2
2023-10-26 14:37:09 -04:00
Jason Ertel cb9d72ebd7 switch back to kilo version 2023-10-26 14:19:59 -04:00
m0duspwnens 7e8f3b753f add minion name to log, update comment 2023-10-26 13:19:04 -04:00
reyesj2 47373adad2 Specify config.yaml in config_path. Otherwise when no influxd.bolt exists influxdb will fail to read the config file and won't create a new db.
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2023-10-26 13:15:40 -04:00
m0duspwnens 6891a95254 remove wait_for_salt_minion from so-functions 2023-10-26 13:02:39 -04:00
Mike Reeves 2e0100fd35 Update defaults.yaml 2023-10-26 12:37:55 -04:00
Jason Ertel a969c319f5 Merge pull request #11631 from Security-Onion-Solutions/kilo
oidc
2023-10-26 12:30:06 -04:00
Jason Ertel 4942f83d4f adjust version to match target branch 2023-10-26 11:45:39 -04:00
Josh Brower 6f4566c23e Merge pull request #11609 from Security-Onion-Solutions/2.4/kibanauser
Add kibana curl config
2023-10-26 10:42:32 -04:00
Wes 891ea997e7 Add lifecycle policies and warm settings 2023-10-26 12:25:37 +00:00
Mike Reeves 01810a782c Annotation changes for warm node 2023-10-25 16:46:30 -04:00
Mike Reeves 6d6292714f Annotation changes for warm node 2023-10-25 16:21:47 -04:00
Mike Reeves 88fb7d06e6 Annotation changes for warm node 2023-10-25 16:20:28 -04:00
Josh Patterson 39abe19cfd Update config.map.jinja 2023-10-25 16:17:06 -04:00
Josh Patterson 807b40019f Update soc_elasticsearch.yaml 2023-10-25 16:16:48 -04:00
Josh Patterson 5f168a33ed Update defaults.yaml 2023-10-25 16:16:01 -04:00
Mike Reeves d1170cb69f Update soc_elasticsearch.yaml 2023-10-25 16:05:20 -04:00
m0duspwnens 19fdc9319b fix role update 2023-10-25 15:58:26 -04:00
Mike Reeves dc53b49f15 Update soup 2023-10-25 15:53:39 -04:00
Josh Patterson af4b34801f Update defaults.yaml 2023-10-25 15:48:27 -04:00
Josh Patterson 1ae8896a05 Update config.map.jinja 2023-10-25 15:47:40 -04:00
Mike Reeves 6fb0c5dbfe Annotation changes for warm node 2023-10-25 15:37:36 -04:00
Mike Reeves 58bf6d3eff Merge branch '2.4/dev' of github.com:Security-Onion-Solutions/securityonion into warmui 2023-10-25 15:37:14 -04:00
Mike Reeves a887551dad Annotation changes for warm node 2023-10-25 15:22:47 -04:00
Jason Ertel b20177b0ef Merge branch '2.4/dev' into kilo 2023-10-25 15:19:57 -04:00
defensivedepth 1e710a22ce Merge remote-tracking branch 'remotes/origin/2.4/dev' into 2.4/kibanauser 2023-10-25 11:33:38 -04:00
Josh Patterson d562445686 Merge pull request #11619 from Security-Onion-Solutions/revert-11612-upgrade/salt3006.3
Revert "Upgrade/salt3006.3"
2023-10-25 11:28:14 -04:00
Josh Patterson c41e19ad0b Revert "Upgrade/salt3006.3" 2023-10-25 11:01:13 -04:00
m0duspwnens a3e6b1ee1d change generate_ssl wait_for_salt_minion 2023-10-25 09:26:36 -04:00
Jason Ertel a28cc274ba Merge branch '2.4/dev' into kilo 2023-10-25 09:04:36 -04:00
Jason Ertel a66006c8a6 minor updates 2023-10-25 09:04:23 -04:00
defensivedepth 3ad480453a Rename to remove dupe 2023-10-25 07:20:07 -04:00
Josh Patterson 205748e992 Merge pull request #11613 from Security-Onion-Solutions/issue/11610
fix issue/11610
2023-10-24 18:16:44 -04:00
m0duspwnens dfe707ab64 fix issue/11610 2023-10-24 17:26:39 -04:00
Josh Patterson 308e5ea505 Merge pull request #11612 from Security-Onion-Solutions/upgrade/salt3006.3
Upgrade/salt3006.3
2023-10-24 16:45:12 -04:00
m0duspwnens 3e343bff84 fix line to log properly 2023-10-24 16:40:51 -04:00
m0duspwnens 1d6e32fbab dont exit if salt isnt running 2023-10-24 15:08:50 -04:00
defensivedepth 310a6b4f27 Add kibana curl config 2023-10-24 14:21:01 -04:00
m0duspwnens 180ba3a958 if deb fam, stop salt-master and salt-minion after salt upgrade 2023-10-24 13:24:52 -04:00
m0duspwnens 6d3465626e if deb fam, stop salt-master and salt-minion after salt upgrade 2023-10-24 12:52:25 -04:00
m0duspwnens fab91edd2d Merge remote-tracking branch 'origin/2.4/dev' into upgrade/salt3006.3 2023-10-24 09:41:23 -04:00
m0duspwnens 752390be2e merge with dev, fix confict 2023-10-24 09:40:09 -04:00
Mike Reeves 02639d3bc5 Merge pull request #11606 from Security-Onion-Solutions/TOoSmOotH-patch-2
Enable http2 for Suricata
2023-10-24 09:23:07 -04:00
Mike Reeves 4a3fc06a4d Enable http2 for Suricata 2023-10-24 09:18:10 -04:00
weslambert 0c2b3f3c62 Merge pull request #11600 from Security-Onion-Solutions/fix/suricata_pkt_src
Parse pkt_src for Suricata logs
2023-10-23 15:51:30 -04:00
weslambert 660020cc76 Parse pkt_src for Suricata logs 2023-10-23 15:45:41 -04:00
Jorge Reyes b59a95b72f Merge pull request #11594 from Security-Onion-Solutions/fix/playbookrule
FIX: Add -watch to soctopus saltstate for file SOCtopus.conf. Makes contai…
2023-10-23 11:51:53 -04:00
reyesj2 030a667d26 Add -watch to soctopus saltstate for file SOCtopus.conf. Makes container restart @ highstate if file is updated.
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2023-10-23 11:47:14 -04:00
Josh Patterson a40760e601 Merge pull request #11592 from Security-Onion-Solutions/minechanges
Minechanges
2023-10-23 10:37:05 -04:00
m0duspwnens dc3ca99c12 ask the minion if it can see itself in the mine 2023-10-20 17:16:33 -04:00
m0duspwnens 7e3aa11a73 check mine is populated with ip before telling node to highstate 2023-10-20 16:27:20 -04:00
m0duspwnens c409339446 change post setup highstate cron to 5 minutes since accepting minion runs a highstate 2023-10-20 13:46:24 -04:00
m0duspwnens c588bf4395 update mine and highstate minion when added 2023-10-20 13:43:12 -04:00
m0duspwnens 6d77b1e4c3 continue loop if minion not in mine 2023-10-20 13:41:53 -04:00
m0duspwnens 99662c999f log operation and minion target 2023-10-20 13:41:24 -04:00
m0duspwnens ef2b89f5bf fix attempts logic 2023-10-20 13:40:40 -04:00
Josh Patterson 2878f82754 Merge pull request #11582 from Security-Onion-Solutions/minechanges
handle a minion not being in the mine data return
2023-10-20 10:07:44 -04:00
m0duspwnens 2e16250c93 handle a minion not being in the mine data return 2023-10-20 10:00:39 -04:00
m0duspwnens f03bbdbc09 Merge remote-tracking branch 'origin/2.4/dev' into upgrade/salt3006.3 2023-10-19 17:01:12 -04:00
m0duspwnens dbfccdfff8 fix logging when using wait_for_minion 2023-10-19 16:53:03 -04:00
m0duspwnens dfcbbfd157 update call to wait_for_salt_minion with new options in so-functions 2023-10-19 15:58:50 -04:00
m0duspwnens 37e803917e have soup wait_for_salt_minion() before running any highstate 2023-10-19 15:58:10 -04:00
m0duspwnens 66ee074795 add wait_for_salt_minion to so-common 2023-10-19 15:57:24 -04:00
m0duspwnens 90bde94371 handle debian family salt upgrade for soup 2023-10-19 13:46:48 -04:00
m0duspwnens 84f8e1cc92 debian family upgrade salt without -r flag 2023-10-19 13:46:07 -04:00
m0duspwnens e3830fa286 all more os to set_os in so-common 2023-10-19 13:43:03 -04:00
m0duspwnens 13a5c8baa7 remove extra || 2023-10-19 11:19:51 -04:00
m0duspwnens c5610edd83 handle salt for r9 and c9 2023-10-19 11:12:20 -04:00
weslambert 5119e6c45a Merge pull request #11570 from Security-Onion-Solutions/feature/additional_integrations
Additional integrations
2023-10-19 09:30:40 -04:00
m0duspwnens 02e22c87e8 Merge remote-tracking branch 'origin/2.4/dev' into upgrade/salt3006.3 2023-10-19 09:15:31 -04:00
Mike Reeves 0772926992 Merge pull request #11573 from Security-Onion-Solutions/minechanges 2023-10-18 19:45:23 -04:00
m0duspwnens b2bb92d413 remove extra space 2023-10-18 19:38:19 -04:00
Mike Reeves 19bebe44aa Merge pull request #11572 from Security-Onion-Solutions/minechanges 2023-10-18 19:37:34 -04:00
m0duspwnens f30a652e19 add back redirects 2023-10-18 19:31:45 -04:00
m0duspwnens ff18b1f074 remove redirect 2023-10-18 18:45:14 -04:00
m0duspwnens 9eb682bc40 generate_ca after salt-master and salt-minion states run 2023-10-18 18:37:35 -04:00
Wes c135f886a9 Remove Carbon Black Cloud integration 2023-10-18 20:41:34 +00:00
Wes 28b7a24cc1 Add templates for integrations 2023-10-18 20:36:04 +00:00
m0duspwnens a52ee063e5 use generate_ca and generate_ssl functions and move them up 2023-10-18 16:35:33 -04:00
Wes 767a54c91b Add pkgs 2023-10-18 20:07:26 +00:00
m0duspwnens ac28e1b967 verify crt and key differently in checkmine 2023-10-18 15:53:12 -04:00
Jorge Reyes 5e10a0d9e2 Merge pull request #11568 from Security-Onion-Solutions/2.4/zeek6
Add back plugin-tds/ plugin-profinet. Using patched versions for Zeek 6
2023-10-18 15:39:30 -04:00
reyesj2 dd28dc6ddd Add back plugin-tds/ plugin-profinet. Using patched versions for Zeek 6
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2023-10-18 15:30:32 -04:00
m0duspwnens e58c1e189c use x509 instead of file for onchanges 2023-10-18 15:10:17 -04:00
m0duspwnens 1c1b23c328 fix mine update for ca 2023-10-18 15:07:18 -04:00
m0duspwnens 2206cdb0fa change soup comment 2023-10-18 15:04:39 -04:00
m0duspwnens 1999db0bb3 apply ca state early in setup 2023-10-18 15:02:22 -04:00
m0duspwnens c3cde61202 docker service watches and requires the intca 2023-10-18 15:01:26 -04:00
m0duspwnens 8e68f96316 check that the manager has a ca in the mine and that it is valid 2023-10-18 13:59:15 -04:00
m0duspwnens 138aa9c554 update the mine with the ca when it is created or changed 2023-10-18 13:54:14 -04:00
weslambert f0e380870d Merge pull request #11567 from Security-Onion-Solutions/fix/mhr_docs
Add note regarding DNS resolver
2023-10-18 13:46:25 -04:00
weslambert 34717fb65e Add note regarding DNS resolver 2023-10-18 13:44:09 -04:00
Josh Patterson d81dfb99d0 Merge pull request #11563 from Security-Onion-Solutions/minechanges
Minechanges
2023-10-17 17:36:46 -04:00
m0duspwnens fb9a0ab8b6 endif not fi in jinja 2023-10-17 17:33:53 -04:00
m0duspwnens 928fb23e96 only add node to pillar if returned ip from mine 2023-10-17 17:28:28 -04:00
m0duspwnens d9862aefcf handle mine.p not being present. only check if mine_ip exists, dont compare to alived ip 2023-10-17 17:09:52 -04:00
m0duspwnens 496b97d706 handle the mine file not being present before checking the size 2023-10-17 15:42:42 -04:00
weslambert 830b5b9a21 Merge pull request #11560 from Security-Onion-Solutions/foxtrot
Elastic 8.10.4
2023-10-17 13:47:21 -04:00
weslambert 06e731c762 Update VERSION 2023-10-17 13:33:12 -04:00
weslambert be2a829524 Elastic 8.10.4 2023-10-17 10:49:03 -04:00
weslambert 8cab242ad0 Elastic 8.10.4 2023-10-17 10:48:31 -04:00
weslambert 99054a2687 Elastic 8.10.4 2023-10-17 10:47:26 -04:00
weslambert adcb7840bd Elastic 8.10.3 2023-10-17 10:38:20 -04:00
weslambert 8db6fef92d Elastic 8.10.3 2023-10-17 10:35:36 -04:00
weslambert 24329e3731 Update config_saved_objects.ndjson 2023-10-17 10:34:38 -04:00
weslambert 1db88bdbb5 Update so-common 2023-10-17 10:33:39 -04:00
weslambert 7c2cdb78e9 Update VERSION 2023-10-17 10:31:53 -04:00
Josh Patterson e858a1211e Merge pull request #11558 from Security-Onion-Solutions/excludelogfp
mark suricata 7 log line as fp fo so-log-check
2023-10-17 10:02:21 -04:00
m0duspwnens 01cb0fccb6 mark suricata 7 log line as fp fo so-log-check 2023-10-17 10:01:11 -04:00
Josh Patterson 86394dab01 Merge pull request #11555 from Security-Onion-Solutions/minechanges
Minechanges
2023-10-16 17:32:16 -04:00
m0duspwnens 53fcafea50 redo how we check if salt-master is ready and accessible 2023-10-16 16:31:43 -04:00
Jorge Reyes 574a81da7f Merge pull request #11554 from Security-Onion-Solutions/2.4/zeek6
Zeek 6 upgrade
2023-10-16 15:52:48 -04:00
reyesj2 ed693a7ae6 Remove commented lines in defaults.yaml to avoid UI issues.
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2023-10-16 15:48:51 -04:00
reyesj2 e5c936e8cf Replace external zeek-community-id with builtin community-id. Disable plugin-tds + plugin-profinet. Not updated for Zeek 6.x
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2023-10-16 15:18:26 -04:00
m0duspwnens 9f3a9dfab0 reorder salt.master state 2023-10-16 15:00:53 -04:00
m0duspwnens c0030bc513 dont need to restart minion service when just adding sleep delay on service start 2023-10-16 15:00:07 -04:00
m0duspwnens a637b0e61b apply salt.master and minion state early in setup to prevent the services from restarting later in setup 2023-10-16 14:58:58 -04:00
Jason Ertel 2f0e673ec3 Merge pull request #11552 from Security-Onion-Solutions/jertel/auto
only add heavynodes to remoteHostUrls
2023-10-16 13:10:10 -04:00
Jason Ertel 84c39b5de7 only add heavynodes to remoteHostUrls 2023-10-16 13:01:13 -04:00
m0duspwnens 07902d17cc display container dl status during soup 2023-10-16 11:20:19 -04:00
m0duspwnens 1a7761c531 display container dl status during soup 2023-10-16 11:00:31 -04:00
m0duspwnens 2773da5a12 run the checkmine engine under master instead of minion 2023-10-16 10:34:45 -04:00
m0duspwnens e23b3a62f3 default interval of 60s 2023-10-13 16:24:11 -04:00
m0duspwnens 57684efddf checkmine looks for 1 byte file and verify mine ip is correct 2023-10-13 16:23:16 -04:00
m0duspwnens 1641aa111b add checkmine back 2023-10-13 13:46:31 -04:00
Jason Ertel ca2530e07f Merge pull request #11535 from Security-Onion-Solutions/jertel/auto
avoid rebooting when testing deb installs
2023-10-12 16:30:24 -04:00
Mike Reeves 104b53c6ec Merge pull request #11534 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update HOTFIX
2023-10-12 16:20:37 -04:00
Mike Reeves 6c5f8e4e2d Update HOTFIX 2023-10-12 16:19:59 -04:00
Mike Reeves b8d586addd Merge pull request #11533 from Security-Onion-Solutions/2.4/main
2.4/main
2023-10-12 16:19:29 -04:00
m0duspwnens d2002a5158 add additional comments 2023-10-12 15:58:33 -04:00
m0duspwnens 5250292e95 only allow stable install type. require -r to be used 2023-10-12 15:54:22 -04:00
Jason Ertel 49a651fd72 adjust var name 2023-10-12 15:43:22 -04:00
m0duspwnens 2d688331df handle version install for stable and onedir install type 2023-10-12 15:32:04 -04:00
m0duspwnens b12c4a96e9 remove files 2023-10-12 15:11:25 -04:00
m0duspwnens 6dd06c0fe9 change install_centos_onedir to install version provided from command line 2023-10-12 15:07:47 -04:00
Jason Ertel 17ae9b3349 avoid reboot during testing 2023-10-12 13:54:07 -04:00
m0duspwnens 8dc163f074 use script from develop branch 2023-10-12 13:09:07 -04:00
m0duspwnens ab4c5acd0c update bootstrap-salt.sh with stable branch 2023-10-12 09:28:07 -04:00
m0duspwnens d357864d69 fix upgrade_salt function for oel 2023-10-11 15:32:11 -04:00
Jason Ertel 44b855dd93 merge 2.4/dev 2023-10-11 13:35:16 -04:00
m0duspwnens 2094b4f688 upgrade to salt 3006.3 2023-10-11 09:04:36 -04:00
Josh Patterson 5252482fe3 Merge pull request #11503 from Security-Onion-Solutions/minechanges
Minechanges
2023-10-10 16:33:17 -04:00
m0duspwnens abeebc7bc4 Merge remote-tracking branch 'origin/2.4/dev' into minechanges 2023-10-10 13:13:55 -04:00
m0duspwnens 4193130ed0 reduce salt mine interval to 25 minutes 2023-10-10 13:07:12 -04:00
m0duspwnens 89467adf9c batch the salt mine update 2023-10-10 13:05:43 -04:00
m0duspwnens a283e7ea0b remove checkmine salt engine 2023-10-10 13:00:54 -04:00
Mike Reeves a54479d603 Merge pull request #11497 from Security-Onion-Solutions/TOoSmOotH-patch-9
Update VERSION
2023-10-10 11:07:51 -04:00
Mike Reeves 49ebbf3232 Update VERSION 2023-10-10 11:05:39 -04:00
m0duspwnens 05da5c039c Merge remote-tracking branch 'origin/2.4/dev' into minechanges 2023-10-10 11:02:19 -04:00
Josh Patterson f3d0248ec5 Merge pull request #11496 from Security-Onion-Solutions/fix/ping
accept icmp on input chain
2023-10-10 10:59:05 -04:00
m0duspwnens 4dc24b22c7 accept icmp on input chain 2023-10-10 10:51:59 -04:00
m0duspwnens 39ea1d317d add comment 2023-09-29 17:12:14 -04:00
m0duspwnens 827ed7b273 run salt.mine_function state locally and provide pillar info to it 2023-09-29 17:08:42 -04:00
m0duspwnens 8690304dff change how mine_functions.conf is managed during setup 2023-09-29 16:17:19 -04:00
m0duspwnens 1e327c143c Merge remote-tracking branch 'origin/2.4/dev' into minechanges 2023-09-29 15:11:06 -04:00
m0duspwnens ad01be66ea remove checkmine engine. add x509.get_pem_entries to managers mine_functions. simplify mine update during soup 2023-09-29 14:09:04 -04:00
Jason Ertel 5c7c3fb996 avoid rare false positive when dasbhoard load completes during setup 2023-07-31 16:09:36 -04:00
Jason Ertel f4907a5b5c Merge branch '2.4/dev' into kilo 2023-07-28 14:15:14 -04:00
Jason Ertel a5c4783564 oidc 2023-07-27 18:36:50 -04:00
Jason Ertel d3e83d154b Merge branch '2.4/t dev' into kilo 2023-07-27 10:20:22 -04:00
Jason Ertel aa36e9a785 oidc 2023-07-27 08:40:27 -04:00
Jason Ertel b712d505f2 update version to use kilo images 2023-07-26 09:21:23 -04:00
Jason Ertel 6d56deb2e4 oidc 1 2023-07-25 08:12:45 -04:00
Jason Ertel 101e2e8ba1 do not redirect to API URLs when not logged in 2023-07-24 17:05:52 -04:00
Jason Ertel 83bff72cd4 Merge branch '2.4/dev' into kilo 2023-07-18 10:49:12 -04:00
Jason Ertel b24afac0f4 upgrade registry version 2023-07-18 10:48:42 -04:00
Jason Ertel b129b4ceaa prepare for alt login 2023-07-14 17:03:20 -04:00
324 changed files with 535988 additions and 376267 deletions
+1 -1
View File
@@ -11,7 +11,7 @@ jobs:
steps:
- name: "Contributor Check"
if: (github.event.comment.body == 'recheck' || github.event.comment.body == 'I have read the CLA Document and I hereby sign the CLA') || github.event_name == 'pull_request_target'
uses: cla-assistant/github-action@v2.1.3-beta
uses: cla-assistant/github-action@v2.3.1
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
PERSONAL_ACCESS_TOKEN : ${{ secrets.PERSONAL_ACCESS_TOKEN }}
+4 -2
View File
@@ -4,9 +4,11 @@ on:
push:
paths:
- "salt/sensoroni/files/analyzers/**"
- "salt/manager/tools/sbin"
pull_request:
paths:
- "salt/sensoroni/files/analyzers/**"
- "salt/manager/tools/sbin"
jobs:
build:
@@ -16,7 +18,7 @@ jobs:
fail-fast: false
matrix:
python-version: ["3.10"]
python-code-path: ["salt/sensoroni/files/analyzers"]
python-code-path: ["salt/sensoroni/files/analyzers", "salt/manager/tools/sbin"]
steps:
- uses: actions/checkout@v3
@@ -34,4 +36,4 @@ jobs:
flake8 ${{ matrix.python-code-path }} --show-source --max-complexity=12 --doctests --max-line-length=200 --statistics
- name: Test with pytest
run: |
pytest ${{ matrix.python-code-path }} --cov=${{ matrix.python-code-path }} --doctest-modules --cov-report=term --cov-fail-under=100 --cov-config=${{ matrix.python-code-path }}/pytest.ini
pytest ${{ matrix.python-code-path }} --cov=${{ matrix.python-code-path }} --doctest-modules --cov-report=term --cov-fail-under=100 --cov-config=pytest.ini
+11 -12
View File
@@ -1,18 +1,17 @@
### 2.4.20-20231012 ISO image released on 2023/10/12
### 2.4.30-20231228 ISO image released on 2024/01/02
### Download and Verify
2.4.20-20231012 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.20-20231012.iso
2.4.30-20231228 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231228.iso
MD5: 7D6ACA843068BA9432B3FF63BFD1EF0F
SHA1: BEF2B906066A1B04921DF0B80E7FDD4BC8ECED5C
SHA256: 5D511D50F11666C69AE12435A47B9A2D30CB3CC88F8D38DC58A5BC0ECADF1BF5
MD5: DBD47645CD6FA8358C51D8753046FB54
SHA1: 2494091065434ACB028F71444A5D16E8F8A11EDF
SHA256: 3345AE1DC58AC7F29D82E60D9A36CDF8DE19B7DFF999D8C4F89C7BD36AEE7F1D
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.20-20231012.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231228.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
@@ -26,22 +25,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.20-20231012.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231228.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.20-20231012.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231228.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.4.20-20231012.iso.sig securityonion-2.4.20-20231012.iso
gpg --verify securityonion-2.4.30-20231228.iso.sig securityonion-2.4.30-20231228.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Thu 12 Oct 2023 01:28:32 PM EDT using RSA key ID FE507013
gpg: Signature made Thu 28 Dec 2023 10:08:31 AM EST using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
-1
View File
@@ -1 +0,0 @@
20231012
+1 -1
View File
@@ -1 +1 @@
2.4.20
2.4.40
Binary file not shown.

After

Width:  |  Height:  |  Size: 21 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 12 KiB

@@ -12,7 +12,6 @@ role:
eval:
fleet:
heavynode:
helixsensor:
idh:
import:
manager:
+4
View File
@@ -7,6 +7,8 @@
tgt_type='compound') | dictsort()
%}
# only add a node to the pillar if it returned an ip from the mine
{% if ip | length > 0%}
{% set hostname = cached_grains[minionid]['host'] %}
{% set node_type = minionid.split('_')[1] %}
{% if node_type not in node_types.keys() %}
@@ -18,8 +20,10 @@
{% do node_types[node_type][hostname].update(ip[0]) %}
{% endif %}
{% endif %}
{% endif %}
{% endfor %}
logstash:
nodes:
{% for node_type, values in node_types.items() %}
+4
View File
@@ -4,6 +4,9 @@
{% set hostname = minionid.split('_')[0] %}
{% set node_type = minionid.split('_')[1] %}
{% set is_alive = False %}
# only add a node to the pillar if it returned an ip from the mine
{% if ip | length > 0%}
{% if minionid in manage_alived.keys() %}
{% if ip[0] == manage_alived[minionid] %}
{% set is_alive = True %}
@@ -18,6 +21,7 @@
{% do node_types[node_type][hostname].update({'ip':ip[0], 'alive':is_alive}) %}
{% endif %}
{% endif %}
{% endif %}
{% endfor %}
node_data:
-44
View File
@@ -1,44 +0,0 @@
thresholding:
sids:
8675309:
- threshold:
gen_id: 1
type: threshold
track: by_src
count: 10
seconds: 10
- threshold:
gen_id: 1
type: limit
track: by_dst
count: 100
seconds: 30
- rate_filter:
gen_id: 1
track: by_rule
count: 50
seconds: 30
new_action: alert
timeout: 30
- suppress:
gen_id: 1
track: by_either
ip: 10.10.3.7
11223344:
- threshold:
gen_id: 1
type: limit
track: by_dst
count: 10
seconds: 10
- rate_filter:
gen_id: 1
track: by_src
count: 50
seconds: 20
new_action: pass
timeout: 60
- suppress:
gen_id: 1
track: by_src
ip: 10.10.3.0/24
-20
View File
@@ -1,20 +0,0 @@
thresholding:
sids:
<signature id>:
- threshold:
gen_id: <generator id>
type: <threshold | limit | both>
track: <by_src | by_dst>
count: <count>
seconds: <seconds>
- rate_filter:
gen_id: <generator id>
track: <by_src | by_dst | by_rule | by_both>
count: <count>
seconds: <seconds>
new_action: <alert | pass>
timeout: <seconds>
- suppress:
gen_id: <generator id>
track: <by_src | by_dst | by_either>
ip: <ip | subnet>
+1 -10
View File
@@ -16,6 +16,7 @@ base:
- sensoroni.adv_sensoroni
- telegraf.soc_telegraf
- telegraf.adv_telegraf
- users
'* and not *_desktop':
- firewall.soc_firewall
@@ -61,8 +62,6 @@ base:
- elastalert.adv_elastalert
- backup.soc_backup
- backup.adv_backup
- curator.soc_curator
- curator.adv_curator
- soctopus.soc_soctopus
- soctopus.adv_soctopus
- minions.{{ grains.id }}
@@ -113,8 +112,6 @@ base:
- kibana.adv_kibana
- strelka.soc_strelka
- strelka.adv_strelka
- curator.soc_curator
- curator.adv_curator
- kratos.soc_kratos
- kratos.adv_kratos
- redis.soc_redis
@@ -172,8 +169,6 @@ base:
- kibana.adv_kibana
- strelka.soc_strelka
- strelka.adv_strelka
- curator.soc_curator
- curator.adv_curator
- backup.soc_backup
- backup.adv_backup
- zeek.soc_zeek
@@ -194,8 +189,6 @@ base:
- logstash.adv_logstash
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- curator.soc_curator
- curator.adv_curator
- redis.soc_redis
- redis.adv_redis
- zeek.soc_zeek
@@ -268,8 +261,6 @@ base:
- soctopus.adv_soctopus
- kibana.soc_kibana
- kibana.adv_kibana
- curator.soc_curator
- curator.adv_curator
- backup.soc_backup
- backup.adv_backup
- kratos.soc_kratos
+2
View File
@@ -0,0 +1,2 @@
# users pillar goes in /opt/so/saltstack/local/pillar/users/init.sls
# the users directory may need to be created under /opt/so/saltstack/local/pillar
+18
View File
@@ -0,0 +1,18 @@
users:
sclapton:
# required fields
status: present
# node_access determines which node types the user can access.
# this can either be by grains.role or by final part of the minion id after the _
node_access:
- standalone
- searchnode
# optional fields
fullname: Stevie Claptoon
uid: 1001
gid: 1001
homephone: does not have a phone
groups:
- mygroup1
- mygroup2
- wheel # give sudo access
+20
View File
@@ -0,0 +1,20 @@
users:
sclapton:
# required fields
status: <present | absent>
# node_access determines which node types the user can access.
# this can either be by grains.role or by final part of the minion id after the _
node_access:
- standalone
- searchnode
# optional fields
fullname: <string>
uid: <integer>
gid: <integer>
roomnumber: <string>
workphone: <string>
homephone: <string>
groups:
- <string>
- <string>
- wheel # give sudo access
Executable
+26
View File
@@ -0,0 +1,26 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
if [[ $# -ne 1 ]]; then
echo "Usage: $0 <python_script_dir>"
echo "Runs tests on all *_test.py files in the given directory."
exit 1
fi
HOME_DIR=$(dirname "$0")
TARGET_DIR=${1:-.}
PATH=$PATH:/usr/local/bin
if ! which pytest &> /dev/null || ! which flake8 &> /dev/null ; then
echo "Missing dependencies. Consider running the following command:"
echo " python -m pip install flake8 pytest pytest-cov"
exit 1
fi
pip install pytest pytest-cov
flake8 "$TARGET_DIR" "--config=${HOME_DIR}/pytest.ini"
python3 -m pytest "--cov-config=${HOME_DIR}/pytest.ini" "--cov=$TARGET_DIR" --doctest-modules --cov-report=term --cov-fail-under=100 "$TARGET_DIR"
-4
View File
@@ -219,10 +219,6 @@
{% do allowed_states.append('kibana.secrets') %}
{% endif %}
{% if grains.role in ['so-eval', 'so-standalone', 'so-managersearch', 'so-heavynode', 'so-manager'] %}
{% do allowed_states.append('curator') %}
{% endif %}
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch'] %}
{% do allowed_states.append('elastalert') %}
{% endif %}
+10
View File
@@ -0,0 +1,10 @@
{% macro remove_comments(bpfmerged, app) %}
{# remove comments from the bpf #}
{% for bpf in bpfmerged[app] %}
{% if bpf.strip().startswith('#') %}
{% do bpfmerged[app].pop(loop.index0) %}
{% endif %}
{% endfor %}
{% endmacro %}
+3
View File
@@ -1,4 +1,7 @@
{% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %}
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %}
{% import 'bpf/macros.jinja' as MACROS %}
{{ MACROS.remove_comments(BPFMERGED, 'pcap') }}
{% set PCAPBPF = BPFMERGED.pcap %}
+3
View File
@@ -1,4 +1,7 @@
{% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %}
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %}
{% import 'bpf/macros.jinja' as MACROS %}
{{ MACROS.remove_comments(BPFMERGED, 'suricata') }}
{% set SURICATABPF = BPFMERGED.suricata %}
+3
View File
@@ -1,4 +1,7 @@
{% import_yaml 'bpf/defaults.yaml' as BPFDEFAULTS %}
{% set BPFMERGED = salt['pillar.get']('bpf', BPFDEFAULTS.bpf, merge=True) %}
{% import 'bpf/macros.jinja' as MACROS %}
{{ MACROS.remove_comments(BPFMERGED, 'zeek') }}
{% set ZEEKBPF = BPFMERGED.zeek %}
+1 -1
View File
@@ -37,7 +37,7 @@ x509_signing_policies:
- ST: Utah
- L: Salt Lake City
- basicConstraints: "critical CA:false"
- keyUsage: "critical keyEncipherment"
- keyUsage: "critical keyEncipherment digitalSignature"
- subjectKeyIdentifier: hash
- authorityKeyIdentifier: keyid,issuer:always
- extendedKeyUsage: serverAuth
+6
View File
@@ -50,6 +50,12 @@ pki_public_ca_crt:
attempts: 5
interval: 30
mine_update_ca_crt:
module.run:
- mine.update: []
- onchanges:
- x509: pki_public_ca_crt
cakeyperms:
file.managed:
- replace: False
+9
View File
@@ -8,6 +8,7 @@ include:
- common.packages
{% if GLOBALS.role in GLOBALS.manager_roles %}
- manager.elasticsearch # needed for elastic_curl_config state
- manager.kibana
{% endif %}
net.core.wmem_default:
@@ -178,6 +179,14 @@ so-status_check_cron:
- month: '*'
- dayweek: '*'
# This cronjob/script runs a check if the node needs restarted, but should be used for future status checks as well
common_status_check_cron:
cron.present:
- name: '/usr/sbin/so-common-status-check > /dev/null 2>&1'
- identifier: common_status_check
- user: root
- minute: '*/10'
remove_post_setup_cron:
cron.absent:
- name: 'PATH=$PATH:/usr/sbin salt-call state.highstate'
+88 -15
View File
@@ -8,7 +8,7 @@
# Elastic agent is not managed by salt. Because of this we must store this base information in a
# script that accompanies the soup system. Since so-common is one of those special soup files,
# and since this same logic is required during installation, it's included in this file.
ELASTIC_AGENT_TARBALL_VERSION="8.8.2"
ELASTIC_AGENT_TARBALL_VERSION="8.10.4"
ELASTIC_AGENT_URL="https://repo.securityonion.net/file/so-repo/prod/2.4/elasticagent/elastic-agent_SO-$ELASTIC_AGENT_TARBALL_VERSION.tar.gz"
ELASTIC_AGENT_MD5_URL="https://repo.securityonion.net/file/so-repo/prod/2.4/elasticagent/elastic-agent_SO-$ELASTIC_AGENT_TARBALL_VERSION.md5"
ELASTIC_AGENT_FILE="/nsm/elastic-fleet/artifacts/elastic-agent_SO-$ELASTIC_AGENT_TARBALL_VERSION.tar.gz"
@@ -133,22 +133,37 @@ check_elastic_license() {
}
check_salt_master_status() {
local timeout=$1
echo "Checking if we can talk to the salt master"
salt-call state.show_top concurrent=true
return
local count=0
local attempts="${1:- 10}"
current_time="$(date '+%b %d %H:%M:%S')"
echo "Checking if we can access the salt master and that it is ready at: ${current_time}"
while ! salt-call state.show_top -l error concurrent=true 1> /dev/null; do
current_time="$(date '+%b %d %H:%M:%S')"
echo "Can't access salt master or it is not ready at: ${current_time}"
((count+=1))
if [[ $count -eq $attempts ]]; then
# 10 attempts takes about 5.5 minutes
echo "Gave up trying to access salt-master"
return 1
fi
done
current_time="$(date '+%b %d %H:%M:%S')"
echo "Successfully accessed and salt master ready at: ${current_time}"
return 0
}
# this is only intended to be used to check the status of the minion from a salt master
check_salt_minion_status() {
local timeout=$1
echo "Checking if the salt minion will respond to jobs" >> "$setup_log" 2>&1
salt "$MINION_ID" test.ping -t $timeout > /dev/null 2>&1
local minion="$1"
local timeout="${2:-5}"
local logfile="${3:-'/dev/stdout'}"
echo "Checking if the salt minion: $minion will respond to jobs" >> "$logfile" 2>&1
salt "$minion" test.ping -t $timeout > /dev/null 2>&1
local status=$?
if [ $status -gt 0 ]; then
echo " Minion did not respond" >> "$setup_log" 2>&1
echo " Minion did not respond" >> "$logfile" 2>&1
else
echo " Received job response from salt minion" >> "$setup_log" 2>&1
echo " Received job response from salt minion" >> "$logfile" 2>&1
fi
return $status
@@ -382,6 +397,10 @@ retry() {
echo "<Start of output>"
echo "$output"
echo "<End of output>"
if [[ $exitcode -eq 0 ]]; then
echo "Forcing exit code to 1"
exitcode=1
fi
fi
elif [ -n "$failedOutput" ]; then
if [[ "$output" =~ "$failedOutput" ]]; then
@@ -390,7 +409,7 @@ retry() {
echo "$output"
echo "<End of output>"
if [[ $exitcode -eq 0 ]]; then
echo "The exitcode was 0, but we are setting to 1 since we found $failedOutput in the output."
echo "Forcing exit code to 1"
exitcode=1
fi
else
@@ -428,6 +447,24 @@ run_check_net_err() {
fi
}
wait_for_salt_minion() {
local minion="$1"
local timeout="${2:-5}"
local logfile="${3:-'/dev/stdout'}"
retry 60 5 "journalctl -u salt-minion.service | grep 'Minion is ready to receive requests'" >> "$logfile" 2>&1 || fail
local attempt=0
# each attempts would take about 15 seconds
local maxAttempts=20
until check_salt_minion_status "$minion" "$timeout" "$logfile"; do
attempt=$((attempt+1))
if [[ $attempt -eq $maxAttempts ]]; then
return 1
fi
sleep 10
done
return 0
}
salt_minion_count() {
local MINIONDIR="/opt/so/saltstack/local/pillar/minions"
MINIONCOUNT=$(ls -la $MINIONDIR/*.sls | grep -v adv_ | wc -l)
@@ -440,19 +477,51 @@ set_os() {
OS=rocky
OSVER=9
is_rocky=true
is_rpm=true
elif grep -q "CentOS Stream release 9" /etc/redhat-release; then
OS=centos
OSVER=9
is_centos=true
elif grep -q "Oracle Linux Server release 9" /etc/system-release; then
OS=oel
is_rpm=true
elif grep -q "AlmaLinux release 9" /etc/redhat-release; then
OS=alma
OSVER=9
is_alma=true
is_rpm=true
elif grep -q "Red Hat Enterprise Linux release 9" /etc/redhat-release; then
if [ -f /etc/oracle-release ]; then
OS=oracle
OSVER=9
is_oracle=true
is_rpm=true
else
OS=rhel
OSVER=9
is_rhel=true
is_rpm=true
fi
fi
cron_service_name="crond"
else
elif [ -f /etc/os-release ]; then
if grep -q "UBUNTU_CODENAME=focal" /etc/os-release; then
OSVER=focal
UBVER=20.04
OS=ubuntu
is_ubuntu=true
is_deb=true
elif grep -q "UBUNTU_CODENAME=jammy" /etc/os-release; then
OSVER=jammy
UBVER=22.04
OS=ubuntu
is_ubuntu=true
is_deb=true
elif grep -q "VERSION_CODENAME=bookworm" /etc/os-release; then
OSVER=bookworm
DEBVER=12
is_debian=true
OS=debian
is_deb=true
fi
cron_service_name="cron"
fi
}
@@ -486,6 +555,10 @@ set_version() {
fi
}
status () {
printf "\n=========================================================================\n$(date) | $1\n=========================================================================\n"
}
systemctl_func() {
local action=$1
local echo_action=$1
@@ -0,0 +1,52 @@
#!/usr/bin/env python3
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
import sys
import subprocess
import os
sys.path.append('/opt/saltstack/salt/lib/python3.10/site-packages/')
import salt.config
import salt.loader
__opts__ = salt.config.minion_config('/etc/salt/minion')
__grains__ = salt.loader.grains(__opts__)
def check_needs_restarted():
osfam = __grains__['os_family']
val = '0'
outfile = "/opt/so/log/sostatus/needs_restarted"
if osfam == 'Debian':
if os.path.exists('/var/run/reboot-required'):
val = '1'
elif osfam == 'RedHat':
cmd = 'needs-restarting -r > /dev/null 2>&1'
try:
needs_restarting = subprocess.check_call(cmd, shell=True)
except subprocess.CalledProcessError:
val = '1'
else:
fail("Unsupported OS")
with open(outfile, 'w') as f:
f.write(val)
def fail(msg):
print(msg, file=sys.stderr)
sys.exit(1)
def main():
proc = subprocess.run(['id', '-u'], stdout=subprocess.PIPE, encoding="utf-8")
if proc.stdout.strip() != "0":
fail("This program must be run as root")
check_needs_restarted()
if __name__ == "__main__":
main()
-1
View File
@@ -42,7 +42,6 @@ container_list() {
)
elif [ $MANAGERCHECK != 'so-helix' ]; then
TRUSTED_CONTAINERS=(
"so-curator"
"so-elastalert"
"so-elastic-agent"
"so-elastic-agent-builder"
+19
View File
@@ -109,11 +109,19 @@ if [[ $EXCLUDE_STARTUP_ERRORS == 'Y' ]]; then
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|timeout exceeded" # server not yet ready (telegraf waiting on elasticsearch)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|influxsize kbytes" # server not yet ready (telegraf waiting on influx)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|expected field at" # server not yet ready (telegraf waiting on health data)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|connection timed out" # server not yet ready (telegraf plugin unable to connect)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|command timed out" # server not yet ready (telegraf plugin waiting for script to finish)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|cached the public key" # server not yet ready (salt minion waiting on key acceptance)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|no ingest nodes" # server not yet ready (logstash waiting on elastic)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|failed to poll" # server not yet ready (sensoroni waiting on soc)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|minions returned with non" # server not yet ready (salt waiting on minions)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|so_long_term" # server not yet ready (influxdb not yet setup)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|search_phase_execution_exception" # server not yet ready (elastalert running searches before ES is ready)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|timeout retrieving docker" # Telegraf unable to reach Docker engine, rare
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|timeout retrieving container" # Telegraf unable to reach Docker engine, rare
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|error while communicating" # Elasticsearch MS -> HN "sensor" temporarily unavailable
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|tls handshake error" # Docker registry container when new node comes onlines
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|Unable to get license information" # Logstash trying to contact ES before it's ready
fi
if [[ $EXCLUDE_FALSE_POSITIVE_ERRORS == 'Y' ]]; then
@@ -136,6 +144,8 @@ if [[ $EXCLUDE_FALSE_POSITIVE_ERRORS == 'Y' ]]; then
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|invalid query input" # false positive (Invalid user input in hunt query)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|example" # false positive (example test data)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|status 200" # false positive (request successful, contained error string in content)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|app_layer.error" # false positive (suricata 7) in stats.log e.g. app_layer.error.imap.parser | Total | 0
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|is not an ip string literal" # false positive (Open Canary logging out blank IP addresses)
fi
if [[ $EXCLUDE_KNOWN_ERRORS == 'Y' ]]; then
@@ -157,6 +167,12 @@ if [[ $EXCLUDE_KNOWN_ERRORS == 'Y' ]]; then
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|repodownload.conf" # known issue with reposync on pre-2.4.20
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|missing versions record" # stenographer corrupt index
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|soc.field." # known ingest type collisions issue with earlier versions of SO
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|error parsing signature" # Malformed Suricata rule, from upstream provider
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|sticky buffer has no matches" # Non-critical Suricata error
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|Unable to determine destination index stats" # Elastic transform temporary error
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|cannot join on an empty table" # InfluxDB flux query, import nodes
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|exhausting result iterator" # InfluxDB flux query mismatched table results (temporary data issue)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|failed to finish run" # InfluxDB rare error, self-recoverable
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|iteration"
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|communication packets"
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|use of closed"
@@ -213,6 +229,9 @@ exclude_log "spool" # disregard zeek analyze logs as this is data specifi
exclude_log "import" # disregard imported test data the contains error strings
exclude_log "update.log" # ignore playbook updates due to several known issues
exclude_log "playbook.log" # ignore due to several playbook known issues
exclude_log "cron-cluster-delete.log" # ignore since Curator has been removed
exclude_log "cron-close.log" # ignore since Curator has been removed
exclude_log "curator.log" # ignore since Curator has been removed
for log_file in $(cat /tmp/log_check_files); do
status "Checking log file $log_file"
+9 -4
View File
@@ -41,8 +41,13 @@ done
if [ $SKIP -ne 1 ]; then
# Inform user we are about to delete all data
echo
echo "This script will delete all NIDS data (PCAP, Suricata, Zeek)"
echo "If you would like to proceed, please type "AGREE" and hit ENTER."
echo "This script will delete all NSM data from /nsm."
echo
echo "This includes Suricata data, Zeek data, and full packet capture (PCAP)."
echo
echo "This will NOT delete any Suricata or Zeek logs that have already been ingested into Elasticsearch."
echo
echo "If you would like to proceed, then type AGREE and press ENTER."
echo
# Read user input
read INPUT
@@ -54,8 +59,8 @@ delete_pcap() {
[ -d $PCAP_DATA ] && so-pcap-stop && rm -rf $PCAP_DATA/* && so-pcap-start
}
delete_suricata() {
SURI_LOG="/opt/so/log/suricata/eve.json"
[ -f $SURI_LOG ] && so-suricata-stop && rm -f $SURI_LOG && so-suricata-start
SURI_LOG="/nsm/suricata/"
[ -d $SURI_LOG ] && so-suricata-stop && rm -rf $SURI_LOG/* && so-suricata-start
}
delete_zeek() {
ZEEK_LOG="/nsm/zeek/logs/"
-67
View File
@@ -1,67 +0,0 @@
#!/bin/bash
local_salt_dir=/opt/so/saltstack/local
zeek_logs_enabled() {
echo "zeeklogs:" > $local_salt_dir/pillar/zeeklogs.sls
echo " enabled:" >> $local_salt_dir/pillar/zeeklogs.sls
for BLOG in "${BLOGS[@]}"; do
echo " - $BLOG" | tr -d '"' >> $local_salt_dir/pillar/zeeklogs.sls
done
}
whiptail_manager_adv_service_zeeklogs() {
BLOGS=$(whiptail --title "so-zeek-logs" --checklist "Please Select Logs to Send:" 24 78 12 \
"conn" "Connection Logging" ON \
"dce_rpc" "RPC Logs" ON \
"dhcp" "DHCP Logs" ON \
"dnp3" "DNP3 Logs" ON \
"dns" "DNS Logs" ON \
"dpd" "DPD Logs" ON \
"files" "Files Logs" ON \
"ftp" "FTP Logs" ON \
"http" "HTTP Logs" ON \
"intel" "Intel Hits Logs" ON \
"irc" "IRC Chat Logs" ON \
"kerberos" "Kerberos Logs" ON \
"modbus" "MODBUS Logs" ON \
"notice" "Zeek Notice Logs" ON \
"ntlm" "NTLM Logs" ON \
"pe" "PE Logs" ON \
"radius" "Radius Logs" ON \
"rfb" "RFB Logs" ON \
"rdp" "RDP Logs" ON \
"sip" "SIP Logs" ON \
"smb_files" "SMB Files Logs" ON \
"smb_mapping" "SMB Mapping Logs" ON \
"smtp" "SMTP Logs" ON \
"snmp" "SNMP Logs" ON \
"ssh" "SSH Logs" ON \
"ssl" "SSL Logs" ON \
"syslog" "Syslog Logs" ON \
"tunnel" "Tunnel Logs" ON \
"weird" "Zeek Weird Logs" ON \
"mysql" "MySQL Logs" ON \
"socks" "SOCKS Logs" ON \
"x509" "x.509 Logs" ON 3>&1 1>&2 2>&3 )
local exitstatus=$?
IFS=' ' read -ra BLOGS <<< "$BLOGS"
return $exitstatus
}
whiptail_manager_adv_service_zeeklogs
return_code=$?
case $return_code in
1)
whiptail --title "so-zeek-logs" --msgbox "Cancelling. No changes have been made." 8 75
;;
255)
whiptail --title "so-zeek-logs" --msgbox "Whiptail error occured, exiting." 8 75
;;
*)
zeek_logs_enabled
;;
esac
@@ -49,12 +49,19 @@ check_nsm_raid() {
check_boss_raid() {
MVCLI=$(/usr/local/bin/mvcli info -o vd |grep status |grep functional)
MVTEST=$(/usr/local/bin/mvcli info -o vd | grep "No adapter")
# Check to see if this is a SM based system
if [[ -z $MVTEST ]]; then
if [[ -n $MVCLI ]]; then
BOSSRAID=0
else
BOSSRAID=1
fi
else
# This doesn't have boss raid so lets make it 0
BOSSRAID=0
fi
}
check_software_raid() {
-81
View File
@@ -1,81 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls.split('.')[0] in allowed_states %}
{% from "curator/map.jinja" import CURATORMERGED %}
# Create the group
curatorgroup:
group.present:
- name: curator
- gid: 934
# Add user
curator:
user.present:
- uid: 934
- gid: 934
- home: /opt/so/conf/curator
- createhome: False
# Create the log directory
curlogdir:
file.directory:
- name: /opt/so/log/curator
- user: 934
- group: 939
curactiondir:
file.directory:
- name: /opt/so/conf/curator/action
- user: 934
- group: 939
- makedirs: True
actionconfs:
file.recurse:
- name: /opt/so/conf/curator/action
- source: salt://curator/files/action
- user: 934
- group: 939
- template: jinja
- defaults:
CURATORMERGED: {{ CURATORMERGED.elasticsearch.index_settings }}
curconf:
file.managed:
- name: /opt/so/conf/curator/curator.yml
- source: salt://curator/files/curator.yml
- user: 934
- group: 939
- mode: 660
- template: jinja
- show_changes: False
curator_sbin:
file.recurse:
- name: /usr/sbin
- source: salt://curator/tools/sbin
- user: 934
- group: 939
- file_mode: 755
curator_sbin_jinja:
file.recurse:
- name: /usr/sbin
- source: salt://curator/tools/sbin_jinja
- user: 934
- group: 939
- file_mode: 755
- template: jinja
{% else %}
{{sls}}_state_not_allowed:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
{% endif %}
-100
View File
@@ -1,100 +0,0 @@
curator:
enabled: False
elasticsearch:
index_settings:
logs-import-so:
close: 73000
delete: 73001
logs-strelka-so:
close: 30
delete: 365
logs-suricata-so:
close: 30
delete: 365
logs-syslog-so:
close: 30
delete: 365
logs-zeek-so:
close: 30
delete: 365
logs-elastic_agent-metricbeat-default:
close: 30
delete: 365
logs-elastic_agent-osquerybeat-default:
close: 30
delete: 365
logs-elastic_agent-fleet_server-default:
close: 30
delete: 365
logs-elastic_agent-filebeat-default:
close: 30
delete: 365
logs-elastic_agent-default:
close: 30
delete: 365
logs-system-auth-default:
close: 30
delete: 365
logs-system-application-default:
close: 30
delete: 365
logs-system-security-default:
close: 30
delete: 365
logs-system-system-default:
close: 30
delete: 365
logs-system-syslog-default:
close: 30
delete: 365
logs-windows-powershell-default:
close: 30
delete: 365
logs-windows-sysmon_operational-default:
close: 30
delete: 365
so-beats:
close: 30
delete: 365
so-elasticsearch:
close: 30
delete: 365
so-firewall:
close: 30
delete: 365
so-ids:
close: 30
delete: 365
so-import:
close: 73000
delete: 73001
so-kratos:
close: 30
delete: 365
so-kibana:
close: 30
delete: 365
so-logstash:
close: 30
delete: 365
so-netflow:
close: 30
delete: 365
so-osquery:
close: 30
delete: 365
so-ossec:
close: 30
delete: 365
so-redis:
close: 30
delete: 365
so-strelka:
close: 30
delete: 365
so-syslog:
close: 30
delete: 365
so-zeek:
close: 30
delete: 365
+12 -13
View File
@@ -3,20 +3,15 @@
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls.split('.')[0] in allowed_states %}
include:
- curator.sostatus
so-curator:
docker_container.absent:
- force: True
so-curator_so-status.disabled:
file.comment:
file.line:
- name: /opt/so/conf/so-status/so-status.conf
- regex: ^so-curator$
- match: ^so-curator$
- mode: delete
so-curator-cluster-close:
cron.absent:
@@ -26,10 +21,14 @@ so-curator-cluster-delete:
cron.absent:
- identifier: so-curator-cluster-delete
{% else %}
{{sls}}_state_not_allowed:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
delete_curator_configuration:
file.absent:
- name: /opt/so/conf/curator
- recurse: True
{% set files = salt.file.find(path='/usr/sbin', name='so-curator*') %}
{% if files|length > 0 %}
delete_curator_scripts:
file.absent:
- names: {{files|yaml}}
{% endif %}
-88
View File
@@ -1,88 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls.split('.')[0] in allowed_states %}
{% from 'vars/globals.map.jinja' import GLOBALS %}
{% from 'docker/docker.map.jinja' import DOCKER %}
include:
- curator.config
- curator.sostatus
so-curator:
docker_container.running:
- image: {{ GLOBALS.registry_host }}:5000/{{ GLOBALS.image_repo }}/so-curator:{{ GLOBALS.so_version }}
- start: True
- hostname: curator
- name: so-curator
- user: curator
- networks:
- sobridge:
- ipv4_address: {{ DOCKER.containers['so-curator'].ip }}
- interactive: True
- tty: True
- binds:
- /opt/so/conf/curator/curator.yml:/etc/curator/config/curator.yml:ro
- /opt/so/conf/curator/action/:/etc/curator/action:ro
- /opt/so/log/curator:/var/log/curator:rw
{% if DOCKER.containers['so-curator'].custom_bind_mounts %}
{% for BIND in DOCKER.containers['so-curator'].custom_bind_mounts %}
- {{ BIND }}
{% endfor %}
{% endif %}
{% if DOCKER.containers['so-curator'].extra_hosts %}
- extra_hosts:
{% for XTRAHOST in DOCKER.containers['so-curator'].extra_hosts %}
- {{ XTRAHOST }}
{% endfor %}
{% endif %}
{% if DOCKER.containers['so-curator'].extra_env %}
- environment:
{% for XTRAENV in DOCKER.containers['so-curator'].extra_env %}
- {{ XTRAENV }}
{% endfor %}
{% endif %}
- require:
- file: actionconfs
- file: curconf
- file: curlogdir
- watch:
- file: curconf
delete_so-curator_so-status.disabled:
file.uncomment:
- name: /opt/so/conf/so-status/so-status.conf
- regex: ^so-curator$
so-curator-cluster-close:
cron.present:
- name: /usr/sbin/so-curator-cluster-close > /opt/so/log/curator/cron-close.log 2>&1
- identifier: so-curator-cluster-close
- user: root
- minute: '2'
- hour: '*/1'
- daymonth: '*'
- month: '*'
- dayweek: '*'
so-curator-cluster-delete:
cron.present:
- name: /usr/sbin/so-curator-cluster-delete > /opt/so/log/curator/cron-cluster-delete.log 2>&1
- identifier: so-curator-cluster-delete
- user: root
- minute: '*/5'
- hour: '*'
- daymonth: '*'
- month: '*'
- dayweek: '*'
{% else %}
{{sls}}_state_not_allowed:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
{% endif %}
-31
View File
@@ -1,31 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% import_yaml 'elasticsearch/defaults.yaml' as ELASTICDEFAULTS %}
{% set ELASTICMERGED = salt['pillar.get']('elasticsearch:retention', ELASTICDEFAULTS.elasticsearch.retention, merge=true) %}
{{ ELASTICMERGED.retention_pct }}
{%- set log_size_limit = salt['pillar.get']('elasticsearch:log_size_limit') %}
actions:
1:
action: delete_indices
description: >-
Delete indices when {{log_size_limit}}(GB) is exceeded.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-.*|so-.*|.ds-logs-.*-so.*)$'
- filtertype: pattern
kind: regex
value: '^(so-case.*)$'
exclude: True
- filtertype: space
source: creation_date
use_age: True
disk_space: {{log_size_limit}}
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-elastic_agent-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent default indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-elastic_agent-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent default indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-elastic_agent-filebeat-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Filebeat indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.filebeat-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-elastic_agent-filebeat-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent Filebeat indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.filebeat-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-elastic_agent-fleet_server-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Fleet Server indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.fleet_server-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-elastic_agent-fleet_server-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete import indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.fleet_server-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-elastic_agent-metricbeat-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Metricbeat indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.metricbeat-default-.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-elastic_agent-metricbeat-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent Metricbeat indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.metricbeat-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-elastic_agent-osquerybeat-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Osquerybeat indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.osquerybeat-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-elastic_agent-osquerybeat-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent Osquerybeat indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.osquerybeat-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-import-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete import indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-import-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-import-so'].close %}
actions:
1:
action: close
description: >-
Close import indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-import-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-import-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete import indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-import-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-strelka-so'].close %}
actions:
1:
action: close
description: >-
Close Strelka indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-strelka-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-strelka-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Strelka indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-strelka-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-suricata-so'].close %}
actions:
1:
action: close
description: >-
Close Suricata indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-suricata-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-suricata-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Suricata indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-suricata-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-syslog-so'].close %}
actions:
1:
action: close
description: >-
Close syslog indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-syslog-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-syslog-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete syslog indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-syslog-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-system-application-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent system application indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.application-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-system-application-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent system application indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.application-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-system-auth-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent system auth indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.auth-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-system-auth-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent system auth indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.auth-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-system-security-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent system security indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.security-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-system-security-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent system security indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.security-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-system-syslog-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent system syslog indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.syslog-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-system-syslog-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent system syslog indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.syslog-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-system-system-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent system system indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.system-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-system-system-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent system system indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.system-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-windows-powershell-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Windows Powershell indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-windows.powershell-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-windows-powershell-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent Windows Powershell indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-windows.powershell-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-windows-sysmon_operational-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Windows Sysmon operational indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-windows.sysmon_operational-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-windows-sysmon_operational-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent Windows Sysmon operational indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-windows.sysmon_operational-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-zeek-so'].close %}
actions:
1:
action: close
description: >-
Close Zeek indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-zeek-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-zeek-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Zeek indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-zeek-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-beats'].close %}
actions:
1:
action: close
description: >-
Close Beats indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-beats.*|so-beats.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-beats'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete beats indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-beats.*|so-beats.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-elasticsearch'].close %}
actions:
1:
action: close
description: >-
Close elasticsearch indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-elasticsearch.*|so-elasticsearch.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-elasticsearch'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete elasticsearch indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-elasticsearch.*|so-elasticsearch.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,28 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-firewall'].close %}
actions:
1:
action: close
description: >-
Close Firewall indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-firewall.*|so-firewall.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,28 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-firewall'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete firewall indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-firewall.*|so-firewall.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,28 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-ids'].close %}
actions:
1:
action: close
description: >-
Close IDS indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-ids.*|so-ids.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,28 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-ids'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete IDS indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-ids.*|so-ids.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-import'].close %}
actions:
1:
action: close
description: >-
Close Import indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-import.*|so-import.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-import'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete import indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-import.*|so-import.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-kibana'].close %}
actions:
1:
action: close
description: >-
Close kibana indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-kibana.*|so-kibana.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-kibana'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete kibana indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-kibana.*|so-kibana.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-kratos'].close %}
actions:
1:
action: close
description: >-
Close kratos indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-kratos.*|so-kratos.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-kratos'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete kratos indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-kratos.*|so-kratos.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-logstash'].close %}
actions:
1:
action: close
description: >-
Close logstash indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-logstash.*|so-logstash.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-logstash'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete logstash indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-logstash.*|so-logstash.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-netflow'].close %}
actions:
1:
action: close
description: >-
Close netflow indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-netflow.*|so-netflow.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-netflow'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete netflow indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-netflow.*|so-netflow.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-osquery'].close %}
actions:
1:
action: close
description: >-
Close osquery indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-osquery.*|so-osquery.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-osquery'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete import indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-osquery.*|so-osquery.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-ossec'].close %}
actions:
1:
action: close
description: >-
Close ossec indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-ossec.*|so-ossec.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-ossec'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete ossec indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-ossec.*|so-ossec.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-redis'].close %}
actions:
1:
action: close
description: >-
Close redis indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-redis.*|so-redis.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-redis'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete redis indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-redis.*|so-redis.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-strelka'].close %}
actions:
1:
action: close
description: >-
Close Strelka indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-strelka.*|so-strelka.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-strelka'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Strelka indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-strelka.*|so-strelka.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:

Some files were not shown because too many files have changed in this diff Show More