Compare commits

...

436 Commits

Author SHA1 Message Date
Doug Burks a13b3f305a Merge pull request #10970 from Security-Onion-Solutions/2.4/dev
2.4.5 RC2
2023-08-07 10:21:29 -04:00
Doug Burks 38089c6662 Merge pull request #10971 from Security-Onion-Solutions/2.4/main
2.4/main to 2.4/dev
2023-08-07 10:17:51 -04:00
Doug Burks 2d863f09eb Merge pull request #10969 from Security-Onion-Solutions/dougburks-patch-1
add spaces for proper rendering DOWNLOAD_AND_VERIFY_ISO.md
2023-08-07 09:31:33 -04:00
Doug Burks 37b98ba188 add spaces for proper rendering DOWNLOAD_AND_VERIFY_ISO.md 2023-08-07 09:29:34 -04:00
Doug Burks 65d1e57ccd Merge pull request #10968 from Security-Onion-Solutions/dougburks-patch-1
prepare for 2.4.5 ISO image release
2023-08-07 09:15:53 -04:00
Doug Burks 9ae32e2bd6 create sigs directory and add sig for 2.4.5 2023-08-07 09:02:52 -04:00
Doug Burks 6e8f31e083 Delete sigs 2023-08-07 08:59:24 -04:00
Doug Burks 3c5cd941c7 Update DOWNLOAD_AND_VERIFY_ISO.md for 2.4.5 2023-08-07 08:45:30 -04:00
Doug Burks 2ea2a4d0a7 Merge pull request #10964 from Security-Onion-Solutions/dougburks-patch-1
Revert yesterday's change to zeekcaptureloss.sh
2023-08-05 09:23:58 -04:00
Doug Burks 90102b1148 Finish reverting yesterday's change to zeekcaptureloss.sh 2023-08-05 09:23:27 -04:00
Doug Burks ec81cbd70d Revert yesterday's change to zeekcaptureloss.sh 2023-08-05 09:11:58 -04:00
Josh Patterson 59c0109c91 Merge pull request #10961 from Security-Onion-Solutions/fix/tgrafzeekcloss
fix count of WORKERS for zeekcaptureloss script for telegraf
2023-08-04 16:39:26 -04:00
m0duspwnens 9af2a731ca fix count of WORKERS for zeekcaptureloss script for telegraf 2023-08-04 16:29:30 -04:00
Josh Brower 9b656ebbc0 Merge pull request #10960 from Security-Onion-Solutions/2.4/fleetcustomfqdn
Refactor to remove new line
2023-08-04 16:16:43 -04:00
Josh Brower 9d3744aa25 Refactor to remove new line 2023-08-04 16:05:28 -04:00
Josh Patterson 9fddd56c96 Merge pull request #10959 from Security-Onion-Solutions/desktopyummv
Desktopyummv
2023-08-04 16:03:20 -04:00
m0duspwnens 89c4f58296 fix indents 2023-08-04 15:41:10 -04:00
m0duspwnens 0ba1e7521a set default session for preexisting users 2023-08-04 15:36:44 -04:00
m0duspwnens 36747cf940 add networkminer to desktop.packages 2023-08-04 13:52:01 -04:00
Doug Burks 118088c35f Merge pull request #10953 from Security-Onion-Solutions/dougburks-patch-1
FEATURE: soup should rotate its log file #10951
2023-08-04 12:38:21 -04:00
Doug Burks 63373710b4 Update soup to rotate log file 2023-08-04 12:26:36 -04:00
Doug Burks 209da766ba Update soup to rotate log file 2023-08-04 12:16:14 -04:00
m0duspwnens 433cde0f9e Merge remote-tracking branch 'origin/2.4/dev' into desktopyummv 2023-08-04 11:25:06 -04:00
Josh Patterson 9fe9256a0f Merge pull request #10950 from Security-Onion-Solutions/fix/idhfirewall
Fix/idhfirewall
2023-08-04 11:00:58 -04:00
m0duspwnens 014aeffb2a add analyst back 2023-08-04 09:56:33 -04:00
m0duspwnens 3b86b60207 Merge remote-tracking branch 'origin/2.4/dev' into fix/idhfirewall 2023-08-04 09:40:01 -04:00
m0duspwnens 0f52530d07 soc_firewall.yaml update adding idh and rename analyst to workstation 2023-08-04 09:37:58 -04:00
m0duspwnens 726ec72350 allow idh to connect to salt_manager ports on managres 2023-08-04 09:22:59 -04:00
Doug Burks 560ec9106d Merge pull request #10948 from Security-Onion-Solutions/dougburks-patch-1
Update so-whiptail
2023-08-04 09:21:55 -04:00
m0duspwnens a51acfc314 rename analyst to workstation for fw rules. allow workstation to connect to salt_manager port on managers 2023-08-04 09:17:22 -04:00
Doug Burks 78950ebfbb Update so-whiptail 2023-08-04 09:16:58 -04:00
Josh Brower d3ae2b03f0 Merge pull request #10947 from Security-Onion-Solutions/2.4/comm_id
Generate community_id for defend endpoint logs
2023-08-04 09:07:35 -04:00
Josh Brower dd1fa51eb5 Generate community_id for defend endpoint logs 2023-08-04 09:03:17 -04:00
m0duspwnens 682289ef23 add sensoroni ports where missing 2023-08-04 09:01:09 -04:00
m0duspwnens 593cdbd060 add rules for idh to connect to managers, change idh from sensor to idh in so-firewall-minion 2023-08-04 08:50:06 -04:00
Josh Brower 4ed0ba5040 Merge pull request #10946 from Security-Onion-Solutions/2.4/logstashfix
Don't watch certs on search nodes
2023-08-03 19:01:13 -04:00
Josh Brower 2472d6a727 Don't watch certs on search nodes 2023-08-03 18:52:29 -04:00
Mike Reeves 18e31a4490 Merge pull request #10944 from Security-Onion-Solutions/raid
Raid refactor + yara and rule proxy
2023-08-03 17:18:19 -04:00
Mike Reeves 2caca92082 Raid refactor + yara and rule proxy 2023-08-03 17:11:43 -04:00
weslambert abf74e0ae4 Merge pull request #10940 from Security-Onion-Solutions/foxtrot
Add time shift for so-import-evtx
2023-08-03 16:56:40 -04:00
Josh Brower dc7ce5ba8f Merge pull request #10941 from Security-Onion-Solutions/2.4/defendupdate
Update for 8.8.2
2023-08-03 16:28:56 -04:00
Josh Brower 6b5343f582 Update for 8.8.2 2023-08-03 16:25:02 -04:00
weslambert ca6276b922 Update VERSION 2023-08-03 15:58:33 -04:00
weslambert 3e4136e641 Update help text 2023-08-03 15:56:05 -04:00
m0duspwnens 15b8e1a753 add convert-gnome-classic.sh 2023-08-03 15:37:26 -04:00
Doug Burks b7197bbd16 Merge pull request #10939 from Security-Onion-Solutions/dougburks-patch-1
Update soup for airgap
2023-08-03 15:28:28 -04:00
Josh Brower 8966617508 Merge pull request #10926 from Security-Onion-Solutions/2.4/FleetEnhancments
2.4/fleet-Enhancements
2023-08-03 15:28:03 -04:00
Doug Burks 9319c3f2e1 Update soup for airgap 2023-08-03 15:27:24 -04:00
m0duspwnens d4fbf7d6a6 convert to gnome classic 2023-08-03 15:26:43 -04:00
Josh Brower e78fcbc6cb Refactor for Jinja instead 2023-08-03 15:25:11 -04:00
Josh Brower 27b70cbf68 Use jinja instead 2023-08-03 15:21:20 -04:00
Josh Patterson ffb54135d1 Merge pull request #10938 from Security-Onion-Solutions/desktopyummv
Desktopyummv
2023-08-03 14:54:29 -04:00
m0duspwnens d40a8927c3 install salt version specified in master.defaults.yaml for desktop 2023-08-03 14:51:43 -04:00
m0duspwnens 9172e10dba check if there are files in yum.repos.d before trying to move them 2023-08-03 14:47:53 -04:00
Doug Burks 1907ea805c Merge pull request #10937 from Security-Onion-Solutions/dougburks-patch-1
Update soup for airgap
2023-08-03 14:39:53 -04:00
Doug Burks 80598d7f8d Update soup for airgap 2023-08-03 14:36:47 -04:00
Josh Patterson 13c3e7f5ff Merge pull request #10934 from Security-Onion-Solutions/fix/soupairgap
ensure AIRGAP is lowercase and check for true
2023-08-03 12:00:06 -04:00
m0duspwnens d4389d5057 ensure AIRGAP is lowercase and check for true 2023-08-03 11:56:48 -04:00
weslambert cf2233bbb6 Add help information for time shift 2023-08-03 08:54:54 -04:00
weslambert 3847863b3d Add time shift 2023-08-03 08:51:23 -04:00
weslambert 3368789b43 Update VERSION 2023-08-03 08:49:45 -04:00
Josh Brower 1bc7bbc76e Refactor custom_fqdn 2023-08-02 20:02:37 -04:00
Jason Ertel e108bb9bcd Merge pull request #10932 from Security-Onion-Solutions/jertel/agentcommon
remove unused vars
2023-08-02 19:29:03 -04:00
Jason Ertel 5414b0756c remove unused vars 2023-08-02 19:25:07 -04:00
Jason Ertel 11c827927c Merge pull request #10931 from Security-Onion-Solutions/jertel/agentcommon
refactor elastic-agent download for soup ctrl+c anomalies
2023-08-02 19:20:45 -04:00
Jason Ertel 3054b8dcb9 refactor elastic-agent download for soup ctrl+c anomalies 2023-08-02 18:57:46 -04:00
Josh Brower 399758cd5f Merge remote-tracking branch 'origin/2.4/dev' into 2.4/FleetEnhancments 2023-08-02 17:58:48 -04:00
Josh Brower 1c8a8c460c Restart logstash when certs change 2023-08-02 17:53:29 -04:00
Josh Brower ab28cee7cf Allow multiple Custom Fleet FQDN 2023-08-02 17:45:37 -04:00
Mike Reeves 5a3c1f0373 Merge pull request #10930 from Security-Onion-Solutions/m0duspwnens-patch-2
add gtk2
2023-08-02 16:58:38 -04:00
Josh Patterson 435da77388 add gtk2 2023-08-02 16:53:45 -04:00
Mike Reeves da2910e36f Merge pull request #10927 from Security-Onion-Solutions/m0duspwnens-patch-1
add mono-devel
2023-08-02 16:22:09 -04:00
Josh Patterson eb512d9aa2 add mono-devel 2023-08-02 16:21:23 -04:00
Mike Reeves 03f5e44be7 Merge pull request #10924 from Security-Onion-Solutions/2.4/regenagent
Regen Agent Installers
2023-08-02 15:28:29 -04:00
Josh Brower f153c1125d Allow multiple Custom Fleet FQDN 2023-08-02 15:23:18 -04:00
Jason Ertel 99b61b5e1d Merge pull request #10925 from Security-Onion-Solutions/jertel/fiximportsuri
ensure suri rules are synced for import installs
2023-08-02 15:13:59 -04:00
Jason Ertel 8036df4b20 ensure suri rules are synced for import installs 2023-08-02 15:10:31 -04:00
Josh Brower aab55c8cf6 Regen Agent Installers 2023-08-02 15:09:26 -04:00
Josh Patterson f3c5d26a4e Merge pull request #10923 from Security-Onion-Solutions/soupaloop
Soupaloop
2023-08-02 14:44:49 -04:00
m0duspwnens 64776936cc no longer need so-user migrate in 2.4 2023-08-02 14:09:43 -04:00
m0duspwnens c17b324108 dont count adv_ sls files for number of minions in deployment 2023-08-02 14:04:19 -04:00
weslambert 72e1cbbfb6 Merge pull request #10920 from Security-Onion-Solutions/fix/pfsense
Pfsense fix
2023-08-02 13:27:33 -04:00
weslambert f102351052 Add event 2023-08-02 13:25:44 -04:00
weslambert ac28f90af3 Remove override 2023-08-02 13:15:11 -04:00
m0duspwnens f6c6204555 procps to procps-ng 2023-08-02 13:05:24 -04:00
m0duspwnens 9873121000 change pgrep for salt-minion PID 2023-08-02 12:54:31 -04:00
m0duspwnens 5630b353c4 change how pgrep finds salt-master PID 2023-08-02 11:20:51 -04:00
Josh Patterson 04ed5835ae Merge pull request #10918 from Security-Onion-Solutions/issue/10917
force portgroups added to hostgroups in roles to be list of strings
2023-08-02 11:00:41 -04:00
m0duspwnens 407cb2a537 force portgroups added to hostgroups in roles to be list of strings 2023-08-02 10:56:41 -04:00
Josh Brower b520c1abb7 Allow multiple Custom Fleet FQDN 2023-08-02 10:36:40 -04:00
weslambert 25b11c35fb Merge pull request #10915 from Security-Onion-Solutions/fix/ea_elastic_defend
Set version for Elastic Defend and enable updates
2023-08-02 10:32:30 -04:00
weslambert ef0301d364 Merge pull request #10914 from Security-Onion-Solutions/feature/package_list
Add package list
2023-08-02 10:03:38 -04:00
Wes e694019027 Add package list 2023-08-02 13:50:14 +00:00
weslambert 22ebb2faf6 Merge pull request #10907 from Security-Onion-Solutions/fix/ea_container_logs
EA Container Logs
2023-08-02 09:26:53 -04:00
Wes 0d5ed2e835 Set version for Elastic Defend and enable updates 2023-08-02 13:21:03 +00:00
Josh Patterson 8ab1769d70 Merge pull request #10912 from Security-Onion-Solutions/mineerror
Mine error
2023-08-01 17:21:31 -04:00
Jason Ertel 6692fffb9b Merge pull request #10910 from Security-Onion-Solutions/jertel/noautoredirforapi
Fix login flicker; so-status sluggishness
2023-08-01 17:05:48 -04:00
Jason Ertel 23414599ee use simple json (w/o template) to resolve sluggishness 2023-08-01 16:53:26 -04:00
Jason Ertel 8b3a38f573 resolve login page flicker 2023-08-01 16:30:24 -04:00
m0duspwnens 9ec4322bf4 Merge remote-tracking branch 'origin/2.4/dev' into mineerror 2023-08-01 16:21:22 -04:00
m0duspwnens 7037fc52f8 sync all modules before running states 2023-08-01 16:21:06 -04:00
Wes 0e047cffad Add to logrotate 2023-08-01 20:14:53 +00:00
Wes 44b086a028 Change path 2023-08-01 20:13:50 +00:00
Wes 4e2eb86b36 Move LOGS_PATH to environment vars 2023-08-01 20:11:51 +00:00
weslambert 1cbf60825d Add log dir 2023-08-01 14:40:52 -04:00
weslambert 2d13bf1a61 Present logs to the host 2023-08-01 14:40:12 -04:00
Josh Brower 968fee3488 Regen Agent Installers when Fleet URLs change 2023-08-01 13:10:41 -04:00
Doug Burks da51fd59a0 Merge pull request #10905 from Security-Onion-Solutions/dougburks-patch-1
Update verbiage and links in soc_sensor.yaml
2023-08-01 12:52:22 -04:00
Doug Burks 3fa0a98830 Update verbiage and links in soc_sensor.yaml 2023-08-01 12:45:09 -04:00
weslambert e7bef745eb Merge pull request #10904 from Security-Onion-Solutions/fix/syslog
Move syslog to the INPUT chain where needed
2023-08-01 12:14:48 -04:00
Mike Reeves 82b335ed04 Merge pull request #10899 from Security-Onion-Solutions/offload
Fix Offload
2023-08-01 10:32:53 -04:00
Mike Reeves f35f42c83d Sensor NIC offload 2023-08-01 10:23:45 -04:00
weslambert 4adaddf13f Move syslog to the INPUT chain where needed 2023-08-01 10:14:59 -04:00
Mike Reeves b6579d7d45 Sensor NIC offload 2023-08-01 10:13:44 -04:00
Mike Reeves 87a5d20ac9 Sensor NIC offload 2023-08-01 10:03:59 -04:00
Mike Reeves 2875a7a2e5 Sensor NIC offload 2023-08-01 09:48:44 -04:00
Josh Brower f27ebc47c1 Merge pull request #10897 from Security-Onion-Solutions/2.4/heavyrc2
2.4/heavyrc2
2023-08-01 09:15:10 -04:00
Josh Brower 63b4bdcebe Merge remote-tracking branch 'origin/2.4/dev' into 2.4/heavyrc2 2023-08-01 08:53:07 -04:00
weslambert ba3660d0da Merge pull request #10894 from Security-Onion-Solutions/fix/soc_auth
SOC Auth msg fix
2023-08-01 08:35:41 -04:00
weslambert 83265d9d6c Merge pull request #10893 from Security-Onion-Solutions/foxtrot
Elastic 8.2.2
2023-08-01 08:20:07 -04:00
weslambert 527a6ba454 Use asterisk when searching 'msg' since it is now a keyword 2023-07-31 23:52:38 -04:00
weslambert f84b0a3219 Update VERSION 2023-07-31 23:16:46 -04:00
weslambert ae6997a6b7 Merge pull request #10892 from Security-Onion-Solutions/feature/elastic_8.8.2
Elastic 8.8.2
2023-07-31 22:24:21 -04:00
weslambert 9d59e4250f Update VERSION 2023-07-31 22:23:54 -04:00
Wes 48d9c14563 Enable log package by default 2023-08-01 02:20:43 +00:00
Wes 29b64eadd4 Change log.log to log.logs 2023-08-01 02:20:22 +00:00
weslambert 5dd5f9fc1c Elastic 8.8.2 2023-07-31 22:18:43 -04:00
weslambert 44c926ba8d Elastic 8.8.2 2023-07-31 22:18:07 -04:00
weslambert 6a55a8e5c0 Elastic 8.2.2 2023-07-31 22:17:22 -04:00
Josh Brower 64bad0a9cf Merge remote-tracking branch 'origin/2.4/dev' into 2.4/heavyrc2 2023-07-31 15:24:32 -04:00
Josh Brower b6dd347eb8 Heavy Node add manager 2023-07-31 15:22:29 -04:00
Josh Brower a89508f1ae Heavy Node fixes 2023-07-31 15:17:24 -04:00
Josh Patterson ed7b674fbb Merge pull request #10891 from Security-Onion-Solutions/fix/idh
import DOCKER in idh.enabled
2023-07-31 15:06:26 -04:00
Josh Patterson 0c2a4cbaba Merge pull request #10889 from Security-Onion-Solutions/searchnodefw
add managersearch and standlone fw rules for searchnode
2023-07-31 13:37:39 -04:00
m0duspwnens 57562ad5e3 add managersearch and standlone fw rules for searchnode 2023-07-31 13:34:08 -04:00
m0duspwnens 95581f505a import DOCKER in idh.enabled 2023-07-31 13:18:57 -04:00
Mike Reeves 599de60dc8 Merge pull request #10888 from Security-Onion-Solutions/soups
Update Soup
2023-07-31 13:14:54 -04:00
Mike Reeves 77101fec12 Update Soup 2023-07-31 13:12:32 -04:00
Mike Reeves 069d32be1a Merge pull request #10887 from Security-Onion-Solutions/soups
Soup
2023-07-31 13:10:02 -04:00
Mike Reeves e78e6b74ed Update Soup 2023-07-31 13:07:29 -04:00
Mike Reeves 16217912db Update Soup 2023-07-31 13:04:33 -04:00
Josh Patterson 635ddc9b21 Merge pull request #10886 from Security-Onion-Solutions/iptables
Iptables
2023-07-31 11:36:22 -04:00
Mike Reeves 18d8f0d448 Merge pull request #10885 from Security-Onion-Solutions/sensorfix
Sensor Fix
2023-07-31 10:37:28 -04:00
Mike Reeves 1c42d70d30 Update soc_sensor.yaml 2023-07-31 10:36:00 -04:00
Mike Reeves 282f13a774 Merge pull request #10881 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update so-yara-download
2023-07-31 10:23:32 -04:00
Mike Reeves f867be9e04 Fix no_proxy 2023-07-31 10:19:51 -04:00
Mike Reeves 4939447764 Update so-yara-download 2023-07-31 10:16:37 -04:00
Mike Reeves 5a59975cb8 Update so-yara-download 2023-07-31 10:14:31 -04:00
coreyogburn 20f3cedc01 Merge pull request #10842 from Security-Onion-Solutions/cogburn/7992
New Action "Add to Case"
2023-07-28 14:54:28 -06:00
Doug Burks e563d71856 Merge pull request #10871 from Security-Onion-Solutions/dougburks-patch-1
Update README.md to 2.4 RC2
2023-07-28 16:33:06 -04:00
Doug Burks 1ca78fd297 Update README.md to 2.4 RC2 2023-07-28 16:29:46 -04:00
Mike Reeves e76ee718e0 Merge pull request #10870 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-07-28 16:08:53 -04:00
Mike Reeves 5c90a5f27e Update VERSION 2023-07-28 16:08:01 -04:00
Mike Reeves bee429fe29 Merge pull request #10868 from Security-Onion-Solutions/2.4/dev
2.4.4
2023-07-28 16:00:45 -04:00
m0duspwnens ecbb353d68 Merge remote-tracking branch 'origin/2.4/dev' into iptables 2023-07-28 15:12:08 -04:00
Mike Reeves ed21b94c28 Merge pull request #10867 from Security-Onion-Solutions/2.4.4
2.4.4
2023-07-28 14:53:23 -04:00
Mike Reeves 2a282a29c3 2.4.4 2023-07-28 14:49:50 -04:00
Mike Reeves bc09b418ca Merge pull request #10866 from Security-Onion-Solutions/rockyepel
Rockyepel
2023-07-28 14:06:36 -04:00
m0duspwnens 6f6db61a69 remove epel-next 2023-07-28 14:04:27 -04:00
m0duspwnens 9fce80dba3 install epel-next after epel-release 2023-07-28 14:01:14 -04:00
Mike Reeves abfec85e28 Merge pull request #10863 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update so-functions
2023-07-28 12:21:20 -04:00
Mike Reeves 9aa655365b Update so-functions 2023-07-28 12:20:15 -04:00
Corey Ogburn aa56085758 New Action "Add to Case" 2023-07-28 09:55:44 -06:00
Mike Reeves 9a3760951a Merge pull request #10861 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update so-functions
2023-07-28 11:35:49 -04:00
m0duspwnens 4c8373452d change to iptables-nft-services 2023-07-28 11:35:34 -04:00
Mike Reeves 0bb5db2e72 Update so-functions 2023-07-28 11:34:30 -04:00
Mike Reeves 2dbc7d8485 Merge pull request #10859 from Security-Onion-Solutions/ordesk
Ordesk
2023-07-28 10:56:15 -04:00
Mike Reeves 858e884ec2 Fix Desktop ISO install 2023-07-28 10:52:37 -04:00
Mike Reeves 4672eeb99b Fix Desktop ISO install 2023-07-28 10:51:45 -04:00
Mike Reeves aa824e7b6c Merge pull request #10857 from Security-Onion-Solutions/ordesk
Oracle Desktop
2023-07-28 09:58:46 -04:00
Mike Reeves bb2a1b9521 Fix Desktop ISO install 2023-07-28 09:46:27 -04:00
m0duspwnens 3a22ef8e86 change iptables package name for redhat fam 2023-07-28 08:40:32 -04:00
m0duspwnens 54080c42fe enable, not enabled 2023-07-27 17:01:19 -04:00
Mike Reeves a1fa87c150 Merge pull request #10853 from Security-Onion-Solutions/TOoSmOotH-patch-1
Don't restart suricata if it doesn't exist
2023-07-27 16:38:45 -04:00
Mike Reeves 0c553633b1 Don't restart suricata if it doesn't exist 2023-07-27 16:16:46 -04:00
m0duspwnens 12486599e0 Merge remote-tracking branch 'origin/2.4/dev' into iptables 2023-07-27 16:13:58 -04:00
m0duspwnens 3c16218c5a map services,pkg,config for firewall state 2023-07-27 15:45:18 -04:00
Josh Patterson f9850025ea Merge pull request #10852 from Security-Onion-Solutions/2.4/debian
2.4/debian
2023-07-27 15:05:23 -04:00
Mike Reeves 65b76d72ca Merge pull request #10850 from Security-Onion-Solutions/ordesk
Fix packages for desktop
2023-07-27 14:44:44 -04:00
Mike Reeves afca15f444 Fix packages for desktop 2023-07-27 14:17:43 -04:00
Mike Reeves 65b9843f14 Fix packages for desktop 2023-07-27 14:11:53 -04:00
m0duspwnens 653e2d8205 Merge remote-tracking branch 'origin/2.4/dev' into 2.4/debian 2023-07-27 10:26:12 -04:00
Josh Patterson bbaf6df914 Merge pull request #10849 from Security-Onion-Solutions/iptables
Iptables
2023-07-27 10:00:46 -04:00
m0duspwnens bc182c1c43 only run firewalld states if os_family is RedHat 2023-07-27 09:24:41 -04:00
m0duspwnens fe9b934af6 Merge remote-tracking branch 'origin/2.4/dev' into iptables 2023-07-26 16:32:03 -04:00
m0duspwnens 373298430b only run iptables-restore if config file is valid 2023-07-26 16:31:22 -04:00
Mike Reeves 4a18eb02f3 Merge pull request #10847 from Security-Onion-Solutions/ordesk
SO Desktop
2023-07-26 15:53:40 -04:00
m0duspwnens 0aab3e185e dont manage interfaces listed in /etc/network/interfaces for debian 2023-07-26 15:16:44 -04:00
Josh Brower b1fb05dd28 Merge pull request #10841 from Security-Onion-Solutions/2.4/eqlfields
Fix formatting
2023-07-26 11:25:20 -04:00
Josh Brower 9437a47946 Fix formatting 2023-07-26 10:54:24 -04:00
Josh Brower bdf4f6190d Merge pull request #10829 from Security-Onion-Solutions/2.4/heavynoderedux
Heavy Node fixes
2023-07-26 10:41:42 -04:00
Josh Brower f24a3a51ce Heavy Node fixes 2023-07-25 18:28:41 -04:00
m0duspwnens ba6043392c reorder whiptail text 2023-07-25 16:18:01 -04:00
m0duspwnens 60eb1611ea upgrade packages for debian and reboot prior to so installation 2023-07-25 16:06:38 -04:00
Josh Brower 3ef6ea9155 Merge pull request #10826 from Security-Onion-Solutions/2.4/navfix
Upgrade Nav
2023-07-25 12:26:07 -04:00
Josh Brower 2b38bc778d Upgrade Nav 2023-07-25 12:24:23 -04:00
m0duspwnens e334d44c95 need quotes for logCmd 2023-07-25 11:03:10 -04:00
m0duspwnens 39662ccf14 import rpm logic change 2023-07-25 10:21:44 -04:00
m0duspwnens fd69d1c714 remove quotes so sed will work in logCmd 2023-07-25 09:59:02 -04:00
m0duspwnens 63eebdf6ac installer_prereq_packages is run for debian during detect_os so not needed again 2023-07-25 09:58:26 -04:00
Josh Brower e19845e41d Merge pull request #10819 from Security-Onion-Solutions/fix/elasticsearch_endpoint
Add endpoint to defaults
2023-07-25 09:11:06 -04:00
Josh Patterson c1190064ad Merge pull request #10823 from Security-Onion-Solutions/2.4/dockerips
2.4/dockerips
2023-07-25 08:39:49 -04:00
Josh Brower 4f94d953c9 Merge remote-tracking branch 'origin/2.4/dev' into fix/elasticsearch_endpoint 2023-07-25 07:42:59 -04:00
Josh Brower 71a83c1fe9 Merge pull request #10815 from Security-Onion-Solutions/2.4/SigmaMappings
2.4/sigma mappings
2023-07-25 07:23:25 -04:00
Wes 5553be02ac Change how tags are added 2023-07-24 21:31:28 +00:00
m0duspwnens b20fad2839 add missing do 2023-07-24 17:08:01 -04:00
m0duspwnens 16edca7834 fix failed copy paste 2023-07-24 17:06:49 -04:00
m0duspwnens 2545f9907f dont allow 172.17.0.0/24 for custom dockernet 2023-07-24 17:00:20 -04:00
Wes 4efc951eaf Add tags 2023-07-24 20:57:39 +00:00
Doug Burks d75191d679 Merge pull request #10820 from Security-Onion-Solutions/dougburks-patch-1
Update README.md
2023-07-24 15:35:34 -04:00
Doug Burks ee667a48c9 Update README.md 2023-07-24 15:33:50 -04:00
Josh Brower 067a83a87c Merge pull request #10818 from Security-Onion-Solutions/2.4/fixnavigator
Update & Fix Navigator
2023-07-24 15:13:09 -04:00
Wes d84dbf9535 Add fleet 2023-07-24 18:53:52 +00:00
m0duspwnens d71254ad29 only add custom docker net to pillar 2023-07-24 14:47:14 -04:00
Wes de7b7ff989 Add endpoint 2023-07-24 18:35:02 +00:00
Josh Brower 510900e640 Update & Fix Navigator 2023-07-24 13:56:22 -04:00
m0duspwnens 00483018ca change docker bip to gateway 2023-07-24 13:38:14 -04:00
Mike Reeves 9416a14971 Merge pull request #10816 from Security-Onion-Solutions/gpgoracle
add oracle key
2023-07-24 11:02:10 -04:00
Mike Reeves c9faa1a340 Add gui 2023-07-24 11:00:26 -04:00
m0duspwnens 9bda01bd29 change ranges 2023-07-24 10:40:23 -04:00
Josh Brower eead0c42d4 Merge remote-tracking branch 'origin/2.4/dev' into 2.4/SigmaMappings 2023-07-24 09:27:14 -04:00
Josh Brower 741e6039c1 Cleanup for Sigma Rules 2023-07-24 09:25:58 -04:00
m0duspwnens db09b465bd change default docker net/range 2023-07-24 09:23:13 -04:00
Doug Burks a59f2ded38 Merge pull request #10813 from Security-Onion-Solutions/2.4/fix-packages-sls
Update packages.sls
2023-07-24 08:08:11 -04:00
Doug Burks e2fe04dadc Update packages.sls 2023-07-24 07:10:48 -04:00
Doug Burks 563bf2ff3a Merge pull request #10812 from Security-Onion-Solutions/fuse
Update packages.sls
2023-07-24 06:48:47 -04:00
Mike Reeves 07eeb4e2a0 Update packages.sls 2023-07-23 21:07:19 -04:00
Mike Reeves 5dc5b99b05 Add gui 2023-07-21 18:00:01 -04:00
Mike Reeves ba69c67dc2 Add gui 2023-07-21 17:30:17 -04:00
Mike Reeves d1d5f8a2b6 Add gui 2023-07-21 17:28:09 -04:00
Mike Reeves 48324911ce Add gui 2023-07-21 17:18:03 -04:00
m0duspwnens 4b0126a2e7 fix split 2023-07-21 17:10:51 -04:00
Mike Reeves 8a3c2e7242 Add gui 2023-07-21 17:06:38 -04:00
m0duspwnens f55c1a4078 DOCKERBIP change 2023-07-21 16:59:22 -04:00
m0duspwnens c4d81a249a remove /24 from DOCKERBIP 2023-07-21 16:36:03 -04:00
m0duspwnens 4c9d172721 sorange to range 2023-07-21 16:21:18 -04:00
m0duspwnens 36a936d3d6 docker ips changes 2023-07-21 16:06:52 -04:00
coreyogburn d6164446c6 Merge pull request #10809 from Security-Onion-Solutions/cogburn/8655
Added ReverseLookup Option
2023-07-21 13:38:38 -06:00
Corey Ogburn bb7a918a16 Added ReverseLookup Option
Defaults to false, has metadata to show up in the config section of soc.
2023-07-21 13:18:08 -06:00
weslambert be254b15f2 Merge pull request #10804 from Security-Onion-Solutions/fix/fleet_logging
Fleet logging
2023-07-20 15:51:56 -04:00
weslambert 83e1e3efdc Merge pull request #10788 from Security-Onion-Solutions/fix/elastic_mappings
Fix user name mapping and remove security subfield
2023-07-20 15:51:42 -04:00
Mike Reeves 7c48f9d6ec Merge pull request #10806 from Security-Onion-Solutions/newrhel
For Phil
2023-07-20 14:41:05 -04:00
Mike Reeves f2947de0ca Add epel-next 2023-07-20 12:13:36 -04:00
Wes d07c46f27e Change playbook and sysmon 2023-07-20 16:08:50 +00:00
Mike Reeves 47e418a441 Add epel-next 2023-07-20 12:07:26 -04:00
Mike Reeves 87b1207ac0 Merge pull request #10805 from Security-Onion-Solutions/alma
Test Alma
2023-07-20 10:57:19 -04:00
Mike Reeves a86cbaa6fa Merge pull request #10803 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update needs_restarting.py
2023-07-20 10:55:11 -04:00
Wes c68cd6cf33 Fix typo 2023-07-20 14:39:35 +00:00
Josh Patterson 3071a1de41 Update map.jinja 2023-07-20 08:42:27 -04:00
Josh Patterson e75d0c8094 Update needs_restarting.py 2023-07-20 08:36:27 -04:00
Mike Reeves 14c685ab10 Update needs_restarting.py 2023-07-20 08:32:19 -04:00
Mike Reeves 54082858dc Update needs_restarting.py 2023-07-20 08:25:13 -04:00
Wes 4b7e7978ef Add final pipeline 2023-07-19 19:56:54 +00:00
Josh Patterson 066de70638 Merge pull request #10799 from Security-Onion-Solutions/2.4/mysql
whiptails for ubuntu focal
2023-07-19 15:55:32 -04:00
m0duspwnens 19c6796927 only allow existing deployment for focal 2023-07-19 15:38:18 -04:00
m0duspwnens 77c9b4fb54 remove OTHER 2023-07-19 15:35:28 -04:00
m0duspwnens 3104137190 install type whiptail for focal 2023-07-19 15:31:09 -04:00
Josh Patterson c8b65ecca0 Merge pull request #10798 from Security-Onion-Solutions/2.4/mysql
2.4/mysql
2023-07-19 14:55:35 -04:00
Mike Reeves 555c881235 Test Alma 2023-07-19 14:48:12 -04:00
m0duspwnens 0ac9a1f9cc Merge remote-tracking branch 'origin/2.4/dev' into 2.4/mysql 2023-07-19 14:41:03 -04:00
m0duspwnens 3c0554a42c queue states during so-playbook-reset 2023-07-19 14:40:29 -04:00
Wes 0b19179630 Add logrotate 2023-07-19 15:17:42 +00:00
Wes 30a14f8aaf Add logging 2023-07-19 15:00:20 +00:00
Wes 877fc36013 Add log dir 2023-07-19 14:57:24 +00:00
Mike Reeves a892adb66f Merge pull request #10668 from Security-Onion-Solutions/centos
CentOS Stream Support
2023-07-19 10:41:38 -04:00
Mike Reeves a49b05661d Merge pull request #10794 from Security-Onion-Solutions/2.4/mysql
2.4/mysql
2023-07-19 10:40:37 -04:00
Jason Ertel 266fc4e866 Merge pull request #10792 from Security-Onion-Solutions/regup
upgrade registry version
2023-07-19 10:00:40 -04:00
Wes b738325880 Remove keyword 2023-07-19 13:55:12 +00:00
m0duspwnens ad7821391d Merge remote-tracking branch 'origin/2.4/dev' into 2.4/mysql 2023-07-19 09:54:54 -04:00
m0duspwnens 1b0c146b54 get rid of mysql error: mbind: Operation not permitted 2023-07-19 09:54:00 -04:00
Wes 1848a835f5 Remove keyword 2023-07-19 13:52:15 +00:00
Jason Ertel 23cc75c68d upgrade registry version 2023-07-19 09:51:07 -04:00
weslambert 17fcf12608 Merge pull request #10791 from Security-Onion-Solutions/fix/elastic_clear
Set delete for interactive
2023-07-19 08:27:00 -04:00
Wes 6a8737e9a2 Set delete for interactive 2023-07-19 12:21:47 +00:00
m0duspwnens 9543058a2c Merge remote-tracking branch 'origin/2.4/dev' into 2.4/mysql 2023-07-18 16:51:52 -04:00
m0duspwnens b66cd82110 fix depreciations 2023-07-18 16:50:34 -04:00
weslambert 41ebb403ca Merge pull request #10787 from Security-Onion-Solutions/fix/elastic_clear
Use new agent scripts for Elastic clear command
2023-07-18 16:15:27 -04:00
Mike Reeves c94436fcbd fix other OS installs 2023-07-18 15:19:10 -04:00
Wes a59eda319e Remove security subfield 2023-07-18 19:00:50 +00:00
Wes 8a76975d8c Use new agent scripts 2023-07-18 18:43:57 +00:00
Mike Reeves 737da45e7f fix other OS installs 2023-07-18 14:02:13 -04:00
m0duspwnens df1bf8e67b restart mysql container if config or pass changes 2023-07-18 13:41:26 -04:00
Mike Reeves f95757c551 fix other OS installs 2023-07-18 11:58:49 -04:00
Mike Reeves 5e46138961 fix other OS installs 2023-07-18 11:55:51 -04:00
Mike Reeves dc8aa4d923 fix other OS installs 2023-07-18 11:53:55 -04:00
Wes 1d3e39b6bd Map user name to keyword and remove security subfield generation 2023-07-18 14:46:47 +00:00
Mike Reeves 9ad7303cf2 fix other OS installs 2023-07-17 16:44:55 -04:00
Mike Reeves b1daa22dfc fix other OS installs 2023-07-17 16:40:35 -04:00
Mike Reeves 49c4edbcbe fix other OS installs 2023-07-17 16:33:47 -04:00
Mike Reeves f4c3103f84 fix other OS installs 2023-07-17 16:24:51 -04:00
Mike Reeves a2aea5530b Merge pull request #10779 from Security-Onion-Solutions/palletethings
Palletethings
2023-07-17 16:20:44 -04:00
Mike Reeves 01234f87f9 fix other OS installs 2023-07-17 16:20:32 -04:00
m0duspwnens 5d4186ac07 different whiptail warning if ubuntu 20.04 2023-07-17 15:56:29 -04:00
m0duspwnens 425ca35a22 Merge remote-tracking branch 'origin/centos' into palletethings 2023-07-17 13:58:00 -04:00
m0duspwnens fe5ca3a0c8 set palette after detecting os and before whiptail 2023-07-17 13:51:14 -04:00
Mike Reeves 7fad710ca1 fix other OS installs 2023-07-17 13:51:01 -04:00
Mike Reeves 8d6c2600c9 fix other OS installs 2023-07-17 13:49:08 -04:00
Mike Reeves 38c7ea0801 fix other OS installs 2023-07-17 13:44:02 -04:00
Mike Reeves abe0a9ec27 fix other OS installs 2023-07-17 11:03:28 -04:00
Mike Reeves f0f8513370 fix other OS installs 2023-07-17 11:02:34 -04:00
Mike Reeves bffd24e0d5 fix other OS installs 2023-07-17 10:55:04 -04:00
Mike Reeves 71cbab8fcc fix other OS installs 2023-07-17 10:47:24 -04:00
weslambert 6816d06710 Merge pull request #10766 from Security-Onion-Solutions/fix/elastic-agent-scripts
Add agent scripts
2023-07-17 10:46:54 -04:00
Wes d19615f743 Fix typo 2023-07-17 14:42:27 +00:00
Mike Reeves 894e009b95 fix other OS installs 2023-07-17 10:34:14 -04:00
Wes 1a4515fc8a Split restart into stop and start 2023-07-17 14:30:51 +00:00
Wes 31696803e1 Use correct name 2023-07-17 14:28:12 +00:00
Wes e715dfa354 Remove sbin 2023-07-17 14:27:39 +00:00
Wes c723a09107 Remove agent installer generation script 2023-07-14 21:45:25 +00:00
Wes 8cf3ceeb71 Update agent scripts 2023-07-14 21:43:03 +00:00
Mike Reeves 921fc95668 Fix logic 2023-07-14 14:35:51 -04:00
Doug Burks 9e42fb927d Add RPM-GPG-KEY-oracle 2023-07-14 14:04:36 -04:00
Mike Reeves 87d72e852c Fix logic 2023-07-14 13:45:31 -04:00
m0duspwnens ba2782c5e7 patch x509_v2.py 2023-07-14 13:22:40 -04:00
Mike Reeves 9169fca9f8 Merge branch '2.4/dev' into centos 2023-07-14 13:17:52 -04:00
Mike Reeves 1028fb1346 Fix ISO install 2023-07-14 13:17:20 -04:00
Josh Brower 6846487909 Merge pull request #10765 from Security-Onion-Solutions/2.4/FleetEnhancements
Retry install
2023-07-14 13:07:25 -04:00
Josh Brower 2cc0c4c0ac Automatically Update ES URLs 2023-07-14 12:07:32 -04:00
Mike Reeves 5a5b643155 Fix ISO install 2023-07-14 12:04:30 -04:00
Josh Patterson e97bec2bc1 Merge pull request #10769 from Security-Onion-Solutions/wtinstalltype
Wtinstalltype
2023-07-14 09:22:40 -04:00
Josh Brower 78db64a419 Auto-managed Fleet Server URLs 2023-07-14 08:40:26 -04:00
m0duspwnens 55d32c5b98 merge and fix conflicts 2023-07-14 08:37:03 -04:00
Mike Reeves 333213d1dd Multi OS Support 2023-07-13 18:40:48 -04:00
Mike Reeves 03b16a5582 Multi OS Support 2023-07-13 18:29:02 -04:00
Mike Reeves 20c76abac4 Multi OS Support 2023-07-13 18:27:21 -04:00
m0duspwnens 4158e18675 warn of unsupported os 2023-07-13 16:38:51 -04:00
Mike Reeves f0c391e801 Multi OS Support 2023-07-13 15:05:51 -04:00
weslambert 922a77ac55 Merge pull request #10762 from Security-Onion-Solutions/fix/integration_elasticsearch
Allow Elasticsearch integration policy
2023-07-13 14:42:23 -04:00
weslambert a62f96595c Merge pull request #10763 from Security-Onion-Solutions/fix/strelka_pe
Strelka entropy and pe fixes
2023-07-13 14:42:12 -04:00
Josh Brower fb8a79e112 Retry install 2023-07-13 13:15:01 -04:00
Mike Reeves 782a3eccfe Initial Oracle support 2023-07-13 11:29:18 -04:00
Mike Reeves 2c996fe7ad Initial Oracle support 2023-07-13 10:54:04 -04:00
weslambert 0c177ec923 Allow Elasticsearch integration policy 2023-07-13 10:46:59 -04:00
Wes 41f00c0aa1 Add agent scripts 2023-07-13 14:32:22 +00:00
Mike Reeves 05b30771c5 Initial Oracle support 2023-07-13 10:29:06 -04:00
Wes e3249c8e4c Wrap values in quotes for proper conversion 2023-07-13 14:18:57 +00:00
Mike Reeves a0b6e1076f Initial Oracle support 2023-07-13 10:04:55 -04:00
weslambert 85bb5a327c Fix long vs float for pe version 2023-07-13 09:38:09 -04:00
Mike Reeves 68f5c9965a Initial Oracle support 2023-07-13 09:24:01 -04:00
Mike Reeves 727d0443a2 Merge pull request #10757 from Security-Onion-Solutions/TOoSmOotH-patch-5
Update VERSION
2023-07-13 08:53:35 -04:00
Mike Reeves b915cea52f Initial Oracle support 2023-07-13 08:44:20 -04:00
Mike Reeves d98a1d5ae5 Initial Oracle support 2023-07-13 08:40:09 -04:00
Josh Brower 6f5bb136ff Merge pull request #10753 from Security-Onion-Solutions/2.4/integrationfixes
Update Integration JSON
2023-07-13 07:34:32 -04:00
Mike Reeves 695ec149f1 Initial Oracle support 2023-07-12 15:07:26 -04:00
Mike Reeves 50103aebb3 Initial Oracle support 2023-07-12 14:59:36 -04:00
Mike Reeves 6f81e234cd Initial Oracle support 2023-07-12 14:52:23 -04:00
Mike Reeves 7732435b64 Initial Oracle support 2023-07-12 14:49:59 -04:00
Mike Reeves 2cf36f1e8f Initial Oracle support 2023-07-12 14:12:24 -04:00
Mike Reeves 43d63a3187 Update VERSION 2023-07-12 10:59:12 -04:00
Josh Brower 40294e2762 Update Integration JSON 2023-07-12 08:49:36 -04:00
Mike Reeves a3f79850fe Initial Oracle support 2023-07-10 20:31:49 -04:00
Mike Reeves b9204cbe99 Initial RHEL support 2023-07-10 12:57:59 -04:00
Mike Reeves 6f7914f3c4 Initial RHEL support 2023-07-10 10:18:09 -04:00
Mike Reeves 0c9e230294 Initial RHEL support 2023-07-10 10:14:47 -04:00
Mike Reeves fa1d53a309 Add Debian 2023-07-07 13:00:39 -04:00
Mike Reeves a41b0dbfea Add Debian 2023-07-07 12:59:41 -04:00
Mike Reeves d28375b304 Add Debian 2023-07-07 12:54:47 -04:00
Mike Reeves 07c0b539d7 Add Debian 2023-07-07 12:53:23 -04:00
Mike Reeves d18ebd6e36 Add Debian 2023-07-07 12:52:45 -04:00
Mike Reeves 5a642b151b Add Debian 2023-07-07 12:51:17 -04:00
Mike Reeves 0aa4ea3e87 Add Debian 2023-07-07 12:49:11 -04:00
Mike Reeves efcef90ead Add Debian 2023-07-07 11:37:33 -04:00
Mike Reeves af56aa4f16 Add Debian 2023-07-07 11:35:11 -04:00
Mike Reeves d5257468eb Add Debian 2023-07-07 11:31:18 -04:00
Mike Reeves a3b0db7949 Add Debian 2023-07-07 11:27:42 -04:00
Mike Reeves 5f509eb2d8 Add Debian 2023-07-07 11:24:59 -04:00
Mike Reeves a38d561684 Add Debian 2023-07-07 11:21:47 -04:00
Mike Reeves 4b559ec182 Add Debian 2023-07-07 11:19:36 -04:00
Mike Reeves 0b209d69e5 Add Debian 2023-07-07 11:02:26 -04:00
Josh Patterson 11493cb615 Merge pull request #10697 from Security-Onion-Solutions/jppcentos
Jppcentos
2023-07-05 09:52:01 -04:00
m0duspwnens 0def41f03c Merge remote-tracking branch 'origin/centos' into jppcentos 2023-07-05 08:44:49 -04:00
Mike Reeves 1c191e426f Add some Ubuntu 2023-07-03 16:20:44 -04:00
m0duspwnens de98baaad4 Merge remote-tracking branch 'origin/centos' into jppcentos 2023-07-03 15:46:30 -04:00
m0duspwnens df0e19ff80 update-alternatives for python3.10 2023-07-03 15:44:51 -04:00
Mike Reeves d22d864ba6 Add some Ubuntu 2023-07-03 15:23:56 -04:00
Mike Reeves 898b352af9 Add some Ubuntu 2023-07-03 15:16:12 -04:00
Mike Reeves 76a8e315b7 Add some Ubuntu 2023-07-03 15:12:56 -04:00
Mike Reeves edaf695463 Add some Ubuntu 2023-07-03 15:12:55 -04:00
Mike Reeves 53fcac4a02 Add some Ubuntu 2023-07-03 15:12:55 -04:00
Mike Reeves 44054ba95f Add some Ubuntu 2023-07-03 15:12:54 -04:00
Mike Reeves 10aa77977e Add some Ubuntu 2023-07-03 15:12:54 -04:00
Mike Reeves 8e90658856 Add some Ubuntu 2023-07-03 15:12:54 -04:00
Mike Reeves 965d0543f4 Add some Ubuntu 2023-07-03 15:12:53 -04:00
Mike Reeves e353855855 Add some Ubuntu 2023-07-03 15:12:53 -04:00
Mike Reeves c54217a8cb Add some Ubuntu 2023-07-03 15:12:52 -04:00
Mike Reeves 710b3bac3d fix repo state 2023-07-03 15:12:52 -04:00
Mike Reeves 8a90579df7 fix repo state 2023-07-03 15:12:51 -04:00
Mike Reeves 39c8766914 fix repo state 2023-07-03 15:12:51 -04:00
Mike Reeves 694ea743cc add more OS logic 2023-07-03 15:12:51 -04:00
Mike Reeves 3d9e7d1e97 add fuse 2023-07-03 15:12:50 -04:00
Mike Reeves ca71c00f1c add fuse 2023-07-03 15:12:50 -04:00
Mike Reeves 2f2394dca2 add OS logic 2023-07-03 15:12:49 -04:00
Mike Reeves fee4c20912 add OS logic 2023-07-03 15:12:49 -04:00
Mike Reeves 03342fd477 Add more packages 2023-07-03 15:12:49 -04:00
Mike Reeves 6dbff3b9df Add more packages 2023-07-03 15:12:48 -04:00
Mike Reeves 2f375b89a8 Add more packages 2023-07-03 15:12:48 -04:00
Mike Reeves f67ac80c56 Add more packages 2023-07-03 15:12:47 -04:00
Mike Reeves b06a35099f Add more packages 2023-07-03 15:12:47 -04:00
Mike Reeves 087099b9b6 Fix keys 2023-07-03 15:12:47 -04:00
Mike Reeves 04fe2ca996 Fix gpg things 2023-07-03 15:12:46 -04:00
Mike Reeves bdb5748b44 Fix whiptail logic 2023-07-03 15:12:46 -04:00
Mike Reeves 1cbe5580a6 Fix whiptail logic 2023-07-03 15:12:45 -04:00
Mike Reeves b57674a7cc Fix syntax error 2023-07-03 15:12:45 -04:00
Mike Reeves 53bd7bcc29 Initial Support 2023-07-03 15:12:45 -04:00
Mike Reeves 6787b97c6a Initial Support 2023-07-03 15:12:44 -04:00
m0duspwnens 0d43f9aaf4 add repo noninteractively 2023-07-03 14:23:24 -04:00
Mike Reeves 40540f47bf Add some Ubuntu 2023-07-03 13:51:01 -04:00
Mike Reeves 24e05c9491 Add some Ubuntu 2023-07-03 13:45:04 -04:00
Mike Reeves 02c9465dfb Add some Ubuntu 2023-07-03 12:30:53 -04:00
Mike Reeves a4d484ea47 Add some Ubuntu 2023-07-03 12:00:57 -04:00
Mike Reeves c9d650f4c8 Add some Ubuntu 2023-07-03 11:59:07 -04:00
Mike Reeves ed1d2d0a8b Add some Ubuntu 2023-07-03 10:06:16 -04:00
Mike Reeves 903de330c2 Add some Ubuntu 2023-07-03 09:49:24 -04:00
Mike Reeves 8621352701 Add some Ubuntu 2023-07-03 09:38:23 -04:00
Mike Reeves 564ab105ba Add some Ubuntu 2023-07-02 09:34:14 -04:00
Mike Reeves b637e27c8d Merge branch '2.4/dev' of github.com:Security-Onion-Solutions/securityonion into centos 2023-07-02 09:13:06 -04:00
Mike Reeves 34ab949dfc fix repo state 2023-06-29 08:56:38 -04:00
Mike Reeves 59191008a0 fix repo state 2023-06-29 08:55:00 -04:00
Mike Reeves 17a04a75c9 fix repo state 2023-06-29 08:53:00 -04:00
Mike Reeves 884d669ae9 add more OS logic 2023-06-29 08:48:46 -04:00
Mike Reeves 8a88b16b9e add fuse 2023-06-28 16:16:59 -04:00
Mike Reeves 6545ae588d add fuse 2023-06-28 16:10:23 -04:00
Mike Reeves 5ab54fcfc5 add OS logic 2023-06-28 16:02:25 -04:00
Mike Reeves ae4befe377 add OS logic 2023-06-28 15:57:43 -04:00
Mike Reeves 0c320e3501 Add more packages 2023-06-28 15:46:29 -04:00
Mike Reeves 933f4fa6c8 Add more packages 2023-06-28 15:45:32 -04:00
Mike Reeves d80c88f613 Add more packages 2023-06-28 15:43:56 -04:00
Mike Reeves 6d2e851a43 Add more packages 2023-06-28 15:36:51 -04:00
Mike Reeves 209aae50bc Add more packages 2023-06-28 15:32:01 -04:00
Mike Reeves 6fc988740d Fix keys 2023-06-28 13:46:25 -04:00
Mike Reeves 387ce22385 Fix gpg things 2023-06-27 13:57:53 -04:00
Mike Reeves cc3c28135d Fix whiptail logic 2023-06-27 12:53:18 -04:00
Mike Reeves 6b6724afcf Fix whiptail logic 2023-06-27 12:52:53 -04:00
Mike Reeves c37a179a3c Fix syntax error 2023-06-27 12:46:13 -04:00
Mike Reeves d519369c6f Initial Support 2023-06-26 19:22:33 -04:00
Mike Reeves 883d9560a0 Initial Support 2023-06-26 19:20:40 -04:00
238 changed files with 7538 additions and 29720 deletions
+12 -12
View File
@@ -1,18 +1,18 @@
### 2.4.3-20230711 ISO image built on 2023/07/11 ### 2.4.5-20230807 ISO image released on 2023/08/07
### Download and Verify ### Download and Verify
2.4.3-20230711 ISO image: 2.4.5-20230807 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.3-20230711.iso https://download.securityonion.net/file/securityonion/securityonion-2.4.5-20230807.iso
MD5: F481ED39E02A5AF05EB50D319D97A6C7 MD5: F83FD635025A3A65B380EAFCEB61A92E
SHA1: 20F9BAA8F73A44C21A8DFE81F36247BCF33CEDA6 SHA1: 5864D4CD520617E3328A3D956CAFCC378A8D2D08
SHA256: D805522E02CD4941641385F6FF86FAAC240DA6C5FD98F78460348632C7C631B0 SHA256: D333BAE0DD198DFD80DF59375456D228A4E18A24EDCDB15852CD4CA3F92B69A7
Signature for ISO image: Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.3-20230711.iso.sig https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.5-20230807.iso.sig
Signing key: Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
Download the signature file for the ISO: Download the signature file for the ISO:
``` ```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.3-20230711.iso.sig wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.5-20230807.iso.sig
``` ```
Download the ISO image: Download the ISO image:
``` ```
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.3-20230711.iso wget https://download.securityonion.net/file/securityonion/securityonion-2.4.5-20230807.iso
``` ```
Verify the downloaded ISO image using the signature file: Verify the downloaded ISO image using the signature file:
``` ```
gpg --verify securityonion-2.4.3-20230711.iso.sig securityonion-2.4.3-20230711.iso gpg --verify securityonion-2.4.5-20230807.iso.sig securityonion-2.4.5-20230807.iso
``` ```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below: The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
``` ```
gpg: Signature made Tue 11 Jul 2023 06:23:37 PM EDT using RSA key ID FE507013 gpg: Signature made Sat 05 Aug 2023 10:12:46 AM EDT using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>" gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature! gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner. gpg: There is no indication that the signature belongs to the owner.
+2 -2
View File
@@ -1,6 +1,6 @@
## Security Onion 2.4 Beta 4 ## Security Onion 2.4 Release Candidate 2 (RC2)
Security Onion 2.4 Beta 4 is here! Security Onion 2.4 Release Candidate 2 (RC2) is here!
## Screenshots ## Screenshots
+1 -1
View File
@@ -1 +1 @@
2.4.3 2.4.5
+3 -3
View File
@@ -3,14 +3,14 @@ import subprocess
def check(): def check():
os = __grains__['os'] osfam = __grains__['os_family']
retval = 'False' retval = 'False'
if os == 'Ubuntu': if osfam == 'Debian':
if path.exists('/var/run/reboot-required'): if path.exists('/var/run/reboot-required'):
retval = 'True' retval = 'True'
elif os == 'Rocky': elif osfam == 'RedHat':
cmd = 'needs-restarting -r > /dev/null 2>&1' cmd = 'needs-restarting -r > /dev/null 2>&1'
try: try:
+2 -4
View File
@@ -1,13 +1,11 @@
{%- set DOCKERRANGE = salt['pillar.get']('docker:range', '172.17.0.0/24') %}
{%- set DOCKERBIND = salt['pillar.get']('docker:bip', '172.17.0.1/24') %}
{ {
"registry-mirrors": [ "registry-mirrors": [
"https://:5000" "https://:5000"
], ],
"bip": "{{ DOCKERBIND }}", "bip": "172.17.0.1/24",
"default-address-pools": [ "default-address-pools": [
{ {
"base": "{{ DOCKERRANGE }}", "base": "172.17.0.0/24",
"size": 24 "size": 24
} }
] ]
+2 -3
View File
@@ -195,7 +195,7 @@ soversionfile:
{% endif %} {% endif %}
{% if GLOBALS.so_model and GLOBALS.so_model not in ['SO2AMI01', 'SO2AZI01', 'SO2GCI01'] %} {% if GLOBALS.so_model and GLOBALS.so_model not in ['SO2AMI01', 'SO2AZI01', 'SO2GCI01'] %}
{% if GLOBALS.os == 'Rocky' %} {% if GLOBALS.os == 'OEL' %}
# Install Raid tools # Install Raid tools
raidpkgs: raidpkgs:
pkg.installed: pkg.installed:
@@ -217,8 +217,7 @@ so-raid-status:
- month: '*' - month: '*'
- dayweek: '*' - dayweek: '*'
{% endif %} {% endif %}
{% else %} {% else %}
{{sls}}_state_not_allowed: {{sls}}_state_not_allowed:
+41 -20
View File
@@ -1,6 +1,6 @@
{% from 'vars/globals.map.jinja' import GLOBALS %} {% from 'vars/globals.map.jinja' import GLOBALS %}
{% if GLOBALS.os == 'Ubuntu' %} {% if GLOBALS.os_family == 'Debian' %}
commonpkgs: commonpkgs:
pkg.installed: pkg.installed:
- skip_suggestions: True - skip_suggestions: True
@@ -14,16 +14,25 @@ commonpkgs:
- software-properties-common - software-properties-common
- apt-transport-https - apt-transport-https
- openssl - openssl
- netcat - netcat-openbsd
- sqlite3 - sqlite3
- libssl-dev - libssl-dev
- procps
- python3-dateutil - python3-dateutil
- python3-docker
- python3-packaging - python3-packaging
- python3-watchdog - python3-watchdog
- python3-lxml - python3-lxml
- git - git
- rsync
- vim - vim
- tar
- unzip
{% if grains.oscodename != 'focal' %}
- python3-rich
{% endif %}
{% if grains.oscodename == 'focal' %}
# since Ubuntu requires and internet connection we can use pip to install modules # since Ubuntu requires and internet connection we can use pip to install modules
python3-pip: python3-pip:
pkg.installed pkg.installed
@@ -34,34 +43,46 @@ python-rich:
- target: /usr/local/lib/python3.8/dist-packages/ - target: /usr/local/lib/python3.8/dist-packages/
- require: - require:
- pkg: python3-pip - pkg: python3-pip
{% endif %}
{% endif %}
{% elif GLOBALS.os == 'Rocky' %} {% if GLOBALS.os_family == 'RedHat' %}
commonpkgs: commonpkgs:
pkg.installed: pkg.installed:
- skip_suggestions: True - skip_suggestions: True
- pkgs: - pkgs:
- wget
- jq
- tcpdump
- httpd-tools
- net-tools
- curl - curl
- sqlite
- mariadb-devel
- python3-dnf-plugin-versionlock
- nmap-ncat
- yum-utils
- device-mapper-persistent-data - device-mapper-persistent-data
- lvm2 - fuse
- openssl - fuse-libs
- fuse-overlayfs
- fuse-common
- fuse3
- fuse3-libs
- git - git
- httpd-tools
- jq
- lvm2
{% if GLOBALS.os == 'CentOS Stream' %}
- MariaDB-devel
{% else %}
- mariadb-devel
{% endif %}
- net-tools
- nmap-ncat
- openssl
- procps-ng
- python3-dnf-plugin-versionlock
- python3-docker - python3-docker
- python3-m2crypto - python3-m2crypto
- rsync
- python3-rich
- python3-pyyaml
- python3-watchdog
- python3-packaging - python3-packaging
- python3-pyyaml
- python3-rich
- python3-watchdog
- rsync
- sqlite
- tcpdump
- unzip - unzip
- wget
- yum-utils
{% endif %} {% endif %}
+85 -19
View File
@@ -5,7 +5,16 @@
# https://securityonion.net/license; you may not use this file except in compliance with the # https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0. # Elastic License 2.0.
ELASTIC_AGENT_TARBALL_VERSION="8.7.1" # Elastic agent is not managed by salt. Because of this we must store this base information in a
# script that accompanies the soup system. Since so-common is one of those special soup files,
# and since this same logic is required during installation, it's included in this file.
ELASTIC_AGENT_TARBALL_VERSION="8.8.2"
ELASTIC_AGENT_URL="https://repo.securityonion.net/file/so-repo/prod/2.4/elasticagent/elastic-agent_SO-$ELASTIC_AGENT_TARBALL_VERSION.tar.gz"
ELASTIC_AGENT_MD5_URL="https://repo.securityonion.net/file/so-repo/prod/2.4/elasticagent/elastic-agent_SO-$ELASTIC_AGENT_TARBALL_VERSION.md5"
ELASTIC_AGENT_FILE="/nsm/elastic-fleet/artifacts/elastic-agent_SO-$ELASTIC_AGENT_TARBALL_VERSION.tar.gz"
ELASTIC_AGENT_MD5="/nsm/elastic-fleet/artifacts/elastic-agent_SO-$ELASTIC_AGENT_TARBALL_VERSION.md5"
ELASTIC_AGENT_EXPANSION_DIR=/nsm/elastic-fleet/artifacts/beats/elastic-agent
DEFAULT_SALT_DIR=/opt/so/saltstack/default DEFAULT_SALT_DIR=/opt/so/saltstack/default
DOC_BASE_URL="https://docs.securityonion.net/en/2.4" DOC_BASE_URL="https://docs.securityonion.net/en/2.4"
@@ -161,6 +170,34 @@ disable_fastestmirror() {
sed -i 's/enabled=1/enabled=0/' /etc/yum/pluginconf.d/fastestmirror.conf sed -i 's/enabled=1/enabled=0/' /etc/yum/pluginconf.d/fastestmirror.conf
} }
download_and_verify() {
source_url=$1
source_md5_url=$2
dest_file=$3
md5_file=$4
expand_dir=$5
if [[ -n "$expand_dir" ]]; then
mkdir -p "$expand_dir"
fi
if ! verify_md5_checksum "$dest_file" "$md5_file"; then
retry 15 10 "curl --fail --retry 5 --retry-delay 15 -L '$source_url' --output '$dest_file'" "" ""
retry 15 10 "curl --fail --retry 5 --retry-delay 15 -L '$source_md5_url' --output '$md5_file'" "" ""
if verify_md5_checksum "$dest_file" "$md5_file"; then
echo "Source file and checksum are good."
else
echo "Unable to download and verify the source file and checksum."
return 1
fi
fi
if [[ -n "$expand_dir" ]]; then
tar -xf "$dest_file" -C "$expand_dir"
fi
}
elastic_license() { elastic_license() {
read -r -d '' message <<- EOM read -r -d '' message <<- EOM
@@ -199,19 +236,20 @@ get_random_value() {
} }
gpg_rpm_import() { gpg_rpm_import() {
if [[ "$OS" == "rocky" ]]; then if [[ $is_oracle ]]; then
if [[ "$WHATWOULDYOUSAYYAHDOHERE" == "setup" ]]; then if [[ "$WHATWOULDYOUSAYYAHDOHERE" == "setup" ]]; then
local RPMKEYSLOC="../salt/repo/client/files/rocky/keys" local RPMKEYSLOC="../salt/repo/client/files/$OS/keys"
else else
local RPMKEYSLOC="$UPDATE_DIR/salt/repo/client/files/rocky/keys" local RPMKEYSLOC="$UPDATE_DIR/salt/repo/client/files/$OS/keys"
fi fi
RPMKEYS=('RPM-GPG-KEY-oracle' 'RPM-GPG-KEY-EPEL-9' 'SALT-PROJECT-GPG-PUBKEY-2023.pub' 'docker.pub' 'securityonion.pub' 'MariaDB-Server-GPG-KEY')
RPMKEYS=('RPM-GPG-KEY-rockyofficial' 'RPM-GPG-KEY-EPEL-9' 'SALT-PROJECT-GPG-PUBKEY-2023.pub' 'docker.pub' 'securityonion.pub') for RPMKEY in "${RPMKEYS[@]}"; do
for RPMKEY in "${RPMKEYS[@]}"; do
rpm --import $RPMKEYSLOC/$RPMKEY rpm --import $RPMKEYSLOC/$RPMKEY
echo "Imported $RPMKEY" echo "Imported $RPMKEY"
done done
elif [[ $is_rpm ]]; then
echo "Importing the security onion GPG key"
rpm --import ../salt/repo/client/files/oracle/keys/securityonion.pub
fi fi
} }
@@ -224,12 +262,15 @@ init_monitor() {
if [[ $MONITORNIC == "bond0" ]]; then if [[ $MONITORNIC == "bond0" ]]; then
BIFACES=$(lookup_bond_interfaces) BIFACES=$(lookup_bond_interfaces)
for i in rx tx sg tso ufo gso gro lro rx-vlan-offload tx-vlan-offload generic-receive-offload generic-segmentation-offload tcp-segmentation-offload; do
ethtool -K "$MONITORNIC" "$i" off;
done
else else
BIFACES=$MONITORNIC BIFACES=$MONITORNIC
fi fi
for DEVICE_IFACE in $BIFACES; do for DEVICE_IFACE in $BIFACES; do
for i in rx tx sg tso ufo gso gro lro; do for i in rx tx sg tso ufo gso gro lro rx-vlan-offload tx-vlan-offload generic-receive-offload generic-segmentation-offload tcp-segmentation-offload; do
ethtool -K "$DEVICE_IFACE" "$i" off; ethtool -K "$DEVICE_IFACE" "$i" off;
done done
ip link set dev "$DEVICE_IFACE" arp off multicast off allmulticast off promisc on ip link set dev "$DEVICE_IFACE" arp off multicast off allmulticast off promisc on
@@ -395,19 +436,22 @@ salt_minion_count() {
} }
set_cron_service_name() {
if [[ "$OS" == "rocky" ]]; then
cron_service_name="crond"
else
cron_service_name="cron"
fi
}
set_os() { set_os() {
if [ -f /etc/redhat-release ]; then if [ -f /etc/redhat-release ]; then
OS=rocky if grep -q "Rocky Linux release 9" /etc/redhat-release; then
OS=rocky
OSVER=9
is_rocky=true
elif grep -q "CentOS Stream release 9" /etc/redhat-release; then
OS=centos
OSVER=9
is_centos=true
fi
cron_service_name="crond"
else else
OS=ubuntu OS=ubuntu
is_ubuntu=true
cron_service_name="cron"
fi fi
} }
@@ -416,7 +460,7 @@ set_minionid() {
} }
set_palette() { set_palette() {
if [ "$OS" == ubuntu ]; then if [[ $is_deb ]]; then
update-alternatives --set newt-palette /etc/newt/palette.original update-alternatives --set newt-palette /etc/newt/palette.original
fi fi
} }
@@ -463,6 +507,11 @@ has_uppercase() {
|| return 1 || return 1
} }
update_elastic_agent() {
echo "Checking if Elastic Agent update is necessary..."
download_and_verify "$ELASTIC_AGENT_URL" "$ELASTIC_AGENT_MD5_URL" "$ELASTIC_AGENT_FILE" "$ELASTIC_AGENT_MD5" "$ELASTIC_AGENT_EXPANSION_DIR"
}
valid_cidr() { valid_cidr() {
# Verify there is a backslash in the string # Verify there is a backslash in the string
echo "$1" | grep -qP "^[^/]+/[^/]+$" || return 1 echo "$1" | grep -qP "^[^/]+/[^/]+$" || return 1
@@ -616,6 +665,23 @@ valid_username() {
echo "$user" | grep -qP '^[a-z_]([a-z0-9_-]{0,31}|[a-z0-9_-]{0,30}\$)$' && return 0 || return 1 echo "$user" | grep -qP '^[a-z_]([a-z0-9_-]{0,31}|[a-z0-9_-]{0,30}\$)$' && return 0 || return 1
} }
verify_md5_checksum() {
data_file=$1
md5_file=${2:-${data_file}.md5}
if [[ ! -f "$dest_file" || ! -f "$md5_file" ]]; then
return 2
fi
SOURCEHASH=$(md5sum "$data_file" | awk '{ print $1 }')
HASH=$(cat "$md5_file")
if [[ "$HASH" == "$SOURCEHASH" ]]; then
return 0
fi
return 1
}
wait_for_web_response() { wait_for_web_response() {
url=$1 url=$1
expected=$2 expected=$2
+1 -1
View File
@@ -103,7 +103,7 @@ def output(options, console, code, data):
def check_container_status(options, console): def check_container_status(options, console):
code = 0 code = 0
cli = "docker" cli = "docker"
proc = subprocess.run([cli, 'ps', '--format', '{{json .}}'], stdout=subprocess.PIPE, encoding="utf-8") proc = subprocess.run([cli, 'ps', '--format', 'json'], stdout=subprocess.PIPE, encoding="utf-8")
if proc.returncode != 0: if proc.returncode != 0:
fail("Container system error; unable to obtain container process statuses") fail("Container system error; unable to obtain container process statuses")
+13 -3
View File
@@ -27,6 +27,8 @@ Imports one or more evtx files into Security Onion. The evtx files will be analy
Options: Options:
--json Outputs summary in JSON format. Implies --quiet. --json Outputs summary in JSON format. Implies --quiet.
--quiet Silences progress information to stdout. --quiet Silences progress information to stdout.
--shift Adds a time shift. Accepts a single argument that is intended to be the date of the last record, and shifts the dates of the previous records accordingly.
Ex. sudo so-import-evtx --shift "2023-08-01 01:01:01" example.evtx
EOF EOF
} }
@@ -44,6 +46,10 @@ while [[ $# -gt 0 ]]; do
--quiet) --quiet)
quiet=1 quiet=1
;; ;;
--shift)
SHIFTDATE=$1
shift
;;
-*) -*)
echo "Encountered unexpected parameter: $param" echo "Encountered unexpected parameter: $param"
usage usage
@@ -68,8 +74,10 @@ function status {
function evtx2es() { function evtx2es() {
EVTX=$1 EVTX=$1
HASH=$2 HASH=$2
SHIFTDATE=$3
docker run --rm \ docker run --rm \
-e "SHIFTTS=$SHIFTDATE" \
-v "$EVTX:/tmp/data.evtx" \ -v "$EVTX:/tmp/data.evtx" \
-v "/nsm/import/$HASH/evtx/:/tmp/evtx/" \ -v "/nsm/import/$HASH/evtx/:/tmp/evtx/" \
-v "/nsm/import/evtx-end_newest:/tmp/newest" \ -v "/nsm/import/evtx-end_newest:/tmp/newest" \
@@ -113,7 +121,9 @@ echo $END_NEWEST > /nsm/import/evtx-end_newest
for EVTX in $INPUT_FILES; do for EVTX in $INPUT_FILES; do
EVTX=$(/usr/bin/realpath "$EVTX") EVTX=$(/usr/bin/realpath "$EVTX")
status "Processing Import: ${EVTX}" status "Processing Import: ${EVTX}"
if ! [ -z "$SHIFTDATE" ]; then
status "- timeshifting logs to end date of $SHIFTDATE"
fi
# generate a unique hash to assist with dedupe checks # generate a unique hash to assist with dedupe checks
HASH=$(md5sum "${EVTX}" | awk '{ print $1 }') HASH=$(md5sum "${EVTX}" | awk '{ print $1 }')
HASH_DIR=/nsm/import/${HASH} HASH_DIR=/nsm/import/${HASH}
@@ -136,7 +146,7 @@ for EVTX in $INPUT_FILES; do
# import evtx and write them to import ingest pipeline # import evtx and write them to import ingest pipeline
status "- importing logs to Elasticsearch..." status "- importing logs to Elasticsearch..."
evtx2es "${EVTX}" $HASH evtx2es "${EVTX}" $HASH "$SHIFTDATE"
if [[ $? -ne 0 ]]; then if [[ $? -ne 0 ]]; then
INVALID_EVTXS_COUNT=$((INVALID_EVTXS_COUNT + 1)) INVALID_EVTXS_COUNT=$((INVALID_EVTXS_COUNT + 1))
status "- WARNING: This evtx file may not have fully imported successfully" status "- WARNING: This evtx file may not have fully imported successfully"
@@ -222,4 +232,4 @@ if [[ $json -eq 1 ]]; then
}''' }'''
fi fi
exit $RESULT exit $RESULT
+50 -66
View File
@@ -1,7 +1,7 @@
#!/bin/bash #!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one # Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at # or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the # https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0. # Elastic License 2.0.
@@ -9,25 +9,26 @@
. /usr/sbin/so-common . /usr/sbin/so-common
appliance_check() { {%- if salt['grains.get']('sosmodel', '') %}
{%- if salt['grains.get']('sosmodel', '') %} {%- set model = salt['grains.get']('sosmodel') %}
APPLIANCE=1 model={{ model }}
{%- if grains['sosmodel'] in ['SO2AMI01', 'SO2GCI01', 'SO2AZI01'] %} # Don't need cloud images to use this
exit 0 if [[ $model =~ ^(SO2AMI01|SO2AZI01|SO2GCI01)$ ]]; then
{%- endif %} exit 0
DUDEYOUGOTADELL=$(dmidecode |grep Dell) fi
if [[ -n $DUDEYOUGOTADELL ]]; then {%- else %}
APPTYPE=dell echo "This is not an appliance"
else exit 0
APPTYPE=sm {%- endif %}
fi if [[ $model =~ ^(SOS10K|SOS500|SOS1000|SOS1000F|SOS4000|SOSSN7200|SOSSNNV|SOSMN)$ ]]; then
mkdir -p /opt/so/log/raid is_bossraid=true
fi
{%- else %} if [[ $model =~ ^(SOSSNNV|SOSMN)$ ]]; then
echo "This is not an appliance" is_swraid=true
exit 0 fi
{%- endif %} if [[ $model =~ ^(SOS10K|SOS500|SOS1000|SOS1000F|SOS4000|SOSSN7200)$ ]]; then
} is_hwraid=true
fi
check_nsm_raid() { check_nsm_raid() {
PERCCLI=$(/opt/raidtools/perccli/perccli64 /c0/v0 show|grep RAID|grep Optl) PERCCLI=$(/opt/raidtools/perccli/perccli64 /c0/v0 show|grep RAID|grep Optl)
@@ -49,61 +50,44 @@ check_nsm_raid() {
check_boss_raid() { check_boss_raid() {
MVCLI=$(/usr/local/bin/mvcli info -o vd |grep status |grep functional) MVCLI=$(/usr/local/bin/mvcli info -o vd |grep status |grep functional)
if [[ -n $DUDEYOUGOTADELL ]]; then if [[ -n $MVCLI ]]; then
if [[ -n $MVCLI ]]; then BOSSRAID=0
BOSSRAID=0 else
else BOSSRAID=1
BOSSRAID=1
fi
fi fi
} }
check_software_raid() { check_software_raid() {
if [[ -n $DUDEYOUGOTADELL ]]; then SWRC=$(grep "_" /proc/mdstat)
SWRC=$(grep "_" /proc/mdstat) if [[ -n $SWRC ]]; then
# RAID is failed in some way
if [[ -n $SWRC ]]; then SWRAID=1
# RAID is failed in some way else
SWRAID=1 SWRAID=0
else
SWRAID=0
fi
fi fi
} }
# This script checks raid status if you use SO appliances # Set everything to 0
SWRAID=0
BOSSRAID=0
HWRAID=0
# See if this is an appliance if [[ $is_hwraid ]]; then
check_nsm_raid
appliance_check fi
check_nsm_raid if [[ $is_bossraid ]]; then
check_boss_raid check_boss_raid
{%- if salt['grains.get']('sosmodel', '') %} fi
{%- if grains['sosmodel'] in ['SOSMN', 'SOSSNNV'] %} if [[ $is_swraid ]]; then
check_software_raid check_software_raid
{%- endif %}
{%- endif %}
if [[ -n $SWRAID ]]; then
if [[ $SWRAID == '0' && $BOSSRAID == '0' ]]; then
RAIDSTATUS=0
else
RAIDSTATUS=1
fi
elif [[ -n $DUDEYOUGOTADELL ]]; then
if [[ $BOSSRAID == '0' && $HWRAID == '0' ]]; then
RAIDSTATUS=0
else
RAIDSTATUS=1
fi
elif [[ "$APPTYPE" == 'sm' ]]; then
if [[ -n "$HWRAID" ]]; then
RAIDSTATUS=0
else
RAIDSTATUS=1
fi
fi fi
echo "nsmraid=$RAIDSTATUS" > /opt/so/log/raid/status.log sum=$(($SWRAID + $BOSSRAID + $HWRAID))
if [[ $sum == "0" ]]; then
RAIDSTATUS=0
else
RAIDSTATUS=1
fi
echo "nsmraid=$RAIDSTATUS" > /opt/so/log/raid/status.log
+7
View File
@@ -0,0 +1,7 @@
# This file is managed by Salt in the desktop.xwindows state
# It will not be overwritten if it already exists
[User]
Session=gnome-classic
Icon=/home/{{USERNAME}}/.face
SystemAccount=false
+333 -198
View File
@@ -1,170 +1,281 @@
{% from 'vars/globals.map.jinja' import GLOBALS %} {% from 'vars/globals.map.jinja' import GLOBALS %}
{# we only want this state to run it is CentOS #} {# we only want this state to run it is CentOS #}
{% if GLOBALS.os == 'Rocky' %} {% if GLOBALS.os == 'OEL' %}
desktop_packages: desktop_packages:
pkg.installed: pkg.installed:
- pkgs: - pkgs:
- ModemManager
- ModemManager-glib
- NetworkManager - NetworkManager
- NetworkManager-adsl - NetworkManager-adsl
- NetworkManager-bluetooth - NetworkManager-bluetooth
- NetworkManager-l2tp-gnome - NetworkManager-config-server
- NetworkManager-libreswan-gnome - NetworkManager-libnm
- NetworkManager-openconnect-gnome
- NetworkManager-openvpn-gnome
- NetworkManager-ppp
- NetworkManager-pptp-gnome
- NetworkManager-team - NetworkManager-team
- NetworkManager-tui - NetworkManager-tui
- NetworkManager-wifi - NetworkManager-wifi
- NetworkManager-wwan - NetworkManager-wwan
- PackageKit
- PackageKit-command-not-found
- PackageKit-glib
- PackageKit-gstreamer-plugin - PackageKit-gstreamer-plugin
- aajohan-comfortaa-fonts - PackageKit-gtk3-module
- abattis-cantarell-fonts
- acl
- alsa-ucm
- alsa-utils
- anaconda
- anaconda-install-env-deps
- anaconda-live
- at
- attr
- audit - audit
- audit-libs
- authselect - authselect
- authselect-libs
- avahi
- avahi-glib
- avahi-libs
- baobab
- basesystem - basesystem
- bash
- bash-completion
- bc - bc
- blktrace - bcache-tools
- bluez - bluez
- bluez-libs
- bluez-obexd
- bolt - bolt
- bpftool
- bzip2 - bzip2
- bzip2-libs
- c-ares
- ca-certificates
- cairo
- cairo-gobject
- cairomm
- checkpolicy
- chkconfig - chkconfig
- chrome-gnome-shell
- chromium - chromium
- chrony - clutter
- cinnamon - clutter-gst3
- cinnamon-control-center - clutter-gtk
- cinnamon-screensaver - cogl
- cockpit - color-filesystem
- coreutils - colord
- cpio - colord-gtk
- cronie - colord-libs
- crontabs - conmon
- crypto-policies - cups
- crypto-policies-scripts - cups-client
- cryptsetup - cups-filesystem
- curl - cups-filters
- cyrus-sasl-plain - cups-filters-libs
- dbus - cups-ipptool
- cups-libs
- cups-pk-helper
- dconf
- dejavu-sans-fonts - dejavu-sans-fonts
- dejavu-sans-mono-fonts - dejavu-sans-mono-fonts
- dejavu-serif-fonts - dejavu-serif-fonts
- dnf - desktop-file-utils
- dnf-plugins-core
- dos2unix
- dosfstools
- dracut-config-rescue
- dracut-live
- dsniff - dsniff
- e2fsprogs
- ed
- efi-filesystem
- efibootmgr
- efivar-libs
- eom
- ethtool - ethtool
- f36-backgrounds-extras-gnome - evolution-data-server
- f36-backgrounds-gnome - evolution-data-server-langpacks
- f37-backgrounds-extras-gnome
- f37-backgrounds-gnome
- file - file
- filesystem - flac-libs
- firewall-config - flashrom
- firewalld - flatpak
- fprintd-pam - flatpak-libs
- git - flatpak-selinux
- glibc - flatpak-session-helper
- glibc-all-langpacks - fontconfig
- fonts-filesystem
- foomatic
- foomatic-db
- foomatic-db-filesystem
- foomatic-db-ppds
- freetype
- fuse
- fuse-common
- fuse-libs
- fuse-overlayfs
- fuse3
- fuse3-libs
- fwupd
- fwupd-plugin-flashrom
- gcr
- gcr-base
- gd
- gdbm-libs
- gdisk
- gdk-pixbuf2
- gdk-pixbuf2-modules
- gdm
- gedit
- geoclue2
- geoclue2-libs
- geocode-glib
- gettext
- gettext-libs
- ghostscript
- ghostscript-tools-fonts
- ghostscript-tools-printing
- giflib
- glx-utils
- gmp
- gnome-autoar
- gnome-bluetooth
- gnome-bluetooth-libs
- gnome-calculator - gnome-calculator
- gnome-characters
- gnome-classic-session
- gnome-color-manager
- gnome-control-center
- gnome-control-center-filesystem
- gnome-desktop3
- gnome-disk-utility - gnome-disk-utility
- gnome-font-viewer
- gnome-initial-setup
- gnome-keyring
- gnome-keyring-pam
- gnome-logs
- gnome-menus
- gnome-online-accounts
- gnome-remote-desktop
- gnome-screenshot - gnome-screenshot
- gnome-session
- gnome-session-wayland-session
- gnome-session-xsession
- gnome-settings-daemon
- gnome-shell
- gnome-shell-extension-apps-menu
- gnome-shell-extension-background-logo
- gnome-shell-extension-common
- gnome-shell-extension-desktop-icons
- gnome-shell-extension-launch-new-instance
- gnome-shell-extension-places-menu
- gnome-shell-extension-window-list
- gnome-software
- gnome-system-monitor - gnome-system-monitor
- gnome-terminal - gnome-terminal
- gnupg2 - gnome-terminal-nautilus
- gnome-tour
- gnome-user-docs
- gnome-video-effects
- gobject-introspection
- gom
- google-droid-sans-fonts
- google-noto-cjk-fonts-common
- google-noto-emoji-color-fonts - google-noto-emoji-color-fonts
- google-noto-fonts-common
- google-noto-sans-cjk-ttc-fonts - google-noto-sans-cjk-ttc-fonts
- google-noto-sans-gurmukhi-fonts - google-noto-sans-gurmukhi-fonts
- google-noto-sans-sinhala-vf-fonts - google-noto-sans-sinhala-vf-fonts
- google-noto-serif-cjk-ttc-fonts - google-noto-serif-cjk-ttc-fonts
- grub2-common - gpgme
- grub2-pc-modules - gpm-libs
- grub2-tools - graphene
- grub2-tools-efi - graphite2
- grub2-tools-extra - gsettings-desktop-schemas
- grub2-tools-minimal - gsm
- grubby - gsound
- gspell
- gstreamer1
- gstreamer1-plugins-bad-free - gstreamer1-plugins-bad-free
- gstreamer1-plugins-base
- gstreamer1-plugins-good - gstreamer1-plugins-good
- gstreamer1-plugins-good-gtk
- gstreamer1-plugins-ugly-free - gstreamer1-plugins-ugly-free
- gtk-update-icon-cache
- gtk2
- gtk3
- gtk4
- gtkmm30
- gtksourceview4
- gutenprint
- gutenprint-cups
- gutenprint-doc
- gutenprint-libs
- gvfs
- gvfs-client
- gvfs-fuse
- gvfs-goa
- gvfs-gphoto2 - gvfs-gphoto2
- gvfs-mtp - gvfs-mtp
- gvfs-smb - gvfs-smb
- hostname - gzip
- hyperv-daemons - harfbuzz
- ibus-anthy - harfbuzz-icu
- ibus-hangul - hdparm
- ibus-libpinyin - hicolor-icon-theme
- ibus-libzhuyin - highcontrast-icon-theme
- ibus-m17n - hplip-common
- ibus-typing-booster - hplip-libs
- imsettings-systemd - hunspell
- initial-setup-gui - hunspell-en
- initscripts - hunspell-en-GB
- hunspell-en-US
- hunspell-filesystem
- hyphen
- ibus
- ibus-gtk3
- ibus-libs
- ibus-setup
- iio-sensor-proxy
- ima-evm-utils
- inih
- initscripts-rename-device - initscripts-rename-device
- iproute - initscripts-service
- iproute-tc - iso-codes
- iprutils - jansson
- iputils - jbig2dec-libs
- irqbalance - jbigkit-libs
- iwl100-firmware
- iwl1000-firmware
- iwl105-firmware
- iwl135-firmware
- iwl2000-firmware
- iwl2030-firmware
- iwl3160-firmware
- iwl5000-firmware
- iwl5150-firmware
- iwl6000g2a-firmware
- iwl6000g2b-firmware
- iwl6050-firmware
- iwl7260-firmware
- jomolhari-fonts - jomolhari-fonts
- jose
- jq
- json-c
- json-glib
- julietaula-montserrat-fonts - julietaula-montserrat-fonts
- kbd - kbd
- kernel - kbd-misc
- kernel-modules
- kernel-modules-extra
- kernel-tools
- kexec-tools
- khmer-os-system-fonts - khmer-os-system-fonts
- kmod-kvdo - langpacks-core-en
- kpatch - langpacks-core-font-en
- kpatch-dnf - langpacks-en
- ledmon - lcms2
- less - libICE
- libSM
- libX11
- libX11-common
- libX11-xcb
- libXau
- libXcomposite
- libXcursor
- libXdamage
- libXdmcp
- libXext
- libXfixes
- libXfont2
- libXft
- libXi
- libXinerama
- libXmu
- libXpm
- libXrandr
- libXrender
- libXres
- libXt
- libXtst
- libXv
- libXxf86dga
- libXxf86vm
- libappstream-glib
- liberation-fonts-common
- liberation-mono-fonts - liberation-mono-fonts
- liberation-sans-fonts - liberation-sans-fonts
- liberation-serif-fonts - liberation-serif-fonts
- libertas-sd8787-firmware - libertas-sd8787-firmware
- libstoragemgmt - libglvnd-gles
- libsysfs - libglvnd-glx
- lightdm - libglvnd-opengl
- linux-firmware - libgnomekbd
- logrotate - libgomp
- libgphoto2
- lockdev
- lohit-assamese-fonts - lohit-assamese-fonts
- lohit-bengali-fonts - lohit-bengali-fonts
- lohit-devanagari-fonts - lohit-devanagari-fonts
@@ -175,136 +286,160 @@ desktop_packages:
- lohit-telugu-fonts - lohit-telugu-fonts
- lshw - lshw
- lsof - lsof
- lsscsi - mesa-dri-drivers
- lvm2 - mesa-filesystem
- mailcap - mesa-libEGL
- man-db - mesa-libGL
- man-pages - mesa-libgbm
- mcelog - mesa-libglapi
- mdadm - mesa-libxatracker
- memtest86+ - mesa-vulkan-drivers
- metacity
- microcode_ctl - microcode_ctl
- mlocate - mobile-broadband-provider-info
- mono-devel
- mpfr
- mpg123-libs
- mtdev
- mtr - mtr
- nano - nautilus
- ncurses - nautilus-extensions
- nemo-fileroller
- nemo-image-converter
- nemo-preview
- net-tools - net-tools
- netronome-firmware
- ngrep
- nm-connection-editor
- nmap-ncat
- nvme-cli - nvme-cli
- open-vm-tools-desktop - open-vm-tools-desktop
- openssh-clients - oracle-backgrounds
- openssh-server - oracle-indexhtml
- p11-kit - oracle-logos
- paktype-naskh-basic-fonts - pcaudiolib
- parole
- parted
- passwd
- pciutils - pciutils
- pinentry
- pinentry-gnome3
- pinfo - pinfo
- pipewire - pipewire
- pipewire-alsa - pipewire-alsa
- pipewire-gstreamer - pipewire-gstreamer
- pipewire-jack-audio-connection-kit - pipewire-jack-audio-connection-kit
- pipewire-libs
- pipewire-pulseaudio - pipewire-pulseaudio
- pipewire-utils - pipewire-utils
- pixman
- plymouth - plymouth
- plymouth-core-libs
- plymouth-graphics-libs
- plymouth-plugin-label
- plymouth-plugin-two-step
- plymouth-scripts
- plymouth-system-theme
- plymouth-theme-spinner
- policycoreutils - policycoreutils
- powerline - policycoreutils-python-utils
- ppp
- prefixdevname
- procps-ng
- psacct
- pt-sans-fonts - pt-sans-fonts
- python3-libselinux - pulseaudio-libs
- python3-scapy - pulseaudio-libs-glib2
- qemu-guest-agent - pulseaudio-utils
- quota - sane-airscan
- realmd - sane-backends
- redshift-gtk - sane-backends-drivers-cameras
- rocky-backgrounds
- rocky-release
- rootfiles
- rpm
- rpm-plugin-audit
- rsync
- rsyslog
- rsyslog-gnutls
- rsyslog-gssapi
- rsyslog-relp
- salt-minion
- sane-backends-drivers-scanners - sane-backends-drivers-scanners
- selinux-policy-targeted - sane-backends-libs
- setroubleshoot
- setup
- sg3_utils
- sg3_utils-libs
- shadow-utils
- sil-abyssinica-fonts - sil-abyssinica-fonts
- sil-nuosu-fonts - sil-nuosu-fonts
- sil-padauk-fonts - sil-padauk-fonts
- slick-greeter
- slick-greeter-cinnamon
- smartmontools - smartmontools
- smc-meera-fonts - smc-meera-fonts
- sos - snappy
- sound-theme-freedesktop
- soundtouch
- securityonion-networkminer
- speech-dispatcher
- speech-dispatcher-espeak-ng
- speex
- spice-vdagent - spice-vdagent
- ssldump - switcheroo-control
- sssd
- sssd-common
- sssd-kcm
- stix-fonts
- strace
- sudo
- symlinks - symlinks
- syslinux - system-config-printer-libs
- systemd - system-config-printer-udev
- systemd-udev - taglib
- tar
- tcpdump - tcpdump
- tcpflow - tcpflow
- teamd - thai-scalable-fonts-common
- thai-scalable-waree-fonts - thai-scalable-waree-fonts
- time - totem
- tmux - totem-pl-parser
- tmux-powerline - totem-video-thumbnailer
- transmission - tpm2-tools
- tpm2-tss
- tracer-common
- tracker
- tracker-miners
- tree - tree
- tuned - tuned
- twolame-libs
- tzdata
- udisks2
- udisks2-iscsi
- udisks2-lvm2
- unzip - unzip
- upower
- urw-base35-bookman-fonts
- urw-base35-c059-fonts
- urw-base35-d050000l-fonts
- urw-base35-fonts
- urw-base35-fonts-common
- urw-base35-gothic-fonts
- urw-base35-nimbus-mono-ps-fonts
- urw-base35-nimbus-roman-fonts
- urw-base35-nimbus-sans-fonts
- urw-base35-p052-fonts
- urw-base35-standard-symbols-ps-fonts
- urw-base35-z003-fonts
- usb_modeswitch - usb_modeswitch
- usb_modeswitch-data
- usbutils - usbutils
- util-linux - usermode
- util-linux-user - userspace-rcu
- vdo - vdo
- vim-enhanced - vulkan-loader
- vim-minimal - wavpack
- vim-powerline - webkit2gtk3
- virt-what - webkit2gtk3-jsc
- wget - webrtc-audio-processing
- whois - whois
- which - wireless-regdb
- wireplumber - wireplumber
- wireplumber-libs
- wireshark - wireshark
- woff2
- words - words
- wpa_supplicant
- wpebackend-fdo
- xdg-dbus-proxy
- xdg-desktop-portal
- xdg-desktop-portal-gnome
- xdg-desktop-portal-gtk
- xdg-user-dirs
- xdg-user-dirs-gtk - xdg-user-dirs-gtk
- xed - xdg-utils
- xfsdump - xkeyboard-config
- xfsprogs - xorg-x11-drv-evdev
- xreader - xorg-x11-drv-fbdev
- yum - xorg-x11-drv-libinput
- xorg-x11-drv-vmware
- xorg-x11-drv-wacom
- xorg-x11-drv-wacom-serial-support
- xorg-x11-server-Xorg
- xorg-x11-server-Xwayland
- xorg-x11-server-common
- xorg-x11-server-utils
- xorg-x11-utils
- xorg-x11-xauth
- xorg-x11-xinit
- xorg-x11-xinit-session
- zip - zip
{% else %} {% else %}
desktop_packages_os_fail: desktop_packages_os_fail:
test.fail_without_changes: test.fail_without_changes:
- comment: 'SO desktop can only be installed on Rocky' - comment: 'SO desktop can only be installed on Oracle Linux'
{% endif %} {% endif %}
+2 -2
View File
@@ -1,7 +1,7 @@
{% from 'vars/globals.map.jinja' import GLOBALS %} {% from 'vars/globals.map.jinja' import GLOBALS %}
{# we only want this state to run it is CentOS #} {# we only want this state to run it is CentOS #}
{% if GLOBALS.os == 'Rocky' %} {% if GLOBALS.os == 'OEL' %}
remove_graphical_target: remove_graphical_target:
file.symlink: file.symlink:
@@ -12,6 +12,6 @@ remove_graphical_target:
{% else %} {% else %}
desktop_trusted-ca_os_fail: desktop_trusted-ca_os_fail:
test.fail_without_changes: test.fail_without_changes:
- comment: 'SO Desktop can only be installed on Rocky' - comment: 'SO Desktop can only be installed on Oracle Linux'
{% endif %} {% endif %}
@@ -0,0 +1,4 @@
#!/bin/bash
echo "Setting default session to gnome-classic"
cp /usr/share/accountsservice/user-templates/standard /etc/accountsservice/user-templates/
sed -i 's|Session=gnome|Session=gnome-classic|g' /etc/accountsservice/user-templates/standard
+1 -1
View File
@@ -1,7 +1,7 @@
{% from 'vars/globals.map.jinja' import GLOBALS %} {% from 'vars/globals.map.jinja' import GLOBALS %}
{# we only want this state to run it is CentOS #} {# we only want this state to run it is CentOS #}
{% if GLOBALS.os == 'Rocky' %} {% if GLOBALS.os == 'OEL' %}
{% set global_ca_text = [] %} {% set global_ca_text = [] %}
{% set global_ca_server = [] %} {% set global_ca_server = [] %}
+23 -2
View File
@@ -1,7 +1,7 @@
{% from 'vars/globals.map.jinja' import GLOBALS %} {% from 'vars/globals.map.jinja' import GLOBALS %}
{# we only want this state to run it is CentOS #} {# we only want this state to run it is CentOS #}
{% if GLOBALS.os == 'Rocky' %} {% if GLOBALS.os == 'OEL' %}
include: include:
- desktop.packages - desktop.packages
@@ -14,10 +14,31 @@ graphical_target:
- require: - require:
- desktop_packages - desktop_packages
convert_gnome_classic:
cmd.script:
- name: salt://desktop/scripts/convert-gnome-classic.sh
{% for username in salt['file.find'](path='/home/',mindepth=1,maxdepth=1,type='d') %}
{% set username = username.split('/')[2] %}
{% if username != 'zeek' %}
{% if not salt['file.file_exists']('/var/lib/AccountsService/users/' ~ username) %}
{{username}}_session:
file.managed:
- name: /var/lib/AccountsService/users/{{username}}
- source: salt://desktop/files/session.jinja
- template: jinja
- defaults:
USERNAME: {{username}}
{% endif %}
{% endif %}
{% endfor %}
{% else %} {% else %}
desktop_xwindows_os_fail: desktop_xwindows_os_fail:
test.fail_without_changes: test.fail_without_changes:
- comment: 'SO Desktop can only be installed on Rocky' - comment: 'SO Desktop can only be installed on Oracle Linux'
{% endif %} {% endif %}
+3 -5
View File
@@ -1,8 +1,6 @@
docker: docker:
bip: '172.17.0.1' range: '172.17.1.0/24'
range: '172.17.0.0/24' gateway: '172.17.1.1'
sorange: '172.17.1.0/24'
sobip: '172.17.1.1'
containers: containers:
'so-dockerregistry': 'so-dockerregistry':
final_octet: 20 final_octet: 20
@@ -202,4 +200,4 @@ docker:
final_octet: 99 final_octet: 99
custom_bind_mounts: [] custom_bind_mounts: []
extra_hosts: [] extra_hosts: []
extra_env: [] extra_env: []
+1 -1
View File
@@ -1,6 +1,6 @@
{% import_yaml 'docker/defaults.yaml' as DOCKERDEFAULTS %} {% import_yaml 'docker/defaults.yaml' as DOCKERDEFAULTS %}
{% set DOCKER = salt['pillar.get']('docker', DOCKERDEFAULTS.docker, merge=True) %} {% set DOCKER = salt['pillar.get']('docker', DOCKERDEFAULTS.docker, merge=True) %}
{% set RANGESPLIT = DOCKER.sorange.split('.') %} {% set RANGESPLIT = DOCKER.range.split('.') %}
{% set FIRSTTHREE = RANGESPLIT[0] ~ '.' ~ RANGESPLIT[1] ~ '.' ~ RANGESPLIT[2] ~ '.' %} {% set FIRSTTHREE = RANGESPLIT[0] ~ '.' ~ RANGESPLIT[1] ~ '.' ~ RANGESPLIT[2] ~ '.' %}
{% for container, vals in DOCKER.containers.items() %} {% for container, vals in DOCKER.containers.items() %}
+28 -6
View File
@@ -12,7 +12,28 @@ dockergroup:
- name: docker - name: docker
- gid: 920 - gid: 920
{% if GLOBALS.os == 'Ubuntu' %} {% if GLOBALS.os_family == 'Debian' %}
{% if grains.oscodename == 'bookworm' %}
dockerheldpackages:
pkg.installed:
- pkgs:
- containerd.io: 1.6.21-1
- docker-ce: 5:24.0.3-1~debian.12~bookworm
- docker-ce-cli: 5:24.0.3-1~debian.12~bookworm
- docker-ce-rootless-extras: 5:24.0.3-1~debian.12~bookworm
- hold: True
- update_holds: True
{% elif grains.oscodename == 'jammy' %}
dockerheldpackages:
pkg.installed:
- pkgs:
- containerd.io: 1.6.21-1
- docker-ce: 5:24.0.2-1~ubuntu.22.04~jammy
- docker-ce-cli: 5:24.0.2-1~ubuntu.22.04~jammy
- docker-ce-rootless-extras: 5:24.0.2-1~ubuntu.22.04~jammy
- hold: True
- update_holds: True
{% else %}
dockerheldpackages: dockerheldpackages:
pkg.installed: pkg.installed:
- pkgs: - pkgs:
@@ -22,14 +43,15 @@ dockerheldpackages:
- docker-ce-rootless-extras: 5:20.10.5~3-0~ubuntu-focal - docker-ce-rootless-extras: 5:20.10.5~3-0~ubuntu-focal
- hold: True - hold: True
- update_holds: True - update_holds: True
{% endif %}
{% else %} {% else %}
dockerheldpackages: dockerheldpackages:
pkg.installed: pkg.installed:
- pkgs: - pkgs:
- containerd.io: 1.6.21-3.1.el9 - containerd.io: 1.6.21-3.1.el9
- docker-ce: 24.0.2-1.el9 - docker-ce: 24.0.4-1.el9
- docker-ce-cli: 24.0.2-1.el9 - docker-ce-cli: 24.0.4-1.el9
- docker-ce-rootless-extras: 24.0.2-1.el9 - docker-ce-rootless-extras: 24.0.4-1.el9
- hold: True - hold: True
- update_holds: True - update_holds: True
{% endif %} {% endif %}
@@ -80,8 +102,8 @@ dockerreserveports:
sos_docker_net: sos_docker_net:
docker_network.present: docker_network.present:
- name: sobridge - name: sobridge
- subnet: {{ DOCKER.sorange }} - subnet: {{ DOCKER.range }}
- gateway: {{ DOCKER.sobip }} - gateway: {{ DOCKER.gateway }}
- options: - options:
com.docker.network.bridge.name: 'sobridge' com.docker.network.bridge.name: 'sobridge'
com.docker.network.driver.mtu: '1500' com.docker.network.driver.mtu: '1500'
+3 -11
View File
@@ -1,20 +1,12 @@
docker: docker:
bip: gateway:
description: Bind IP for the default docker interface. description: Gateway for the default docker interface.
helpLink: docker.html helpLink: docker.html
advanced: True advanced: True
range: range:
description: Default docker IP range for containers. description: Default docker IP range for containers.
helpLink: docker.html helpLink: docker.html
advanced: True advanced: True
sobip:
description: Bind IP for the SO docker interface.
helpLink: docker.html
advanced: True
sorange:
description: IP range for the SO docker containers.
helpLink: docker.html
advanced: True
containers: containers:
so-curator: &dockerOptions so-curator: &dockerOptions
final_octet: final_octet:
@@ -68,4 +60,4 @@ docker:
so-strelka-filestream: *dockerOptions so-strelka-filestream: *dockerOptions
so-strelka-frontend: *dockerOptions so-strelka-frontend: *dockerOptions
so-strelka-gatekeeper: *dockerOptions so-strelka-gatekeeper: *dockerOptions
so-strelka-manager: *dockerOptions so-strelka-manager: *dockerOptions
+16 -1
View File
@@ -28,6 +28,22 @@ elasticagentconfdir:
- group: 939 - group: 939
- makedirs: True - makedirs: True
elasticagentlogdir:
file.directory:
- name: /opt/so/log/elasticagent
- user: 949
- group: 939
- makedirs: True
elasticagent_sbin_jinja:
file.recurse:
- name: /usr/sbin
- source: salt://elasticagent/tools/sbin_jinja
- user: 949
- group: 939
- file_mode: 755
- template: jinja
# Create config # Create config
create-elastic-agent-config: create-elastic-agent-config:
file.managed: file.managed:
@@ -37,7 +53,6 @@ create-elastic-agent-config:
- group: 939 - group: 939
- template: jinja - template: jinja
{% else %} {% else %}
{{sls}}_state_not_allowed: {{sls}}_state_not_allowed:
+11 -3
View File
@@ -33,19 +33,27 @@ so-elastic-agent:
{% endif %} {% endif %}
- binds: - binds:
- /opt/so/conf/elastic-agent/elastic-agent.yml:/usr/share/elastic-agent/elastic-agent.yml:ro - /opt/so/conf/elastic-agent/elastic-agent.yml:/usr/share/elastic-agent/elastic-agent.yml:ro
- /opt/so/log/elasticagent:/usr/share/elastic-agent/logs
- /etc/pki/tls/certs/intca.crt:/etc/pki/tls/certs/intca.crt:ro
- /nsm:/nsm:ro - /nsm:/nsm:ro
- /opt/so/log:/opt/so/log:ro
{% if DOCKER.containers['so-elastic-agent'].custom_bind_mounts %} {% if DOCKER.containers['so-elastic-agent'].custom_bind_mounts %}
{% for BIND in DOCKER.containers['so-elastic-agent'].custom_bind_mounts %} {% for BIND in DOCKER.containers['so-elastic-agent'].custom_bind_mounts %}
- {{ BIND }} - {{ BIND }}
{% endfor %} {% endfor %}
{% endif %} {% endif %}
{% if DOCKER.containers['so-elastic-agent'].extra_env %}
- environment: - environment:
- FLEET_CA=/etc/pki/tls/certs/intca.crt
- LOGS_PATH=logs
{% if DOCKER.containers['so-elastic-agent'].extra_env %}
{% for XTRAENV in DOCKER.containers['so-elastic-agent'].extra_env %} {% for XTRAENV in DOCKER.containers['so-elastic-agent'].extra_env %}
- {{ XTRAENV }} - {{ XTRAENV }}
{% endfor %} {% endfor %}
{% endif %} {% endif %}
- require:
- file: create-elastic-agent-config
- watch:
- file: create-elastic-agent-config
delete_so-elastic-agent_so-status.disabled: delete_so-elastic-agent_so-status.disabled:
file.uncomment: file.uncomment:
+332 -19
View File
@@ -3,7 +3,7 @@
{%- set ES_PASS = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %} {%- set ES_PASS = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %}
id: aea1ba80-1065-11ee-a369-97538913b6a9 id: aea1ba80-1065-11ee-a369-97538913b6a9
revision: 2 revision: 1
outputs: outputs:
default: default:
type: elasticsearch type: elasticsearch
@@ -11,7 +11,7 @@ outputs:
- 'https://{{ GLOBALS.hostname }}:9200' - 'https://{{ GLOBALS.hostname }}:9200'
username: '{{ ES_USER }}' username: '{{ ES_USER }}'
password: '{{ ES_PASS }}' password: '{{ ES_PASS }}'
ssl.verification_mode: none ssl.verification_mode: full
output_permissions: {} output_permissions: {}
agent: agent:
download: download:
@@ -22,56 +22,369 @@ agent:
metrics: false metrics: false
features: {} features: {}
inputs: inputs:
- id: logfile-logs-80ffa884-2cfc-459a-964a-34df25714d85 - id: logfile-logs-fefef78c-422f-4cfa-8abf-4cd1b9428f62
name: suricata-logs name: import-evtx-logs
revision: 1 revision: 2
type: logfile type: logfile
use_output: default use_output: default
meta: meta:
package: package:
name: log name: log
version: version:
data_stream: data_stream:
namespace: so namespace: so
package_policy_id: 80ffa884-2cfc-459a-964a-34df25714d85 package_policy_id: fefef78c-422f-4cfa-8abf-4cd1b9428f62
streams: streams:
- id: logfile-log.log-80ffa884-2cfc-459a-964a-34df25714d85 - id: logfile-log.log-fefef78c-422f-4cfa-8abf-4cd1b9428f62
data_stream:
dataset: import
paths:
- /nsm/import/*/evtx/*.json
processors:
- dissect:
field: log.file.path
tokenizer: '/nsm/import/%{import.id}/evtx/%{import.file}'
target_prefix: ''
- decode_json_fields:
fields:
- message
target: ''
- drop_fields:
ignore_missing: true
fields:
- host
- add_fields:
fields:
dataset: system.security
type: logs
namespace: default
target: data_stream
- add_fields:
fields:
dataset: system.security
module: system
imported: true
target: event
- then:
- add_fields:
fields:
dataset: windows.sysmon_operational
target: data_stream
- add_fields:
fields:
dataset: windows.sysmon_operational
module: windows
imported: true
target: event
if:
equals:
winlog.channel: Microsoft-Windows-Sysmon/Operational
- then:
- add_fields:
fields:
dataset: system.application
target: data_stream
- add_fields:
fields:
dataset: system.application
target: event
if:
equals:
winlog.channel: Application
- then:
- add_fields:
fields:
dataset: system.system
target: data_stream
- add_fields:
fields:
dataset: system.system
target: event
if:
equals:
winlog.channel: System
- then:
- add_fields:
fields:
dataset: windows.powershell_operational
target: data_stream
- add_fields:
fields:
dataset: windows.powershell_operational
module: windows
target: event
if:
equals:
winlog.channel: Microsoft-Windows-PowerShell/Operational
tags:
- import
- id: logfile-redis-fc98c947-7d17-4861-a318-7ad075f6d1b0
name: redis-logs
revision: 2
type: logfile
use_output: default
meta:
package:
name: redis
version:
data_stream:
namespace: default
package_policy_id: fc98c947-7d17-4861-a318-7ad075f6d1b0
streams:
- id: logfile-redis.log-fc98c947-7d17-4861-a318-7ad075f6d1b0
data_stream:
dataset: redis.log
type: logs
exclude_files:
- .gz$
paths:
- /opt/so/log/redis/redis.log
tags:
- redis-log
exclude_lines:
- '^\s+[\-`(''.|_]'
- id: logfile-logs-3b56803d-5ade-4c93-b25e-9b37182f66b8
name: import-suricata-logs
revision: 2
type: logfile
use_output: default
meta:
package:
name: log
version:
data_stream:
namespace: so
package_policy_id: 3b56803d-5ade-4c93-b25e-9b37182f66b8
streams:
- id: logfile-log.log-3b56803d-5ade-4c93-b25e-9b37182f66b8
data_stream:
dataset: import
pipeline: suricata.common
paths:
- /nsm/import/*/suricata/eve*.json
processors:
- add_fields:
fields:
module: suricata
imported: true
category: network
target: event
- dissect:
field: log.file.path
tokenizer: '/nsm/import/%{import.id}/suricata/%{import.file}'
target_prefix: ''
- id: logfile-logs-c327e1a3-1ebe-449c-a8eb-f6f35032e69d
name: soc-server-logs
revision: 2
type: logfile
use_output: default
meta:
package:
name: log
version:
data_stream:
namespace: so
package_policy_id: c327e1a3-1ebe-449c-a8eb-f6f35032e69d
streams:
- id: logfile-log.log-c327e1a3-1ebe-449c-a8eb-f6f35032e69d
data_stream:
dataset: soc
pipeline: common
paths:
- /opt/so/log/soc/sensoroni-server.log
processors:
- decode_json_fields:
add_error_key: true
process_array: true
max_depth: 2
fields:
- message
target: soc
- add_fields:
fields:
module: soc
dataset_temp: server
category: host
target: event
- rename:
ignore_missing: true
fields:
- from: soc.fields.sourceIp
to: source.ip
- from: soc.fields.status
to: http.response.status_code
- from: soc.fields.method
to: http.request.method
- from: soc.fields.path
to: url.path
- from: soc.message
to: event.action
- from: soc.level
to: log.level
tags:
- so-soc
- id: logfile-logs-906e0d4c-9ec3-4c6a-bef6-e347ec9fd073
name: soc-sensoroni-logs
revision: 2
type: logfile
use_output: default
meta:
package:
name: log
version:
data_stream:
namespace: so
package_policy_id: 906e0d4c-9ec3-4c6a-bef6-e347ec9fd073
streams:
- id: logfile-log.log-906e0d4c-9ec3-4c6a-bef6-e347ec9fd073
data_stream:
dataset: soc
pipeline: common
paths:
- /opt/so/log/sensoroni/sensoroni.log
processors:
- decode_json_fields:
add_error_key: true
process_array: true
max_depth: 2
fields:
- message
target: sensoroni
- add_fields:
fields:
module: soc
dataset_temp: sensoroni
category: host
target: event
- rename:
ignore_missing: true
fields:
- from: sensoroni.fields.sourceIp
to: source.ip
- from: sensoroni.fields.status
to: http.response.status_code
- from: sensoroni.fields.method
to: http.request.method
- from: sensoroni.fields.path
to: url.path
- from: sensoroni.message
to: event.action
- from: sensoroni.level
to: log.level
- id: logfile-logs-df0d7f2c-221f-433b-b18b-d1cf83250515
name: soc-salt-relay-logs
revision: 2
type: logfile
use_output: default
meta:
package:
name: log
version:
data_stream:
namespace: so
package_policy_id: df0d7f2c-221f-433b-b18b-d1cf83250515
streams:
- id: logfile-log.log-df0d7f2c-221f-433b-b18b-d1cf83250515
data_stream:
dataset: soc
pipeline: common
paths:
- /opt/so/log/soc/salt-relay.log
processors:
- dissect:
field: message
tokenizer: '%{soc.ts} | %{event.action}'
target_prefix: ''
- add_fields:
fields:
module: soc
dataset_temp: salt_relay
category: host
target: event
tags:
- so-soc
- id: logfile-logs-74bd2366-fe52-493c-bddc-843a017fc4d0
name: soc-auth-sync-logs
revision: 2
type: logfile
use_output: default
meta:
package:
name: log
version:
data_stream:
namespace: so
package_policy_id: 74bd2366-fe52-493c-bddc-843a017fc4d0
streams:
- id: logfile-log.log-74bd2366-fe52-493c-bddc-843a017fc4d0
data_stream:
dataset: soc
pipeline: common
paths:
- /opt/so/log/soc/sync.log
processors:
- dissect:
field: message
tokenizer: '%{event.action}'
target_prefix: ''
- add_fields:
fields:
module: soc
dataset_temp: auth_sync
category: host
target: event
tags:
- so-soc
- id: logfile-logs-d151d9bf-ff2a-4529-9520-c99244bc0253
name: suricata-logs
revision: 2
type: logfile
use_output: default
meta:
package:
name: log
version:
data_stream:
namespace: so
package_policy_id: d151d9bf-ff2a-4529-9520-c99244bc0253
streams:
- id: logfile-log.log-d151d9bf-ff2a-4529-9520-c99244bc0253
data_stream: data_stream:
dataset: suricata dataset: suricata
pipeline: suricata.common
paths: paths:
- /nsm/suricata/eve*.json - /nsm/suricata/eve*.json
processors: processors:
- add_fields: - add_fields:
target: event
fields: fields:
category: network
module: suricata module: suricata
pipeline: suricata.common category: network
- id: logfile-logs-90103ac4-f6bd-4a4a-b596-952c332390fc target: event
- id: logfile-logs-31f94d05-ae75-40ee-b9c5-0e0356eff327
name: strelka-logs name: strelka-logs
revision: 1 revision: 2
type: logfile type: logfile
use_output: default use_output: default
meta: meta:
package: package:
name: log name: log
version: version:
data_stream: data_stream:
namespace: so namespace: so
package_policy_id: 90103ac4-f6bd-4a4a-b596-952c332390fc package_policy_id: 31f94d05-ae75-40ee-b9c5-0e0356eff327
streams: streams:
- id: logfile-log.log-90103ac4-f6bd-4a4a-b596-952c332390fc - id: logfile-log.log-31f94d05-ae75-40ee-b9c5-0e0356eff327
data_stream: data_stream:
dataset: strelka dataset: strelka
pipeline: strelka.file
paths: paths:
- /nsm/strelka/log/strelka.log - /nsm/strelka/log/strelka.log
processors: processors:
- add_fields: - add_fields:
target: event
fields: fields:
category: file
module: strelka module: strelka
pipeline: strelka.file category: file
target: event
- id: logfile-logs-6197fe84-9b58-4d9b-8464-3d517f28808d - id: logfile-logs-6197fe84-9b58-4d9b-8464-3d517f28808d
name: zeek-logs name: zeek-logs
revision: 1 revision: 1
@@ -0,0 +1,16 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{% if grains.role == 'so-heavynode' %}
docker exec so-elastic-agent /usr/share/elastic-agent/elastic-agent inspect
{% else %}
/bin/elastic-agent inspect
{% endif %}
@@ -0,0 +1,17 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{% if grains.role == 'so-heavynode' %}
/usr/sbin/so-stop elastic-agent $1
/usr/sbin/so-start elasticagent $1
{% else %}
service elastic-agent restart
{% endif %}
@@ -5,6 +5,13 @@
# https://securityonion.net/license; you may not use this file except in compliance with the # https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0. # Elastic License 2.0.
. /usr/sbin/so-common . /usr/sbin/so-common
/usr/sbin/so-restart elastic-agent $1 {% if grains.role == 'so-heavynode' %}
/usr/sbin/so-start elasticagent $1
{% else %}
service elastic-agent start
{% endif %}
+17
View File
@@ -0,0 +1,17 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{% if grains.role == 'so-heavynode' %}
docker exec so-elastic-agent /usr/share/elastic-agent/elastic-agent status
{% else %}
/bin/elastic-agent status
{% endif %}
@@ -9,4 +9,9 @@
. /usr/sbin/so-common . /usr/sbin/so-common
{% if grains.role == 'so-heavynode' %}
/usr/sbin/so-stop elastic-agent $1 /usr/sbin/so-stop elastic-agent $1
{% else %}
service elastic-agent stop
{% endif %}
@@ -0,0 +1,17 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
{% if grains.role == 'so-heavynode' %}
docker exec so-elastic-agent /usr/share/elastic-agent/elastic-agent version
{% else %}
/bin/elastic-agent version
{% endif %}
+7
View File
@@ -45,6 +45,13 @@ eaconfdir:
- group: 939 - group: 939
- makedirs: True - makedirs: True
ealogdir:
file.directory:
- name: /opt/so/log/elasticfleet
- user: 947
- group: 939
- makedirs: True
eastatedir: eastatedir:
file.directory: file.directory:
- name: /opt/so/conf/elastic-fleet/state - name: /opt/so/conf/elastic-fleet/state
+3 -1
View File
@@ -2,7 +2,7 @@ elasticfleet:
enabled: False enabled: False
config: config:
server: server:
custom_fqdn: '' custom_fqdn: []
enable_auto_configuration: True enable_auto_configuration: True
endpoints_enrollment: '' endpoints_enrollment: ''
es_token: '' es_token: ''
@@ -28,7 +28,9 @@ elasticfleet:
- aws - aws
- azure - azure
- cloudflare - cloudflare
- endpoint
- fim - fim
- github - github
- google_workspace - google_workspace
- log
- 1password - 1password
+36 -8
View File
@@ -15,15 +15,27 @@
include: include:
- elasticfleet.config - elasticfleet.config
- elasticfleet.sostatus - elasticfleet.sostatus
- ssl
{% if ELASTICFLEETMERGED.config.server.enable_auto_configuration and grains.role not in ['so-import', 'so-eval'] %} # If enabled, automatically update Fleet Logstash Outputs
{% if ELASTICFLEETMERGED.config.server.enable_auto_configuration and grains.role not in ['so-import', 'so-eval', 'so-fleet'] %}
so-elastic-fleet-auto-configure-logstash-outputs: so-elastic-fleet-auto-configure-logstash-outputs:
cmd.run: cmd.run:
- name: /usr/sbin/so-elastic-fleet-outputs-update - name: /usr/sbin/so-elastic-fleet-outputs-update
{% endif %}
#so-elastic-fleet-auto-configure-server-urls: # If enabled, automatically update Fleet Server URLs & ES Connection
# cmd.run: {% if ELASTICFLEETMERGED.config.server.enable_auto_configuration and grains.role not in ['so-fleet'] %}
# - name: /usr/sbin/so-elastic-fleet-urls-update so-elastic-fleet-auto-configure-server-urls:
cmd.run:
- name: /usr/sbin/so-elastic-fleet-urls-update
{% endif %}
# Automatically update Fleet Server Elasticsearch URLs
{% if grains.role not in ['so-fleet'] %}
so-elastic-fleet-auto-configure-elasticsearch-urls:
cmd.run:
- name: /usr/sbin/so-elastic-fleet-es-url-update
{% endif %} {% endif %}
{% if SERVICETOKEN != '' %} {% if SERVICETOKEN != '' %}
@@ -50,8 +62,15 @@ so-elastic-fleet:
- {{ BINDING }} - {{ BINDING }}
{% endfor %} {% endfor %}
- binds: - binds:
- /etc/pki:/etc/pki:ro - /etc/pki/elasticfleet-server.crt:/etc/pki/elasticfleet-server.crt:ro
#- /opt/so/conf/elastic-fleet/state:/usr/share/elastic-agent/state:rw - /etc/pki/elasticfleet-server.key:/etc/pki/elasticfleet-server.key:ro
- /etc/pki/tls/certs/intca.crt:/etc/pki/tls/certs/intca.crt:ro
{% if GLOBALS.os_family == 'Debian' %}
- /etc/ssl/elasticfleet-server.crt:/etc/ssl/elasticfleet-server.crt:ro
- /etc/ssl/elasticfleet-server.key:/etc/ssl/elasticfleet-server.key:ro
- /etc/ssl/tls/certs/intca.crt:/etc/ssl/tls/certs/intca.crt:ro
{% endif %}
- /opt/so/log/elasticfleet:/usr/share/elastic-agent/logs
{% if DOCKER.containers['so-elastic-fleet'].custom_bind_mounts %} {% if DOCKER.containers['so-elastic-fleet'].custom_bind_mounts %}
{% for BIND in DOCKER.containers['so-elastic-fleet'].custom_bind_mounts %} {% for BIND in DOCKER.containers['so-elastic-fleet'].custom_bind_mounts %}
- {{ BIND }} - {{ BIND }}
@@ -59,19 +78,28 @@ so-elastic-fleet:
{% endif %} {% endif %}
- environment: - environment:
- FLEET_SERVER_ENABLE=true - FLEET_SERVER_ENABLE=true
- FLEET_URL=https://{{ GLOBALS.node_ip }}:8220 - FLEET_URL=https://{{ GLOBALS.hostname }}:8220
- FLEET_SERVER_ELASTICSEARCH_HOST=https://{{ GLOBALS.manager }}:9200 - FLEET_SERVER_ELASTICSEARCH_HOST=https://{{ GLOBALS.manager }}:9200
- FLEET_SERVER_SERVICE_TOKEN={{ SERVICETOKEN }} - FLEET_SERVER_SERVICE_TOKEN={{ SERVICETOKEN }}
- FLEET_SERVER_POLICY_ID=FleetServer_{{ GLOBALS.hostname }} - FLEET_SERVER_POLICY_ID=FleetServer_{{ GLOBALS.hostname }}
- FLEET_SERVER_ELASTICSEARCH_CA=/etc/pki/tls/certs/intca.crt
- FLEET_SERVER_CERT=/etc/pki/elasticfleet-server.crt - FLEET_SERVER_CERT=/etc/pki/elasticfleet-server.crt
- FLEET_SERVER_CERT_KEY=/etc/pki/elasticfleet-server.key - FLEET_SERVER_CERT_KEY=/etc/pki/elasticfleet-server.key
{% if GLOBALS.os_family == 'Debian' %}
- FLEET_CA=/etc/ssl/certs/intca.crt
- FLEET_SERVER_ELASTICSEARCH_CA=/etc/ssl/certs/intca.crt
{% else %}
- FLEET_CA=/etc/pki/tls/certs/intca.crt - FLEET_CA=/etc/pki/tls/certs/intca.crt
- FLEET_SERVER_ELASTICSEARCH_CA=/etc/pki/tls/certs/intca.crt
{% endif %}
- LOGS_PATH=logs
{% if DOCKER.containers['so-elastic-fleet'].extra_env %} {% if DOCKER.containers['so-elastic-fleet'].extra_env %}
{% for XTRAENV in DOCKER.containers['so-elastic-fleet'].extra_env %} {% for XTRAENV in DOCKER.containers['so-elastic-fleet'].extra_env %}
- {{ XTRAENV }} - {{ XTRAENV }}
{% endfor %} {% endfor %}
{% endif %} {% endif %}
- watch:
- x509: etc_elasticfleet_key
- x509: etc_elasticfleet_crt
{% endif %} {% endif %}
{% if GLOBALS.role != "so-fleet" %} {% if GLOBALS.role != "so-fleet" %}
@@ -13,7 +13,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -14,7 +14,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -5,17 +5,16 @@
"package": { "package": {
"name": "endpoint", "name": "endpoint",
"title": "Elastic Defend", "title": "Elastic Defend",
"version": "" "version": "8.8.0"
}, },
"enabled": true, "enabled": true,
"policy_id": "endpoints-initial", "policy_id": "endpoints-initial",
"vars": {},
"inputs": [{ "inputs": [{
"type": "endpoint", "type": "ENDPOINT_INTEGRATION_CONFIG",
"enabled": true, "enabled": true,
"streams": [], "streams": [],
"config": { "config": {
"integration_config": { "_config": {
"value": { "value": {
"type": "endpoint", "type": "endpoint",
"endpointConfig": { "endpointConfig": {
@@ -25,4 +24,4 @@
} }
} }
}] }]
} }
@@ -13,9 +13,14 @@
"system.auth": { "system.auth": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"ignore_older": "72h",
"paths": [ "paths": [
"/var/log/auth.log*", "/var/log/auth.log*",
"/var/log/secure*" "/var/log/secure*"
],
"preserve_original_event": false,
"tags": [
"system-auth"
] ]
} }
}, },
@@ -24,34 +29,49 @@
"vars": { "vars": {
"paths": [ "paths": [
"/var/log/messages*", "/var/log/messages*",
"/var/log/syslog*" "/var/log/syslog*",
] "/var/log/system*"
],
"tags": [],
"ignore_older": "72h"
} }
} }
} }
}, },
"system-winlog": { "system-winlog": {
"enabled": true, "enabled": true,
"vars": {
"preserve_original_event": false
},
"streams": { "streams": {
"system.application": { "system.application": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"preserve_original_event": false,
"ignore_older": "72h",
"language": 0,
"tags": [] "tags": []
} }
}, },
"system.security": { "system.security": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"preserve_original_event": false,
"ignore_older": "72h",
"language": 0,
"tags": []
}
},
"system.system": {
"enabled": true,
"vars": {
"preserve_original_event": false,
"ignore_older": "72h",
"language": 0,
"tags": [] "tags": []
} }
} }
} }
}, },
"system-system/metrics": { "system-system/metrics": {
"enabled": false "enabled": false
} }
} }
} }
@@ -11,7 +11,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -12,7 +12,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -11,7 +11,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -11,7 +11,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -11,7 +11,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -11,7 +11,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -11,7 +11,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -11,7 +11,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -11,7 +11,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -11,7 +11,7 @@
"logs-logfile": { "logs-logfile": {
"enabled": true, "enabled": true,
"streams": { "streams": {
"log.log": { "log.logs": {
"enabled": true, "enabled": true,
"vars": { "vars": {
"paths": [ "paths": [
@@ -1,106 +0,0 @@
{
"package": {
"name": "elasticsearch",
"version": ""
},
"name": "elasticsearch-logs",
"namespace": "default",
"description": "Elasticsearch Logs",
"policy_id": "so-grid-nodes_heavy",
"inputs": {
"elasticsearch-logfile": {
"enabled": true,
"streams": {
"elasticsearch.audit": {
"enabled": false,
"vars": {
"paths": [
"/var/log/elasticsearch/*_audit.json"
]
}
},
"elasticsearch.deprecation": {
"enabled": false,
"vars": {
"paths": [
"/var/log/elasticsearch/*_deprecation.json"
]
}
},
"elasticsearch.gc": {
"enabled": false,
"vars": {
"paths": [
"/var/log/elasticsearch/gc.log.[0-9]*",
"/var/log/elasticsearch/gc.log"
]
}
},
"elasticsearch.server": {
"enabled": true,
"vars": {
"paths": [
"/opt/so/log/elasticsearch/*.log"
]
}
},
"elasticsearch.slowlog": {
"enabled": false,
"vars": {
"paths": [
"/var/log/elasticsearch/*_index_search_slowlog.json",
"/var/log/elasticsearch/*_index_indexing_slowlog.json"
]
}
}
}
},
"elasticsearch-elasticsearch/metrics": {
"enabled": false,
"vars": {
"hosts": [
"http://localhost:9200"
],
"scope": "node"
},
"streams": {
"elasticsearch.stack_monitoring.ccr": {
"enabled": false
},
"elasticsearch.stack_monitoring.cluster_stats": {
"enabled": false
},
"elasticsearch.stack_monitoring.enrich": {
"enabled": false
},
"elasticsearch.stack_monitoring.index": {
"enabled": false
},
"elasticsearch.stack_monitoring.index_recovery": {
"enabled": false,
"vars": {
"active.only": true
}
},
"elasticsearch.stack_monitoring.index_summary": {
"enabled": false
},
"elasticsearch.stack_monitoring.ml_job": {
"enabled": false
},
"elasticsearch.stack_monitoring.node": {
"enabled": false
},
"elasticsearch.stack_monitoring.node_stats": {
"enabled": false
},
"elasticsearch.stack_monitoring.pending_tasks": {
"enabled": false
},
"elasticsearch.stack_monitoring.shard": {
"enabled": false
}
}
}
}
}
@@ -1,29 +0,0 @@
{
"package": {
"name": "log",
"version": ""
},
"name": "kratos-logs",
"namespace": "so",
"description": "Kratos logs",
"policy_id": "so-grid-nodes_heavy",
"inputs": {
"logs-logfile": {
"enabled": true,
"streams": {
"log.log": {
"enabled": true,
"vars": {
"paths": [
"/opt/so/log/kratos/kratos.log"
],
"data_stream.dataset": "kratos",
"tags": ["so-kratos"],
"processors": "- decode_json_fields:\n fields: [\"message\"]\n target: \"\"\n add_error_key: true \n- add_fields:\n target: event\n fields:\n category: iam\n module: kratos",
"custom": "pipeline: kratos"
}
}
}
}
}
}
@@ -3,7 +3,7 @@
"name": "osquery_manager", "name": "osquery_manager",
"version": "" "version": ""
}, },
"name": "osquery-grid-nodes", "name": "osquery-grid-nodes_heavy",
"namespace": "default", "namespace": "default",
"policy_id": "so-grid-nodes_heavy", "policy_id": "so-grid-nodes_heavy",
"inputs": { "inputs": {
@@ -1,76 +0,0 @@
{
"package": {
"name": "redis",
"version": ""
},
"name": "redis-logs",
"namespace": "default",
"description": "Redis logs",
"policy_id": "so-grid-nodes_heavy",
"inputs": {
"redis-logfile": {
"enabled": true,
"streams": {
"redis.log": {
"enabled": true,
"vars": {
"paths": [
"/opt/so/log/redis/redis.log"
],
"tags": [
"redis-log"
],
"preserve_original_event": false
}
}
}
},
"redis-redis": {
"enabled": false,
"streams": {
"redis.slowlog": {
"enabled": false,
"vars": {
"hosts": [
"127.0.0.1:6379"
],
"password": ""
}
}
}
},
"redis-redis/metrics": {
"enabled": false,
"vars": {
"hosts": [
"127.0.0.1:6379"
],
"idle_timeout": "20s",
"maxconn": 10,
"network": "tcp",
"password": ""
},
"streams": {
"redis.info": {
"enabled": false,
"vars": {
"period": "10s"
}
},
"redis.key": {
"enabled": false,
"vars": {
"key.patterns": "- limit: 20\n pattern: *\n",
"period": "10s"
}
},
"redis.keyspace": {
"enabled": false,
"vars": {
"period": "10s"
}
}
}
}
}
}
@@ -1,29 +0,0 @@
{
"package": {
"name": "log",
"version": ""
},
"name": "soc-auth-sync-logs",
"namespace": "so",
"description": "Security Onion - Elastic Auth Sync - Logs",
"policy_id": "so-grid-nodes_heavy",
"inputs": {
"logs-logfile": {
"enabled": true,
"streams": {
"log.log": {
"enabled": true,
"vars": {
"paths": [
"/opt/so/log/soc/sync.log"
],
"data_stream.dataset": "soc",
"tags": ["so-soc"],
"processors": "- dissect:\n tokenizer: \"%{event.action}\"\n field: \"message\"\n target_prefix: \"\"\n- add_fields:\n target: event\n fields:\n category: host\n module: soc\n dataset_temp: auth_sync",
"custom": "pipeline: common"
}
}
}
}
}
}
@@ -1,29 +0,0 @@
{
"package": {
"name": "log",
"version": ""
},
"name": "soc-salt-relay-logs",
"namespace": "so",
"description": "Security Onion - Salt Relay - Logs",
"policy_id": "so-grid-nodes_heavy",
"inputs": {
"logs-logfile": {
"enabled": true,
"streams": {
"log.log": {
"enabled": true,
"vars": {
"paths": [
"/opt/so/log/soc/salt-relay.log"
],
"data_stream.dataset": "soc",
"tags": ["so-soc"],
"processors": "- dissect:\n tokenizer: \"%{soc.ts} | %{event.action}\"\n field: \"message\"\n target_prefix: \"\"\n- add_fields:\n target: event\n fields:\n category: host\n module: soc\n dataset_temp: salt_relay",
"custom": "pipeline: common"
}
}
}
}
}
}
@@ -1,29 +0,0 @@
{
"package": {
"name": "log",
"version": ""
},
"name": "soc-sensoroni-logs",
"namespace": "so",
"description": "Security Onion - Sensoroni - Logs",
"policy_id": "so-grid-nodes_heavy",
"inputs": {
"logs-logfile": {
"enabled": true,
"streams": {
"log.log": {
"enabled": true,
"vars": {
"paths": [
"/opt/so/log/sensoroni/sensoroni.log"
],
"data_stream.dataset": "soc",
"tags": [],
"processors": "- decode_json_fields:\n fields: [\"message\"]\n target: \"sensoroni\"\n process_array: true\n max_depth: 2\n add_error_key: true \n- add_fields:\n target: event\n fields:\n category: host\n module: soc\n dataset_temp: sensoroni\n- rename:\n fields:\n - from: \"sensoroni.fields.sourceIp\"\n to: \"source.ip\"\n - from: \"sensoroni.fields.status\"\n to: \"http.response.status_code\"\n - from: \"sensoroni.fields.method\"\n to: \"http.request.method\"\n - from: \"sensoroni.fields.path\"\n to: \"url.path\"\n - from: \"sensoroni.message\"\n to: \"event.action\"\n - from: \"sensoroni.level\"\n to: \"log.level\"\n ignore_missing: true",
"custom": "pipeline: common"
}
}
}
}
}
}
@@ -1,29 +0,0 @@
{
"package": {
"name": "log",
"version": ""
},
"name": "soc-server-logs",
"namespace": "so",
"description": "Security Onion Console Logs",
"policy_id": "so-grid-nodes_heavy",
"inputs": {
"logs-logfile": {
"enabled": true,
"streams": {
"log.log": {
"enabled": true,
"vars": {
"paths": [
"/opt/so/log/soc/sensoroni-server.log"
],
"data_stream.dataset": "soc",
"tags": ["so-soc"],
"processors": "- decode_json_fields:\n fields: [\"message\"]\n target: \"soc\"\n process_array: true\n max_depth: 2\n add_error_key: true \n- add_fields:\n target: event\n fields:\n category: host\n module: soc\n dataset_temp: server\n- rename:\n fields:\n - from: \"soc.fields.sourceIp\"\n to: \"source.ip\"\n - from: \"soc.fields.status\"\n to: \"http.response.status_code\"\n - from: \"soc.fields.method\"\n to: \"http.request.method\"\n - from: \"soc.fields.path\"\n to: \"url.path\"\n - from: \"soc.message\"\n to: \"event.action\"\n - from: \"soc.level\"\n to: \"log.level\"\n ignore_missing: true",
"custom": "pipeline: common"
}
}
}
}
}
}
@@ -4,7 +4,7 @@
"name": "system", "name": "system",
"version": "" "version": ""
}, },
"name": "system-grid-nodes", "name": "system-grid-nodes_heavy",
"namespace": "default", "namespace": "default",
"inputs": { "inputs": {
"system-logfile": { "system-logfile": {
+2
View File
@@ -14,12 +14,14 @@ run_installer:
- name: salt://elasticfleet/files/so_agent-installers/so-elastic-agent_linux_amd64 - name: salt://elasticfleet/files/so_agent-installers/so-elastic-agent_linux_amd64
- cwd: /opt/so - cwd: /opt/so
- args: -token={{ GRIDNODETOKENGENERAL }} - args: -token={{ GRIDNODETOKENGENERAL }}
- retry: True
{% else %} {% else %}
run_installer: run_installer:
cmd.script: cmd.script:
- name: salt://elasticfleet/files/so_agent-installers/so-elastic-agent_linux_amd64 - name: salt://elasticfleet/files/so_agent-installers/so-elastic-agent_linux_amd64
- cwd: /opt/so - cwd: /opt/so
- args: -token={{ GRIDNODETOKENHEAVY }} - args: -token={{ GRIDNODETOKENHEAVY }}
- retry: True
{% endif %} {% endif %}
{% endif %} {% endif %}
+2 -1
View File
@@ -12,10 +12,11 @@ elasticfleet:
config: config:
server: server:
custom_fqdn: custom_fqdn:
description: Custom FQDN for Agents to connect to. description: Custom FQDN for Agents to connect to. One per line.
global: True global: True
helpLink: elastic-fleet.html helpLink: elastic-fleet.html
advanced: True advanced: True
forcedType: "[]string"
enable_auto_configuration: enable_auto_configuration:
description: Enable auto-configuration of Logstash Outputs & Fleet Host URLs. description: Enable auto-configuration of Logstash Outputs & Fleet Host URLs.
global: True global: True
@@ -15,10 +15,8 @@ if [ ! -f /opt/so/state/eaintegrations.txt ]; then
printf "\n\nInitial Endpoints Policy - Loading $INTEGRATION\n" printf "\n\nInitial Endpoints Policy - Loading $INTEGRATION\n"
elastic_fleet_integration_check "endpoints-initial" "$INTEGRATION" elastic_fleet_integration_check "endpoints-initial" "$INTEGRATION"
if [ -n "$INTEGRATION_ID" ]; then if [ -n "$INTEGRATION_ID" ]; then
if [ "$NAME" != "elastic-defend-endpoints" ]; then printf "\n\nIntegration $NAME exists - Updating integration\n"
printf "\n\nIntegration $NAME exists - Updating integration\n" elastic_fleet_integration_update "$INTEGRATION_ID" "@$INTEGRATION"
elastic_fleet_integration_update "$INTEGRATION_ID" "@$INTEGRATION"
fi
else else
printf "\n\nIntegration does not exist - Creating integration\n" printf "\n\nIntegration does not exist - Creating integration\n"
elastic_fleet_integration_create "@$INTEGRATION" elastic_fleet_integration_create "@$INTEGRATION"
@@ -35,9 +33,7 @@ if [ ! -f /opt/so/state/eaintegrations.txt ]; then
elastic_fleet_integration_update "$INTEGRATION_ID" "@$INTEGRATION" elastic_fleet_integration_update "$INTEGRATION_ID" "@$INTEGRATION"
else else
printf "\n\nIntegration does not exist - Creating integration\n" printf "\n\nIntegration does not exist - Creating integration\n"
if [ "$NAME" != "elasticsearch-logs" ]; then elastic_fleet_integration_create "@$INTEGRATION"
elastic_fleet_integration_create "@$INTEGRATION"
fi
fi fi
done done
if [[ "$RETURN_CODE" != "1" ]]; then if [[ "$RETURN_CODE" != "1" ]]; then
+15
View File
@@ -0,0 +1,15 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-elastic-fleet-common
# Let's snag a cookie from Kibana
SESSIONCOOKIE=$(curl -s -K /opt/so/conf/elasticsearch/curl.config -c - -X GET http://localhost:5601/ | grep sid | awk '{print $7}')
# List configured package policies
curl -s -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET "localhost:5601/api/fleet/epm/packages" -H 'kbn-xsrf: true' | jq
echo
@@ -11,6 +11,12 @@
. /usr/sbin/so-common . /usr/sbin/so-common
. /usr/sbin/so-elastic-fleet-common . /usr/sbin/so-elastic-fleet-common
LOG="/opt/so/log/elasticfleet/so-elastic-agent-gen-installers.log"
# Check to see if we are already running
NUM_RUNNING=$(pgrep -cf "/bin/bash /sbin/so-elastic-agent-gen-installers")
[ "$NUM_RUNNING" -gt 1 ] && echo "$(date) - $NUM_RUNNING gen installers script processes running...exiting." >>$LOG && exit 0
for i in {1..30} for i in {1..30}
do do
ENROLLMENTOKEN=$(curl -K /opt/so/conf/elasticsearch/curl.config -L "localhost:5601/api/fleet/enrollment_api_keys" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' | jq .list | jq -r -c '.[] | select(.policy_id | contains("endpoints-initial")) | .api_key') ENROLLMENTOKEN=$(curl -K /opt/so/conf/elasticsearch/curl.config -L "localhost:5601/api/fleet/enrollment_api_keys" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' | jq .list | jq -r -c '.[] | select(.policy_id | contains("endpoints-initial")) | .api_key')
@@ -0,0 +1,16 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-elastic-fleet-common
{% if grains.role == 'so-heavynode' %}
docker exec so-elastic-agent /usr/share/elastic-agent/elastic-agent inspect
{% else %}
/bin/elastic-agent inspect
{% endif %}
@@ -0,0 +1,16 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-elastic-fleet-common
{% if grains.role == 'so-heavynode' %}
docker exec so-elastic-agent service elastic-agent restart
{% else %}
service elastic-agent restart
{% endif %}
+17
View File
@@ -0,0 +1,17 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-elastic-fleet-common
{% if grains.role == 'so-heavynode' %}
docker exec so-elastic-agent service elastic-agent start
{% else %}
service elastic-agent start
{% endif %}
+17
View File
@@ -0,0 +1,17 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-elastic-fleet-common
{% if grains.role == 'so-heavynode' %}
docker exec so-elastic-agent /usr/share/elastic-agent/elastic-agent status
{% else %}
/bin/elastic-agent status
{% endif %}
+17
View File
@@ -0,0 +1,17 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-elastic-fleet-common
{% if grains.role == 'so-heavynode' %}
docker exec so-elastic-agent service elastic-agent stop
{% else %}
service elastic-agent stop
{% endif %}
@@ -0,0 +1,17 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-elastic-fleet-common
{% if grains.role == 'so-heavynode' %}
docker exec so-elastic-agent /usr/share/elastic-agent/elastic-agent version
{% else %}
/bin/elastic-agent version
{% endif %}
@@ -0,0 +1,53 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0; you may not use
# this file except in compliance with the Elastic License 2.0.
{% from 'vars/globals.map.jinja' import GLOBALS %}
. /usr/sbin/so-common
# Only run on Managers
if ! is_manager_node; then
printf "Not a Manager Node... Exiting"
exit 0
fi
function update_es_urls() {
# Generate updated JSON payload
JSON_STRING=$(jq -n --arg UPDATEDLIST $NEW_LIST_JSON '{"name":"so-manager_elasticsearch","type":"elasticsearch","hosts": $UPDATEDLIST,"is_default":false,"is_default_monitoring":false,"config_yaml":""}')
# Update Fleet Elasticsearch URLs
curl -K /opt/so/conf/elasticsearch/curl.config -L -X PUT "localhost:5601/api/fleet/outputs/so-manager_elasticsearch" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d "$JSON_STRING"
}
# Get current list of Fleet Elasticsearch URLs
RAW_JSON=$(curl -K /opt/so/conf/elasticsearch/curl.config 'http://localhost:5601/api/fleet/outputs/so-manager_elasticsearch')
# Check to make sure that the server responded with good data - else, bail from script
CHECKSUM=$(jq -r '.item.id' <<< "$RAW_JSON")
if [ "$CHECKSUM" != "so-manager_elasticsearch" ]; then
printf "Failed to query for current Fleet Server Elasticsearch URLs..."
exit 1
fi
# Get the current list of Fleet Server Elasticsearch & hash them
CURRENT_LIST=$(jq -c -r '.item.hosts' <<< "$RAW_JSON")
CURRENT_HASH=$(sha1sum <<< "$CURRENT_LIST" | awk '{print $1}')
# Create array & add initial elements
NEW_LIST=("https://{{ GLOBALS.hostname }}:9200")
# Sort & hash the new list of Fleet Elasticsearch URLs
NEW_LIST_JSON=$(jq --compact-output --null-input '$ARGS.positional' --args -- "${NEW_LIST[@]}")
NEW_HASH=$(sha1sum <<< "$NEW_LIST_JSON" | awk '{print $1}')
# Compare the current & new list of URLs - if different, update the Fleet Elasticsearch URLs
if [ "$NEW_HASH" = "$CURRENT_HASH" ]; then
printf "\nHashes match - no update needed.\n"
printf "Current List: $CURRENT_LIST\nNew List: $NEW_LIST_JSON\n"
exit 0
else
printf "\nHashes don't match - update needed.\n"
printf "Current List: $CURRENT_LIST\nNew List: $NEW_LIST_JSON\n"
update_es_urls
fi
@@ -2,7 +2,15 @@
# or more contributor license agreements. Licensed under the Elastic License 2.0; you may not use # or more contributor license agreements. Licensed under the Elastic License 2.0; you may not use
# this file except in compliance with the Elastic License 2.0. # this file except in compliance with the Elastic License 2.0.
{% from 'vars/globals.map.jinja' import GLOBALS %} {% from 'vars/globals.map.jinja' import GLOBALS %}
{% set CUSTOMFQDN = salt['pillar.get']('elasticfleet:config:server:custom_fqdn') %} {% from 'elasticfleet/map.jinja' import ELASTICFLEETMERGED %}
. /usr/sbin/so-common
# Only run on Managers
if ! is_manager_node; then
printf "Not a Manager Node... Exiting"
exit 0
fi
function update_logstash_outputs() { function update_logstash_outputs() {
# Generate updated JSON payload # Generate updated JSON payload
@@ -27,15 +35,20 @@ CURRENT_LIST=$(jq -c -r '.item.hosts' <<< "$RAW_JSON")
CURRENT_HASH=$(sha1sum <<< "$CURRENT_LIST" | awk '{print $1}') CURRENT_HASH=$(sha1sum <<< "$CURRENT_LIST" | awk '{print $1}')
# Create array & add initial elements # Create array & add initial elements
if [ "{{ GLOBALS.manager_ip }}" = "{{ GLOBALS.url_base }}" ]; then if [ "{{ GLOBALS.hostname }}" = "{{ GLOBALS.url_base }}" ]; then
NEW_LIST=("{{ GLOBALS.url_base }}:5055") NEW_LIST=("{{ GLOBALS.url_base }}:5055")
else else
NEW_LIST=("{{ GLOBALS.url_base }}:5055" "{{ GLOBALS.manager_ip }}:5055") NEW_LIST=("{{ GLOBALS.url_base }}:5055" "{{ GLOBALS.hostname }}:5055")
fi fi
{% if CUSTOMFQDN != "" %} # Query for FQDN entries & add them to the list
# Add Custom Hostname to list {% if ELASTICFLEETMERGED.config.server.custom_fqdn | length > 0 %}
NEW_LIST+=("{{ CUSTOMFQDN }}:5055") CUSTOMFQDNLIST=('{{ ELASTICFLEETMERGED.config.server.custom_fqdn | join(' ') }}')
readarray -t -d ' ' CUSTOMFQDN < <(printf '%s' "$CUSTOMFQDNLIST")
for CUSTOMNAME in "${CUSTOMFQDN[@]}"
do
NEW_LIST+=("$CUSTOMNAME:5055")
done
{% endif %} {% endif %}
# Query for the current Grid Nodes that are running Logstash # Query for the current Grid Nodes that are running Logstash
@@ -6,6 +6,12 @@
# this file except in compliance with the Elastic License 2.0. # this file except in compliance with the Elastic License 2.0.
{% from 'vars/globals.map.jinja' import GLOBALS %} {% from 'vars/globals.map.jinja' import GLOBALS %}
{% if GLOBALS.os_family == 'Debian' %}
INTCA=/etc/ssl/certs/intca.crt
{% else %}
INTCA=/etc/pki/tls/certs/intca.crt
{% endif %}
. /usr/sbin/so-elastic-fleet-common . /usr/sbin/so-elastic-fleet-common
printf "\n### Create ES Token ###\n" printf "\n### Create ES Token ###\n"
@@ -13,7 +19,7 @@ ESTOKEN=$(curl -K /opt/so/conf/elasticsearch/curl.config -L -X POST "localhost:5
### Create Outputs & Fleet URLs ### ### Create Outputs & Fleet URLs ###
printf "\nAdd Manager Elasticsearch Output...\n" printf "\nAdd Manager Elasticsearch Output...\n"
ESCACRT=$(openssl x509 -in /etc/pki/tls/certs/intca.crt) ESCACRT=$(openssl x509 -in $INTCA)
JSON_STRING=$( jq -n \ JSON_STRING=$( jq -n \
--arg ESCACRT "$ESCACRT" \ --arg ESCACRT "$ESCACRT" \
'{"name":"so-manager_elasticsearch","id":"so-manager_elasticsearch","type":"elasticsearch","hosts":["https://{{ GLOBALS.manager_ip }}:9200","https://{{ GLOBALS.manager }}:9200"],"is_default":true,"is_default_monitoring":true,"config_yaml":"","ssl":{"certificate_authorities": [$ESCACRT]}}' ) '{"name":"so-manager_elasticsearch","id":"so-manager_elasticsearch","type":"elasticsearch","hosts":["https://{{ GLOBALS.manager_ip }}:9200","https://{{ GLOBALS.manager }}:9200"],"is_default":true,"is_default_monitoring":true,"config_yaml":"","ssl":{"certificate_authorities": [$ESCACRT]}}' )
@@ -22,9 +28,9 @@ printf "\n\n"
printf "\nCreate Logstash Output Config if node is not an Import or Eval install\n" printf "\nCreate Logstash Output Config if node is not an Import or Eval install\n"
{% if grains.role not in ['so-import', 'so-eval'] %} {% if grains.role not in ['so-import', 'so-eval'] %}
LOGSTASHCRT=$(openssl x509 -in /etc/pki/elasticfleet-agent.crt) LOGSTASHCRT=$(openssl x509 -in /etc/pki/elasticfleet-logstash.crt)
LOGSTASHKEY=$(openssl rsa -in /etc/pki/elasticfleet-agent.key) LOGSTASHKEY=$(openssl rsa -in /etc/pki/elasticfleet-logstash.key)
LOGSTASHCA=$(openssl x509 -in /etc/pki/tls/certs/intca.crt) LOGSTASHCA=$(openssl x509 -in $INTCA)
JSON_STRING=$( jq -n \ JSON_STRING=$( jq -n \
--arg LOGSTASHCRT "$LOGSTASHCRT" \ --arg LOGSTASHCRT "$LOGSTASHCRT" \
--arg LOGSTASHKEY "$LOGSTASHKEY" \ --arg LOGSTASHKEY "$LOGSTASHKEY" \
@@ -35,12 +41,12 @@ curl -K /opt/so/conf/elasticsearch/curl.config -L -X POST "localhost:5601/api/fl
printf "\n\n" printf "\n\n"
{%- endif %} {%- endif %}
# Add Manager IP & URL Base to Fleet Host URLs # Add Manager Hostname & URL Base to Fleet Host URLs
printf "\nAdd SO-Manager Fleet URL\n" printf "\nAdd SO-Manager Fleet URL\n"
if [ "{{ GLOBALS.manager_ip }}" = "{{ GLOBALS.url_base }}" ]; then if [ "{{ GLOBALS.hostname }}" = "{{ GLOBALS.url_base }}" ]; then
JSON_STRING=$( jq -n '{"id":"grid-default","name":"grid-default","is_default":true,"host_urls":["https://{{ GLOBALS.url_base }}:8220"]}') JSON_STRING=$( jq -n '{"id":"grid-default","name":"grid-default","is_default":true,"host_urls":["https://{{ GLOBALS.url_base }}:8220"]}')
else else
JSON_STRING=$( jq -n '{"id":"grid-default","name":"grid-default","is_default":true,"host_urls":["https://{{ GLOBALS.url_base }}:8220", "https://{{ GLOBALS.manager_ip }}:8220"]}') JSON_STRING=$( jq -n '{"id":"grid-default","name":"grid-default","is_default":true,"host_urls":["https://{{ GLOBALS.url_base }}:8220", "https://{{ GLOBALS.hostname }}:8220"]}')
fi fi
## This array replaces whatever URLs are currently configured ## This array replaces whatever URLs are currently configured
@@ -0,0 +1,80 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0; you may not use
# this file except in compliance with the Elastic License 2.0.
{% from 'vars/globals.map.jinja' import GLOBALS %}
{% from 'elasticfleet/map.jinja' import ELASTICFLEETMERGED %}
. /usr/sbin/so-common
# Only run on Managers
if ! is_manager_node; then
printf "Not a Manager Node... Exiting"
exit 0
fi
function update_fleet_urls() {
# Generate updated JSON payload
JSON_STRING=$(jq -n --arg UPDATEDLIST $NEW_LIST_JSON '{"name":"grid-default","is_default":true,"host_urls": $UPDATEDLIST}')
# Update Fleet Server URLs
curl -K /opt/so/conf/elasticsearch/curl.config -L -X PUT "localhost:5601/api/fleet/fleet_server_hosts/grid-default" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d "$JSON_STRING"
}
# Get current list of Fleet Server URLs
RAW_JSON=$(curl -K /opt/so/conf/elasticsearch/curl.config 'http://localhost:5601/api/fleet/fleet_server_hosts/grid-default')
# Check to make sure that the server responded with good data - else, bail from script
CHECKSUM=$(jq -r '.item.id' <<< "$RAW_JSON")
if [ "$CHECKSUM" != "grid-default" ]; then
printf "Failed to query for current Fleet Server URLs..."
exit 1
fi
# Get the current list of Fleet Server URLs & hash them
CURRENT_LIST=$(jq -c -r '.item.host_urls' <<< "$RAW_JSON")
CURRENT_HASH=$(sha1sum <<< "$CURRENT_LIST" | awk '{print $1}')
# Create array & add initial elements
if [ "{{ GLOBALS.hostname }}" = "{{ GLOBALS.url_base }}" ]; then
NEW_LIST=("https://{{ GLOBALS.url_base }}:8220")
else
NEW_LIST=("https://{{ GLOBALS.url_base }}:8220" "https://{{ GLOBALS.hostname }}:8220")
fi
# Query for FQDN entries & add them to the list
{% if ELASTICFLEETMERGED.config.server.custom_fqdn | length > 0 %}
CUSTOMFQDNLIST=('{{ ELASTICFLEETMERGED.config.server.custom_fqdn | join(' ') }}')
readarray -t -d ' ' CUSTOMFQDN < <(printf '%s' "$CUSTOMFQDNLIST")
for CUSTOMNAME in "${CUSTOMFQDN[@]}"
do
NEW_LIST+=("https://$CUSTOMNAME:8220")
done
{% endif %}
# Query for the current Grid Nodes that are running Logstash (which includes Fleet Nodes)
LOGSTASHNODES=$(salt-call --out=json pillar.get logstash:nodes | jq '.local')
# Query for Fleet Nodes & add them to the list (Hostname)
if grep -q "fleet" <<< $LOGSTASHNODES; then
readarray -t FLEETNODES < <(jq -r ' .fleet | keys_unsorted[]' <<< $LOGSTASHNODES)
for NODE in "${FLEETNODES[@]}"
do
NEW_LIST+=("https://$NODE:8220")
done
fi
# Sort & hash the new list of Fleet Server URLs
NEW_LIST_JSON=$(jq --compact-output --null-input '$ARGS.positional' --args -- "${NEW_LIST[@]}")
NEW_HASH=$(sha1sum <<< "$NEW_LIST_JSON" | awk '{print $1}')
# Compare the current & new list of URLs - if different, update the Fleet Server URLs & regenerate the agent installer
if [ "$NEW_HASH" = "$CURRENT_HASH" ]; then
printf "\nHashes match - no update needed.\n"
printf "Current List: $CURRENT_LIST\nNew List: $NEW_LIST_JSON\n"
exit 0
else
printf "\nHashes don't match - update needed.\n"
printf "Current List: $CURRENT_LIST\nNew List: $NEW_LIST_JSON\n"
update_fleet_urls
/sbin/so-elastic-agent-gen-installers >> /opt/so/log/elasticfleet/so-elastic-agent-gen-installers.log &
fi
+394
View File
@@ -81,6 +81,8 @@ elasticsearch:
managed: true managed: true
composed_of: composed_of:
- "so-data-streams-mappings" - "so-data-streams-mappings"
- "so-fleet_globals-1"
- "so-fleet_agent_id_verification-1"
- "so-logs-mappings" - "so-logs-mappings"
- "so-logs-settings" - "so-logs-settings"
priority: 225 priority: 225
@@ -1312,6 +1314,398 @@ elasticsearch:
name: elastic_agent name: elastic_agent
managed_by: security_onion managed_by: security_onion
managed: true managed: true
so-logs-endpoint.alerts:
index_sorting: False
index_template:
index_patterns:
- "logs-endpoint.alerts-*"
template:
settings:
index:
number_of_replicas: 0
mapping:
total_fields:
limit: 5000
sort:
field: "@timestamp"
order: desc
composed_of:
- "event-mappings"
- "logs-endpoint.alerts@custom"
- "logs-endpoint.alerts@package"
- "so-fleet_globals-1"
- "so-fleet_agent_id_verification-1"
priority: 501
data_stream:
hidden: false
allow_custom_routing: false
policy:
phases:
hot:
min_age: 0ms
actions:
set_priority:
priority: 100
rollover:
max_age: 30d
max_primary_shard_size: 50gb
cold:
min_age: 30d
actions:
set_priority:
priority: 0
delete:
min_age: 365d
actions:
delete: {}
_meta:
package:
name: elastic_agent
managed_by: security_onion
managed: true
so-logs-endpoint.events.api:
index_sorting: False
index_template:
index_patterns:
- "logs-endpoint.events.api-*"
template:
settings:
index:
number_of_replicas: 0
mapping:
total_fields:
limit: 5000
sort:
field: "@timestamp"
order: desc
composed_of:
- "event-mappings"
- "logs-endpoint.events.api@custom"
- "logs-endpoint.events.api@package"
- "so-fleet_globals-1"
- "so-fleet_agent_id_verification-1"
priority: 501
data_stream:
hidden: false
allow_custom_routing: false
policy:
phases:
hot:
min_age: 0ms
actions:
set_priority:
priority: 100
rollover:
max_age: 30d
max_primary_shard_size: 50gb
cold:
min_age: 30d
actions:
set_priority:
priority: 0
delete:
min_age: 365d
actions:
delete: {}
_meta:
package:
name: elastic_agent
managed_by: security_onion
managed: true
so-logs-endpoint.events.file:
index_sorting: False
index_template:
index_patterns:
- "logs-endpoint.events.file-*"
template:
settings:
index:
number_of_replicas: 0
mapping:
total_fields:
limit: 5000
sort:
field: "@timestamp"
order: desc
composed_of:
- "event-mappings"
- "logs-endpoint.events.file@custom"
- "logs-endpoint.events.file@package"
- "so-fleet_globals-1"
- "so-fleet_agent_id_verification-1"
priority: 501
data_stream:
hidden: false
allow_custom_routing: false
policy:
phases:
hot:
min_age: 0ms
actions:
set_priority:
priority: 100
rollover:
max_age: 30d
max_primary_shard_size: 50gb
cold:
min_age: 30d
actions:
set_priority:
priority: 0
delete:
min_age: 365d
actions:
delete: {}
_meta:
package:
name: elastic_agent
managed_by: security_onion
managed: true
so-logs-endpoint.events.library:
index_sorting: False
index_template:
index_patterns:
- "logs-endpoint.events.library-*"
template:
settings:
index:
number_of_replicas: 0
mapping:
total_fields:
limit: 5000
sort:
field: "@timestamp"
order: desc
composed_of:
- "event-mappings"
- "logs-endpoint.events.library@custom"
- "logs-endpoint.events.library@package"
- "so-fleet_globals-1"
- "so-fleet_agent_id_verification-1"
priority: 501
data_stream:
hidden: false
allow_custom_routing: false
policy:
phases:
hot:
min_age: 0ms
actions:
set_priority:
priority: 100
rollover:
max_age: 30d
max_primary_shard_size: 50gb
cold:
min_age: 30d
actions:
set_priority:
priority: 0
delete:
min_age: 365d
actions:
delete: {}
_meta:
package:
name: elastic_agent
managed_by: security_onion
managed: true
so-logs-endpoint.events.network:
index_sorting: False
index_template:
index_patterns:
- "logs-endpoint.events.network-*"
template:
settings:
index:
number_of_replicas: 0
mapping:
total_fields:
limit: 5000
sort:
field: "@timestamp"
order: desc
composed_of:
- "event-mappings"
- "logs-endpoint.events.network@custom"
- "logs-endpoint.events.network@package"
- "so-fleet_globals-1"
- "so-fleet_agent_id_verification-1"
priority: 501
data_stream:
hidden: false
allow_custom_routing: false
policy:
phases:
hot:
min_age: 0ms
actions:
set_priority:
priority: 100
rollover:
max_age: 30d
max_primary_shard_size: 50gb
cold:
min_age: 30d
actions:
set_priority:
priority: 0
delete:
min_age: 365d
actions:
delete: {}
_meta:
package:
name: elastic_agent
managed_by: security_onion
managed: true
so-logs-endpoint.events.process:
index_sorting: False
index_template:
index_patterns:
- "logs-endpoint.events.process-*"
template:
settings:
index:
number_of_replicas: 0
mapping:
total_fields:
limit: 5000
sort:
field: "@timestamp"
order: desc
composed_of:
- "event-mappings"
- "logs-endpoint.events.process@custom"
- "logs-endpoint.events.process@package"
- "so-fleet_globals-1"
- "so-fleet_agent_id_verification-1"
priority: 501
data_stream:
hidden: false
allow_custom_routing: false
policy:
phases:
hot:
min_age: 0ms
actions:
set_priority:
priority: 100
rollover:
max_age: 30d
max_primary_shard_size: 50gb
cold:
min_age: 30d
actions:
set_priority:
priority: 0
delete:
min_age: 365d
actions:
delete: {}
_meta:
package:
name: elastic_agent
managed_by: security_onion
managed: true
so-logs-endpoint.events.registry:
index_sorting: False
index_template:
index_patterns:
- "logs-endpoint.events.registry-*"
template:
settings:
index:
number_of_replicas: 0
mapping:
total_fields:
limit: 5000
sort:
field: "@timestamp"
order: desc
composed_of:
- "event-mappings"
- "logs-endpoint.events.registry@custom"
- "logs-endpoint.events.registry@package"
- "so-fleet_globals-1"
- "so-fleet_agent_id_verification-1"
priority: 501
data_stream:
hidden: false
allow_custom_routing: false
policy:
phases:
hot:
min_age: 0ms
actions:
set_priority:
priority: 100
rollover:
max_age: 30d
max_primary_shard_size: 50gb
cold:
min_age: 30d
actions:
set_priority:
priority: 0
delete:
min_age: 365d
actions:
delete: {}
_meta:
package:
name: elastic_agent
managed_by: security_onion
managed: true
so-logs-endpoint.events.security:
index_sorting: False
index_template:
index_patterns:
- "logs-endpoint.events.security-*"
template:
settings:
index:
number_of_replicas: 0
mapping:
total_fields:
limit: 5000
sort:
field: "@timestamp"
order: desc
composed_of:
- "event-mappings"
- "logs-endpoint.events.security@custom"
- "logs-endpoint.events.security@package"
- "so-fleet_globals-1"
- "so-fleet_agent_id_verification-1"
priority: 501
data_stream:
hidden: false
allow_custom_routing: false
policy:
phases:
hot:
min_age: 0ms
actions:
set_priority:
priority: 100
rollover:
max_age: 30d
max_primary_shard_size: 50gb
cold:
min_age: 30d
actions:
set_priority:
priority: 0
delete:
min_age: 365d
actions:
delete: {}
_meta:
package:
name: elastic_agent
managed_by: security_onion
managed: true
so-logs-elastic_agent.filebeat: so-logs-elastic_agent.filebeat:
index_sorting: False index_sorting: False
index_template: index_template:
@@ -72,8 +72,13 @@
{ "set": { "ignore_failure": true, "field": "event.module", "value": "elastic_agent" } }, { "set": { "ignore_failure": true, "field": "event.module", "value": "elastic_agent" } },
{ "split": { "if": "ctx.event?.dataset != null && ctx.event.dataset.contains('.')", "field": "event.dataset", "separator": "\\.", "target_field": "module_temp" } }, { "split": { "if": "ctx.event?.dataset != null && ctx.event.dataset.contains('.')", "field": "event.dataset", "separator": "\\.", "target_field": "module_temp" } },
{ "set": { "if": "ctx.module_temp != null", "override": true, "field": "event.module", "value": "{{module_temp.0}}" } }, { "set": { "if": "ctx.module_temp != null", "override": true, "field": "event.module", "value": "{{module_temp.0}}" } },
{ "split": { "if": "ctx.event?.dataset != null && ctx.event.dataset.contains('.')", "field": "event.dataset", "separator": "\\.", "target_field": "dataset_tag_temp" } }, { "gsub": { "if": "ctx.event?.dataset != null && ctx.event.dataset.contains('.')", "field": "event.dataset", "pattern": "^[^.]*.", "replacement": "", "target_field": "dataset_tag_temp" } },
{ "append": { "if": "ctx.dataset_tag_temp != null", "field": "tags", "value": "{{dataset_tag_temp.1}}" } }, { "append": { "if": "ctx.dataset_tag_temp != null", "field": "tags", "value": "{{dataset_tag_temp}}" } },
{ "set": { "if": "ctx.network?.direction == 'egress'", "override": true, "field": "network.initiated", "value": "true" } },
{ "set": { "if": "ctx.network?.direction == 'ingress'", "override": true, "field": "network.initiated", "value": "false" } },
{ "set": { "if": "ctx.network?.type == 'ipv4'", "override": true, "field": "destination.ipv6", "value": "false" } },
{ "set": { "if": "ctx.network?.type == 'ipv6'", "override": true, "field": "destination.ipv6", "value": "true" } },
{"community_id":{ "if": "ctx.event?.dataset == 'endpoint.events.network'", "ignore_failure":true } },
{ "remove": { "field": [ "message2", "type", "fields", "category", "module", "dataset", "event.dataset_temp", "dataset_tag_temp", "module_temp" ], "ignore_missing": true, "ignore_failure": true } } { "remove": { "field": [ "message2", "type", "fields", "category", "module", "dataset", "event.dataset_temp", "dataset_tag_temp", "module_temp" ], "ignore_missing": true, "ignore_failure": true } }
], ],
"on_failure": [ "on_failure": [
+2 -3
View File
@@ -49,11 +49,10 @@
"on_failure" : [ {"set" : {"field" : "error.message","value" : "{{ _ingest.on_failure_message }}"}}] "on_failure" : [ {"set" : {"field" : "error.message","value" : "{{ _ingest.on_failure_message }}"}}]
} }
}, },
{ "set": { "field": "_index", "value": "so-firewall", "override": true } },
{ "set": { "if": "ctx.network?.transport_id == '0'", "field": "network.transport", "value": "icmp", "override": true } }, { "set": { "if": "ctx.network?.transport_id == '0'", "field": "network.transport", "value": "icmp", "override": true } },
{ "community_id": {} }, { "community_id": {} },
{ "set": { "field": "module", "value": "pfsense", "override": true } }, { "set": { "field": "event.module", "value": "pfsense", "override": true } },
{ "set": { "field": "dataset", "value": "firewall", "override": true } }, { "set": { "field": "event.dataset", "value": "firewall", "override": true } },
{ "set": { "field": "category", "value": "network", "override": true } }, { "set": { "field": "category", "value": "network", "override": true } },
{ "remove": { "field": ["real_message", "ip_sub_msg", "firewall.sub_message"], "ignore_failure": true } } { "remove": { "field": ["real_message", "ip_sub_msg", "firewall.sub_message"], "ignore_failure": true } }
] ]
+2 -1
View File
@@ -63,7 +63,8 @@
{ "set": { "if": "ctx.rule?.score != null && ctx.rule?.score >= 50 && ctx.rule?.score <=69", "field": "event.severity", "value": 2, "override": true } }, { "set": { "if": "ctx.rule?.score != null && ctx.rule?.score >= 50 && ctx.rule?.score <=69", "field": "event.severity", "value": 2, "override": true } },
{ "set": { "if": "ctx.rule?.score != null && ctx.rule?.score >= 70 && ctx.rule?.score <=89", "field": "event.severity", "value": 3, "override": true } }, { "set": { "if": "ctx.rule?.score != null && ctx.rule?.score >= 70 && ctx.rule?.score <=89", "field": "event.severity", "value": 3, "override": true } },
{ "set": { "if": "ctx.rule?.score != null && ctx.rule?.score >= 90", "field": "event.severity", "value": 4, "override": true } }, { "set": { "if": "ctx.rule?.score != null && ctx.rule?.score >= 90", "field": "event.severity", "value": 4, "override": true } },
{ "set": { "if": "ctx.scan?.entropy?.entropy == 0", "field": "scan.entropy.entropy", "value": 0.0, "override": true } }, { "set": { "if": "ctx.scan?.entropy?.entropy == 0", "field": "scan.entropy.entropy", "value": "0.0", "override": true } },
{ "set": { "if": "ctx.scan?.pe?.image_version == 0", "field": "scan.pe.image_version", "value": "0.0", "override": true } },
{ "set": { "field": "observer.name", "value": "{{agent.name}}" }}, { "set": { "field": "observer.name", "value": "{{agent.name}}" }},
{ "convert" : { "field" : "scan.exiftool","type": "string", "ignore_missing":true }}, { "convert" : { "field" : "scan.exiftool","type": "string", "ignore_missing":true }},
{ "remove": { "field": ["host", "path", "message", "exiftool", "scan.yara.meta"], "ignore_missing": true } }, { "remove": { "field": ["host", "path", "message", "exiftool", "scan.yara.meta"], "ignore_missing": true } },
@@ -4,46 +4,6 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"agent": { "agent": {
@@ -52,69 +12,33 @@
"properties": { "properties": {
"original": { "original": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"ephemeral_id": { "ephemeral_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"version": { "version": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
} }
} }
} }
} }
File diff suppressed because it is too large Load Diff
File diff suppressed because it is too large Load Diff
@@ -4,46 +4,6 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"@timestamp": { "@timestamp": {
@@ -57,15 +17,9 @@
}, },
"tags": { "tags": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
} }
} }
File diff suppressed because it is too large Load Diff
File diff suppressed because it is too large Load Diff
File diff suppressed because it is too large Load Diff
@@ -4,59 +4,13 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"client": { "client": {
"properties": { "properties": {
"address": { "address": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"as": { "as": {
"properties": { "properties": {
@@ -66,12 +20,6 @@
"organization": { "organization": {
"properties": { "properties": {
"name": { "name": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
} }
@@ -84,118 +32,52 @@
}, },
"domain": { "domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"geo": { "geo": {
"properties": { "properties": {
"city_name": { "city_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"continent_code": { "continent_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"continent_name": { "continent_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"country_iso_code": { "country_iso_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"country_name": { "country_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"location": { "location": {
"type": "geo_point" "type": "geo_point"
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"postal_code": { "postal_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"region_iso_code": { "region_iso_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"region_name": { "region_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"timezone": { "timezone": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -204,13 +86,7 @@
}, },
"mac": { "mac": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"nat": { "nat": {
"properties": { "properties": {
@@ -230,63 +106,27 @@
}, },
"registered_domain": { "registered_domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"subdomain": { "subdomain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"top_level_domain": { "top_level_domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"user": { "user": {
"properties": { "properties": {
"domain": { "domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"email": { "email": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"full_name": { "full_name": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
}, },
@@ -294,75 +134,33 @@
"properties": { "properties": {
"domain": { "domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"hash": { "hash": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
}, },
"roles": { "roles": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
@@ -371,4 +169,4 @@
} }
} }
} }
} }
@@ -4,46 +4,6 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"cloud": { "cloud": {
@@ -52,57 +12,27 @@
"properties": { "properties": {
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"availability_zone": { "availability_zone": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"instance": { "instance": {
"properties": { "properties": {
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -110,13 +40,7 @@
"properties": { "properties": {
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -124,57 +48,27 @@
"properties": { "properties": {
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"provider": { "provider": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"region": { "region": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"service": { "service": {
"properties": { "properties": {
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
@@ -183,4 +77,4 @@
} }
} }
} }
} }
@@ -4,81 +4,23 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"container": { "container": {
"properties": { "properties": {
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"image": { "image": {
"properties": { "properties": {
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"tag": { "tag": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -87,27 +29,15 @@
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"runtime": { "runtime": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
} }
} }
} }
} }
@@ -4,46 +4,6 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"cyberarkpas": { "cyberarkpas": {
@@ -52,565 +12,241 @@
"properties": { "properties": {
"action": { "action": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"ca_properties": { "ca_properties": {
"properties": { "properties": {
"address": { "address": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"cpm_disabled": { "cpm_disabled": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"cpm_error_details": { "cpm_error_details": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"cpm_status": { "cpm_status": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"creation_method": { "creation_method": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"customer": { "customer": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"database": { "database": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"device_type": { "device_type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"dual_account_status": { "dual_account_status": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"group_name": { "group_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"in_process": { "in_process": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"index": { "index": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"last_fail_date": { "last_fail_date": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"last_success_change": { "last_success_change": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"last_success_reconciliation": { "last_success_reconciliation": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"last_success_verification": { "last_success_verification": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"last_task": { "last_task": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"logon_domain": { "logon_domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"other": { "other": {
"type": "flattened" "type": "flattened"
}, },
"policy_id": { "policy_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"port": { "port": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"privcloud": { "privcloud": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"reset_immediately": { "reset_immediately": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"retries_count": { "retries_count": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"sequence_id": { "sequence_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"tags": { "tags": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"user_dn": { "user_dn": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"user_name": { "user_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"virtual_username": { "virtual_username": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"category": { "category": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"desc": { "desc": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"extra_details": { "extra_details": {
"properties": { "properties": {
"ad_process_id": { "ad_process_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"ad_process_name": { "ad_process_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"application_type": { "application_type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"command": { "command": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"connection_component_id": { "connection_component_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"dst_host": { "dst_host": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"logon_account": { "logon_account": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"managed_account": { "managed_account": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"other": { "other": {
"type": "flattened" "type": "flattened"
}, },
"process_id": { "process_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"process_name": { "process_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"protocol": { "protocol": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"psmid": { "psmid": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"session_duration": { "session_duration": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"session_id": { "session_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"src_host": { "src_host": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"username": { "username": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"file": { "file": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"gateway_station": { "gateway_station": {
"type": "ip" "type": "ip"
}, },
"hostname": { "hostname": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"iso_timestamp": { "iso_timestamp": {
"type": "date" "type": "date"
}, },
"issuer": { "issuer": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"location": { "location": {
"doc_values": false, "doc_values": false,
"ignore_above": 4096, "ignore_above": 4096,
"index": false, "index": false,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"message": { "message": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"message_id": { "message_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"product": { "product": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"pvwa_details": { "pvwa_details": {
"type": "flattened" "type": "flattened"
@@ -619,99 +255,45 @@
"doc_values": false, "doc_values": false,
"ignore_above": 4096, "ignore_above": 4096,
"index": false, "index": false,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"reason": { "reason": {
"norms": false, "norms": false,
"type": "text", "type": "text"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"rfc5424": { "rfc5424": {
"type": "boolean" "type": "boolean"
}, },
"safe": { "safe": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"severity": { "severity": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"source_user": { "source_user": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"station": { "station": {
"type": "ip" "type": "ip"
}, },
"target_user": { "target_user": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"timestamp": { "timestamp": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"vendor": { "vendor": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"version": { "version": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
@@ -720,4 +302,4 @@
} }
} }
} }
} }
@@ -4,46 +4,6 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"data_stream": { "data_stream": {
@@ -62,4 +22,4 @@
} }
} }
} }
} }
@@ -4,59 +4,13 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"destination": { "destination": {
"properties": { "properties": {
"address": { "address": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"as": { "as": {
"properties": { "properties": {
@@ -66,12 +20,6 @@
"organization": { "organization": {
"properties": { "properties": {
"name": { "name": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
} }
@@ -84,118 +32,52 @@
}, },
"domain": { "domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"geo": { "geo": {
"properties": { "properties": {
"city_name": { "city_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"continent_code": { "continent_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"continent_name": { "continent_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"country_iso_code": { "country_iso_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"country_name": { "country_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"location": { "location": {
"type": "geo_point" "type": "geo_point"
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"postal_code": { "postal_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"region_iso_code": { "region_iso_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"region_name": { "region_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"timezone": { "timezone": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -204,13 +86,7 @@
}, },
"mac": { "mac": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"nat": { "nat": {
"properties": { "properties": {
@@ -230,63 +106,27 @@
}, },
"registered_domain": { "registered_domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"subdomain": { "subdomain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"top_level_domain": { "top_level_domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"user": { "user": {
"properties": { "properties": {
"domain": { "domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"email": { "email": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"full_name": { "full_name": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
}, },
@@ -294,75 +134,33 @@
"properties": { "properties": {
"domain": { "domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"hash": { "hash": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
}, },
"roles": { "roles": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
@@ -371,4 +169,4 @@
} }
} }
} }
} }
@@ -4,46 +4,6 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"dll": { "dll": {
@@ -52,56 +12,26 @@
"properties": { "properties": {
"digest_algorithm": { "digest_algorithm": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"exists": { "exists": {
"type": "boolean" "type": "boolean"
}, },
"signing_id": { "signing_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"status": { "status": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"subject_name": { "subject_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"team_id": { "team_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"timestamp": { "timestamp": {
"type": "date" "type": "date"
@@ -118,147 +48,63 @@
"properties": { "properties": {
"md5": { "md5": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"sha1": { "sha1": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"sha256": { "sha256": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"sha512": { "sha512": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"ssdeep": { "ssdeep": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"path": { "path": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"pe": { "pe": {
"properties": { "properties": {
"architecture": { "architecture": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"company": { "company": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"description": { "description": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"file_version": { "file_version": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"imphash": { "imphash": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"original_file_name": { "original_file_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"product": { "product": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
@@ -267,4 +113,4 @@
} }
} }
} }
} }
@@ -4,46 +4,6 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"dns": { "dns": {
@@ -52,141 +12,63 @@
"properties": { "properties": {
"class": { "class": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"data": { "data": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"ttl": { "ttl": {
"type": "long" "type": "long"
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
}, },
"type": "object" "type": "object"
}, },
"header_flags": { "header_flags": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"op_code": { "op_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"question": { "question": {
"properties": { "properties": {
"class": { "class": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"registered_domain": { "registered_domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"subdomain": { "subdomain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"top_level_domain": { "top_level_domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -195,27 +77,15 @@
}, },
"response_code": { "response_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
} }
} }
} }
} }
@@ -4,63 +4,17 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"ecs": { "ecs": {
"properties": { "properties": {
"version": { "version": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
} }
} }
} }
} }
@@ -4,46 +4,6 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"@timestamp": { "@timestamp": {
@@ -57,15 +17,9 @@
}, },
"tags": { "tags": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
} }
} }
@@ -4,79 +4,23 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"error": { "error": {
"properties": { "properties": {
"code": { "code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"message": { "message": {
"type": "match_only_text" "type": "match_only_text"
}, },
"stack_trace": { "stack_trace": {
"fields": { "fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
},
"text": { "text": {
"type": "match_only_text" "type": "match_only_text"
} }
@@ -85,17 +29,11 @@
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
} }
} }
} }
} }
@@ -4,102 +4,32 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"event": { "event": {
"properties": { "properties": {
"action": { "action": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"agent_id_status": { "agent_id_status": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"category": { "category": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"code": { "code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"created": { "created": {
"type": "date" "type": "date"
}, },
"dataset": { "dataset": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"duration": { "duration": {
"type": "long" "type": "long"
@@ -109,97 +39,43 @@
}, },
"hash": { "hash": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"ingested": { "ingested": {
"type": "date" "type": "date"
}, },
"kind": { "kind": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"module": { "module": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"original": { "original": {
"doc_values": false, "doc_values": false,
"index": false, "index": false,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"outcome": { "outcome": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"provider": { "provider": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"reason": { "reason": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"reference": { "reference": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"risk_score": { "risk_score": {
"type": "float" "type": "float"
@@ -218,37 +94,19 @@
}, },
"timezone": { "timezone": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"url": { "url": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
} }
} }
} }
} }
@@ -4,46 +4,6 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"file": { "file": {
@@ -53,68 +13,32 @@
}, },
"attributes": { "attributes": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"code_signature": { "code_signature": {
"properties": { "properties": {
"digest_algorithm": { "digest_algorithm": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"exists": { "exists": {
"type": "boolean" "type": "boolean"
}, },
"signing_id": { "signing_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"status": { "status": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"subject_name": { "subject_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"team_id": { "team_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"timestamp": { "timestamp": {
"type": "date" "type": "date"
@@ -135,65 +59,29 @@
}, },
"device": { "device": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"directory": { "directory": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"drive_letter": { "drive_letter": {
"ignore_above": 1, "ignore_above": 1,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"elf": { "elf": {
"properties": { "properties": {
"architecture": { "architecture": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"byte_order": { "byte_order": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"cpu_type": { "cpu_type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"creation_date": { "creation_date": {
"type": "date" "type": "date"
@@ -205,76 +93,34 @@
"properties": { "properties": {
"abi_version": { "abi_version": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"class": { "class": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"data": { "data": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"entrypoint": { "entrypoint": {
"type": "long" "type": "long"
}, },
"object_version": { "object_version": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"os_abi": { "os_abi": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"version": { "version": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -291,46 +137,22 @@
}, },
"flags": { "flags": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"physical_offset": { "physical_offset": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"physical_size": { "physical_size": {
"type": "long" "type": "long"
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"virtual_address": { "virtual_address": {
"type": "long" "type": "long"
@@ -345,203 +167,89 @@
"properties": { "properties": {
"sections": { "sections": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
}, },
"type": "nested" "type": "nested"
}, },
"shared_libraries": { "shared_libraries": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"telfhash": { "telfhash": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"extension": { "extension": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"fork_name": { "fork_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"gid": { "gid": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"group": { "group": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"hash": { "hash": {
"properties": { "properties": {
"md5": { "md5": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"sha1": { "sha1": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"sha256": { "sha256": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"sha512": { "sha512": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"ssdeep": { "ssdeep": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"inode": { "inode": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"mime_type": { "mime_type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"mode": { "mode": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"mtime": { "mtime": {
"type": "date" "type": "date"
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"owner": { "owner": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"path": { "path": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
}, },
@@ -549,73 +257,31 @@
"properties": { "properties": {
"architecture": { "architecture": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"company": { "company": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"description": { "description": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"file_version": { "file_version": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"imphash": { "imphash": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"original_file_name": { "original_file_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"product": { "product": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -623,118 +289,52 @@
"type": "long" "type": "long"
}, },
"target_path": { "target_path": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"uid": { "uid": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"x509": { "x509": {
"properties": { "properties": {
"alternative_names": { "alternative_names": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"issuer": { "issuer": {
"properties": { "properties": {
"common_name": { "common_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"country": { "country": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"distinguished_name": { "distinguished_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"locality": { "locality": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"organization": { "organization": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"organizational_unit": { "organizational_unit": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"state_or_province": { "state_or_province": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -746,23 +346,11 @@
}, },
"public_key_algorithm": { "public_key_algorithm": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"public_key_curve": { "public_key_curve": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"public_key_exponent": { "public_key_exponent": {
"doc_values": false, "doc_values": false,
@@ -774,107 +362,47 @@
}, },
"serial_number": { "serial_number": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"signature_algorithm": { "signature_algorithm": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"subject": { "subject": {
"properties": { "properties": {
"common_name": { "common_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"country": { "country": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"distinguished_name": { "distinguished_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"locality": { "locality": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"organization": { "organization": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"organizational_unit": { "organizational_unit": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"state_or_province": { "state_or_province": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"version_number": { "version_number": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
@@ -883,4 +411,4 @@
} }
} }
} }
} }
File diff suppressed because it is too large Load Diff
@@ -4,46 +4,6 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"gcp": { "gcp": {
@@ -54,35 +14,17 @@
"properties": { "properties": {
"authority_selector": { "authority_selector": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"principal_email": { "principal_email": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"method_name": { "method_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"num_response_items": { "num_response_items": {
"type": "long" "type": "long"
@@ -91,43 +33,19 @@
"properties": { "properties": {
"filter": { "filter": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"proto_name": { "proto_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"resource_name": { "resource_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -138,13 +56,7 @@
}, },
"caller_supplied_user_agent": { "caller_supplied_user_agent": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -152,25 +64,13 @@
"properties": { "properties": {
"current_locations": { "current_locations": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"resource_name": { "resource_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"response": { "response": {
"properties": { "properties": {
@@ -178,77 +78,35 @@
"properties": { "properties": {
"group": { "group": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"kind": { "kind": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"uid": { "uid": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"proto_name": { "proto_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"status": { "status": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"service_name": { "service_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"status": { "status": {
"properties": { "properties": {
@@ -257,25 +115,13 @@
}, },
"message": { "message": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -285,33 +131,15 @@
"properties": { "properties": {
"project_id": { "project_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"region": { "region": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"zone": { "zone": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -319,33 +147,15 @@
"properties": { "properties": {
"project_id": { "project_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"subnetwork_name": { "subnetwork_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"vpc_name": { "vpc_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
@@ -357,96 +167,42 @@
"properties": { "properties": {
"action": { "action": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"destination_range": { "destination_range": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"direction": { "direction": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"priority": { "priority": {
"type": "long" "type": "long"
}, },
"reference": { "reference": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"source_range": { "source_range": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"source_service_account": { "source_service_account": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"source_tag": { "source_tag": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"target_service_account": { "target_service_account": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"target_tag": { "target_tag": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
@@ -458,33 +214,15 @@
"properties": { "properties": {
"project_id": { "project_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"region": { "region": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"zone": { "zone": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
@@ -492,33 +230,15 @@
"properties": { "properties": {
"project_id": { "project_id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"subnetwork_name": { "subnetwork_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"vpc_name": { "vpc_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
@@ -528,13 +248,7 @@
"properties": { "properties": {
"reporter": { "reporter": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"rtt": { "rtt": {
"properties": { "properties": {
@@ -550,4 +264,4 @@
} }
} }
} }
} }
File diff suppressed because it is too large Load Diff
@@ -4,83 +4,25 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"group": { "group": {
"properties": { "properties": {
"domain": { "domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
} }
} }
} }
} }
@@ -4,59 +4,13 @@
"ecs_version": "1.12.2" "ecs_version": "1.12.2"
}, },
"template": { "template": {
"settings": {
"analysis": {
"analyzer": {
"es_security_analyzer": {
"type": "custom",
"char_filter": [
"whitespace_no_way"
],
"filter": [
"lowercase",
"trim"
],
"tokenizer": "keyword"
}
},
"char_filter": {
"whitespace_no_way": {
"type": "pattern_replace",
"pattern": "(\\s)+",
"replacement": "$1"
}
},
"filter": {
"path_hierarchy_pattern_filter": {
"type": "pattern_capture",
"preserve_original": true,
"patterns": [
"((?:[^\\\\]*\\\\)*)(.*)",
"((?:[^/]*/)*)(.*)"
]
}
},
"tokenizer": {
"path_tokenizer": {
"type": "path_hierarchy",
"delimiter": "\\"
}
}
}
},
"mappings": { "mappings": {
"properties": { "properties": {
"host": { "host": {
"properties": { "properties": {
"architecture": { "architecture": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"cpu": { "cpu": {
"properties": { "properties": {
@@ -86,163 +40,73 @@
}, },
"domain": { "domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"geo": { "geo": {
"properties": { "properties": {
"city_name": { "city_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"continent_code": { "continent_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"continent_name": { "continent_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"country_iso_code": { "country_iso_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"country_name": { "country_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"location": { "location": {
"type": "geo_point" "type": "geo_point"
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"postal_code": { "postal_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"region_iso_code": { "region_iso_code": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"region_name": { "region_name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"timezone": { "timezone": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"hostname": { "hostname": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"ip": { "ip": {
"type": "ip" "type": "ip"
}, },
"mac": { "mac": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"network": { "network": {
"properties": { "properties": {
@@ -272,85 +136,37 @@
"properties": { "properties": {
"family": { "family": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"full": { "full": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
}, },
"kernel": { "kernel": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
}, },
"platform": { "platform": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"version": { "version": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"type": { "type": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"uptime": { "uptime": {
"type": "long" "type": "long"
@@ -359,31 +175,13 @@
"properties": { "properties": {
"domain": { "domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"email": { "email": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"full_name": { "full_name": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
}, },
@@ -391,75 +189,33 @@
"properties": { "properties": {
"domain": { "domain": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
}, },
"hash": { "hash": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"id": { "id": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
}, },
"name": { "name": {
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
},
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword" "type": "keyword"
}, },
"roles": { "roles": {
"ignore_above": 1024, "ignore_above": 1024,
"type": "keyword", "type": "keyword"
"fields": {
"security": {
"type": "text",
"analyzer": "es_security_analyzer"
}
}
} }
} }
} }
@@ -468,4 +224,4 @@
} }
} }
} }
} }

Some files were not shown because too many files have changed in this diff Show More