Compare commits

...

414 Commits

Author SHA1 Message Date
Mike Reeves 84c5fa6a58 Merge pull request #12353 from Security-Onion-Solutions/2.4/dev
2.4.50
2024-02-20 10:04:01 -05:00
Mike Reeves 5c96e30087 Merge pull request #12383 from Security-Onion-Solutions/2.4.50
2.4.50
2024-02-20 09:50:09 -05:00
Mike Reeves 18b4fcca75 2.4.50 2024-02-20 09:47:05 -05:00
Josh Patterson 0765320839 Merge pull request #12360 from Security-Onion-Solutions/2450soup
`2450soup
2024-02-14 14:37:28 -05:00
m0duspwnens a2b17d2348 move jinja to top 2024-02-14 14:27:41 -05:00
m0duspwnens c1f467a068 handle airgap 2024-02-14 14:22:18 -05:00
m0duspwnens 7d5932ee5e Merge remote-tracking branch 'origin/2.4/dev' into 2450soup 2024-02-14 13:29:39 -05:00
m0duspwnens 79e98e508f pass in UPDATE_DIR as a pillar 2024-02-14 13:28:12 -05:00
Josh Patterson cf6266a92b Merge pull request #12354 from Security-Onion-Solutions/2450soup
modify soup to update soup scripts using salt
2024-02-13 16:23:57 -05:00
m0duspwnens 2e9fa2438b add back comment 2024-02-13 16:19:50 -05:00
m0duspwnens 00f2374582 fix path for so-firewall 2024-02-13 15:43:02 -05:00
m0duspwnens 468eedfaeb add soup script update retru 2024-02-13 15:30:24 -05:00
m0duspwnens 88786e8342 use file.copy to preserve perms 2024-02-13 15:05:09 -05:00
m0duspwnens 141fd49f02 use rsync 2024-02-13 14:27:22 -05:00
m0duspwnens 7112337c85 fix copy 2024-02-13 13:52:14 -05:00
m0duspwnens d6ac7a3286 fix the jinja 2024-02-13 13:31:34 -05:00
m0duspwnens 9175a73456 dont need $ for vars 2024-02-13 13:08:09 -05:00
Doug Burks 14209ad99d Merge pull request #12355 from Security-Onion-Solutions/dougburks-patch-1
Add table columns to process dashboard in defaults.yaml
2024-02-13 12:59:34 -05:00
m0duspwnens 1bde002f20 update case 2024-02-13 12:51:53 -05:00
Doug Burks 0741ae370a Update defaults.yaml 2024-02-13 12:51:26 -05:00
m0duspwnens d7f853b5b2 comment out script copy in soup 2024-02-13 12:50:22 -05:00
m0duspwnens 5c9b1ab38b copy with cp 2024-02-13 12:48:31 -05:00
m0duspwnens b713771494 add back common soup_scripts state 2024-02-13 12:30:36 -05:00
Doug Burks 8060751a66 Add table columns to process dashboard in defaults.yaml 2024-02-13 12:24:33 -05:00
m0duspwnens c1258f9a92 Merge remote-tracking branch 'origin/2.4/dev' into 2450soup 2024-02-13 11:09:24 -05:00
m0duspwnens 92634724c4 move rm 2024-02-13 11:09:08 -05:00
m0duspwnens 3efaba1104 modify soup to update soup scripts without using salt 2024-02-13 11:04:26 -05:00
Doug Burks d072d431b3 Merge pull request #12350 from Security-Onion-Solutions/feature/process-ancestry-action
FEATURE: Add new SOC action to show process ancestry #12345
2024-02-13 08:51:38 -05:00
Doug Burks 0ad39a7e32 FEATURE: Add new SOC action to show process ancestry #12345 2024-02-12 19:18:29 -05:00
Doug Burks 20d2f3b97e Update Sublime action in defaults.yaml to use i18n 2024-02-12 19:13:32 -05:00
Josh Brower 64726a2785 Merge pull request #12349 from Security-Onion-Solutions/2.4/conflictingfix
Fix conflicting id
2024-02-12 19:07:07 -05:00
Josh Brower ccb14485a3 Fix conflicting id 2024-02-12 19:06:19 -05:00
Mike Reeves e713b4c660 Merge pull request #12346 from Security-Onion-Solutions/reyesj2-patch-1
Remove unused file
2024-02-12 16:07:31 -05:00
Mike Reeves 2db5f4dd41 Merge pull request #12308 from petiepooo/feat-es-ownfs
FEATURE: Check for mountpoint during Elastic size limit calculations
2024-02-12 16:03:36 -05:00
Mike Reeves f91cb5b81f Merge pull request #12290 from petiepooo/fix-remove-intca-symlink
fix: also remove intca symlink
2024-02-12 12:33:13 -05:00
Jorge Reyes 4b697b2406 Remove unused file 2024-02-12 09:28:48 -05:00
Josh Brower c04f5a3f0f Merge pull request #12268 from Security-Onion-Solutions/feature/fleet-artifacts
Feature/fleet artifacts
2024-02-12 08:58:14 -05:00
Josh Brower b1de6abc17 Merge pull request #12343 from Security-Onion-Solutions/fix/anothercheck
Wait for ES to be ready
2024-02-12 08:58:05 -05:00
Josh Brower cc0f25a4f7 Wait for ES to be ready 2024-02-11 13:30:20 -05:00
Josh Brower eafb5cf15e Change to file_root 2024-02-11 13:18:20 -05:00
Jorge Reyes 2b2aa30ac1 Merge pull request #12332 from Security-Onion-Solutions/reyesj2/sod-putty
Add putty to SOD
2024-02-10 20:41:03 -05:00
Josh Brower 66ac36a944 Update soup 2024-02-10 11:07:26 -05:00
Josh Brower feabb7c51f Merge remote-tracking branch 'origin/2.4/dev' into feature/fleet-artifacts 2024-02-10 10:57:46 -05:00
Josh Patterson 94b6e781bb Merge pull request #12337 from Security-Onion-Solutions/salt3006.6v2
Salt3006.6v2
2024-02-09 15:45:39 -05:00
m0duspwnens 304ae49251 fix source 2024-02-09 12:41:23 -05:00
m0duspwnens 213ac822a8 create dir and chown 2024-02-09 10:54:07 -05:00
m0duspwnens 2143881c0b specify *.rules 2024-02-09 10:22:25 -05:00
m0duspwnens 5903ae596c move suricata rules to /opt/so/rules/nids/suri 2024-02-09 09:47:23 -05:00
Josh Brower 0c423c9329 Merge pull request #12333 from Security-Onion-Solutions/fix/shell
Fixup shell
2024-02-09 09:31:47 -05:00
Josh Brower 654602bf80 Fixup shell 2024-02-09 09:30:18 -05:00
reyesj2 3c9d6da1d8 add putty to sod packages.sls
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-02-08 22:05:37 -05:00
Josh Brower 683abf0179 Rework naming 2024-02-08 13:24:25 -05:00
Josh Brower 8d0e8789bd Use salt file roots 2024-02-08 09:54:51 -05:00
Josh Brower 503a09f150 Merge remote-tracking branch 'origin/2.4/dev' into feature/fleet-artifacts 2024-02-08 09:45:21 -05:00
Josh Patterson f02f61c6dd Merge pull request #12325 from Security-Onion-Solutions/salt3006.6
Salt3006.6
2024-02-07 16:33:56 -05:00
Doug Burks 8c5dafa058 Merge pull request #12324 from Security-Onion-Solutions/feature/dashboards-communityid-firewall
FEATURE: Add new dashboards for community_id and firewall auth #12323
2024-02-07 16:15:21 -05:00
Doug Burks d3d2305f00 FEATURE: Add new dashboards for community_id and firewall auth #12323 2024-02-07 16:08:27 -05:00
m0duspwnens 6534f392a9 update backup filename 2024-02-07 14:25:28 -05:00
m0duspwnens 478fb6261e Merge remote-tracking branch 'origin/2.4/dev' into salt3006.6 2024-02-07 14:15:11 -05:00
m0duspwnens e42e07b245 update salt mine after salt-master restarts 2024-02-07 13:05:45 -05:00
m0duspwnens f97d0f2f36 add /opt/so/rules/ to files_roots 2024-02-07 09:25:56 -05:00
m0duspwnens 24fd3ef8cc uopdate error message 2024-02-06 16:22:13 -05:00
m0duspwnens b3f6153667 update so-yaml tests 2024-02-06 16:15:54 -05:00
Doug Burks d800d59304 Merge pull request #12316 from Security-Onion-Solutions/feature/improve-soc-actions
FEATURE: Improve Correlate and Hunt actions on SOC Actions menu #12315
2024-02-06 15:46:31 -05:00
Doug Burks 7106095128 FEATURE: Improve Correlate and Hunt actions on SOC Actions menu #12315 2024-02-06 15:39:23 -05:00
m0duspwnens 9d62ade32e update so-yaml tests 2024-02-06 11:14:27 -05:00
m0duspwnens 2643ae08a7 add append to list 2024-02-05 17:54:30 -05:00
Pete cf83d1cb86 feat: use mountpoint for Elastic log limit
Instead of just existence, this checks if the directories are separate mountpoints when determining disk size and log_size_limit calculations.

It also sets the percentage to 80 if /nsm/elasticsearch is a separate mountpoint.  This allows for better disk utilization on server configurations where /nsm is based on large slow HDDs for increased PCAP retention but /nsm/elasticsearch is based on SSDs for faster Elasticsearch performance.
2024-02-02 12:25:16 -05:00
Pete 7a29b3a529 call salt before stopping salt services
salt-call does not work when the salt-master is not running.  If these calls are to succeed, they should occur before the salt services are stopped.
2024-02-02 08:45:01 -05:00
m0duspwnens 61ee41e431 Merge remote-tracking branch 'origin/2.4/dev' into salt3006.6 2024-02-01 11:07:06 -05:00
m0duspwnens 0d5db58c86 upgrade salt3006.6 2024-02-01 10:32:41 -05:00
Josh Brower 3d478b92b2 Merge pull request #12294 from Security-Onion-Solutions/jppffa
Jppffa
2024-02-01 09:47:18 -05:00
Josh Brower e090518b59 Refactor script 2024-02-01 09:46:53 -05:00
weslambert 91c1e595ef Merge pull request #12297 from Security-Onion-Solutions/feature/pipeline_config_ui
Manage custom Elasticsearch and Logstash pipelines in UI
2024-02-01 09:18:30 -05:00
Wes 1818e134ca Change numbers for Logstash 2024-02-01 14:01:55 +00:00
Wes 182667bafb Change numbers for Elasticsearch 2024-02-01 13:59:23 +00:00
Wes 136097f981 Custom Logstash pipeline annotations 2024-01-31 21:47:09 +00:00
Wes bc502cc065 Custom Elasticserach pipeline annotations 2024-01-31 21:46:33 +00:00
m0duspwnens ae32ac40c2 add fleet node nginx to docker annotations 2024-01-31 16:28:45 -05:00
m0duspwnens 2f03248612 use different nginx defaults for so-fleet node hosting artifacts 2024-01-31 16:25:09 -05:00
Mike Reeves a094d1007b Merge pull request #12293 from Security-Onion-Solutions/TOoSmOotH-patch-3
fix salt lock for airgap version mismatches
2024-01-31 16:21:16 -05:00
Mike Reeves 341ff5b564 Update so-functions 2024-01-31 16:18:51 -05:00
Josh Brower 0fe96bfc2d switch to symlink 2024-01-31 16:17:40 -05:00
Wes 4672a5b8eb Custom pipeline configuration in UI 2024-01-31 20:18:17 +00:00
Wes 1853dc398b Custom pipeline configuration 2024-01-31 20:17:33 +00:00
Wes bc75be9402 Custom pipelines in UI 2024-01-31 20:16:48 +00:00
Wes cd4bd6460a Custom pipelines 2024-01-31 20:16:18 +00:00
Pete 1192dbd530 also remove intca symlink
The symlink is created in init.sls; it should be removed here.
2024-01-31 09:01:56 -05:00
Jorge Reyes 4dd0b4a4fd Merge pull request #12283 from Security-Onion-Solutions/reyesj2-patch-6
Remove remediate from initial oscap scan
2024-01-30 15:56:13 -05:00
reyesj2 b5ffa186fb Remove remediate from initial oscap scan
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-30 15:54:23 -05:00
Josh Brower 0d08bb0a91 Finalize script 2024-01-29 11:37:28 -05:00
Jorge Reyes cb5e111a00 Merge pull request #12267 from Security-Onion-Solutions/reyesj2-patch-6
Update soup
2024-01-29 10:22:35 -05:00
reyesj2 7c08b348aa Add comment for soup update w/ STIGs enabled
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-29 10:16:34 -05:00
Josh Brower afa98fa147 update artifacts URL automatically 2024-01-28 14:20:52 -05:00
Josh Brower 1847e5c3c0 Enable nginx on Fleet Node 2024-01-28 11:37:18 -05:00
Josh Brower cfc33b1a34 Sync Elastic Agent Artifacts 2024-01-28 10:12:25 -05:00
weslambert dc5ea89255 Merge pull request #12260 from Security-Onion-Solutions/fix/endpoint_diagnostic
Add template for endpoint.diagnostic.collection
2024-01-26 16:13:30 -05:00
reyesj2 c4301d7cc1 Soup script update locations
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-26 15:51:06 -05:00
reyesj2 91c7b8144d soup logic
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-26 15:43:42 -05:00
reyesj2 2e026b637d Update soup to retry modified salt command on failure to update soup scripts.
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-26 11:36:33 -05:00
reyesj2 cd6e387bcb remove --local from soup common.soup_scripts update.
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-25 16:15:53 -05:00
Wes 12ab6338db Add diagnostic 2024-01-25 20:16:52 +00:00
weslambert cd54d4becb Fix indent 2024-01-25 13:57:02 -05:00
weslambert 5f1c76f6ec endpoint.diagnostic.collection 2024-01-25 09:46:25 -05:00
weslambert d2d70d1c5b Merge pull request #12250 from Security-Onion-Solutions/fix/scan_pe_flags
Fix PE Flags
2024-01-24 14:29:23 -05:00
Jason Ertel e53030feef Merge pull request #12248 from Security-Onion-Solutions/jertel/pfeat
standardize feature names
2024-01-24 12:12:16 -05:00
Jason Ertel 9f17bd2255 lks/fps 2024-01-24 11:17:32 -05:00
Wes 8426aad56d Text mapping for scan.pe.flags 2024-01-24 15:10:42 +00:00
Wes d23d367058 Make scan.pe.flags a string 2024-01-24 15:08:38 +00:00
weslambert cbdaf2e9a1 Merge pull request #12242 from Security-Onion-Solutions/upgrade/strelka_0.24.01.18
Fix quote
2024-01-23 14:02:35 -05:00
weslambert 4d7af21dd5 Fix quote 2024-01-23 13:55:37 -05:00
weslambert 8348506acc Merge pull request #12240 from Security-Onion-Solutions/upgrade/strelka_0.24.01.18
UPGRADE: Strelka 0.24.01.18
2024-01-23 13:50:15 -05:00
weslambert 1698d95efe Use PLACEHOLDER for key values 2024-01-23 13:45:26 -05:00
weslambert b1052ddcce Merge pull request #12241 from Security-Onion-Solutions/fix/leak_test
Exclude specific Strelka key values
2024-01-23 13:43:18 -05:00
weslambert 0cb36bb0aa Exclude StrelkaHexDump and PLACEHOLDER values 2024-01-23 13:39:59 -05:00
weslambert 0ccdfcb07c Exclude only offset_meta_key 2024-01-23 13:11:43 -05:00
weslambert 63ba97306c Exclude Strelka defaults 2024-01-23 13:05:58 -05:00
weslambert 72319e33db Avoid leak test triggering 2024-01-23 12:38:09 -05:00
weslambert 34bb37e415 Merge pull request #12227 from Security-Onion-Solutions/feature/rita_logs
RITA Logs
2024-01-23 12:32:32 -05:00
Wes 3bcb0bc132 Update defaults 2024-01-23 17:18:54 +00:00
Jorge Reyes d25a2d4c30 Merge pull request #12230 from Security-Onion-Solutions/reyesj2-patch-sl
Handle non-zero
2024-01-23 08:31:48 -05:00
reyesj2 350b0df3bf Handle non-zero
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-22 22:48:15 -05:00
Wes 5542db0aac Leave package version null 2024-01-22 21:07:46 +00:00
Wes b08db3e05a Add RITA policy 2024-01-22 20:16:43 +00:00
Wes 80a3942245 Rename RITA pipelines 2024-01-22 20:15:48 +00:00
weslambert de6151fbe2 Merge pull request #12221 from Security-Onion-Solutions/feature/additional_integrations_4
Additional integrations #4 - Part 1
2024-01-19 17:32:37 -05:00
Wes 7118cc8dee Add additional integration SOC configuration 2024-01-19 22:04:07 +00:00
Wes 05aa8b013a Add additional integration to templates 2024-01-19 22:02:39 +00:00
Wes d0457cb61e Add additional integrations to defaults 2024-01-19 22:00:38 +00:00
Jorge Reyes c2b44985c7 Merge pull request #12220 from Security-Onion-Solutions/reyesj2-patch-sl
Disable stigs setting/verifying umask is set to 077. Known issue with …
2024-01-19 16:06:10 -05:00
reyesj2 8f8c250ed3 Disable stigs setting/verifing umask is set to 077. Known issue with running SOUP
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-19 16:04:21 -05:00
Mike Reeves 6db32885eb Merge pull request #12216 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update suricata.common
2024-01-19 13:56:48 -05:00
Mike Reeves efe8cfda95 Update suricata.common 2024-01-19 13:39:28 -05:00
Mike Reeves 08486e279c Update suricata.common 2024-01-19 13:36:43 -05:00
Jorge Reyes 40d0411441 Merge pull request #12214 from Security-Onion-Solutions/reyesj2-patch-sl
Add stig pillar dir during soup
2024-01-19 10:55:13 -05:00
reyesj2 2b6927da82 Add stig pillar dir during soup
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-19 09:55:23 -05:00
Jorge Reyes 0786806f8f Merge pull request #12213 from Security-Onion-Solutions/reyesj2-patch-sl
Update soup
2024-01-19 08:59:34 -05:00
reyesj2 ca4f2f1dd6 Add creation of additional pillars to soup for stig state
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-19 08:31:20 -05:00
Jorge Reyes 97e2721754 Merge pull request #12208 from Security-Onion-Solutions/reyesj2-patch-sl 2024-01-18 16:53:14 -05:00
reyesj2 07602076f1 Update telegraf script
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-18 16:48:16 -05:00
reyesj2 caf4036dbf Update features check
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-18 16:06:53 -05:00
Jorge Reyes 4a898619a6 Merge pull request #12206 from Security-Onion-Solutions/reyesj2-patch-sl
Remove need for stig script
2024-01-18 12:49:28 -05:00
reyesj2 65d46ea27d Merge remote-tracking branch 'remotes/origin/2.4/dev' into reyesj2-patch-sl 2024-01-18 12:24:35 -05:00
reyesj2 67445de4ee Remove need for stig script
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-18 12:24:01 -05:00
Jorge Reyes 6a8bf0b953 Merge pull request #12202 from Security-Onion-Solutions/reyesj2-patch-sl
Add stig state
2024-01-18 09:25:21 -05:00
weslambert 33d74098bd Merge pull request #12201 from Security-Onion-Solutions/fix/suricata_ike
Add Suricata IKE pipeline
2024-01-17 16:50:19 -05:00
reyesj2 3173f9a26f Merge remote-tracking branch 'remotes/origin/2.4/dev' into reyesj2-patch-sl 2024-01-17 16:28:13 -05:00
reyesj2 df921892a3 Remove post scan from remediate log.
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-17 16:23:20 -05:00
reyesj2 739feb25a4 Add telegraf script to import featuresdetected
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-17 15:55:00 -05:00
reyesj2 4e6924610d Add additional status checks to so-common-status-check for telegraf
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-17 15:37:52 -05:00
Mike Reeves 880f2a3e1b Merge pull request #12197 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2024-01-17 14:19:30 -05:00
Mike Reeves 958c827fd5 Update VERSION 2024-01-17 14:18:37 -05:00
Mike Reeves aa294a7f41 Merge pull request #12195 from Security-Onion-Solutions/2.4/dev
2.4.40
2024-01-17 14:04:27 -05:00
Mike Reeves 049d0b53c2 Merge pull request #12194 from Security-Onion-Solutions/2.4.40
2.4.40
2024-01-17 12:02:14 -05:00
Mike Reeves dff6d299a1 2.4.40 2024-01-17 11:59:27 -05:00
Wes e70ce50912 Change description 2024-01-17 14:06:16 +00:00
Jason Ertel 38965ccab5 Merge pull request #12192 from Security-Onion-Solutions/needsrestarted
Needsrestarted
2024-01-16 18:49:22 -05:00
m0duspwnens eeb249e00d look for needs_restarted file 2024-01-16 17:22:09 -05:00
m0duspwnens dff06cb085 changes for telegraf os.sh 2024-01-16 17:03:36 -05:00
m0duspwnens 8c1d1c95db check needs_restarting rework 2024-01-16 17:02:27 -05:00
Wes f6590ac0bf Remove Suricata IKEv2 pipeline 2024-01-16 18:10:00 +00:00
Wes ea64ce92d3 Add Suricata IKE pipeline 2024-01-16 18:09:46 +00:00
Wes 8a92b023b2 Add interface name 2024-01-16 18:09:16 +00:00
reyesj2 6cf0b365e6 Modify yum.conf.jinja to include localpkg_gpgcheck rather than modifying it with so-stig
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-15 21:30:31 -05:00
reyesj2 4bffd8e27c Merge remote-tracking branch 'remotes/origin/2.4/dev' into reyesj2-patch-sl 2024-01-15 21:19:37 -05:00
reyesj2 a73d78300a Add initial stig state
Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
2024-01-15 21:17:17 -05:00
weslambert 790f5171a6 Merge pull request #12176 from Security-Onion-Solutions/fix/otx_pulses_template
FIX: OTX pulses template
2024-01-12 16:55:58 -05:00
weslambert 252c51dafb Change order of names 2024-01-12 16:45:18 -05:00
weslambert a07e6e1058 OTX pulses 2024-01-12 16:43:33 -05:00
weslambert 3f9678056d OTX pulses template 2024-01-12 16:42:32 -05:00
weslambert c895b6a274 Merge pull request #12173 from Security-Onion-Solutions/fix/endpoint_metrics_templates
Add endpoint metrics templates
2024-01-12 11:26:09 -05:00
Wes 418f41c7e4 Add SOC configuration for metrics 2024-01-12 15:03:18 +00:00
weslambert 05679e79fc Merge pull request #12171 from Security-Onion-Solutions/2.4/dev
Merge 2.4 dev
2024-01-12 08:50:15 -05:00
Josh Brower af3aa53612 Merge pull request #12170 from Security-Onion-Solutions/fix/nav
Remove old nav layers
2024-01-12 08:48:29 -05:00
Wes 5eae349938 Add endpoint metrics templates 2024-01-12 13:47:35 +00:00
Josh Brower 2f8ce33cf7 formatting 2024-01-12 08:47:09 -05:00
Josh Brower 61b2a76a09 Remove old nav layers-rev2 2024-01-12 08:46:23 -05:00
Josh Brower b89b7cab59 Remove old nav layers 2024-01-12 08:37:32 -05:00
weslambert 71c5e34e03 Merge pull request #12164 from Security-Onion-Solutions/fix/optional_integration_pillar_merge
Make sure optional integration pillar values are merged with defaults
2024-01-11 16:14:46 -05:00
weslambert 880300d644 Move ELASTICFLEETMERGED import under allowed states 2024-01-11 14:58:21 -05:00
weslambert f5b59cacec Move ELASTICFLEETMERGED import 2024-01-11 14:56:01 -05:00
weslambert ea5097f1b4 Add back curly brace 2024-01-11 14:51:01 -05:00
weslambert cc66daba1a Make sure optional integration pillar values are merged with defaults 2024-01-11 14:49:39 -05:00
Josh Brower ea54aafa86 Merge pull request #12161 from Security-Onion-Solutions/fix/kibana-restart
Check Kibana API not Web
2024-01-11 12:32:19 -05:00
Josh Brower 03f140161c Check Kibana API not Web 2024-01-11 12:30:23 -05:00
weslambert 7bdc306ad4 Merge pull request #12160 from Security-Onion-Solutions/feature/additional_integrations_3
Additional Supported Integrations #3
2024-01-11 12:26:14 -05:00
weslambert 5e1e685ce0 Exclude Cisco failed_attempts pipeline 2024-01-11 10:52:30 -05:00
Wes c89d674a92 Add settings for integrations 2024-01-11 14:18:06 +00:00
Wes 9b1ddcacb4 Add additional templates for integrations 2024-01-11 14:00:09 +00:00
Wes 5703023008 Add additional packages 2024-01-11 13:59:38 +00:00
Josh Brower 59fe9a0587 Merge pull request #12156 from Security-Onion-Solutions/fix/navigator
Upgrade Navigator and fix Playbook layer
2024-01-11 08:48:34 -05:00
Josh Brower b8e555e913 Upgrade Navigator and fix Playbook layer 2024-01-10 21:16:59 -05:00
Mike Reeves 16b15c786b Merge pull request #12155 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update soup
2024-01-10 14:44:51 -05:00
Mike Reeves 3e13ea5c7a Update soup 2024-01-10 14:36:49 -05:00
Josh Brower 9159eab9fd Merge pull request #12151 from Security-Onion-Solutions/fix/so-playbook-reset
Fix reinstall & reset stability
2024-01-10 14:23:53 -05:00
Mike Reeves 0519812866 Merge pull request #12154 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update so-functions
2024-01-10 14:21:49 -05:00
Mike Reeves fc2f02c0a0 Update so-functions 2024-01-10 14:19:47 -05:00
Mike Reeves 1e3a00a833 Update so-functions 2024-01-10 14:16:55 -05:00
Josh Brower f21f0a9a96 Replace sed for so-yaml 2024-01-10 11:15:51 -05:00
Josh Brower 6ff764e6a1 refactor for reinstall stability 2024-01-10 10:22:50 -05:00
Jason Ertel f5568995ac Merge pull request #12149 from Security-Onion-Solutions/jertel/logs
exempt transient license check errors
2024-01-10 09:12:46 -05:00
Jason Ertel 47eea80d03 exempt transient license check errors 2024-01-10 09:07:17 -05:00
Josh Patterson 0b919ff0fa Merge pull request #12144 from Security-Onion-Solutions/salt3006.5
Salt3006.5
2024-01-09 12:09:36 -05:00
m0duspwnens c9f2038990 remove outdated comment 2024-01-09 11:36:44 -05:00
Josh Brower bf05efa59f Merge pull request #12141 from Security-Onion-Solutions/fix/fleet-reset
Fix/fleet reset
2024-01-09 10:38:07 -05:00
Josh Brower b058bc8c05 Move to non-destructive 2024-01-09 10:22:43 -05:00
Josh Brower 7ddda03ee9 Merge pull request #12138 from Security-Onion-Solutions/fix/fim
Fix/fim
2024-01-09 08:26:55 -05:00
Josh Brower 5513e74807 comma 2024-01-09 08:12:33 -05:00
Josh Brower 31ee365a91 Fixup FIM events 2024-01-09 08:11:05 -05:00
m0duspwnens f46ac6b9d7 Merge remote-tracking branch 'origin/2.4/dev' into salt3006.5 2024-01-08 14:02:02 -05:00
m0duspwnens 31f314504e salt 3006.5 2024-01-08 14:01:40 -05:00
Mike Reeves 0d76ddd49f Merge pull request #12120 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update so-raid-status for SM based appliances
2024-01-05 10:27:21 -05:00
Mike Reeves b0447a9af5 Update so-raid-status for SM based appliances 2024-01-05 09:28:04 -05:00
Josh Patterson ef6eafeff1 Merge pull request #12118 from Security-Onion-Solutions/startupstates
enable startup_states: highstate on managers during setup and not wit…
2024-01-04 17:37:27 -05:00
m0duspwnens ccfdafea0a enable startup_states: highstate on managers during setup and not with salt 2024-01-04 16:24:48 -05:00
Josh Patterson 93cdac592e Merge pull request #12116 from Security-Onion-Solutions/issue/12033
Issue/12033
2024-01-04 09:54:29 -05:00
m0duspwnens 2eaf0e812a declare NEW_LIST outside jinja logic 2024-01-03 16:49:28 -05:00
Jorge Reyes cab7c9d573 Merge pull request #12109 from Security-Onion-Solutions/reyesj2-patch-1
Add brasero to packages list for SOD
2024-01-03 14:45:07 -05:00
Jorge Reyes 8c792a8cfa Add brasero to packages list for SOD 2024-01-03 12:17:57 -05:00
m0duspwnens c091a0845c allow user to disable elastic agent sending to manager 2024-01-03 11:48:16 -05:00
Mike Reeves cf23723c54 Merge pull request #12102 from Security-Onion-Solutions/2.4/main
2.4/main
2024-01-02 11:18:07 -05:00
Mike Reeves 30bc02178a Merge pull request #12100 from Security-Onion-Solutions/mkrtemp
2.4.30 hotfix
2024-01-02 11:16:13 -05:00
Mike Reeves 84e8013e46 Update DOWNLOAD_AND_VERIFY_ISO.md 2024-01-02 10:31:14 -05:00
Mike Reeves 80ec4cecec Merge pull request #12099 from Security-Onion-Solutions/2.4.30hf5
2.4.30 hotfix
2024-01-02 10:29:45 -05:00
Mike Reeves 82482d309a Update DOWNLOAD_AND_VERIFY_ISO.md 2024-01-02 10:09:13 -05:00
Mike Reeves d437a2856a 2.4.30 hotfix 2024-01-02 09:48:45 -05:00
Josh Patterson f0b44ad56c Merge pull request #12095 from Security-Onion-Solutions/startupstates
Change salt-minion startup_states
2024-01-02 09:18:21 -05:00
Jason Ertel cffc3353bc Merge pull request #12090 from Security-Onion-Solutions/jertel/lasths
show last highstate date/time on grid metrics screen; expose maxUploa…
2023-12-29 14:51:09 -05:00
Jason Ertel e075d07f5c show last highstate date/time on grid metrics screen; expose maxUploadSize and staleMetricsMs settings on config screen 2023-12-29 11:38:42 -05:00
Jason Ertel fe8f57c43b Merge pull request #12071 from Security-Onion-Solutions/jertel/influxerr
exclude transient influxdb error
2023-12-22 07:22:45 -05:00
Jason Ertel 3456de3a30 exclude transient influxdb error 2023-12-22 07:16:45 -05:00
Jason Ertel 14767dd8b5 Merge pull request #12067 from Security-Onion-Solutions/jertel/fixcurator
only run the file.absent state if there are files to delete
2023-12-21 09:41:46 -05:00
Jason Ertel 8189f46a03 only run the file.absent state if there are files to delete 2023-12-21 09:36:47 -05:00
weslambert cfb5c1c9d2 Merge pull request #12063 from Security-Onion-Solutions/fix/curator_log_check
Ignore Curator logs
2023-12-20 17:47:17 -05:00
weslambert 244968ce23 Remove unnecessary blank lines 2023-12-20 17:30:15 -05:00
weslambert 65f89b22b2 Ignore Curator logs 2023-12-20 17:28:55 -05:00
weslambert 7684aadb87 Merge pull request #12062 from Security-Onion-Solutions/fix/curator_remove
Curator Remove Changes
2023-12-20 15:16:47 -05:00
Wes 188744357f Remove post since function doesn't exist 2023-12-20 19:14:14 +00:00
Wes 4baf4657f6 Curator cleanup 2023-12-20 19:10:22 +00:00
Wes 1006710226 Change Curator disable config 2023-12-20 18:26:27 +00:00
weslambert cd661027a6 Remove post for 2.4.40 2023-12-20 12:23:20 -05:00
m0duspwnens 28fdf15304 remove comment 2023-12-19 16:37:32 -05:00
Mike Reeves 90edf7e8f1 Merge pull request #12053 from Security-Onion-Solutions/2.4/main
2.4/main
2023-12-19 14:40:21 -05:00
Mike Reeves 552e4c0d1c Merge pull request #12050 from Security-Onion-Solutions/hotfix/2.4.30
Hotfix/2.4.30
2023-12-19 14:37:35 -05:00
weslambert ba2c51bee2 Merge pull request #12052 from Security-Onion-Solutions/fix/analyzer_images
Fix analyzer images
2023-12-19 14:30:19 -05:00
m0duspwnens 7b9ac7ae6d remove checkin_at_boot function 2023-12-19 14:05:19 -05:00
Wes 62708ac97d Add new image 2023-12-19 18:58:17 +00:00
Wes f8fdc6d14e Remove old image 2023-12-19 18:57:54 +00:00
Mike Reeves 72fbf386eb Merge pull request #12051 from Security-Onion-Solutions/jertel/hotfixm
Jertel/hotfixm
2023-12-19 13:48:21 -05:00
Wes 15773bae34 Fix analyzer image links 2023-12-19 18:42:59 +00:00
Jason Ertel ce8a774129 Merge branch '2.4/main' into jertel/hotfixm 2023-12-19 13:42:13 -05:00
Wes c06de33318 Test EchoTrail image 2023-12-19 18:36:55 +00:00
Wes 41dc9df7cd Add images for analyzers 2023-12-19 18:35:10 +00:00
Mike Reeves cb956fb399 Merge pull request #12049 from Security-Onion-Solutions/2.4.30hf4
2.4.30 hotfix
2023-12-19 13:10:51 -05:00
Mike Reeves 5c34cdd943 2.4.30 hotfix 2023-12-19 13:07:25 -05:00
Doug Burks 5e8613f38b Merge pull request #12048 from Security-Onion-Solutions/2.4/improve-filterlog-parser
FIX: Update dashboard and hunt query for firewall logs #12021
2023-12-19 12:57:37 -05:00
weslambert 69472e70b4 Merge pull request #12003 from HoangLongVu/2.4/dev
2.4/dev Analyzers for Threatfox, MalwareBazaar, Echotrail, Elasticsearch
2023-12-19 12:09:16 -05:00
m0duspwnens 090f3a3e02 only run if in file 2023-12-19 12:08:17 -05:00
Wes 85242651b2 Add Sublime image to assets and change link 2023-12-19 15:49:57 +00:00
Jason Ertel 80cd9920b2 Merge pull request #12047 from Security-Onion-Solutions/jertel/eslogerror
exclude log false positives
2023-12-19 10:49:42 -05:00
Jason Ertel ca21e32d83 log false positives 2023-12-19 10:47:39 -05:00
Wes 6ab12ceec4 Add Elasticsearch image to assets and change link 2023-12-19 15:46:02 +00:00
Wes bfcf7d4668 Add EchoTrail image to assets and change link 2023-12-19 15:42:23 +00:00
Wes 4a23832267 Don't require advanced options for required values 2023-12-19 15:14:33 +00:00
m0duspwnens b3be999aea dont enable startup_states during setup. use salt to add it 2023-12-19 09:00:32 -05:00
Doug Burks ab5de4c104 update soc defaults.yaml 2023-12-19 07:27:07 -05:00
Wes 614589153b Update Malwarebazaar test and comply with flake8 2023-12-19 02:57:35 +00:00
Ryan Hoang 5e715036fb Update malwarebazaar_test.py 2023-12-18 19:54:14 -05:00
Ryan Hoang 748a67314f Update malwarebazaar_test.py 2023-12-18 19:27:13 -05:00
Ryan Hoang a561f8c783 Update malwarebazaar_test.py Removed Whitespace 2023-12-18 19:18:26 -05:00
Elijah Gibson fb5ee6b9e9 Flake8 linting + isInJson tail recursion update 2023-12-18 15:58:16 -05:00
Elijah Gibson 7d6f8d922b Update malwarebazaar_test.py
Flake8 linting
2023-12-18 15:57:41 -05:00
Elijah Gibson f86adf8053 Merge branch 'Security-Onion-Solutions:2.4/dev' into 2.4/dev 2023-12-18 15:57:00 -05:00
Wes 8f6b1a07b7 Don't use soup for removing Curator files 2023-12-18 20:54:24 +00:00
Wes 6c92672566 Remove Curator configuration and scripts 2023-12-18 20:53:56 +00:00
Wes aba5893965 Add disabled state for Curator 2023-12-18 20:50:49 +00:00
Josh Patterson 866c9988a0 Merge pull request #12037 from Security-Onion-Solutions/fix/receiver
Fix receivers
https://github.com/Security-Onion-Solutions/securityonion/issues/12038
2023-12-18 13:56:33 -05:00
Josh Patterson f032ff40a2 Merge branch '2.4/dev' into fix/receiver 2023-12-18 13:55:23 -05:00
Semphorin 03421c1bcd added isInJson tests 2023-12-18 13:54:38 -05:00
Doug Burks 4d8661d2e0 FIX: Update dashboard and hunt query for firewall logs #12021 2023-12-18 13:38:04 -05:00
Doug Burks 6a1073b616 FIX: Update dashboard and hunt query for firewall logs #12021 2023-12-18 12:57:40 -05:00
Wes 6a4e05d60f Remove control characters 2023-12-15 20:53:51 +00:00
Wes 981f3642a0 Update tests 2023-12-15 20:53:19 +00:00
m0duspwnens 33a9ac5701 use logstash nodes for logstash extra_hosts 2023-12-15 15:42:49 -05:00
Wes 020472085b ThreatFox test 2023-12-15 15:16:44 +00:00
Wes 8aaeee20b9 Fix import 2023-12-15 14:40:25 +00:00
Wes e32de6893b Remove control characters 2023-12-15 14:27:27 +00:00
Wes f05eb742dd Fix patch 2023-12-15 14:26:33 +00:00
Wes cd3a661dd6 Set malwarebazaar.py to be executable 2023-12-15 14:17:33 +00:00
weslambert 55c957170d Reduce complexity 2023-12-15 09:00:31 -05:00
Jackson d41daa37f1 malwarebazaar 2023-12-15 03:00:43 -05:00
Jackson b59896bb47 ThreatFox and EchoTrail 2023-12-15 02:47:54 -05:00
Jackson c59a6516fc fix Elasticsearch lint 2023-12-15 02:34:45 -05:00
Doug Burks 88684a6c19 Merge pull request #12023 from Security-Onion-Solutions/2.4/fix-firewall-queries
FIX: Update dashboard and hunt query for firewall logs #12021
2023-12-14 14:56:42 -05:00
weslambert d0d671a828 Merge pull request #12020 from Security-Onion-Solutions/fix/integration_force
Add force option to integrations
2023-12-14 13:44:32 -05:00
Doug Burks 8779fb8cbc Update defaults.yaml 2023-12-14 13:30:52 -05:00
Doug Burks 042e5ae9f0 https://github.com/Security-Onion-Solutions/securityonion/issues/12021 2023-12-14 12:46:28 -05:00
Josh Patterson 45f50cc121 Merge pull request #12019 from Security-Onion-Solutions/fix/extrahosts
fix extra_hosts
2023-12-14 12:03:07 -05:00
Wes 22fcccef1c Add force option 2023-12-14 16:53:19 +00:00
Jackson 977081b6e7 update Readme.md 2023-12-14 10:37:04 -05:00
m0duspwnens 3dbf97944d fix extra_hosts. https://github.com/Security-Onion-Solutions/securityonion/issues/12015 2023-12-14 10:26:29 -05:00
m0duspwnens 03b2a7d2de change 9805 pipeline to send to self. fix extra_hosts for logstash 2023-12-14 10:01:03 -05:00
Jason Ertel 395da2cca0 Merge pull request #12012 from Security-Onion-Solutions/jertel/eslogerror
more log false alarms
2023-12-14 08:59:12 -05:00
Jason Ertel 997d323763 more log false alarms 2023-12-14 08:55:18 -05:00
Elijah Gibson d5edf57ccb Update elasticsearch.py 2023-12-13 23:04:44 -05:00
Elijah Gibson 94b9089b79 Update elasticsearch.json 2023-12-13 23:03:42 -05:00
Jackson 81e4fe78e7 pushing everything at once 2023-12-13 13:45:48 -05:00
weslambert 5d3f2298b6 Merge pull request #12000 from Security-Onion-Solutions/feature/additional_integrations
Additional Integrations #2
2023-12-13 13:23:34 -05:00
Doug Burks b17e4006a1 Merge pull request #12001 from Security-Onion-Solutions/2.4/update-clear-scripts
FIX: Update clear scripts #11991
2023-12-13 12:01:11 -05:00
weslambert 8cf5d9c1a6 Annotations 2023-12-13 11:55:40 -05:00
weslambert cdac2bfa16 Add Anomali, Cybersixgill, Snort, and ThreatQuotient 2023-12-13 11:03:25 -05:00
weslambert b0a69d30c9 Add Anomali, Cybersixgill, Snort, and ThreatQuotient packages 2023-12-13 10:44:03 -05:00
Jason Ertel 196d59869a Merge pull request #11998 from Security-Onion-Solutions/kilo
upgrade cla action
2023-12-13 10:18:39 -05:00
Jason Ertel c0ab8f24e9 upgrade cla action 2023-12-13 10:10:51 -05:00
Jason Ertel bd26a52227 upgrade cla action 2023-12-13 10:10:23 -05:00
Jason Ertel 03279732b7 upgrade cla action 2023-12-13 10:09:36 -05:00
Doug Burks 2c4d0a0d71 Update so-elastic-fleet-reset 2023-12-12 16:37:50 -05:00
Doug Burks d49d13289e Update so-elastic-clear 2023-12-12 16:37:06 -05:00
Doug Burks aaf60bea87 Update so-nsm-clear 2023-12-12 16:30:17 -05:00
weslambert e95932f28c Merge pull request #11990 from Security-Onion-Solutions/fix/remove_curator
Remove Curator
2023-12-12 12:31:16 -05:00
Wes bbe091fa14 Fix accidental change 2023-12-12 15:08:47 +00:00
Wes 54c3167b10 Delete data streams when necessary 2023-12-12 05:25:50 +00:00
Wes b1721b6467 Fix directory 2023-12-11 21:43:25 +00:00
Jason Ertel 214404265a Merge pull request #11981 from Security-Onion-Solutions/jertel/importlogs
fix import stats
2023-12-11 14:54:29 -05:00
Jason Ertel 25c39540c8 fix import stats 2023-12-11 14:48:46 -05:00
Wes f7373ed79c Stop Curator, remove scripts and status 2023-12-11 19:20:52 +00:00
Wes d203aec44a Remove Curator 2023-12-08 19:37:06 +00:00
Jason Ertel be8ed1e1d8 Merge pull request #11970 from Security-Onion-Solutions/jertel/hfm
grid page enhancements
2023-12-08 09:56:39 -05:00
Jason Ertel a732985351 grid page enhancements 2023-12-08 08:38:42 -05:00
Jason Ertel 98947f3906 grid page enhancements 2023-12-08 08:37:42 -05:00
weslambert b80d7fd610 Merge pull request #11967 from Security-Onion-Solutions/fix/close_remove
Remove Curator close configuration
2023-12-07 15:05:38 -05:00
Wes 849e9e14ad Change soup to remove delete actions and run post_to_2.4.40 2023-12-07 16:49:44 +00:00
Wes 0ebc8c7beb Change path 2023-12-07 15:17:51 +00:00
Wes e0801282eb Remove files 2023-12-07 14:07:26 +00:00
Wes bdf4b2c68d Remove settings 2023-12-07 14:03:45 +00:00
Wes e49fc0dd27 Remove more settings 2023-12-07 14:03:09 +00:00
Wes f52da4a933 Remove close settings and cron 2023-12-07 13:58:39 +00:00
Wes f38758a9c7 Remove close scripts 2023-12-07 13:52:25 +00:00
Wes 1ac3a2d2f1 Remove delete files and allow deletion of indices managed by ILM 2023-12-07 13:51:24 +00:00
Wes 965ced94c4 Remove close files 2023-12-07 13:48:08 +00:00
Doug Burks bc3634b13d Merge pull request #11960 from Security-Onion-Solutions/2.4/fix-config-links
FIX: Documentation links under SOC - Administration - Configuration need updating #11828
2023-12-06 16:04:11 -05:00
Doug Burks 5c50060857 add description for soc_patch.yaml 2023-12-06 15:51:00 -05:00
Doug Burks 00fa75869b add description for http_x_skin 2023-12-06 15:44:36 -05:00
Doug Burks ab0e6f9bec update broken help links in SOC Config 2023-12-06 14:35:51 -05:00
Doug Burks 213cdb479d Update soc_manager.yaml 2023-12-06 14:19:15 -05:00
Mike Reeves 8da96e93c8 Merge pull request #11957 from Security-Onion-Solutions/mergeback
Merge Main into Dev
2023-12-06 13:40:30 -05:00
Mike Reeves 0160cae7d7 Merge branch '2.4/dev' into mergeback 2023-12-06 13:38:53 -05:00
Mike Reeves d7bf52de76 Merge pull request #11918 from Security-Onion-Solutions/hotfix/2.4.30
Hotfix/2.4.30
2023-12-06 13:31:33 -05:00
weslambert fea5a3026d Merge pull request #11955 from Security-Onion-Solutions/fix/sublime_analyzer_documentation
Sublime Analyzer Documentation
2023-12-06 13:27:03 -05:00
weslambert 7f21bee0d4 Add README 2023-12-06 13:14:17 -05:00
weslambert ade3a46a9a Add LocalFile link 2023-12-06 12:58:44 -05:00
weslambert e6a2e49d37 Add Sublime Platform 2023-12-06 12:57:59 -05:00
weslambert 1438913f6a Merge pull request #11954 from Security-Onion-Solutions/fix/sublime_analyzer_indentation
Fix indentation for rule_results
2023-12-06 12:50:44 -05:00
Wes 51fa4922b9 Fix indentation for rule_results 2023-12-06 17:37:07 +00:00
Mike Reeves b878728882 Merge pull request #11951 from Security-Onion-Solutions/2.4.30hf3
2.4.30 hotfix
2023-12-06 08:36:13 -05:00
Mike Reeves 386e9214fc 2.4.30 hotfix 2023-12-06 08:34:46 -05:00
weslambert 4becf3e20f Merge pull request #11950 from Security-Onion-Solutions/fix/eml_observable
Add eml observable type
2023-12-06 08:30:27 -05:00
weslambert 0334ef9677 Add eml observable type 2023-12-05 19:10:16 -05:00
weslambert 0537e1b3f6 Merge pull request #11945 from Security-Onion-Solutions/feature/sublime_platform_analyzer
Sublime Platform Analyzer
2023-12-05 16:51:03 -05:00
Wes 6fff05b444 Remove pytest.ini 2023-12-05 20:14:17 +00:00
Wes 01a37df7fc Add extra line 2023-12-05 20:02:12 +00:00
Wes b3e78c9cc3 Update live flow option 2023-12-05 19:55:23 +00:00
Wes d871b61150 Change author 2023-12-05 18:36:25 +00:00
Wes b2536a64d8 Remove extra space 2023-12-05 18:33:00 +00:00
Wes 3d1eecfad6 Add Sublime Platform analyzer 2023-12-05 18:31:50 +00:00
Mike Reeves 8eaa07a186 Merge pull request #11942 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update soup
2023-12-05 11:26:42 -05:00
Mike Reeves 9446b750c0 Update soup 2023-12-05 11:25:25 -05:00
Mike Reeves fdd4173632 Update soup 2023-12-05 11:20:56 -05:00
Mike Reeves b7227e15eb Merge pull request #11939 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update soup
2023-12-05 10:26:56 -05:00
Mike Reeves 90d9e5b927 Update soup 2023-12-05 10:24:31 -05:00
Mike Reeves 802bf9ce27 Merge pull request #11931 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update soup
2023-12-04 14:00:40 -05:00
Mike Reeves 0b6ba6d2f2 Update soup 2023-12-04 13:51:12 -05:00
Mike Reeves 55a8b1064d Update soup 2023-12-04 13:36:04 -05:00
Josh Patterson 11a3e12e94 Merge pull request #11929 from Security-Onion-Solutions/hf_soup
avoid exiting salt when ca state applied in post for 2.4.30
2023-12-04 11:46:27 -05:00
m0duspwnens 38868af08a avoid exiting salt when ca state applied in post for 2.4.30 2023-12-04 10:11:38 -05:00
Josh Patterson ace5dff351 Merge pull request #11923 from Security-Onion-Solutions/hf_soup
move wait_for_salt_minion for hotfix
2023-12-01 15:37:35 -05:00
m0duspwnens 265cde5296 move wait_for_salt_minion for hotfix 2023-12-01 15:31:15 -05:00
weslambert 55052c4811 Merge pull request #11919 from Security-Onion-Solutions/fix/remove_curator_changes
Remove Curator Changes
2023-12-01 11:15:23 -05:00
Wes e36044e164 Remove close changes 2023-12-01 16:10:56 +00:00
Wes 6fa4a69753 Remove action changes 2023-12-01 16:10:07 +00:00
Doug Burks 4fc3c852a1 Merge pull request #11890 from chateaulav/chateaulav-import-evtx-logs-11889
Update import-evtx-logs.json
2023-11-30 13:57:59 -05:00
weslambert 32b03f514e Merge pull request #11907 from Security-Onion-Solutions/fix/curator_close
Curator close fixes
2023-11-30 11:05:49 -05:00
Wes a605c5c62c Ensure indices managed by ILM can be managed by Curator 2023-11-29 22:13:20 +00:00
Wes 2368e8b793 Fix action file names 2023-11-29 22:06:11 +00:00
weslambert 317b6cb614 Merge pull request #11902 from Security-Onion-Solutions/fix/hotfix_version
Update HOTFIX
2023-11-29 17:03:59 -05:00
weslambert a6d20bdc71 Update HOTFIX 2023-11-29 17:01:29 -05:00
Doug Burks 93fb10de86 Merge pull request #11897 from Security-Onion-Solutions/2.4/nids-rule-reference
FIX: Update NIDS rule.reference in common.nids pipeline #11846
2023-11-29 12:19:12 -05:00
weslambert 1a4d009b7f Merge pull request #11896 from Security-Onion-Solutions/feature/elastic_certificate_fingerprints
Add certificate fingerprints
2023-11-29 12:07:50 -05:00
weslambert 9d63a47792 Certificate hash 2023-11-29 12:01:43 -05:00
weslambert 7001e90667 Client and server fingerprints 2023-11-29 12:00:46 -05:00
weslambert a0573212c0 Merge pull request #11891 from Security-Onion-Solutions/fix/elastic_ignore_analyzer
Ignore analyzer log
2023-11-29 10:05:01 -05:00
weslambert 5f79644aef Ignore analyzer log 2023-11-29 10:02:13 -05:00
Doug Burks 0603e96c08 FIX: Update NIDS rule.reference in common.nids pipeline #11846 2023-11-29 09:46:11 -05:00
Jonathan Race ece3c367b5 Update import-evtx-logs.json
version updates to match 2.4 release pipelines
2023-11-29 09:20:37 -05:00
Jason Ertel 8953ffcc49 Merge pull request #11855 from Security-Onion-Solutions/jertel/hfm
Jertel/hfm
2023-11-21 16:43:28 -05:00
Jason Ertel 9ee3423b32 Merge branch '2.4/dev' into jertel/hfm 2023-11-21 16:42:50 -05:00
Jason Ertel 7d759a99fe remove hotfix 2023-11-21 16:40:54 -05:00
Jason Ertel 861e850f9a Merge pull request #11835 from Security-Onion-Solutions/jertel/yaml
add support for nested keys
2023-11-20 16:33:17 -05:00
Jason Ertel 6356a0bf95 add support for nested keys 2023-11-20 16:18:30 -05:00
Jason Ertel f31e288005 Merge pull request #11832 from Security-Onion-Solutions/jertel/hfm
Merge hoftix back to 2.4/dev
2023-11-20 15:32:40 -05:00
Jason Ertel b2ea7138f3 remove hotfix 2023-11-20 15:28:56 -05:00
Jason Ertel f29a91ea4c Merge branch '2.4/main' into jertel/hfm 2023-11-20 15:28:27 -05:00
Jason Ertel 67f116daed Merge pull request #11809 from Security-Onion-Solutions/jertel/srtmp
improve timing of responses
2023-11-16 16:00:27 -05:00
Jason Ertel c09e8f0d71 improve timing of responses 2023-11-16 15:58:48 -05:00
Jason Ertel de99cda766 improve timing of responses 2023-11-16 15:51:17 -05:00
Jason Ertel 85649da2cb Merge pull request #11792 from Security-Onion-Solutions/jertel/auto
avoid startup error
2023-11-14 15:42:26 -05:00
Jason Ertel f7fa4d05fb avoid startup error 2023-11-14 15:40:52 -05:00
Doug Burks 96b456cd76 Merge pull request #11785 from Security-Onion-Solutions/dougburks-patch-1
FIX: SOC Hunt HTTP EXE query #11784
2023-11-14 10:03:46 -05:00
Doug Burks 4666b993e5 Update defaults.yaml 2023-11-14 09:58:45 -05:00
Mike Reeves 4fa6b265a0 Merge pull request #11778 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-11-13 15:38:53 -05:00
Mike Reeves 567e19e5d7 Update VERSION 2023-11-13 15:38:23 -05:00
Jason Ertel 6d97667634 Merge branch '2.4/dev' into kilo 2023-11-07 15:59:52 -05:00
Jason Ertel 2f95512199 Merge branch '2.4/dev' into kilo 2023-11-06 11:27:58 -05:00
Jason Ertel 6d7243038c switch back to kilo version 2023-10-27 11:20:49 -04:00
293 changed files with 770313 additions and 371163 deletions
+1 -2
View File
@@ -536,11 +536,10 @@ secretGroup = 4
[allowlist]
description = "global allow lists"
regexes = ['''219-09-9999''', '''078-05-1120''', '''(9[0-9]{2}|666)-\d{2}-\d{4}''', '''RPM-GPG-KEY.*''']
regexes = ['''219-09-9999''', '''078-05-1120''', '''(9[0-9]{2}|666)-\d{2}-\d{4}''', '''RPM-GPG-KEY.*''', '''.*:.*StrelkaHexDump.*''', '''.*:.*PLACEHOLDER.*''']
paths = [
'''gitleaks.toml''',
'''(.*?)(jpg|gif|doc|pdf|bin|svg|socket)$''',
'''(go.mod|go.sum)$''',
'''salt/nginx/files/enterprise-attack.json'''
]
+1 -1
View File
@@ -11,7 +11,7 @@ jobs:
steps:
- name: "Contributor Check"
if: (github.event.comment.body == 'recheck' || github.event.comment.body == 'I have read the CLA Document and I hereby sign the CLA') || github.event_name == 'pull_request_target'
uses: cla-assistant/github-action@v2.1.3-beta
uses: cla-assistant/github-action@v2.3.1
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
PERSONAL_ACCESS_TOKEN : ${{ secrets.PERSONAL_ACCESS_TOKEN }}
+11 -12
View File
@@ -1,18 +1,17 @@
### 2.4.30-20231121 ISO image released on 2023/11/21
### 2.4.50-20240220 ISO image released on 2024/02/20
### Download and Verify
2.4.30-20231121 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231121.iso
2.4.50-20240220 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.4.50-20240220.iso
MD5: 09DB0A6B3A75435C855E777272FC03F8
SHA1: A68868E67A3F86B77E01F54067950757EFD3BA72
SHA256: B3880C0302D9CDED7C974585B14355544FC9C3279F952EC79FC2BA9AEC7CB749
MD5: BCA6476EF1BF79773D8EFB11700FDE8E
SHA1: 9FF0A304AA368BCD2EF2BE89AD47E65650241927
SHA256: 49D7695EFFF6F3C4840079BF564F3191B585639816ADE98672A38017F25E9570
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231121.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.50-20240220.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
@@ -26,22 +25,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231121.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.50-20240220.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231121.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.50-20240220.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.4.30-20231121.iso.sig securityonion-2.4.30-20231121.iso
gpg --verify securityonion-2.4.50-20240220.iso.sig securityonion-2.4.50-20240220.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Tue 21 Nov 2023 01:21:38 PM EST using RSA key ID FE507013
gpg: Signature made Fri 16 Feb 2024 11:36:25 AM EST using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
-1
View File
@@ -1 +0,0 @@
20231121
+1 -1
View File
@@ -1 +1 @@
2.4.30
2.4.50
Binary file not shown.

After

Width:  |  Height:  |  Size: 21 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 12 KiB

+2 -1
View File
@@ -41,7 +41,8 @@ file_roots:
base:
- /opt/so/saltstack/local/salt
- /opt/so/saltstack/default/salt
- /nsm/elastic-fleet/artifacts
- /opt/so/rules/nids
# The master_roots setting configures a master-only copy of the file_roots dictionary,
# used by the state compiler.
+6 -10
View File
@@ -61,12 +61,11 @@ base:
- elastalert.adv_elastalert
- backup.soc_backup
- backup.adv_backup
- curator.soc_curator
- curator.adv_curator
- soctopus.soc_soctopus
- soctopus.adv_soctopus
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
- stig.soc_stig
'*_sensor':
- healthcheck.sensor
@@ -82,6 +81,8 @@ base:
- suricata.adv_suricata
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
- stig.soc_stig
- soc.license
'*_eval':
- secrets
@@ -113,8 +114,6 @@ base:
- kibana.adv_kibana
- strelka.soc_strelka
- strelka.adv_strelka
- curator.soc_curator
- curator.adv_curator
- kratos.soc_kratos
- kratos.adv_kratos
- redis.soc_redis
@@ -172,8 +171,6 @@ base:
- kibana.adv_kibana
- strelka.soc_strelka
- strelka.adv_strelka
- curator.soc_curator
- curator.adv_curator
- backup.soc_backup
- backup.adv_backup
- zeek.soc_zeek
@@ -186,6 +183,7 @@ base:
- suricata.adv_suricata
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
- stig.soc_stig
'*_heavynode':
- elasticsearch.auth
@@ -194,8 +192,6 @@ base:
- logstash.adv_logstash
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- curator.soc_curator
- curator.adv_curator
- redis.soc_redis
- redis.adv_redis
- zeek.soc_zeek
@@ -230,6 +226,8 @@ base:
- redis.adv_redis
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
- stig.soc_stig
- soc.license
'*_receiver':
- logstash.nodes
@@ -268,8 +266,6 @@ base:
- soctopus.adv_soctopus
- kibana.soc_kibana
- kibana.adv_kibana
- curator.soc_curator
- curator.adv_curator
- backup.soc_backup
- backup.adv_backup
- kratos.soc_kratos
+11 -9
View File
@@ -102,7 +102,8 @@
'utility',
'schedule',
'soctopus',
'docker_clean'
'docker_clean',
'stig'
],
'so-managersearch': [
'salt.master',
@@ -123,7 +124,8 @@
'utility',
'schedule',
'soctopus',
'docker_clean'
'docker_clean',
'stig'
],
'so-searchnode': [
'ssl',
@@ -131,7 +133,8 @@
'telegraf',
'firewall',
'schedule',
'docker_clean'
'docker_clean',
'stig'
],
'so-standalone': [
'salt.master',
@@ -156,7 +159,8 @@
'schedule',
'soctopus',
'tcpreplay',
'docker_clean'
'docker_clean',
'stig'
],
'so-sensor': [
'ssl',
@@ -168,13 +172,15 @@
'healthcheck',
'schedule',
'tcpreplay',
'docker_clean'
'docker_clean',
'stig'
],
'so-fleet': [
'ssl',
'telegraf',
'firewall',
'logstash',
'nginx',
'healthcheck',
'schedule',
'elasticfleet',
@@ -219,10 +225,6 @@
{% do allowed_states.append('kibana.secrets') %}
{% endif %}
{% if grains.role in ['so-eval', 'so-standalone', 'so-managersearch', 'so-heavynode', 'so-manager'] %}
{% do allowed_states.append('curator') %}
{% endif %}
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch'] %}
{% do allowed_states.append('elastalert') %}
{% endif %}
+20 -1
View File
@@ -4,7 +4,6 @@
{% from 'vars/globals.map.jinja' import GLOBALS %}
include:
- common.soup_scripts
- common.packages
{% if GLOBALS.role in GLOBALS.manager_roles %}
- manager.elasticsearch # needed for elastic_curl_config state
@@ -134,6 +133,18 @@ common_sbin_jinja:
- file_mode: 755
- template: jinja
{% if not GLOBALS.is_manager%}
# prior to 2.4.50 these scripts were in common/tools/sbin on the manager because of soup and distributed to non managers
# these two states remove the scripts from non manager nodes
remove_soup:
file.absent:
- name: /usr/sbin/soup
remove_so-firewall:
file.absent:
- name: /usr/sbin/so-firewall
{% endif %}
so-status_script:
file.managed:
- name: /usr/sbin/so-status
@@ -179,6 +190,14 @@ so-status_check_cron:
- month: '*'
- dayweek: '*'
# This cronjob/script runs a check if the node needs restarted, but should be used for future status checks as well
common_status_check_cron:
cron.present:
- name: '/usr/sbin/so-common-status-check > /dev/null 2>&1'
- identifier: common_status_check
- user: root
- minute: '*/10'
remove_post_setup_cron:
cron.absent:
- name: 'PATH=$PATH:/usr/sbin salt-call state.highstate'
+69 -22
View File
@@ -1,23 +1,70 @@
# Sync some Utilities
soup_scripts:
file.recurse:
- name: /usr/sbin
- user: root
- group: root
- file_mode: 755
- source: salt://common/tools/sbin
- include_pat:
- so-common
- so-image-common
{% import_yaml '/opt/so/saltstack/local/pillar/global/soc_global.sls' as SOC_GLOBAL %}
{% if SOC_GLOBAL.global.airgap %}
{% set UPDATE_DIR='/tmp/soagupdate/SecurityOnion' %}
{% else %}
{% set UPDATE_DIR='/tmp/sogh/securityonion' %}
{% endif %}
soup_manager_scripts:
file.recurse:
- name: /usr/sbin
- user: root
- group: root
- file_mode: 755
- source: salt://manager/tools/sbin
- include_pat:
- so-firewall
- so-repo-sync
- soup
remove_common_soup:
file.absent:
- name: /opt/so/saltstack/default/salt/common/tools/sbin/soup
remove_common_so-firewall:
file.absent:
- name: /opt/so/saltstack/default/salt/common/tools/sbin/so-firewall
copy_so-common_common_tools_sbin:
file.copy:
- name: /opt/so/saltstack/default/salt/common/tools/sbin/so-common
- source: {{UPDATE_DIR}}/salt/common/tools/sbin/so-common
- force: True
- preserve: True
copy_so-image-common_common_tools_sbin:
file.copy:
- name: /opt/so/saltstack/default/salt/common/tools/sbin/so-image-common
- source: {{UPDATE_DIR}}/salt/common/tools/sbin/so-image-common
- force: True
- preserve: True
copy_soup_manager_tools_sbin:
file.copy:
- name: /opt/so/saltstack/default/salt/manager/tools/sbin/soup
- source: {{UPDATE_DIR}}/salt/manager/tools/sbin/soup
- force: True
- preserve: True
copy_so-firewall_manager_tools_sbin:
file.copy:
- name: /opt/so/saltstack/default/salt/manager/tools/sbin/so-firewall
- source: {{UPDATE_DIR}}/salt/manager/tools/sbin/so-firewall
- force: True
- preserve: True
copy_so-common_sbin:
file.copy:
- name: /usr/sbin/so-common
- source: {{UPDATE_DIR}}/salt/common/tools/sbin/so-common
- force: True
- preserve: True
copy_so-image-common_sbin:
file.copy:
- name: /usr/sbin/so-image-common
- source: {{UPDATE_DIR}}/salt/common/tools/sbin/so-image-common
- force: True
- preserve: True
copy_soup_sbin:
file.copy:
- name: /usr/sbin/soup
- source: {{UPDATE_DIR}}/salt/manager/tools/sbin/soup
- force: True
- preserve: True
copy_so-firewall_sbin:
file.copy:
- name: /usr/sbin/so-firewall
- source: {{UPDATE_DIR}}/salt/manager/tools/sbin/so-firewall
- force: True
- preserve: True
+15
View File
@@ -366,6 +366,13 @@ is_feature_enabled() {
return 1
}
read_feat() {
if [ -f /opt/so/log/sostatus/lks_enabled ]; then
lic_id=$(cat /opt/so/saltstack/local/pillar/soc/license.sls | grep license_id: | awk '{print $2}')
echo "$lic_id/$(cat /opt/so/log/sostatus/lks_enabled)/$(cat /opt/so/log/sostatus/fps_enabled)"
fi
}
require_manager() {
if is_manager_node; then
echo "This is a manager, so we can proceed."
@@ -559,6 +566,14 @@ status () {
printf "\n=========================================================================\n$(date) | $1\n=========================================================================\n"
}
sync_options() {
set_version
set_os
salt_minion_count
echo "$VERSION/$OS/$(uname -r)/$MINIONCOUNT/$(read_feat)"
}
systemctl_func() {
local action=$1
local echo_action=$1
@@ -0,0 +1,99 @@
#!/usr/bin/env python3
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
import sys
import subprocess
import os
import json
sys.path.append('/opt/saltstack/salt/lib/python3.10/site-packages/')
import salt.config
import salt.loader
__opts__ = salt.config.minion_config('/etc/salt/minion')
__grains__ = salt.loader.grains(__opts__)
def check_needs_restarted():
osfam = __grains__['os_family']
val = '0'
outfile = "/opt/so/log/sostatus/needs_restarted"
if osfam == 'Debian':
if os.path.exists('/var/run/reboot-required'):
val = '1'
elif osfam == 'RedHat':
cmd = 'needs-restarting -r > /dev/null 2>&1'
try:
needs_restarting = subprocess.check_call(cmd, shell=True)
except subprocess.CalledProcessError:
val = '1'
else:
fail("Unsupported OS")
with open(outfile, 'w') as f:
f.write(val)
def check_for_fps():
feat = 'fps'
feat_full = feat.replace('ps', 'ips')
fps = 0
try:
result = subprocess.run([feat_full + '-mode-setup', '--is-enabled'], stdout=subprocess.PIPE)
if result.returncode == 0:
fps = 1
except FileNotFoundError:
fn = '/proc/sys/crypto/' + feat_full + '_enabled'
with open(fn, 'r') as f:
contents = f.read()
if '1' in contents:
fps = 1
with open('/opt/so/log/sostatus/lks_enabled', 'w') as f:
f.write(str(fps))
def check_for_lks():
feat = 'Lks'
feat_full = feat.replace('ks', 'uks')
lks = 0
result = subprocess.run(['lsblk', '-p', '-J'], check=True, stdout=subprocess.PIPE)
data = json.loads(result.stdout)
for device in data['blockdevices']:
if 'children' in device:
for gc in device['children']:
if 'children' in gc:
try:
arg = 'is' + feat_full
result = subprocess.run(['cryptsetup', arg, gc['name']], stdout=subprocess.PIPE)
if result.returncode == 0:
lks = 1
except FileNotFoundError:
for ggc in gc['children']:
if 'crypt' in ggc['type']:
lks = 1
if lks:
break
with open('/opt/so/log/sostatus/fps_enabled', 'w') as f:
f.write(str(lks))
def fail(msg):
print(msg, file=sys.stderr)
sys.exit(1)
def main():
proc = subprocess.run(['id', '-u'], stdout=subprocess.PIPE, encoding="utf-8")
if proc.stdout.strip() != "0":
fail("This program must be run as root")
# Ensure that umask is 0022 so that files created by this script have rw-r-r permissions
org_umask = os.umask(0o022)
check_needs_restarted()
check_for_fps()
check_for_lks()
# Restore umask to whatever value was set before this script was run. SXIG sets to 0077 rw---
os.umask(org_umask)
if __name__ == "__main__":
main()
-1
View File
@@ -42,7 +42,6 @@ container_list() {
)
elif [ $MANAGERCHECK != 'so-helix' ]; then
TRUSTED_CONTAINERS=(
"so-curator"
"so-elastalert"
"so-elastic-agent"
"so-elastic-agent-builder"
+9
View File
@@ -109,6 +109,8 @@ if [[ $EXCLUDE_STARTUP_ERRORS == 'Y' ]]; then
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|timeout exceeded" # server not yet ready (telegraf waiting on elasticsearch)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|influxsize kbytes" # server not yet ready (telegraf waiting on influx)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|expected field at" # server not yet ready (telegraf waiting on health data)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|connection timed out" # server not yet ready (telegraf plugin unable to connect)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|command timed out" # server not yet ready (telegraf plugin waiting for script to finish)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|cached the public key" # server not yet ready (salt minion waiting on key acceptance)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|no ingest nodes" # server not yet ready (logstash waiting on elastic)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|failed to poll" # server not yet ready (sensoroni waiting on soc)
@@ -119,6 +121,7 @@ if [[ $EXCLUDE_STARTUP_ERRORS == 'Y' ]]; then
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|timeout retrieving container" # Telegraf unable to reach Docker engine, rare
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|error while communicating" # Elasticsearch MS -> HN "sensor" temporarily unavailable
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|tls handshake error" # Docker registry container when new node comes onlines
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|Unable to get license information" # Logstash trying to contact ES before it's ready
fi
if [[ $EXCLUDE_FALSE_POSITIVE_ERRORS == 'Y' ]]; then
@@ -167,6 +170,9 @@ if [[ $EXCLUDE_KNOWN_ERRORS == 'Y' ]]; then
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|error parsing signature" # Malformed Suricata rule, from upstream provider
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|sticky buffer has no matches" # Non-critical Suricata error
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|Unable to determine destination index stats" # Elastic transform temporary error
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|cannot join on an empty table" # InfluxDB flux query, import nodes
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|exhausting result iterator" # InfluxDB flux query mismatched table results (temporary data issue)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|failed to finish run" # InfluxDB rare error, self-recoverable
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|iteration"
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|communication packets"
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|use of closed"
@@ -223,6 +229,9 @@ exclude_log "spool" # disregard zeek analyze logs as this is data specifi
exclude_log "import" # disregard imported test data the contains error strings
exclude_log "update.log" # ignore playbook updates due to several known issues
exclude_log "playbook.log" # ignore due to several playbook known issues
exclude_log "cron-cluster-delete.log" # ignore since Curator has been removed
exclude_log "cron-close.log" # ignore since Curator has been removed
exclude_log "curator.log" # ignore since Curator has been removed
for log_file in $(cat /tmp/log_check_files); do
status "Checking log file $log_file"
+9 -4
View File
@@ -41,8 +41,13 @@ done
if [ $SKIP -ne 1 ]; then
# Inform user we are about to delete all data
echo
echo "This script will delete all NIDS data (PCAP, Suricata, Zeek)"
echo "If you would like to proceed, please type "AGREE" and hit ENTER."
echo "This script will delete all NSM data from /nsm."
echo
echo "This includes Suricata data, Zeek data, and full packet capture (PCAP)."
echo
echo "This will NOT delete any Suricata or Zeek logs that have already been ingested into Elasticsearch."
echo
echo "If you would like to proceed, then type AGREE and press ENTER."
echo
# Read user input
read INPUT
@@ -54,8 +59,8 @@ delete_pcap() {
[ -d $PCAP_DATA ] && so-pcap-stop && rm -rf $PCAP_DATA/* && so-pcap-start
}
delete_suricata() {
SURI_LOG="/opt/so/log/suricata/eve.json"
[ -f $SURI_LOG ] && so-suricata-stop && rm -f $SURI_LOG && so-suricata-start
SURI_LOG="/nsm/suricata/"
[ -d $SURI_LOG ] && so-suricata-stop && rm -rf $SURI_LOG/* && so-suricata-start
}
delete_zeek() {
ZEEK_LOG="/nsm/zeek/logs/"
+11 -4
View File
@@ -49,11 +49,18 @@ check_nsm_raid() {
check_boss_raid() {
MVCLI=$(/usr/local/bin/mvcli info -o vd |grep status |grep functional)
MVTEST=$(/usr/local/bin/mvcli info -o vd | grep "No adapter")
if [[ -n $MVCLI ]]; then
BOSSRAID=0
# Check to see if this is a SM based system
if [[ -z $MVTEST ]]; then
if [[ -n $MVCLI ]]; then
BOSSRAID=0
else
BOSSRAID=1
fi
else
BOSSRAID=1
# This doesn't have boss raid so lets make it 0
BOSSRAID=0
fi
}
@@ -90,4 +97,4 @@ else
RAIDSTATUS=1
fi
echo "nsmraid=$RAIDSTATUS" > /opt/so/log/raid/status.log
echo "nsmraid=$RAIDSTATUS" > /opt/so/log/raid/status.log
-81
View File
@@ -1,81 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls.split('.')[0] in allowed_states %}
{% from "curator/map.jinja" import CURATORMERGED %}
# Create the group
curatorgroup:
group.present:
- name: curator
- gid: 934
# Add user
curator:
user.present:
- uid: 934
- gid: 934
- home: /opt/so/conf/curator
- createhome: False
# Create the log directory
curlogdir:
file.directory:
- name: /opt/so/log/curator
- user: 934
- group: 939
curactiondir:
file.directory:
- name: /opt/so/conf/curator/action
- user: 934
- group: 939
- makedirs: True
actionconfs:
file.recurse:
- name: /opt/so/conf/curator/action
- source: salt://curator/files/action
- user: 934
- group: 939
- template: jinja
- defaults:
CURATORMERGED: {{ CURATORMERGED.elasticsearch.index_settings }}
curconf:
file.managed:
- name: /opt/so/conf/curator/curator.yml
- source: salt://curator/files/curator.yml
- user: 934
- group: 939
- mode: 660
- template: jinja
- show_changes: False
curator_sbin:
file.recurse:
- name: /usr/sbin
- source: salt://curator/tools/sbin
- user: 934
- group: 939
- file_mode: 755
curator_sbin_jinja:
file.recurse:
- name: /usr/sbin
- source: salt://curator/tools/sbin_jinja
- user: 934
- group: 939
- file_mode: 755
- template: jinja
{% else %}
{{sls}}_state_not_allowed:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
{% endif %}
-100
View File
@@ -1,100 +0,0 @@
curator:
enabled: False
elasticsearch:
index_settings:
logs-import-so:
close: 73000
delete: 73001
logs-strelka-so:
close: 30
delete: 365
logs-suricata-so:
close: 30
delete: 365
logs-syslog-so:
close: 30
delete: 365
logs-zeek-so:
close: 30
delete: 365
logs-elastic_agent-metricbeat-default:
close: 30
delete: 365
logs-elastic_agent-osquerybeat-default:
close: 30
delete: 365
logs-elastic_agent-fleet_server-default:
close: 30
delete: 365
logs-elastic_agent-filebeat-default:
close: 30
delete: 365
logs-elastic_agent-default:
close: 30
delete: 365
logs-system-auth-default:
close: 30
delete: 365
logs-system-application-default:
close: 30
delete: 365
logs-system-security-default:
close: 30
delete: 365
logs-system-system-default:
close: 30
delete: 365
logs-system-syslog-default:
close: 30
delete: 365
logs-windows-powershell-default:
close: 30
delete: 365
logs-windows-sysmon_operational-default:
close: 30
delete: 365
so-beats:
close: 30
delete: 365
so-elasticsearch:
close: 30
delete: 365
so-firewall:
close: 30
delete: 365
so-ids:
close: 30
delete: 365
so-import:
close: 73000
delete: 73001
so-kratos:
close: 30
delete: 365
so-kibana:
close: 30
delete: 365
so-logstash:
close: 30
delete: 365
so-netflow:
close: 30
delete: 365
so-osquery:
close: 30
delete: 365
so-ossec:
close: 30
delete: 365
so-redis:
close: 30
delete: 365
so-strelka:
close: 30
delete: 365
so-syslog:
close: 30
delete: 365
so-zeek:
close: 30
delete: 365
+14 -15
View File
@@ -1,22 +1,17 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls.split('.')[0] in allowed_states %}
include:
- curator.sostatus
so-curator:
docker_container.absent:
- force: True
so-curator_so-status.disabled:
file.comment:
file.line:
- name: /opt/so/conf/so-status/so-status.conf
- regex: ^so-curator$
- match: ^so-curator$
- mode: delete
so-curator-cluster-close:
cron.absent:
@@ -26,10 +21,14 @@ so-curator-cluster-delete:
cron.absent:
- identifier: so-curator-cluster-delete
{% else %}
delete_curator_configuration:
file.absent:
- name: /opt/so/conf/curator
- recurse: True
{{sls}}_state_not_allowed:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
{% endif %}
{% set files = salt.file.find(path='/usr/sbin', name='so-curator*') %}
{% if files|length > 0 %}
delete_curator_scripts:
file.absent:
- names: {{files|yaml}}
{% endif %}
-88
View File
@@ -1,88 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'allowed_states.map.jinja' import allowed_states %}
{% if sls.split('.')[0] in allowed_states %}
{% from 'vars/globals.map.jinja' import GLOBALS %}
{% from 'docker/docker.map.jinja' import DOCKER %}
include:
- curator.config
- curator.sostatus
so-curator:
docker_container.running:
- image: {{ GLOBALS.registry_host }}:5000/{{ GLOBALS.image_repo }}/so-curator:{{ GLOBALS.so_version }}
- start: True
- hostname: curator
- name: so-curator
- user: curator
- networks:
- sobridge:
- ipv4_address: {{ DOCKER.containers['so-curator'].ip }}
- interactive: True
- tty: True
- binds:
- /opt/so/conf/curator/curator.yml:/etc/curator/config/curator.yml:ro
- /opt/so/conf/curator/action/:/etc/curator/action:ro
- /opt/so/log/curator:/var/log/curator:rw
{% if DOCKER.containers['so-curator'].custom_bind_mounts %}
{% for BIND in DOCKER.containers['so-curator'].custom_bind_mounts %}
- {{ BIND }}
{% endfor %}
{% endif %}
{% if DOCKER.containers['so-curator'].extra_hosts %}
- extra_hosts:
{% for XTRAHOST in DOCKER.containers['so-curator'].extra_hosts %}
- {{ XTRAHOST }}
{% endfor %}
{% endif %}
{% if DOCKER.containers['so-curator'].extra_env %}
- environment:
{% for XTRAENV in DOCKER.containers['so-curator'].extra_env %}
- {{ XTRAENV }}
{% endfor %}
{% endif %}
- require:
- file: actionconfs
- file: curconf
- file: curlogdir
- watch:
- file: curconf
delete_so-curator_so-status.disabled:
file.uncomment:
- name: /opt/so/conf/so-status/so-status.conf
- regex: ^so-curator$
so-curator-cluster-close:
cron.present:
- name: /usr/sbin/so-curator-cluster-close > /opt/so/log/curator/cron-close.log 2>&1
- identifier: so-curator-cluster-close
- user: root
- minute: '2'
- hour: '*/1'
- daymonth: '*'
- month: '*'
- dayweek: '*'
so-curator-cluster-delete:
cron.present:
- name: /usr/sbin/so-curator-cluster-delete > /opt/so/log/curator/cron-cluster-delete.log 2>&1
- identifier: so-curator-cluster-delete
- user: root
- minute: '*/5'
- hour: '*'
- daymonth: '*'
- month: '*'
- dayweek: '*'
{% else %}
{{sls}}_state_not_allowed:
test.fail_without_changes:
- name: {{sls}}_state_not_allowed
{% endif %}
-31
View File
@@ -1,31 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% import_yaml 'elasticsearch/defaults.yaml' as ELASTICDEFAULTS %}
{% set ELASTICMERGED = salt['pillar.get']('elasticsearch:retention', ELASTICDEFAULTS.elasticsearch.retention, merge=true) %}
{{ ELASTICMERGED.retention_pct }}
{%- set log_size_limit = salt['pillar.get']('elasticsearch:log_size_limit') %}
actions:
1:
action: delete_indices
description: >-
Delete indices when {{log_size_limit}}(GB) is exceeded.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-.*|so-.*|.ds-logs-.*-so.*)$'
- filtertype: pattern
kind: regex
value: '^(so-case.*)$'
exclude: True
- filtertype: space
source: creation_date
use_age: True
disk_space: {{log_size_limit}}
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-elastic_agent-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent default indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-elastic_agent-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent default indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-elastic_agent-filebeat-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Filebeat indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.filebeat-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-elastic_agent-filebeat-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent Filebeat indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.filebeat-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-elastic_agent-fleet_server-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Fleet Server indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.fleet_server-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-elastic_agent-fleet_server-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete import indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.fleet_server-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-elastic_agent-metricbeat-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Metricbeat indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.metricbeat-default-.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-elastic_agent-metricbeat-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent Metricbeat indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.metricbeat-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-elastic_agent-osquerybeat-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Osquerybeat indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.osquerybeat-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-elastic_agent-osquerybeat-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent Osquerybeat indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-elastic_agent.osquerybeat-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-import-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete import indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-import-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-import-so'].close %}
actions:
1:
action: close
description: >-
Close import indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-import-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-import-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete import indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-import-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-strelka-so'].close %}
actions:
1:
action: close
description: >-
Close Strelka indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-strelka-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-strelka-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Strelka indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-strelka-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-suricata-so'].close %}
actions:
1:
action: close
description: >-
Close Suricata indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-suricata-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-suricata-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Suricata indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-suricata-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-syslog-so'].close %}
actions:
1:
action: close
description: >-
Close syslog indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-syslog-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-syslog-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete syslog indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-syslog-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-system-application-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent system application indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.application-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-system-application-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent system application indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.application-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-system-auth-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent system auth indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.auth-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-system-auth-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent system auth indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.auth-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-system-security-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent system security indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.security-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-system-security-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent system security indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.security-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-system-syslog-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent system syslog indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.syslog-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-system-syslog-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent system syslog indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.syslog-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-system-system-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent system system indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.system-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-system-system-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent system system indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-system.system-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-windows-powershell-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Windows Powershell indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-windows.powershell-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-windows-powershell-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent Windows Powershell indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-windows.powershell-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-windows-sysmon_operational-default'].close %}
actions:
1:
action: close
description: >-
Close Elastic Agent Windows Sysmon operational indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-windows.sysmon_operational-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-windows-sysmon_operational-default'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Elastic Agent Windows Sysmon operational indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-windows.sysmon_operational-default.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['logs-zeek-so'].close %}
actions:
1:
action: close
description: >-
Close Zeek indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-zeek-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['logs-zeek-so'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Zeek indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(.ds-logs-zeek-so.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-beats'].close %}
actions:
1:
action: close
description: >-
Close Beats indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-beats.*|so-beats.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-beats'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete beats indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-beats.*|so-beats.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-elasticsearch'].close %}
actions:
1:
action: close
description: >-
Close elasticsearch indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-elasticsearch.*|so-elasticsearch.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-elasticsearch'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete elasticsearch indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-elasticsearch.*|so-elasticsearch.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,28 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-firewall'].close %}
actions:
1:
action: close
description: >-
Close Firewall indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-firewall.*|so-firewall.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,28 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-firewall'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete firewall indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-firewall.*|so-firewall.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,28 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-ids'].close %}
actions:
1:
action: close
description: >-
Close IDS indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-ids.*|so-ids.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,28 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-ids'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete IDS indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-ids.*|so-ids.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-import'].close %}
actions:
1:
action: close
description: >-
Close Import indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-import.*|so-import.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-import'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete import indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-import.*|so-import.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-kibana'].close %}
actions:
1:
action: close
description: >-
Close kibana indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-kibana.*|so-kibana.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-kibana'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete kibana indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-kibana.*|so-kibana.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-kratos'].close %}
actions:
1:
action: close
description: >-
Close kratos indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-kratos.*|so-kratos.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-kratos'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete kratos indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-kratos.*|so-kratos.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-logstash'].close %}
actions:
1:
action: close
description: >-
Close logstash indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-logstash.*|so-logstash.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-logstash'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete logstash indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-logstash.*|so-logstash.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-netflow'].close %}
actions:
1:
action: close
description: >-
Close netflow indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-netflow.*|so-netflow.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-netflow'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete netflow indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-netflow.*|so-netflow.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-osquery'].close %}
actions:
1:
action: close
description: >-
Close osquery indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-osquery.*|so-osquery.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-osquery'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete import indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-osquery.*|so-osquery.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-ossec'].close %}
actions:
1:
action: close
description: >-
Close ossec indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-ossec.*|so-ossec.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-ossec'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete ossec indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-ossec.*|so-ossec.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-redis'].close %}
actions:
1:
action: close
description: >-
Close redis indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-redis.*|so-redis.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-redis'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete redis indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-redis.*|so-redis.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-strelka'].close %}
actions:
1:
action: close
description: >-
Close Strelka indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-strelka.*|so-strelka.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-strelka'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Strelka indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-strelka.*|so-strelka.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-syslog'].close %}
actions:
1:
action: close
description: >-
Close syslog indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-syslog.*|so-syslog.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-syslog'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete syslog indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-syslog.*|so-syslog.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set cur_close_days = CURATORMERGED['so-zeek'].close %}
actions:
1:
action: close
description: >-
Close Zeek indices older than {{cur_close_days}} days.
options:
delete_aliases: False
timeout_override:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-zeek.*|so-zeek.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{cur_close_days}}
exclude:
@@ -1,27 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{%- set DELETE_DAYS = CURATORMERGED['so-zeek'].delete %}
actions:
1:
action: delete_indices
description: >-
Delete Zeek indices when older than {{ DELETE_DAYS }} days.
options:
ignore_empty_list: True
disable_action: False
filters:
- filtertype: pattern
kind: regex
value: '^(logstash-zeek.*|so-zeek.*)$'
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: {{ DELETE_DAYS }}
exclude:
-40
View File
@@ -1,40 +0,0 @@
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
{% from 'vars/globals.map.jinja' import GLOBALS %}
{% if GLOBALS.role in ['so-searchnode', 'so-heavynode'] %}
{%- set elasticsearch = GLOBALS.node_ip -%}
{% elif GLOBALS.role in ['so-eval', 'so-managersearch', 'so-standalone', 'so-manager'] %}
{%- set elasticsearch = GLOBALS.manager_ip -%}
{%- endif %}
{%- set ES_USER = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:user', '') %}
{%- set ES_PASS = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %}
---
# Remember, leave a key empty if there is no value. None will be a string,
# not a Python "NoneType"
elasticsearch:
client:
hosts:
- https://{{elasticsearch}}:9200
cloud_id:
ca_certs:
client_cert:
client_key:
verify_certs: False
request_timeout: 30
other_settings:
api_key:
id:
api_key:
master_only: False
username: "{{ ES_USER }}"
password: "{{ ES_PASS }}"
logging:
loglevel: INFO
logfile: '/var/log/curator/curator.log'
logformat: default
blacklist: ['elasticsearch', 'urllib3']
-108
View File
@@ -1,108 +0,0 @@
curator:
enabled:
description: You can enable or disable Curator.
helpLink: curator.html
elasticsearch:
index_settings:
logs-import-so:
close: &close
description: Age, in days, when Curator closes the index.
helpLink: curator.html
forcedType: int
delete: &delete
description: Age, in days, when Curator deletes the index.
helpLink: curator.html
forcedType: int
logs-strelka-so:
close: *close
delete: *delete
logs-suricata-so:
close: *close
delete: *delete
logs-syslog-so:
close: *close
delete: *delete
logs-zeek-so:
close: *close
delete: *delete
logs-elastic_agent-metricbeat-default:
close: *close
delete: *delete
logs-elastic_agent-osquerybeat-default:
close: *close
delete: *delete
logs-elastic_agent-fleet_server-default:
close: *close
delete: *delete
logs-elastic_agent-filebeat-default:
close: *close
delete: *delete
logs-elastic_agent-default:
close: *close
delete: *delete
logs-system-auth-default:
close: *close
delete: *delete
logs-system-application-default:
close: *close
delete: *delete
logs-system-security-default:
close: *close
delete: *delete
logs-system-system-default:
close: *close
delete: *delete
logs-system-syslog-default:
close: *close
delete: *delete
logs-windows-powershell-default:
close: *close
delete: *delete
logs-windows-sysmon_operational-default:
close: *close
delete: *delete
so-beats:
close: *close
delete: *delete
so-elasticsearch:
close: *close
delete: *delete
so-firewall:
close: *close
delete: *delete
so-ids:
close: *close
delete: *delete
so-import:
close: *close
delete: *delete
so-kratos:
close: *close
delete: *delete
so-kibana:
close: *close
delete: *delete
so-logstash:
close: *close
delete: *delete
so-netflow:
close: *close
delete: *delete
so-osquery:
close: *close
delete: *delete
so-ossec:
close: *close
delete: *delete
so-redis:
close: *close
delete: *delete
so-strelka:
close: *close
delete: *delete
so-syslog:
close: *close
delete: *delete
so-zeek:
close: *close
delete: *delete
-32
View File
@@ -1,32 +0,0 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
APP=close
lf=/tmp/$APP-pidLockFile
# create empty lock file if none exists
cat /dev/null >> $lf
read lastPID < $lf
# if lastPID is not null and a process with that pid exists , exit
[ ! -z "$lastPID" -a -d /proc/$lastPID ] && exit
echo $$ > $lf
/usr/sbin/so-curator-closed-delete > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-zeek-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-beats-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-firewall-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-ids-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-import-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-kibana-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-kratos-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-osquery-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-ossec-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-strelka-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-syslog-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/logs-import-so-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/logs-strelka-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/logs-suricata-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/logs-syslog-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/logs-zeek-close.yml > /dev/null 2>&1;
@@ -1,30 +0,0 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
APP=close
lf=/tmp/$APP-pidLockFile
# create empty lock file if none exists
cat /dev/null >> $lf
read lastPID < $lf
# if lastPID is not null and a process with that pid exists , exit
[ ! -z "$lastPID" -a -d /proc/$lastPID ] && exit
echo $$ > $lf
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-zeek-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-beats-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-firewall-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-ids-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-import-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-kratos-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-osquery-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-ossec-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-strelka-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/so-syslog-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/logs-import-so-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/logs-strelka-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/logs-suricata-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/logs-syslog-close.yml > /dev/null 2>&1;
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/logs-zeek-close.yml > /dev/null 2>&1;
-17
View File
@@ -1,17 +0,0 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
APP=delete
lf=/tmp/$APP-pidLockFile
# create empty lock file if none exists
cat /dev/null >> $lf
read lastPID < $lf
# if lastPID is not null and a process with that pid exists , exit
[ ! -z "$lastPID" -a -d /proc/$lastPID ] && exit
echo $$ > $lf
docker exec so-curator curator --config /etc/curator/config/curator.yml /etc/curator/action/delete.yml > /dev/null 2>&1
-12
View File
@@ -1,12 +0,0 @@
#!/bin/bash
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
# https://securityonion.net/license; you may not use this file except in compliance with the
# Elastic License 2.0.
. /usr/sbin/so-common
/usr/sbin/so-start curator $1
+2
View File
@@ -35,6 +35,7 @@ desktop_packages:
- bluez-libs
- bluez-obexd
- bolt
- brasero
- bzip2
- bzip2-libs
- c-ares
@@ -333,6 +334,7 @@ desktop_packages:
- pulseaudio-libs
- pulseaudio-libs-glib2
- pulseaudio-utils
- putty
- sane-airscan
- sane-backends
- sane-backends-drivers-cameras
+7 -5
View File
@@ -84,6 +84,13 @@ docker:
custom_bind_mounts: []
extra_hosts: []
extra_env: []
'so-nginx-fleet-node':
final_octet: 31
port_bindings:
- 8443:8443
custom_bind_mounts: []
extra_hosts: []
extra_env: []
'so-playbook':
final_octet: 32
port_bindings:
@@ -159,11 +166,6 @@ docker:
custom_bind_mounts: []
extra_hosts: []
extra_env: []
'so-curator':
final_octet: 43
custom_bind_mounts: []
extra_hosts: []
extra_env: []
'so-elastic-fleet-package-registry':
final_octet: 44
port_bindings:
+1 -1
View File
@@ -48,6 +48,7 @@ docker:
so-logstash: *dockerOptions
so-mysql: *dockerOptions
so-nginx: *dockerOptions
so-nginx-fleet-node: *dockerOptions
so-playbook: *dockerOptions
so-redis: *dockerOptions
so-sensoroni: *dockerOptions
@@ -60,7 +61,6 @@ docker:
so-strelka-gatekeeper: *dockerOptions
so-strelka-coordinator: *dockerOptions
so-elastalert: *dockerOptions
so-curator: *dockerOptions
so-elastic-fleet-package-registry: *dockerOptions
so-idh: *dockerOptions
so-elastic-agent: *dockerOptions
+3 -2
View File
@@ -6,6 +6,7 @@
{% from 'allowed_states.map.jinja' import allowed_states %}
{% from 'vars/globals.map.jinja' import GLOBALS %}
{% if sls.split('.')[0] in allowed_states %}
{% from 'elasticfleet/map.jinja' import ELASTICFLEETMERGED %}
{% set node_data = salt['pillar.get']('node_data') %}
# Add EA Group
@@ -104,8 +105,8 @@ eaoptionalintegrationsdir:
{% for minion in node_data %}
{% set role = node_data[minion]["role"] %}
{% if role in [ "eval","fleet","heavynode","import","manager","managersearch","standalone" ] %}
{% set optional_integrations = salt['pillar.get']('elasticfleet:optional_integrations', {}) %}
{% set integration_keys = salt['pillar.get']('elasticfleet:optional_integrations', {}).keys() %}
{% set optional_integrations = ELASTICFLEETMERGED.optional_integrations %}
{% set integration_keys = optional_integrations.keys() %}
fleet_server_integrations_{{ minion }}:
file.directory:
- name: /opt/so/conf/elastic-fleet/integrations-optional/FleetServer_{{ minion }}
+17
View File
@@ -1,5 +1,6 @@
elasticfleet:
enabled: False
enable_manager_output: True
config:
server:
custom_fqdn: []
@@ -10,6 +11,7 @@ elasticfleet:
logging:
zeek:
excluded:
- analyzer
- broker
- capture_loss
- cluster
@@ -38,8 +40,13 @@ elasticfleet:
- checkpoint
- cisco_asa
- cisco_duo
- cisco_ftd
- cisco_ios
- cisco_ise
- cisco_meraki
- cisco_umbrella
- citrix_adc
- citrix_waf
- cloudflare
- crowdstrike
- darktrace
@@ -57,6 +64,7 @@ elasticfleet:
- google_workspace
- http_endpoint
- httpjson
- iis
- juniper
- juniper_srx
- kafka_log
@@ -65,16 +73,21 @@ elasticfleet:
- m365_defender
- microsoft_defender_endpoint
- microsoft_dhcp
- microsoft_sqlserver
- mimecast
- mysql
- netflow
- nginx
- o365
- okta
- osquery_manager
- panw
- pfsense
- proofpoint_tap
- pulse_connect_secure
- redis
- sentinel_one
- snort
- snyk
- sonicwall_firewall
- sophos
@@ -84,12 +97,16 @@ elasticfleet:
- tcp
- tenable_sc
- ti_abusech
- ti_anomali
- ti_cybersixgill
- ti_misp
- ti_otx
- ti_recordedfuture
- ti_threatq
- udp
- vsphere
- windows
- winlog
- zscaler_zia
- zscaler_zpa
- 1password

Some files were not shown because too many files have changed in this diff Show More