Compare commits

..

20 Commits

Author SHA1 Message Date
Josh Patterson
922c008b11 ensure bool sliders soc 2026-03-27 15:02:54 -04:00
Mike Reeves
ea30749512 Merge pull request #15676 from Security-Onion-Solutions/TOoSmOotH-patch-3
Make AI adapter settings visible
2026-03-26 09:43:58 -04:00
Mike Reeves
0a55592d7e Make AI adapter settings visible
Changed 'advanced' field from True to False for AI adapters and available models.
2026-03-26 09:37:39 -04:00
Josh Brower
115ca2c41d Merge pull request #15672 from Security-Onion-Solutions/yaracomments
update yara template
2026-03-24 15:59:48 -04:00
Josh Brower
9e53bd3f2d update yara template 2026-03-24 15:56:26 -04:00
Josh Brower
d4f1078f84 Merge pull request #15669 from Security-Onion-Solutions/lowercasefix
Lowercase network transport
2026-03-24 11:30:13 -04:00
Josh Brower
1f9bf45b66 Lowercase network transport 2026-03-24 11:24:59 -04:00
Mike Reeves
271de757e7 Merge pull request #15667 from Security-Onion-Solutions/TOoSmOotH-patch-1
Enable clean option for Zeek configuration
2026-03-24 09:56:03 -04:00
Mike Reeves
d4ac352b5a Enable clean option for Zeek configuration 2026-03-24 09:54:49 -04:00
Jorge Reyes
afcef1d0e7 Merge pull request #15661 from Security-Onion-Solutions/reyesj2-361
update stig profile v1r3
2026-03-23 18:09:33 -05:00
Josh Patterson
91b164b728 Merge pull request #15665 from Security-Onion-Solutions/delta
allow negation in suricata address-group vars
2026-03-23 17:34:21 -04:00
Josh Patterson
6a4501241d allow negation in suricata address-group vars 2026-03-23 17:24:12 -04:00
Josh Brower
c6978f9037 Merge pull request #15663 from Security-Onion-Solutions/fix/idh-skins
Remove hardcoded path
2026-03-23 16:30:51 -04:00
Josh Brower
7300513636 Remove hardcoded path 2026-03-23 16:26:56 -04:00
Jorge Reyes
fb7b73c601 Merge pull request #15662 from Security-Onion-Solutions/reyesj2-patch-1
exclude oscap profile from gitleaks
2026-03-23 14:23:24 -05:00
Jorge Reyes
f2b6d59c65 exclude oscap profile from gitleaks 2026-03-23 14:17:39 -05:00
reyesj2
67162357a3 update stig profile v1r3 2026-03-23 14:04:48 -05:00
Jason Ertel
8ea97e4af3 Merge pull request #15658 from Security-Onion-Solutions/jertel/wip
do not attempt to redirect to a source map after login
2026-03-23 09:55:31 -04:00
Jason Ertel
2f9a2e15b3 do not attempt to redirect to a source map after login 2026-03-23 09:48:06 -04:00
Josh Brower
a4fcf4ddf2 Merge pull request #15656 from Security-Onion-Solutions/zeek-websocket
Add support for websockets
2026-03-23 08:21:08 -04:00
12 changed files with 74994 additions and 43855 deletions

View File

@@ -542,5 +542,6 @@ paths = [
'''(.*?)(jpg|gif|doc|pdf|bin|svg|socket)$''', '''(.*?)(jpg|gif|doc|pdf|bin|svg|socket)$''',
'''(go.mod|go.sum)$''', '''(go.mod|go.sum)$''',
'''salt/nginx/files/enterprise-attack.json''', '''salt/nginx/files/enterprise-attack.json''',
'''(.*?)whl$''' '''(.*?)whl$''',
'''salt/stig/files/sos-oscap.xml'''
] ]

View File

@@ -22,6 +22,12 @@
"ignore_failure": true "ignore_failure": true
} }
}, },
{
"lowercase": {
"field": "network.transport",
"ignore_failure": true
}
},
{ {
"rename": { "rename": {
"field": "message2.in_iface", "field": "message2.in_iface",

View File

@@ -20,7 +20,7 @@ so-idh:
- network_mode: host - network_mode: host
- binds: - binds:
- /nsm/idh:/var/tmp:rw - /nsm/idh:/var/tmp:rw
- /opt/so/conf/idh/http-skins:/usr/local/lib/python3.12/site-packages/opencanary/modules/data/http/skin:ro - /opt/so/conf/idh/http-skins:/opt/opencanary/http-skins:ro
- /opt/so/conf/idh/opencanary.conf:/etc/opencanaryd/opencanary.conf:ro - /opt/so/conf/idh/opencanary.conf:/etc/opencanaryd/opencanary.conf:ro
{% if DOCKERMERGED.containers['so-idh'].custom_bind_mounts %} {% if DOCKERMERGED.containers['so-idh'].custom_bind_mounts %}
{% for BIND in DOCKERMERGED.containers['so-idh'].custom_bind_mounts %} {% for BIND in DOCKERMERGED.containers['so-idh'].custom_bind_mounts %}

View File

@@ -28,6 +28,7 @@
{% set HTTPPROXYSKINLIST = OPENCANARYCONFIG.pop('httpproxy_x_skinlist') %} {% set HTTPPROXYSKINLIST = OPENCANARYCONFIG.pop('httpproxy_x_skinlist') %}
{% do OPENCANARYCONFIG.update({'http_x_skin_x_list': HTTPSKINLIST}) %} {% do OPENCANARYCONFIG.update({'http_x_skin_x_list': HTTPSKINLIST}) %}
{% do OPENCANARYCONFIG.update({'httpproxy_x_skin_x_list': HTTPPROXYSKINLIST}) %} {% do OPENCANARYCONFIG.update({'httpproxy_x_skin_x_list': HTTPPROXYSKINLIST}) %}
{% do OPENCANARYCONFIG.update({'http_x_skindir': '/opt/opencanary/http-skins/' ~ OPENCANARYCONFIG['http_x_skin']}) %}
{% set OPENSSH = salt['pillar.get']('idh:openssh', default=IDHCONFIG.idh.openssh, merge=True) %} {% set OPENSSH = salt['pillar.get']('idh:openssh', default=IDHCONFIG.idh.openssh, merge=True) %}

View File

@@ -0,0 +1,29 @@
<html>
<head>
<title>Redirect</title>
<style>
body {
width: 100%;
}
.outer {
margin-left: auto;
margin-right: auto;
width: 25em;
height: 100%;
}
.inner{
display: table-cell;
vertical-align: middle;
height: 30em;
}
</style>
</head>
<body>
<div class='outer'>
<div class='inner'>
<a href="/index">Click here</a>
</div>
</div>
</body>
</html>

View File

@@ -0,0 +1,29 @@
<html>
<head>
<title>Redirect</title>
<style>
body {
width: 100%;
}
.outer {
margin-left: auto;
margin-right: auto;
width: 25em;
height: 100%;
}
.inner{
display: table-cell;
vertical-align: middle;
height: 30em;
}
</style>
</head>
<body>
<div class='outer'>
<div class='inner'>
<a href="/index">Click here</a>
</div>
</div>
</body>
</html>

View File

@@ -387,7 +387,7 @@ http {
error_page 429 = @error429; error_page 429 = @error429;
location @error401 { location @error401 {
if ($request_uri ~* (^/api/.*|^/connect/.*|^/oauth2/.*)) { if ($request_uri ~* (^/api/.*|^/connect/.*|^/oauth2/.*|^/.*\.map$)) {
return 401; return 401;
} }

View File

@@ -2622,6 +2622,7 @@ soc:
This is a YARA rule template. Replace all template values with your own values. This is a YARA rule template. Replace all template values with your own values.
The YARA rule name is the unique identifier for the rule. The YARA rule name is the unique identifier for the rule.
Docs: https://yara.readthedocs.io/en/stable/writingrules.html#writing-yara-rules Docs: https://yara.readthedocs.io/en/stable/writingrules.html#writing-yara-rules
Delete these comments before attempting to "Create" the rule
*/ */
rule Example // This identifier _must_ be unique rule Example // This identifier _must_ be unique

View File

@@ -8,6 +8,7 @@ soc:
description: When this setting is enabled and the grid is not in airgap mode, SOC will provide feature usage data to the Security Onion development team via Google Analytics. This data helps Security Onion developers determine which product features are being used and can also provide insight into improving the user interface. When changing this setting, wait for the grid to fully synchronize and then perform a hard browser refresh on SOC, to force the browser cache to update and reflect the new setting. description: When this setting is enabled and the grid is not in airgap mode, SOC will provide feature usage data to the Security Onion development team via Google Analytics. This data helps Security Onion developers determine which product features are being used and can also provide insight into improving the user interface. When changing this setting, wait for the grid to fully synchronize and then perform a hard browser refresh on SOC, to force the browser cache to update and reflect the new setting.
global: True global: True
helpLink: telemetry helpLink: telemetry
forcedType: bool
files: files:
soc: soc:
banner__md: banner__md:
@@ -139,6 +140,7 @@ soc:
title: Require TOTP title: Require TOTP
description: Require all users to enable Time-based One Time Passwords (MFA) upon login to SOC. description: Require all users to enable Time-based One Time Passwords (MFA) upon login to SOC.
global: True global: True
forcedType: bool
customReportsPath: customReportsPath:
title: Custom Reports Path title: Custom Reports Path
description: Path to custom markdown templates for PDF report generation. All markdown files in this directory will be available as custom reports in the SOC Reports interface. description: Path to custom markdown templates for PDF report generation. All markdown files in this directory will be available as custom reports in the SOC Reports interface.
@@ -185,6 +187,7 @@ soc:
description: "Set to true to enable reverse DNS lookups for IP addresses in the SOC UI. To add your own local lookups, create a CSV file at /nsm/custom-mappings/ip-descriptions.csv on your Manager and populate the file with IP addresses and descriptions as follows: IP, Description. Elasticsearch will then ingest the CSV during the next high state." description: "Set to true to enable reverse DNS lookups for IP addresses in the SOC UI. To add your own local lookups, create a CSV file at /nsm/custom-mappings/ip-descriptions.csv on your Manager and populate the file with IP addresses and descriptions as follows: IP, Description. Elasticsearch will then ingest the CSV during the next high state."
global: True global: True
helpLink: security-onion-console-customization#reverse-dns helpLink: security-onion-console-customization#reverse-dns
forcedType: bool
modules: modules:
elastalertengine: elastalertengine:
aiRepoUrl: aiRepoUrl:
@@ -202,6 +205,7 @@ soc:
showAiSummaries: showAiSummaries:
description: Show AI summaries for ElastAlert rules. description: Show AI summaries for ElastAlert rules.
global: True global: True
forcedType: bool
additionalAlerters: additionalAlerters:
title: "Notifications: Sev 0/Default Alerters" title: "Notifications: Sev 0/Default Alerters"
description: "Specify default alerters to enable for outbound notifications. These alerters will be used unless overridden by higher severity alerter settings. Specify one alerter name (Ex: 'email') per line. Alerters refers to ElastAlert 2 alerters, as documented at https://elastalert2.readthedocs.io. A full update of the ElastAlert rule engine, via the Detections screen, is required in order to apply these changes. Requires a valid Security Onion license key." description: "Specify default alerters to enable for outbound notifications. These alerters will be used unless overridden by higher severity alerter settings. Specify one alerter name (Ex: 'email') per line. Alerters refers to ElastAlert 2 alerters, as documented at https://elastalert2.readthedocs.io. A full update of the ElastAlert rule engine, via the Detections screen, is required in order to apply these changes. Requires a valid Security Onion license key."
@@ -338,6 +342,7 @@ soc:
description: 'Automatically update Sigma rules on a regular basis. This will update the rules based on the configured frequency.' description: 'Automatically update Sigma rules on a regular basis. This will update the rules based on the configured frequency.'
global: True global: True
advanced: True advanced: True
forcedType: bool
communityRulesImportFrequencySeconds: communityRulesImportFrequencySeconds:
description: 'How often to check for new Sigma rules (in seconds). This applies to both Community Rule Packages and any configured Git repos.' description: 'How often to check for new Sigma rules (in seconds). This applies to both Community Rule Packages and any configured Git repos.'
global: True global: True
@@ -395,6 +400,7 @@ soc:
description: Set to true if the SOC case management module, natively integrated with Elasticsearch, should be enabled. description: Set to true if the SOC case management module, natively integrated with Elasticsearch, should be enabled.
global: True global: True
advanced: True advanced: True
forcedType: bool
extractCommonObservables: extractCommonObservables:
description: List of indexed fields to automatically extract into a case observable, when attaching related events to a case. description: List of indexed fields to automatically extract into a case observable, when attaching related events to a case.
global: True global: True
@@ -421,6 +427,7 @@ soc:
lookupTunnelParent: lookupTunnelParent:
description: When true, if a pivoted event appears to be encapsulated, such as in a VXLAN packet, then SOC will pivot to the VXLAN packet stream. When false, SOC will attempt to pivot to the encapsulated packet stream itself, but at the risk that it may be unable to locate it in the stored PCAP data. description: When true, if a pivoted event appears to be encapsulated, such as in a VXLAN packet, then SOC will pivot to the VXLAN packet stream. When false, SOC will attempt to pivot to the encapsulated packet stream itself, but at the risk that it may be unable to locate it in the stored PCAP data.
global: True global: True
forcedType: bool
maxScrollSize: maxScrollSize:
description: The maximum number of documents to request in a single Elasticsearch scroll request. description: The maximum number of documents to request in a single Elasticsearch scroll request.
bulkIndexWorkerCount: bulkIndexWorkerCount:
@@ -477,10 +484,12 @@ soc:
showAiSummaries: showAiSummaries:
description: Show AI summaries for Strelka rules. description: Show AI summaries for Strelka rules.
global: True global: True
forcedType: bool
autoUpdateEnabled: autoUpdateEnabled:
description: 'Automatically update YARA rules on a regular basis. This will update the rules based on the configured frequency.' description: 'Automatically update YARA rules on a regular basis. This will update the rules based on the configured frequency.'
global: True global: True
advanced: True advanced: True
forcedType: bool
autoEnabledYaraRules: autoEnabledYaraRules:
description: 'YARA rules to automatically enable on initial import. Format is $Ruleset - for example, for the default shipped ruleset: securityonion-yara' description: 'YARA rules to automatically enable on initial import. Format is $Ruleset - for example, for the default shipped ruleset: securityonion-yara'
global: True global: True
@@ -536,10 +545,12 @@ soc:
showAiSummaries: showAiSummaries:
description: Show AI summaries for Suricata rules. description: Show AI summaries for Suricata rules.
global: True global: True
forcedType: bool
autoUpdateEnabled: autoUpdateEnabled:
description: 'Automatically update Suricata rules on a regular basis. This will update the rules based on the configured frequency.' description: 'Automatically update Suricata rules on a regular basis. This will update the rules based on the configured frequency.'
global: True global: True
advanced: True advanced: True
forcedType: bool
communityRulesImportFrequencySeconds: communityRulesImportFrequencySeconds:
description: 'How often to check for new Suricata rules (in seconds).' description: 'How often to check for new Suricata rules (in seconds).'
global: True global: True
@@ -669,7 +680,7 @@ soc:
adapters: adapters:
description: Configuration for AI adapters used by the Onion AI assistant. Please see documentation for help on which fields are required for which protocols. description: Configuration for AI adapters used by the Onion AI assistant. Please see documentation for help on which fields are required for which protocols.
global: True global: True
advanced: True advanced: False
forcedType: "[]{}" forcedType: "[]{}"
helpLink: onion-ai helpLink: onion-ai
syntax: json syntax: json
@@ -709,6 +720,7 @@ soc:
enabled: enabled:
description: Set to true to enable the Onion AI assistant in SOC. description: Set to true to enable the Onion AI assistant in SOC.
global: True global: True
forcedType: bool
investigationPrompt: investigationPrompt:
description: Prompt given to Onion AI when beginning an investigation. description: Prompt given to Onion AI when beginning an investigation.
global: True global: True
@@ -734,7 +746,7 @@ soc:
availableModels: availableModels:
description: List of AI models available for use in SOC as well as model specific warning thresholds. description: List of AI models available for use in SOC as well as model specific warning thresholds.
global: True global: True
advanced: True advanced: False
forcedType: "[]{}" forcedType: "[]{}"
helpLink: onion-ai helpLink: onion-ai
syntax: json syntax: json
@@ -789,9 +801,11 @@ soc:
casesEnabled: casesEnabled:
description: Set to true to enable case management in SOC. description: Set to true to enable case management in SOC.
global: True global: True
forcedType: bool
detectionsEnabled: detectionsEnabled:
description: Set to true to enable the Detections module in SOC. description: Set to true to enable the Detections module in SOC.
global: True global: True
forcedType: bool
inactiveTools: inactiveTools:
description: List of external tools to remove from the SOC UI. description: List of external tools to remove from the SOC UI.
global: True global: True
@@ -867,6 +881,7 @@ soc:
showUnreviewedAiSummaries: showUnreviewedAiSummaries:
description: Show AI summaries in detections even if they have not yet been reviewed by a human. description: Show AI summaries in detections even if they have not yet been reviewed by a human.
global: True global: True
forcedType: bool
templateDetections: templateDetections:
suricata: suricata:
description: The template used when creating a new Suricata detection. [publicId] will be replaced with an unused Public Id. description: The template used when creating a new Suricata detection. [publicId] will be replaced with an unused Public Id.
@@ -904,6 +919,7 @@ soc:
customEnabled: customEnabled:
description: Set to true to allow users add their own artifact types directly in the SOC UI. description: Set to true to allow users add their own artifact types directly in the SOC UI.
global: True global: True
forcedType: bool
category: category:
labels: labels:
description: List of available case categories. description: List of available case categories.
@@ -911,6 +927,7 @@ soc:
customEnabled: customEnabled:
description: Set to true to allow users add their own categories directly in the SOC UI. description: Set to true to allow users add their own categories directly in the SOC UI.
global: True global: True
forcedType: bool
pap: pap:
labels: labels:
description: List of available PAP (Permissible Actions Protocol) values. description: List of available PAP (Permissible Actions Protocol) values.
@@ -918,6 +935,7 @@ soc:
customEnabled: customEnabled:
description: Set to true to allow users add their own PAP values directly in the SOC UI. description: Set to true to allow users add their own PAP values directly in the SOC UI.
global: True global: True
forcedType: bool
severity: severity:
labels: labels:
description: List of available case severities. description: List of available case severities.
@@ -925,6 +943,7 @@ soc:
customEnabled: customEnabled:
description: Set to true to allow users add their own severities directly in the SOC UI. description: Set to true to allow users add their own severities directly in the SOC UI.
global: True global: True
forcedType: bool
status: status:
labels: labels:
description: List of available case statuses. Note that some default statuses have special characteristics and related functionality built into SOC. description: List of available case statuses. Note that some default statuses have special characteristics and related functionality built into SOC.
@@ -932,6 +951,7 @@ soc:
customEnabled: customEnabled:
description: Set to true to allow users add their own case statuses directly in the SOC UI. description: Set to true to allow users add their own case statuses directly in the SOC UI.
global: True global: True
forcedType: bool
tags: tags:
labels: labels:
description: List of available tags. description: List of available tags.
@@ -939,6 +959,7 @@ soc:
customEnabled: customEnabled:
description: Set to true to allow users add their own tags directly in the SOC UI. description: Set to true to allow users add their own tags directly in the SOC UI.
global: True global: True
forcedType: bool
tlp: tlp:
labels: labels:
description: List of available TLP (Traffic Light Protocol) values. description: List of available TLP (Traffic Light Protocol) values.
@@ -946,3 +967,4 @@ soc:
customEnabled: customEnabled:
description: Set to true to allow users add their own TLP values directly in the SOC UI. description: Set to true to allow users add their own TLP values directly in the SOC UI.
global: True global: True
forcedType: bool

File diff suppressed because it is too large Load Diff

View File

@@ -161,7 +161,7 @@ suricata:
address-groups: address-groups:
HOME_NET: HOME_NET:
description: Assign a list of hosts, or networks, using CIDR notation, to this Suricata variable. The variable can then be re-used within Suricata rules. This allows for a single adjustment to the variable that will then affect all rules referencing the variable. description: Assign a list of hosts, or networks, using CIDR notation, to this Suricata variable. The variable can then be re-used within Suricata rules. This allows for a single adjustment to the variable that will then affect all rules referencing the variable.
regex: ^(((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)(\/([0-9]|[1-2][0-9]|3[0-2]))?$|^((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?))|:))|(([0-9A-Fa-f]{1,4}:){5}((:[0-9A-Fa-f]{1,4}){1,2}|:((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)|:))|(([0-9A-Fa-f]{1,4}:){4}((:[0-9A-Fa-f]{1,4}){1,3}|:((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)|:))|(([0-9A-Fa-f]{1,4}:){3}((:[0-9A-Fa-f]{1,4}){1,4}|:((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)|:))|(([0-9A-Fa-f]{1,4}:){2}((:[0-9A-Fa-f]{1,4}){1,5}|:((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)|:))|(([0-9A-Fa-f]{1,4}:){1}((:[0-9A-Fa-f]{1,4}){1,6}|:((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)|:))|(:((:[0-9A-Fa-f]{1,4}){1,7}|:)))(\/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$ regex: ^!?((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)(\/([0-9]|[1-2][0-9]|3[0-2]))?$|^!?((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)|:))|(([0-9A-Fa-f]{1,4}:){5}((:[0-9A-Fa-f]{1,4}){1,2}|:((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)|:))|(([0-9A-Fa-f]{1,4}:){4}((:[0-9A-Fa-f]{1,4}){1,3}|:((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)|:))|(([0-9A-Fa-f]{1,4}:){3}((:[0-9A-Fa-f]{1,4}){1,4}|:((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)|:))|(([0-9A-Fa-f]{1,4}:){2}((:[0-9A-Fa-f]{1,4}){1,5}|:((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)|:))|(([0-9A-Fa-f]{1,4}:){1}((:[0-9A-Fa-f]{1,4}){1,6}|:((25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)\.){3}(25[0-5]|(2[0-4]|1[0-9])[0-9]|0?[0-9][0-9]?)|:))|(:((:[0-9A-Fa-f]{1,4}){1,7}|:)))(\/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$
regexFailureMessage: You must enter a valid IP address or CIDR. regexFailureMessage: You must enter a valid IP address or CIDR.
forcedType: "[]string" forcedType: "[]string"
duplicates: True duplicates: True

View File

@@ -38,6 +38,7 @@ zeekzkgsync:
- source: salt://zeek/zkg - source: salt://zeek/zkg
- user: 937 - user: 937
- group: 939 - group: 939
- clean: True
- makedirs: True - makedirs: True
- exclude_pat: README - exclude_pat: README