mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 09:12:45 +01:00
201 lines
4.7 KiB
Plaintext
201 lines
4.7 KiB
Plaintext
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
|
|
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
|
|
# https://securityonion.net/license; you may not use this file except in compliance with the
|
|
# Elastic License 2.0.
|
|
|
|
{% from 'allowed_states.map.jinja' import allowed_states %}
|
|
{% if sls.split('.')[0] in allowed_states %}
|
|
|
|
{% from 'vars/globals.map.jinja' import GLOBALS %}
|
|
{% from 'suricata/map.jinja' import SURICATAMERGED %}
|
|
{% from 'bpf/suricata.map.jinja' import SURICATABPF, SURICATA_BPF_STATUS, SURICATA_BPF_CALC %}
|
|
|
|
{% if GLOBALS.pcap_engine in ["SURICATA", "TRANSITION"] %}
|
|
{% from 'bpf/pcap.map.jinja' import PCAPBPF, PCAP_BPF_STATUS, PCAP_BPF_CALC %}
|
|
# BPF compilation and configuration
|
|
{% if PCAPBPF and not PCAP_BPF_STATUS %}
|
|
suriPCAPbpfcompilationfailure:
|
|
test.configurable_test_state:
|
|
- changes: False
|
|
- result: False
|
|
- comment: "BPF Syntax Error - Discarding Specified BPF. Error: {{ PCAP_BPF_CALC['stderr'] }}"
|
|
{% endif %}
|
|
{% endif %}
|
|
|
|
# BPF applied to all of Suricata - alerts/metadata/pcap
|
|
suribpf:
|
|
file.managed:
|
|
- name: /opt/so/conf/suricata/bpf
|
|
- user: 940
|
|
- group: 940
|
|
{% if SURICATA_BPF_STATUS %}
|
|
- contents: {{ SURICATABPF }}
|
|
{% else %}
|
|
- contents:
|
|
- ""
|
|
{% endif %}
|
|
|
|
{% if SURICATABPF and not SURICATA_BPF_STATUS %}
|
|
suribpfcompilationfailure:
|
|
test.configurable_test_state:
|
|
- changes: False
|
|
- result: False
|
|
- comment: "BPF Syntax Error - Discarding Specified BPF. Error: {{ SURICATA_BPF_CALC['stderr'] }}"
|
|
{% endif %}
|
|
|
|
# Add Suricata Group
|
|
suricatagroup:
|
|
group.present:
|
|
- name: suricata
|
|
- gid: 940
|
|
|
|
# Add Suricata user
|
|
suricata:
|
|
user.present:
|
|
- uid: 940
|
|
- gid: 940
|
|
- home: /nsm/suricata
|
|
- createhome: False
|
|
|
|
socoregroupwithsuricata:
|
|
group.present:
|
|
- name: socore
|
|
- gid: 939
|
|
- addusers:
|
|
- suricata
|
|
|
|
suricata_sbin:
|
|
file.recurse:
|
|
- name: /usr/sbin
|
|
- source: salt://suricata/tools/sbin
|
|
- user: 939
|
|
- group: 939
|
|
- file_mode: 755
|
|
|
|
suricata_sbin_jinja:
|
|
file.recurse:
|
|
- name: /usr/sbin
|
|
- source: salt://suricata/tools/sbin_jinja
|
|
- user: 939
|
|
- group: 939
|
|
- file_mode: 755
|
|
- template: jinja
|
|
|
|
suridir:
|
|
file.directory:
|
|
- name: /opt/so/conf/suricata
|
|
- user: 940
|
|
- group: 939
|
|
- mode: 775
|
|
|
|
suriruledir:
|
|
file.directory:
|
|
- name: /opt/so/rules/suricata
|
|
- user: 940
|
|
- group: 939
|
|
- mode: 775
|
|
- makedirs: True
|
|
|
|
surilogdir:
|
|
file.directory:
|
|
- name: /opt/so/log/suricata
|
|
- user: 940
|
|
- group: 939
|
|
|
|
surinsmdir:
|
|
file.directory:
|
|
- name: /nsm/suricata
|
|
- user: 940
|
|
- group: 939
|
|
- mode: 755
|
|
- makedirs: True
|
|
|
|
suridatadir:
|
|
file.directory:
|
|
- name: /nsm/suricata/extracted
|
|
- user: 940
|
|
- group: 939
|
|
- mode: 770
|
|
- makedirs: True
|
|
|
|
surirulesync:
|
|
file.recurse:
|
|
- name: /opt/so/rules/suricata/
|
|
- source: salt://suricata/rules/
|
|
- user: 940
|
|
- group: 940
|
|
- show_changes: False
|
|
|
|
suriextractionrules:
|
|
file.managed:
|
|
- name: /nsm/rules/suricata/so_extraction.rules
|
|
- source: salt://suricata/files/so_extraction.rules
|
|
- user: 939
|
|
- group: 939
|
|
|
|
surifiltersrules:
|
|
file.managed:
|
|
- name: /nsm/rules/suricata/so_filters.rules
|
|
- source: salt://suricata/files/so_filters.rules
|
|
- user: 939
|
|
- group: 939
|
|
|
|
surilogscript:
|
|
file.managed:
|
|
- name: /usr/local/bin/surilogcompress
|
|
- source: salt://suricata/cron/surilogcompress
|
|
- mode: 755
|
|
|
|
surilogcompress:
|
|
cron.present:
|
|
- name: /usr/local/bin/surilogcompress
|
|
- identifier: surilogcompress
|
|
- user: suricata
|
|
- minute: '17'
|
|
- hour: '*'
|
|
- daymonth: '*'
|
|
- month: '*'
|
|
- dayweek: '*'
|
|
|
|
suriconfig:
|
|
file.managed:
|
|
- name: /opt/so/conf/suricata/suricata.yaml
|
|
- source: salt://suricata/files/suricata.yaml.jinja
|
|
- context:
|
|
suricata_config: {{ SURICATAMERGED.config }}
|
|
- user: 940
|
|
- group: 940
|
|
- template: jinja
|
|
|
|
surithresholding:
|
|
file.managed:
|
|
- name: /opt/so/conf/suricata/threshold.conf
|
|
- source: salt://suricata/files/threshold.conf
|
|
- user: 940
|
|
- group: 940
|
|
- onlyif: salt://suricata/files/threshold.conf
|
|
|
|
suriclassifications:
|
|
file.managed:
|
|
- name: /opt/so/conf/suricata/classification.config
|
|
- source: salt://suricata/classification/classification.config
|
|
- user: 940
|
|
- group: 940
|
|
|
|
so-suricata-eve-clean:
|
|
file.managed:
|
|
- name: /usr/sbin/so-suricata-eve-clean
|
|
- user: root
|
|
- group: root
|
|
- mode: 755
|
|
- template: jinja
|
|
- source: salt://suricata/cron/so-suricata-eve-clean
|
|
|
|
{% else %}
|
|
|
|
{{sls}}_state_not_allowed:
|
|
test.fail_without_changes:
|
|
- name: {{sls}}_state_not_allowed
|
|
|
|
{% endif %}
|