Skip to content

Commit

Permalink
Merge pull request #11374 from Security-Onion-Solutions/dev
Browse files Browse the repository at this point in the history
2.3.270
  • Loading branch information
TOoSmOotH authored Oct 6, 2023
2 parents 3e5f354 + b005a10 commit 3839e52
Show file tree
Hide file tree
Showing 9 changed files with 63 additions and 14 deletions.
22 changes: 11 additions & 11 deletions VERIFY_ISO.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,18 @@
### 2.3.260-20230620 ISO image built on 2023/06/20
### 2.3.270-20231006 ISO image built on 2023/10/06



### Download and Verify

2.3.260-20230620 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.260-20230620.iso
2.3.270-20231006 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.270-20231006.iso

MD5: E09BB9800BAE84E84511516952264F33
SHA1: DBDDFCE58B87F61F40BCE03840A749D8054B7AF1
SHA256: 06ED74278587B09167FBAC1E5796B666FC24AD15D06EA3CC36419D07967E06DD
MD5: 3FC7A37EA402A5F0C6609D7431387575
SHA1: 979851603E431EE9670A1576E5DCCD838CEDA294
SHA256: 34F72EDEA9A62E1545347A31DEDEDD099D824466EC52B8674ACC7DB6D7E8B943

Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.260-20230620.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.270-20231006.iso.sig

Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
Expand All @@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma

Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.260-20230620.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.270-20231006.iso.sig
```

Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.260-20230620.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.270-20231006.iso
```

Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.3.260-20230620.iso.sig securityonion-2.3.260-20230620.iso
gpg --verify securityonion-2.3.270-20231006.iso.sig securityonion-2.3.270-20231006.iso
```

The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Fri 16 Jun 2023 02:58:22 PM EDT using RSA key ID FE507013
gpg: Signature made Thu 21 Sep 2023 10:43:13 AM EDT using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <[email protected]>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Expand Down
2 changes: 1 addition & 1 deletion VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2.3.260
2.3.270
14 changes: 14 additions & 0 deletions salt/common/tools/sbin/soup
Original file line number Diff line number Diff line change
Expand Up @@ -579,6 +579,7 @@ preupgrade_changes() {
[[ "$INSTALLEDVERSION" == 2.3.230 ]] && up_to_2.3.240
[[ "$INSTALLEDVERSION" == 2.3.240 ]] && up_to_2.3.250
[[ "$INSTALLEDVERSION" == 2.3.250 ]] && up_to_2.3.260
[[ "$INSTALLEDVERSION" == 2.3.260 ]] && up_to_2.3.270

true
}
Expand Down Expand Up @@ -610,6 +611,7 @@ postupgrade_changes() {
[[ "$POSTVERSION" == 2.3.230 ]] && post_to_2.3.240
[[ "$POSTVERSION" == 2.3.240 ]] && post_to_2.3.250
[[ "$POSTVERSION" == 2.3.250 ]] && post_to_2.3.260
[[ "$POSTVERSION" == 2.3.260 ]] && post_to_2.3.270

true
}
Expand Down Expand Up @@ -763,6 +765,13 @@ post_to_2.3.260() {
POSTVERSION=2.3.260
}

post_to_2.3.270() {
echo "Pruning unused docker volumes on all nodes - This process will run in the background."
salt --async \* cmd.run "docker volume prune -f"

POSTVERSION=2.3.270
}

stop_salt_master() {
# kill all salt jobs across the grid because the hang indefinitely if they are queued and salt-master restarts
set +e
Expand Down Expand Up @@ -1123,6 +1132,11 @@ up_to_2.3.260() {
INSTALLEDVERSION=2.3.260
}

up_to_2.3.270() {
echo "Upgrading to 2.3.270"
INSTALLEDVERSION=2.3.270
}

verify_upgradespace() {
CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//')
if [ "$CURRENTSPACE" -lt "10" ]; then
Expand Down
2 changes: 1 addition & 1 deletion salt/kibana/bin/so-kibana-config-load
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ update() {

IFS=$'\r\n' GLOBIGNORE='*' command eval 'LINES=($(cat $1))'
for i in "${LINES[@]}"; do
RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.7.1" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ")
RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.8.2" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ")
echo $RESPONSE; if [[ "$RESPONSE" != *"\"success\":true"* ]] && [[ "$RESPONSE" != *"updated_at"* ]] ; then RETURN_CODE=1;fi
done

Expand Down
2 changes: 1 addition & 1 deletion salt/kibana/files/config_saved_objects.ndjson
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.7.1","id": "8.7.1","migrationVersion": {"config": "7.13.0"},"references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="}
{"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.8.2","id": "8.8.2","references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="}
9 changes: 9 additions & 0 deletions salt/playbook/init.sls
Original file line number Diff line number Diff line change
Expand Up @@ -84,13 +84,22 @@ playbook_password_none:
{% else %}
playbookfilesdir:
file.directory:
- name: /opt/so/conf/playbook/redmine-files
- dir_mode: 775
- user: 939
- group: 939
- makedirs: True
so-playbook:
docker_container.running:
- image: {{ MANAGER }}:5000/{{ IMAGEREPO }}/so-playbook:{{ VERSION }}
- hostname: playbook
- name: so-playbook
- binds:
- /opt/so/log/playbook:/playbook/log:rw
- /opt/so/conf/playbook/redmine-files:/usr/src/redmine/files:rw
- environment:
- REDMINE_DB_MYSQL={{ MANAGERIP }}
- REDMINE_DB_DATABASE=playbook
Expand Down
8 changes: 8 additions & 0 deletions salt/redis/init.sls
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,13 @@ redisconf:
- group: 939
- template: jinja
redisdatadir:
file.directory:
- name: /nsm/redis/data
- user: 939
- group: 939
- makedirs: True
so-redis:
docker_container.running:
- image: {{ MANAGER }}:5000/{{ IMAGEREPO }}/so-redis:{{ VERSION }}
Expand All @@ -64,6 +71,7 @@ so-redis:
- /opt/so/log/redis:/var/log/redis:rw
- /opt/so/conf/redis/etc/redis.conf:/usr/local/etc/redis/redis.conf:ro
- /opt/so/conf/redis/working:/redis:rw
- /nsm/redis/data:/data:rw
- /etc/pki/redis.crt:/certs/redis.crt:ro
- /etc/pki/redis.key:/certs/redis.key:ro
{% if grains['role'] in ['so-manager', 'so-helix', 'so-managersearch', 'so-standalone', 'so-import'] %}
Expand Down
18 changes: 18 additions & 0 deletions salt/strelka/init.sls
Original file line number Diff line number Diff line change
Expand Up @@ -194,9 +194,25 @@ filcheck_history_clean:
- minute: '33'
# End Filecheck Section
strelkagkredisdatadir:
file.directory:
- name: /nsm/strelka/gk-redis-data
- user: 939
- group: 939
- makedirs: True
strelkacoordredisdatadir:
file.directory:
- name: /nsm/strelka/coord-redis-data
- user: 939
- group: 939
- makedirs: True
strelka_coordinator:
docker_container.running:
- image: {{ MANAGER }}:5000/{{ IMAGEREPO }}/so-redis:{{ VERSION }}
- binds:
- /nsm/strelka/coord-redis-data:/data:rw
- name: so-strelka-coordinator
- entrypoint: redis-server --save "" --appendonly no
- port_bindings:
Expand All @@ -210,6 +226,8 @@ append_so-strelka-coordinator_so-status.conf:
strelka_gatekeeper:
docker_container.running:
- image: {{ MANAGER }}:5000/{{ IMAGEREPO }}/so-redis:{{ VERSION }}
- binds:
- /nsm/strelka/gk-redis-data:/data:rw
- name: so-strelka-gatekeeper
- entrypoint: redis-server --save "" --appendonly no --maxmemory-policy allkeys-lru
- port_bindings:
Expand Down
Binary file added sigs/securityonion-2.3.270-20231006.iso.sig
Binary file not shown.

0 comments on commit 3839e52

Please sign in to comment.