Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

2.4/dev #12036

Merged
merged 35 commits into from
Dec 18, 2023
Merged

2.4/dev #12036

Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
35 commits
Select commit Hold shift + click to select a range
6d72430
switch back to kilo version
jertel Oct 27, 2023
2f95512
Merge branch '2.4/dev' into kilo
jertel Nov 6, 2023
6d97667
Merge branch '2.4/dev' into kilo
jertel Nov 7, 2023
98947f3
grid page enhancements
jertel Dec 8, 2023
a732985
grid page enhancements
jertel Dec 8, 2023
be8ed1e
Merge pull request #11970 from Security-Onion-Solutions/jertel/hfm
jertel Dec 8, 2023
d203aec
Remove Curator
weslambert Dec 8, 2023
f7373ed
Stop Curator, remove scripts and status
weslambert Dec 11, 2023
25c3954
fix import stats
jertel Dec 11, 2023
2144042
Merge pull request #11981 from Security-Onion-Solutions/jertel/import…
jertel Dec 11, 2023
b1721b6
Fix directory
weslambert Dec 11, 2023
54c3167
Delete data streams when necessary
weslambert Dec 12, 2023
bbe091f
Fix accidental change
weslambert Dec 12, 2023
e95932f
Merge pull request #11990 from Security-Onion-Solutions/fix/remove_cu…
weslambert Dec 12, 2023
aaf60be
Update so-nsm-clear
dougburks Dec 12, 2023
d49d132
Update so-elastic-clear
dougburks Dec 12, 2023
2c4d0a0
Update so-elastic-fleet-reset
dougburks Dec 12, 2023
0327973
upgrade cla action
jertel Dec 13, 2023
bd26a52
upgrade cla action
jertel Dec 13, 2023
c0ab8f2
upgrade cla action
jertel Dec 13, 2023
196d598
Merge pull request #11998 from Security-Onion-Solutions/kilo
jertel Dec 13, 2023
b0a69d3
Add Anomali, Cybersixgill, Snort, and ThreatQuotient packages
weslambert Dec 13, 2023
cdac2bf
Add Anomali, Cybersixgill, Snort, and ThreatQuotient
weslambert Dec 13, 2023
8cf5d9c
Annotations
weslambert Dec 13, 2023
b17e400
Merge pull request #12001 from Security-Onion-Solutions/2.4/update-cl…
dougburks Dec 13, 2023
5d3f229
Merge pull request #12000 from Security-Onion-Solutions/feature/addit…
weslambert Dec 13, 2023
997d323
more log false alarms
jertel Dec 14, 2023
395da2c
Merge pull request #12012 from Security-Onion-Solutions/jertel/esloge…
jertel Dec 14, 2023
3dbf979
fix extra_hosts. https://github.com/Security-Onion-Solutions/security…
m0duspwnens Dec 14, 2023
22fccce
Add force option
weslambert Dec 14, 2023
45f50cc
Merge pull request #12019 from Security-Onion-Solutions/fix/extrahosts
m0duspwnens Dec 14, 2023
042e5ae
https://github.com/Security-Onion-Solutions/securityonion/issues/12021
dougburks Dec 14, 2023
8779fb8
Update defaults.yaml
dougburks Dec 14, 2023
d0d671a
Merge pull request #12020 from Security-Onion-Solutions/fix/integrati…
weslambert Dec 14, 2023
88684a6
Merge pull request #12023 from Security-Onion-Solutions/2.4/fix-firew…
dougburks Dec 14, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/contrib.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ jobs:
steps:
- name: "Contributor Check"
if: (github.event.comment.body == 'recheck' || github.event.comment.body == 'I have read the CLA Document and I hereby sign the CLA') || github.event_name == 'pull_request_target'
uses: cla-assistant/github-action@v2.1.3-beta
uses: cla-assistant/github-action@v2.3.1
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
PERSONAL_ACCESS_TOKEN : ${{ secrets.PERSONAL_ACCESS_TOKEN }}
Expand Down
10 changes: 0 additions & 10 deletions pillar/top.sls
Original file line number Diff line number Diff line change
Expand Up @@ -61,8 +61,6 @@ base:
- elastalert.adv_elastalert
- backup.soc_backup
- backup.adv_backup
- curator.soc_curator
- curator.adv_curator
- soctopus.soc_soctopus
- soctopus.adv_soctopus
- minions.{{ grains.id }}
Expand Down Expand Up @@ -113,8 +111,6 @@ base:
- kibana.adv_kibana
- strelka.soc_strelka
- strelka.adv_strelka
- curator.soc_curator
- curator.adv_curator
- kratos.soc_kratos
- kratos.adv_kratos
- redis.soc_redis
Expand Down Expand Up @@ -172,8 +168,6 @@ base:
- kibana.adv_kibana
- strelka.soc_strelka
- strelka.adv_strelka
- curator.soc_curator
- curator.adv_curator
- backup.soc_backup
- backup.adv_backup
- zeek.soc_zeek
Expand All @@ -194,8 +188,6 @@ base:
- logstash.adv_logstash
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
- curator.soc_curator
- curator.adv_curator
- redis.soc_redis
- redis.adv_redis
- zeek.soc_zeek
Expand Down Expand Up @@ -268,8 +260,6 @@ base:
- soctopus.adv_soctopus
- kibana.soc_kibana
- kibana.adv_kibana
- curator.soc_curator
- curator.adv_curator
- backup.soc_backup
- backup.adv_backup
- kratos.soc_kratos
Expand Down
4 changes: 0 additions & 4 deletions salt/allowed_states.map.jinja
Original file line number Diff line number Diff line change
Expand Up @@ -219,10 +219,6 @@
{% do allowed_states.append('kibana.secrets') %}
{% endif %}

{% if grains.role in ['so-eval', 'so-standalone', 'so-managersearch', 'so-heavynode', 'so-manager'] %}
{% do allowed_states.append('curator') %}
{% endif %}

{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch'] %}
{% do allowed_states.append('elastalert') %}
{% endif %}
Expand Down
1 change: 0 additions & 1 deletion salt/common/tools/sbin/so-image-common
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,6 @@ container_list() {
)
elif [ $MANAGERCHECK != 'so-helix' ]; then
TRUSTED_CONTAINERS=(
"so-curator"
"so-elastalert"
"so-elastic-agent"
"so-elastic-agent-builder"
Expand Down
1 change: 1 addition & 0 deletions salt/common/tools/sbin/so-log-check
Original file line number Diff line number Diff line change
Expand Up @@ -144,6 +144,7 @@ if [[ $EXCLUDE_FALSE_POSITIVE_ERRORS == 'Y' ]]; then
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|status 200" # false positive (request successful, contained error string in content)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|app_layer.error" # false positive (suricata 7) in stats.log e.g. app_layer.error.imap.parser | Total | 0
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|is not an ip string literal" # false positive (Open Canary logging out blank IP addresses)
EXCLUDED_ERRORS="$EXCLUDED_ERRORS|cannot join on an empty table" # false positive (InfluxDB flux query, import nodes)
fi

if [[ $EXCLUDE_KNOWN_ERRORS == 'Y' ]]; then
Expand Down
13 changes: 9 additions & 4 deletions salt/common/tools/sbin/so-nsm-clear
Original file line number Diff line number Diff line change
Expand Up @@ -41,8 +41,13 @@ done
if [ $SKIP -ne 1 ]; then
# Inform user we are about to delete all data
echo
echo "This script will delete all NIDS data (PCAP, Suricata, Zeek)"
echo "If you would like to proceed, please type "AGREE" and hit ENTER."
echo "This script will delete all NSM data from /nsm."
echo
echo "This includes Suricata data, Zeek data, and full packet capture (PCAP)."
echo
echo "This will NOT delete any Suricata or Zeek logs that have already been ingested into Elasticsearch."
echo
echo "If you would like to proceed, then type AGREE and press ENTER."
echo
# Read user input
read INPUT
Expand All @@ -54,8 +59,8 @@ delete_pcap() {
[ -d $PCAP_DATA ] && so-pcap-stop && rm -rf $PCAP_DATA/* && so-pcap-start
}
delete_suricata() {
SURI_LOG="/opt/so/log/suricata/eve.json"
[ -f $SURI_LOG ] && so-suricata-stop && rm -f $SURI_LOG && so-suricata-start
SURI_LOG="/nsm/suricata/"
[ -d $SURI_LOG ] && so-suricata-stop && rm -rf $SURI_LOG/* && so-suricata-start
}
delete_zeek() {
ZEEK_LOG="/nsm/zeek/logs/"
Expand Down
81 changes: 0 additions & 81 deletions salt/curator/config.sls

This file was deleted.

34 changes: 0 additions & 34 deletions salt/curator/defaults.yaml

This file was deleted.

35 changes: 0 additions & 35 deletions salt/curator/disabled.sls

This file was deleted.

81 changes: 0 additions & 81 deletions salt/curator/enabled.sls

This file was deleted.

32 changes: 0 additions & 32 deletions salt/curator/files/action/delete.yml

This file was deleted.

Loading
Loading