Skip to content

Commit

Permalink
Merge pull request #3209 from Security-Onion-Solutions/dev
Browse files Browse the repository at this point in the history
2.3.30
  • Loading branch information
TOoSmOotH authored Mar 1, 2021
2 parents 2df871a + 0d70d2e commit d99acdb
Show file tree
Hide file tree
Showing 4 changed files with 17 additions and 4 deletions.
8 changes: 4 additions & 4 deletions VERIFY_ISO.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,9 +5,9 @@
2.3.30 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.30.iso

MD5: 7716A56E0F46FA29422B07B30235417B
SHA1: D01C26E4391C80FF690384C1DB77550EA4C1E239
SHA256: 3BB0CE7F3F84A0D26B00EAF30F7AEB42A3B5C7E9D8E3BA7E160577B1FA3830F6
MD5: 65202BA0F7661A5E27087F097B8E571E
SHA1: 14E842E39EDBB55A104263281CF25BF88A2E9D67
SHA256: 210B37B9E3DFC827AFE2940E2C87B175ADA968EDD04298A5926F63D9269847B7

Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.30.iso.sig
Expand Down Expand Up @@ -39,7 +39,7 @@ gpg --verify securityonion-2.3.30.iso.sig securityonion-2.3.30.iso

The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Mon 01 Mar 2021 10:23:05 AM EST using RSA key ID FE507013
gpg: Signature made Mon 01 Mar 2021 02:15:28 PM EST using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <[email protected]>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Expand Down
10 changes: 10 additions & 0 deletions salt/telegraf/etc/telegraf.conf
Original file line number Diff line number Diff line change
Expand Up @@ -684,8 +684,10 @@
"/scripts/stenoloss.sh",
"/scripts/suriloss.sh",
"/scripts/checkfiles.sh",
{% if salt['pillar.get']('global:mdengine', 'ZEEK') == 'ZEEK' %}
"/scripts/zeekloss.sh",
"/scripts/zeekcaptureloss.sh",
{% endif %}
"/scripts/oldpcap.sh",
"/scripts/raid.sh"
]
Expand All @@ -697,8 +699,10 @@
"/scripts/stenoloss.sh",
"/scripts/suriloss.sh",
"/scripts/checkfiles.sh",
{% if salt['pillar.get']('global:mdengine', 'ZEEK') == 'ZEEK' %}
"/scripts/zeekloss.sh",
"/scripts/zeekcaptureloss.sh",
{% endif %}
"/scripts/oldpcap.sh",
"/scripts/eps.sh",
"/scripts/raid.sh"
Expand All @@ -713,8 +717,10 @@
"/scripts/stenoloss.sh",
"/scripts/suriloss.sh",
"/scripts/checkfiles.sh",
{% if salt['pillar.get']('global:mdengine', 'ZEEK') == 'ZEEK' %}
"/scripts/zeekloss.sh",
"/scripts/zeekcaptureloss.sh",
{% endif %}
"/scripts/oldpcap.sh",
"/scripts/eps.sh",
"/scripts/raid.sh"
Expand All @@ -728,8 +734,10 @@
"/scripts/stenoloss.sh",
"/scripts/suriloss.sh",
"/scripts/checkfiles.sh",
{% if salt['pillar.get']('global:mdengine', 'ZEEK') == 'ZEEK' %}
"/scripts/zeekloss.sh",
"/scripts/zeekcaptureloss.sh",
{% endif %}
"/scripts/oldpcap.sh",
"/scripts/influxdbsize.sh",
"/scripts/raid.sh"
Expand All @@ -742,8 +750,10 @@
"/scripts/stenoloss.sh",
"/scripts/suriloss.sh",
"/scripts/checkfiles.sh",
{% if salt['pillar.get']('global:mdengine', 'ZEEK') == 'ZEEK' %}
"/scripts/zeekloss.sh",
"/scripts/zeekcaptureloss.sh",
{% endif %}
"/scripts/oldpcap.sh",
"/scripts/helixeps.sh"
]
Expand Down
3 changes: 3 additions & 0 deletions salt/telegraf/init.sls
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,9 @@ tgrafsyncscripts:
- file_mode: 700
- template: jinja
- source: salt://telegraf/scripts
{% if salt['pillar.get']('global:mdengine', 'ZEEK') == 'SURICATA' %}
- exclude_pat: zeekcaptureloss.sh
{% endif %}
tgrafconf:
file.managed:
Expand Down
Binary file modified sigs/securityonion-2.3.30.iso.sig
Binary file not shown.

0 comments on commit d99acdb

Please sign in to comment.