Skip to content

Commit dfcf7a4

Browse files
authored
Merge pull request #13091 from Security-Onion-Solutions/2.4/dev
2.4.70
2 parents b658c82 + 8865121 commit dfcf7a4

File tree

174 files changed

+4236
-4104
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

174 files changed

+4236
-4104
lines changed

.github/workflows/close-threads.yml

+33
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
name: 'Close Threads'
2+
3+
on:
4+
schedule:
5+
- cron: '50 1 * * *'
6+
workflow_dispatch:
7+
8+
permissions:
9+
issues: write
10+
pull-requests: write
11+
discussions: write
12+
13+
concurrency:
14+
group: lock-threads
15+
16+
jobs:
17+
close-threads:
18+
if: github.repository_owner == 'security-onion-solutions'
19+
runs-on: ubuntu-latest
20+
permissions:
21+
issues: write
22+
pull-requests: write
23+
steps:
24+
- uses: actions/stale@v5
25+
with:
26+
days-before-issue-stale: -1
27+
days-before-issue-close: 60
28+
stale-issue-message: "This issue is stale because it has been inactive for an extended period. Stale issues convey that the issue, while important to someone, is not critical enough for the author, or other community members to work on, sponsor, or otherwise shepherd the issue through to a resolution."
29+
close-issue-message: "This issue was closed because it has been stale for an extended period. It will be automatically locked in 30 days, after which no further commenting will be available."
30+
days-before-pr-stale: 45
31+
days-before-pr-close: 60
32+
stale-pr-message: "This PR is stale because it has been inactive for an extended period. The longer a PR remains stale the more out of date with the main branch it becomes."
33+
close-pr-message: "This PR was closed because it has been stale for an extended period. It will be automatically locked in 30 days. If there is still a commitment to finishing this PR re-open it before it is locked."

.github/workflows/lock-threads.yml

+2-18
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ name: 'Lock Threads'
22

33
on:
44
schedule:
5-
- cron: '50 1 * * *'
5+
- cron: '50 2 * * *'
66
workflow_dispatch:
77

88
permissions:
@@ -14,24 +14,8 @@ concurrency:
1414
group: lock-threads
1515

1616
jobs:
17-
close-threads:
18-
runs-on: ubuntu-latest
19-
permissions:
20-
issues: write
21-
pull-requests: write
22-
steps:
23-
- uses: actions/stale@v5
24-
with:
25-
days-before-issue-stale: -1
26-
days-before-issue-close: 60
27-
stale-issue-message: "This issue is stale because it has been inactive for an extended period. Stale issues convey that the issue, while important to someone, is not critical enough for the author, or other community members to work on, sponsor, or otherwise shepherd the issue through to a resolution."
28-
close-issue-message: "This issue was closed because it has been stale for an extended period. It will be automatically locked in 30 days, after which no further commenting will be available."
29-
days-before-pr-stale: 45
30-
days-before-pr-close: 60
31-
stale-pr-message: "This PR is stale because it has been inactive for an extended period. The longer a PR remains stale the more out of date with the main branch it becomes."
32-
close-pr-message: "This PR was closed because it has been stale for an extended period. It will be automatically locked in 30 days. If there is still a commitment to finishing this PR re-open it before it is locked."
33-
3417
lock-threads:
18+
if: github.repository_owner == 'security-onion-solutions'
3519
runs-on: ubuntu-latest
3620
steps:
3721
- uses: jertel/lock-threads@main

DOWNLOAD_AND_VERIFY_ISO.md

+11-11
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
1-
### 2.4.60-20240320 ISO image released on 2024/03/20
1+
### 2.4.70-20240529 ISO image released on 2024/05/29
22

33

44
### Download and Verify
55

6-
2.4.60-20240320 ISO image:
7-
https://download.securityonion.net/file/securityonion/securityonion-2.4.60-20240320.iso
6+
2.4.70-20240529 ISO image:
7+
https://download.securityonion.net/file/securityonion/securityonion-2.4.70-20240529.iso
88

9-
MD5: 178DD42D06B2F32F3870E0C27219821E
10-
SHA1: 73EDCD50817A7F6003FE405CF1808A30D034F89D
11-
SHA256: DD334B8D7088A7B78160C253B680D645E25984BA5CCAB5CC5C327CA72137FC06
9+
MD5: 8FCCF31C2470D1ABA380AF196B611DEC
10+
SHA1: EE5E8F8C14819E7A1FE423E6920531A97F39600B
11+
SHA256: EF5E781D50D50660F452ADC54FD4911296ECBECED7879FA8E04687337CA89BEC
1212

1313
Signature for ISO image:
14-
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.60-20240320.iso.sig
14+
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.70-20240529.iso.sig
1515

1616
Signing key:
1717
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
@@ -25,22 +25,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
2525

2626
Download the signature file for the ISO:
2727
```
28-
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.60-20240320.iso.sig
28+
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.70-20240529.iso.sig
2929
```
3030

3131
Download the ISO image:
3232
```
33-
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.60-20240320.iso
33+
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.70-20240529.iso
3434
```
3535

3636
Verify the downloaded ISO image using the signature file:
3737
```
38-
gpg --verify securityonion-2.4.60-20240320.iso.sig securityonion-2.4.60-20240320.iso
38+
gpg --verify securityonion-2.4.70-20240529.iso.sig securityonion-2.4.70-20240529.iso
3939
```
4040

4141
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
4242
```
43-
gpg: Signature made Tue 19 Mar 2024 03:17:58 PM EDT using RSA key ID FE507013
43+
gpg: Signature made Wed 29 May 2024 11:40:59 AM EDT using RSA key ID FE507013
4444
gpg: Good signature from "Security Onion Solutions, LLC <[email protected]>"
4545
gpg: WARNING: This key is not certified with a trusted signature!
4646
gpg: There is no indication that the signature belongs to the owner.

README.md

+8-5
Original file line numberDiff line numberDiff line change
@@ -8,19 +8,22 @@ Alerts
88
![Alerts](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/50_alerts.png)
99

1010
Dashboards
11-
![Dashboards](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/51_dashboards.png)
11+
![Dashboards](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/53_dashboards.png)
1212

1313
Hunt
14-
![Hunt](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/52_hunt.png)
14+
![Hunt](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/56_hunt.png)
15+
16+
Detections
17+
![Detections](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/57_detections.png)
1518

1619
PCAP
17-
![PCAP](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/53_pcap.png)
20+
![PCAP](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/62_pcap.png)
1821

1922
Grid
20-
![Grid](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/57_grid.png)
23+
![Grid](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/75_grid.png)
2124

2225
Config
23-
![Config](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/61_config.png)
26+
![Config](https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion-docs/2.4/images/87_config.png)
2427

2528
### Release Notes
2629

VERSION

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2.4.60
1+
2.4.70

pillar/top.sls

-10
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,6 @@ base:
4343
- soc.soc_soc
4444
- soc.adv_soc
4545
- soc.license
46-
- soctopus.soc_soctopus
47-
- soctopus.adv_soctopus
4846
- kibana.soc_kibana
4947
- kibana.adv_kibana
5048
- kratos.soc_kratos
@@ -61,8 +59,6 @@ base:
6159
- elastalert.adv_elastalert
6260
- backup.soc_backup
6361
- backup.adv_backup
64-
- soctopus.soc_soctopus
65-
- soctopus.adv_soctopus
6662
- minions.{{ grains.id }}
6763
- minions.adv_{{ grains.id }}
6864
- stig.soc_stig
@@ -108,8 +104,6 @@ base:
108104
- soc.soc_soc
109105
- soc.adv_soc
110106
- soc.license
111-
- soctopus.soc_soctopus
112-
- soctopus.adv_soctopus
113107
- kibana.soc_kibana
114108
- kibana.adv_kibana
115109
- strelka.soc_strelka
@@ -165,8 +159,6 @@ base:
165159
- soc.soc_soc
166160
- soc.adv_soc
167161
- soc.license
168-
- soctopus.soc_soctopus
169-
- soctopus.adv_soctopus
170162
- kibana.soc_kibana
171163
- kibana.adv_kibana
172164
- strelka.soc_strelka
@@ -262,8 +254,6 @@ base:
262254
- soc.soc_soc
263255
- soc.adv_soc
264256
- soc.license
265-
- soctopus.soc_soctopus
266-
- soctopus.adv_soctopus
267257
- kibana.soc_kibana
268258
- kibana.adv_kibana
269259
- backup.soc_backup

salt/allowed_states.map.jinja

+3-12
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,6 @@
3434
'suricata',
3535
'utility',
3636
'schedule',
37-
'soctopus',
3837
'tcpreplay',
3938
'docker_clean'
4039
],
@@ -66,6 +65,7 @@
6665
'registry',
6766
'manager',
6867
'nginx',
68+
'strelka.manager',
6969
'soc',
7070
'kratos',
7171
'influxdb',
@@ -92,6 +92,7 @@
9292
'nginx',
9393
'telegraf',
9494
'influxdb',
95+
'strelka.manager',
9596
'soc',
9697
'kratos',
9798
'elasticfleet',
@@ -101,7 +102,6 @@
101102
'suricata.manager',
102103
'utility',
103104
'schedule',
104-
'soctopus',
105105
'docker_clean',
106106
'stig'
107107
],
@@ -113,6 +113,7 @@
113113
'nginx',
114114
'telegraf',
115115
'influxdb',
116+
'strelka.manager',
116117
'soc',
117118
'kratos',
118119
'elastic-fleet-package-registry',
@@ -123,7 +124,6 @@
123124
'suricata.manager',
124125
'utility',
125126
'schedule',
126-
'soctopus',
127127
'docker_clean',
128128
'stig'
129129
],
@@ -157,7 +157,6 @@
157157
'healthcheck',
158158
'utility',
159159
'schedule',
160-
'soctopus',
161160
'tcpreplay',
162161
'docker_clean',
163162
'stig'
@@ -200,10 +199,6 @@
200199
],
201200
}, grain='role') %}
202201

203-
{% if grains.role in ['so-eval', 'so-manager', 'so-managersearch', 'so-standalone'] %}
204-
{% do allowed_states.append('mysql') %}
205-
{% endif %}
206-
207202
{%- if grains.role in ['so-sensor', 'so-eval', 'so-standalone', 'so-heavynode'] %}
208203
{% do allowed_states.append('zeek') %}
209204
{%- endif %}
@@ -229,10 +224,6 @@
229224
{% do allowed_states.append('elastalert') %}
230225
{% endif %}
231226

232-
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-managersearch'] %}
233-
{% do allowed_states.append('playbook') %}
234-
{% endif %}
235-
236227
{% if grains.role in ['so-manager', 'so-standalone', 'so-searchnode', 'so-managersearch', 'so-heavynode', 'so-receiver'] %}
237228
{% do allowed_states.append('logstash') %}
238229
{% endif %}

salt/bpf/soc_bpf.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
bpf:
22
pcap:
3-
description: List of BPF filters to apply to PCAP.
3+
description: List of BPF filters to apply to Stenographer.
44
multiline: True
55
forcedType: "[]string"
66
helpLink: bpf.html

salt/common/soup_scripts.sls

+40-6
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,16 @@
1-
{% import_yaml '/opt/so/saltstack/local/pillar/global/soc_global.sls' as SOC_GLOBAL %}
2-
{% if SOC_GLOBAL.global.airgap %}
3-
{% set UPDATE_DIR='/tmp/soagupdate/SecurityOnion' %}
4-
{% else %}
5-
{% set UPDATE_DIR='/tmp/sogh/securityonion' %}
6-
{% endif %}
1+
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
2+
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
3+
# https://securityonion.net/license; you may not use this file except in compliance with the
4+
# Elastic License 2.0.
5+
6+
{% if '2.4' in salt['cp.get_file_str']('/etc/soversion') %}
7+
8+
{% import_yaml '/opt/so/saltstack/local/pillar/global/soc_global.sls' as SOC_GLOBAL %}
9+
{% if SOC_GLOBAL.global.airgap %}
10+
{% set UPDATE_DIR='/tmp/soagupdate/SecurityOnion' %}
11+
{% else %}
12+
{% set UPDATE_DIR='/tmp/sogh/securityonion' %}
13+
{% endif %}
714

815
remove_common_soup:
916
file.absent:
@@ -13,6 +20,8 @@ remove_common_so-firewall:
1320
file.absent:
1421
- name: /opt/so/saltstack/default/salt/common/tools/sbin/so-firewall
1522

23+
# This section is used to put the scripts in place in the Salt file system
24+
# in case a state run tries to overwrite what we do in the next section.
1625
copy_so-common_common_tools_sbin:
1726
file.copy:
1827
- name: /opt/so/saltstack/default/salt/common/tools/sbin/so-common
@@ -41,6 +50,15 @@ copy_so-firewall_manager_tools_sbin:
4150
- force: True
4251
- preserve: True
4352

53+
copy_so-yaml_manager_tools_sbin:
54+
file.copy:
55+
- name: /opt/so/saltstack/default/salt/manager/tools/sbin/so-yaml.py
56+
- source: {{UPDATE_DIR}}/salt/manager/tools/sbin/so-yaml.py
57+
- force: True
58+
- preserve: True
59+
60+
# This section is used to put the new script in place so that it can be called during soup.
61+
# It is faster than calling the states that normally manage them to put them in place.
4462
copy_so-common_sbin:
4563
file.copy:
4664
- name: /usr/sbin/so-common
@@ -68,3 +86,19 @@ copy_so-firewall_sbin:
6886
- source: {{UPDATE_DIR}}/salt/manager/tools/sbin/so-firewall
6987
- force: True
7088
- preserve: True
89+
90+
copy_so-yaml_sbin:
91+
file.copy:
92+
- name: /usr/sbin/so-yaml.py
93+
- source: {{UPDATE_DIR}}/salt/manager/tools/sbin/so-yaml.py
94+
- force: True
95+
- preserve: True
96+
97+
{% else %}
98+
fix_23_soup_sbin:
99+
cmd.run:
100+
- name: curl -s -f -o /usr/sbin/soup https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.3/main/salt/common/tools/sbin/soup
101+
fix_23_soup_salt:
102+
cmd.run:
103+
- name: curl -s -f -o /opt/so/saltstack/defalt/salt/common/tools/sbin/soup https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.3/main/salt/common/tools/sbin/soup
104+
{% endif %}

salt/common/tools/sbin/so-checkin

+7-2
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,13 @@
55
# https://securityonion.net/license; you may not use this file except in compliance with the
66
# Elastic License 2.0.
77

8+
. /usr/sbin/so-common
89

10+
cat << EOF
911
10-
. /usr/sbin/so-common
12+
so-checkin will run a full salt highstate to apply all salt states. If a highstate is already running, this request will be queued and so it may pause for a few minutes before you see any more output. For more information about so-checkin and salt, please see:
13+
https://docs.securityonion.net/en/2.4/salt.html
14+
15+
EOF
1116

12-
salt-call state.highstate -l info
17+
salt-call state.highstate -l info queue=True

0 commit comments

Comments
 (0)