Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
42 commits
Select commit Hold shift + click to select a range
a771573
remove idstools
defensivedepth Sep 17, 2025
ded520c
Merge remote-tracking branch 'origin/2.4/dev' into idstools-refactor
defensivedepth Sep 17, 2025
2f6fb71
Merge remote-tracking branch 'origin/2.4/dev' into idstools-refactor
defensivedepth Nov 6, 2025
11518f6
idstools removal refactor
defensivedepth Nov 11, 2025
13789bc
idstools removal refactor
defensivedepth Nov 11, 2025
3a8a6bf
idstools removal refactor
defensivedepth Nov 11, 2025
55bbbdb
idstools removal refactor
defensivedepth Nov 11, 2025
1f24796
Fix ETPRO check
defensivedepth Nov 12, 2025
9a6ff75
Merge remote-tracking branch 'origin/2.4/dev' into idstools-refactor
defensivedepth Nov 12, 2025
81d7c31
remove dupe
defensivedepth Nov 12, 2025
573dded
refactor to hash
defensivedepth Nov 13, 2025
37b3fd9
add detections backup
defensivedepth Nov 13, 2025
b2606b6
fix perms
defensivedepth Nov 13, 2025
f047677
Check correct files
defensivedepth Nov 14, 2025
431e5ab
Extract ETPRO key if found
defensivedepth Nov 14, 2025
af7f7d0
Fix file paths
defensivedepth Nov 17, 2025
1b55642
Refactor rules location
defensivedepth Nov 18, 2025
148ef7e
add default ruleset
defensivedepth Nov 18, 2025
ced3af8
Refactor for Airgap
defensivedepth Nov 25, 2025
4bb0a7c
Merge remote-tracking branch 'origin/2.4/dev' into idstools-refactor
defensivedepth Nov 25, 2025
1284150
Move to manager init
defensivedepth Nov 27, 2025
89a9106
Add context
defensivedepth Nov 29, 2025
87477ae
Removed uneeded bind
defensivedepth Nov 29, 2025
65c96b2
Add error handling
defensivedepth Nov 29, 2025
e96cfd3
Refactor for simplicity
defensivedepth Nov 29, 2025
bda83a4
Remove header
defensivedepth Nov 29, 2025
999f83c
Create dir earlier
defensivedepth Dec 1, 2025
c372cd5
Merge remote-tracking branch 'origin/2.4/dev' into idstools-refactor
defensivedepth Dec 1, 2025
8abd4c9
Remove idstools files
defensivedepth Dec 2, 2025
79c9749
Merge remote-tracking branch 'origin/2.4/dev' into idstools-refactor
defensivedepth Dec 2, 2025
52f70dc
Cleanup idstools
defensivedepth Dec 2, 2025
23575fd
edit actual file
defensivedepth Dec 3, 2025
41b3ac7
Backup salt master config
defensivedepth Dec 3, 2025
822c411
Update version to 2.4.0-delta
defensivedepth Dec 3, 2025
f15a39c
Add historical hashes
defensivedepth Dec 3, 2025
9304513
Add support for suricata rules load status
defensivedepth Dec 4, 2025
dba087a
Update version from 2.4.0-delta to 2.4.200
defensivedepth Dec 5, 2025
b7ad985
Add cron.abset
defensivedepth Dec 5, 2025
3f9a9b7
tweak threshold
defensivedepth Dec 5, 2025
44f5e66
Merge branch '2.4/dev' into idstools-refactor
defensivedepth Dec 5, 2025
a6b19c4
Remove idstools config from manager pillar file
defensivedepth Dec 5, 2025
bef8577
Merge branch 'idstools-refactor' of https://github.com/Security-Onion…
defensivedepth Dec 5, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 0 additions & 6 deletions pillar/top.sls
Original file line number Diff line number Diff line change
Expand Up @@ -43,8 +43,6 @@ base:
- secrets
- manager.soc_manager
- manager.adv_manager
- idstools.soc_idstools
- idstools.adv_idstools
- logstash.nodes
- logstash.soc_logstash
- logstash.adv_logstash
Expand Down Expand Up @@ -117,8 +115,6 @@ base:
- elastalert.adv_elastalert
- manager.soc_manager
- manager.adv_manager
- idstools.soc_idstools
- idstools.adv_idstools
- soc.soc_soc
- soc.adv_soc
- kibana.soc_kibana
Expand Down Expand Up @@ -158,8 +154,6 @@ base:
{% endif %}
- secrets
- healthcheck.standalone
- idstools.soc_idstools
- idstools.adv_idstools
- kratos.soc_kratos
- kratos.adv_kratos
- hydra.soc_hydra
Expand Down
2 changes: 0 additions & 2 deletions salt/allowed_states.map.jinja
Original file line number Diff line number Diff line change
Expand Up @@ -38,8 +38,6 @@
'hydra',
'elasticfleet',
'elastic-fleet-package-registry',
'idstools',
'suricata.manager',
'utility'
] %}

Expand Down
3 changes: 0 additions & 3 deletions salt/common/tools/sbin/so-image-common
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ container_list() {
if [ $MANAGERCHECK == 'so-import' ]; then
TRUSTED_CONTAINERS=(
"so-elasticsearch"
"so-idstools"
"so-influxdb"
"so-kibana"
"so-kratos"
Expand All @@ -49,7 +48,6 @@ container_list() {
"so-elastic-fleet-package-registry"
"so-elasticsearch"
"so-idh"
"so-idstools"
"so-influxdb"
"so-kafka"
"so-kibana"
Expand All @@ -69,7 +67,6 @@ container_list() {
)
else
TRUSTED_CONTAINERS=(
"so-idstools"
"so-elasticsearch"
"so-logstash"
"so-nginx"
Expand Down
2 changes: 1 addition & 1 deletion salt/common/tools/sbin_jinja/so-import-pcap
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ function suricata() {
docker run --rm \
-v /opt/so/conf/suricata/suricata.yaml:/etc/suricata/suricata.yaml:ro \
-v /opt/so/conf/suricata/threshold.conf:/etc/suricata/threshold.conf:ro \
-v /opt/so/conf/suricata/rules:/etc/suricata/rules:ro \
-v /opt/so/rules/suricata/:/etc/suricata/rules:ro \
-v ${LOG_PATH}:/var/log/suricata/:rw \
-v ${NSM_PATH}/:/nsm/:rw \
-v "$PCAP:/input.pcap:ro" \
Expand Down
5 changes: 0 additions & 5 deletions salt/docker/defaults.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -24,11 +24,6 @@ docker:
custom_bind_mounts: []
extra_hosts: []
extra_env: []
'so-idstools':
final_octet: 25
custom_bind_mounts: []
extra_hosts: []
extra_env: []
'so-influxdb':
final_octet: 26
port_bindings:
Expand Down
3 changes: 1 addition & 2 deletions salt/docker/soc_docker.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,6 @@ docker:
forcedType: "[]string"
so-elastic-fleet: *dockerOptions
so-elasticsearch: *dockerOptions
so-idstools: *dockerOptions
so-influxdb: *dockerOptions
so-kibana: *dockerOptions
so-kratos: *dockerOptions
Expand Down Expand Up @@ -102,4 +101,4 @@ docker:
multiline: True
forcedType: "[]string"
so-zeek: *dockerOptions
so-kafka: *dockerOptions
so-kafka: *dockerOptions
65 changes: 0 additions & 65 deletions salt/idstools/config.sls

This file was deleted.

10 changes: 0 additions & 10 deletions salt/idstools/defaults.yaml

This file was deleted.

31 changes: 0 additions & 31 deletions salt/idstools/disabled.sls

This file was deleted.

91 changes: 0 additions & 91 deletions salt/idstools/enabled.sls

This file was deleted.

16 changes: 0 additions & 16 deletions salt/idstools/etc/disable.conf

This file was deleted.

16 changes: 0 additions & 16 deletions salt/idstools/etc/enable.conf

This file was deleted.

12 changes: 0 additions & 12 deletions salt/idstools/etc/modify.conf

This file was deleted.

23 changes: 0 additions & 23 deletions salt/idstools/etc/rulecat.conf

This file was deleted.

13 changes: 0 additions & 13 deletions salt/idstools/init.sls

This file was deleted.

7 changes: 0 additions & 7 deletions salt/idstools/map.jinja

This file was deleted.

1 change: 0 additions & 1 deletion salt/idstools/rules/local.rules

This file was deleted.

Loading
Loading