Skip to content

Commit 42bc657

Browse files
authored
Merge pull request #15542 from Security-Onion-Solutions/2.4/dev
2.4.210
2 parents bf4cc7b + a9d2be8 commit 42bc657

File tree

301 files changed

+4133
-1938
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

301 files changed

+4133
-1938
lines changed

.github/DISCUSSION_TEMPLATE/2-4.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,8 @@ body:
3333
- 2.4.180
3434
- 2.4.190
3535
- 2.4.200
36+
- 2.4.201
37+
- 2.4.210
3638
- Other (please provide detail below)
3739
validations:
3840
required: true
@@ -94,7 +96,7 @@ body:
9496
attributes:
9597
label: Hardware Specs
9698
description: >
97-
Does your hardware meet or exceed the minimum requirements for your installation type as shown at https://docs.securityonion.net/en/2.4/hardware.html?
99+
Does your hardware meet or exceed the minimum requirements for your installation type as shown at https://securityonion.net/docs/hardware?
98100
options:
99101
-
100102
- Meets minimum requirements

DOWNLOAD_AND_VERIFY_ISO.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
1-
### 2.4.201-20260114 ISO image released on 2026/1/15
1+
### 2.4.210-20260302 ISO image released on 2026/03/02
22

33

44
### Download and Verify
55

6-
2.4.201-20260114 ISO image:
7-
https://download.securityonion.net/file/securityonion/securityonion-2.4.201-20260114.iso
6+
2.4.210-20260302 ISO image:
7+
https://download.securityonion.net/file/securityonion/securityonion-2.4.210-20260302.iso
88

9-
MD5: 20E926E433203798512EF46E590C89B9
10-
SHA1: 779E4084A3E1A209B494493B8F5658508B6014FA
11-
SHA256: 3D10E7C885AEC5C5D4F4E50F9644FF9728E8C0A2E36EBB8C96B32569685A7C40
9+
MD5: 575F316981891EBED2EE4E1F42A1F016
10+
SHA1: 600945E8823221CBC5F1C056084A71355308227E
11+
SHA256: A6AA6471125F07FA6E2796430E94BEAFDEF728E833E9728FDFA7106351EBC47E
1212

1313
Signature for ISO image:
14-
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.201-20260114.iso.sig
14+
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.210-20260302.iso.sig
1515

1616
Signing key:
1717
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
@@ -25,22 +25,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
2525

2626
Download the signature file for the ISO:
2727
```
28-
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.201-20260114.iso.sig
28+
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.210-20260302.iso.sig
2929
```
3030

3131
Download the ISO image:
3232
```
33-
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.201-20260114.iso
33+
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.210-20260302.iso
3434
```
3535

3636
Verify the downloaded ISO image using the signature file:
3737
```
38-
gpg --verify securityonion-2.4.201-20260114.iso.sig securityonion-2.4.201-20260114.iso
38+
gpg --verify securityonion-2.4.210-20260302.iso.sig securityonion-2.4.210-20260302.iso
3939
```
4040

4141
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
4242
```
43-
gpg: Signature made Wed 14 Jan 2026 05:23:39 PM EST using RSA key ID FE507013
43+
gpg: Signature made Mon 02 Mar 2026 11:55:24 AM EST using RSA key ID FE507013
4444
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
4545
gpg: WARNING: This key is not certified with a trusted signature!
4646
gpg: There is no indication that the signature belongs to the owner.
@@ -50,4 +50,4 @@ Primary key fingerprint: C804 A93D 36BE 0C73 3EA1 9644 7C10 60B7 FE50 7013
5050
If it fails to verify, try downloading again. If it still fails to verify, try downloading from another computer or another network.
5151

5252
Once you've verified the ISO image, you're ready to proceed to our Installation guide:
53-
https://docs.securityonion.net/en/2.4/installation.html
53+
https://securityonion.net/docs/installation

README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -27,24 +27,24 @@ Config
2727

2828
### Release Notes
2929

30-
https://docs.securityonion.net/en/2.4/release-notes.html
30+
https://securityonion.net/docs/release-notes
3131

3232
### Requirements
3333

34-
https://docs.securityonion.net/en/2.4/hardware.html
34+
https://securityonion.net/docs/hardware
3535

3636
### Download
3737

38-
https://docs.securityonion.net/en/2.4/download.html
38+
https://securityonion.net/docs/download
3939

4040
### Installation
4141

42-
https://docs.securityonion.net/en/2.4/installation.html
42+
https://securityonion.net/docs/installation
4343

4444
### FAQ
4545

46-
https://docs.securityonion.net/en/2.4/faq.html
46+
https://securityonion.net/docs/faq
4747

4848
### Feedback
4949

50-
https://docs.securityonion.net/en/2.4/community-support.html
50+
https://securityonion.net/docs/community-support

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2.4.201
1+
2.4.210

pillar/ca/init.sls

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
ca:
2+
server:

pillar/top.sls

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
base:
22
'*':
3+
- ca
34
- global.soc_global
45
- global.adv_global
56
- docker.soc_docker

salt/allowed_states.map.jinja

Lines changed: 5 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,7 @@
1515
'salt.minion-check',
1616
'sensoroni',
1717
'salt.lasthighstate',
18-
'salt.minion'
19-
] %}
20-
21-
{% set ssl_states = [
22-
'ssl',
18+
'salt.minion',
2319
'telegraf',
2420
'firewall',
2521
'schedule',
@@ -28,7 +24,7 @@
2824

2925
{% set manager_states = [
3026
'salt.master',
31-
'ca',
27+
'ca.server',
3228
'registry',
3329
'manager',
3430
'nginx',
@@ -75,57 +71,49 @@
7571
{# Map role-specific states #}
7672
{% set role_states = {
7773
'so-eval': (
78-
ssl_states +
7974
manager_states +
8075
sensor_states +
81-
elastic_stack_states | reject('equalto', 'logstash') | list
76+
elastic_stack_states | reject('equalto', 'logstash') | list +
77+
['logstash.ssl']
8278
),
8379
'so-heavynode': (
84-
ssl_states +
8580
sensor_states +
8681
['elasticagent', 'elasticsearch', 'logstash', 'redis', 'nginx']
8782
),
8883
'so-idh': (
89-
ssl_states +
9084
['idh']
9185
),
9286
'so-import': (
93-
ssl_states +
9487
manager_states +
9588
sensor_states | reject('equalto', 'strelka') | reject('equalto', 'healthcheck') | list +
96-
['elasticsearch', 'elasticsearch.auth', 'kibana', 'kibana.secrets', 'strelka.manager']
89+
['elasticsearch', 'elasticsearch.auth', 'kibana', 'kibana.secrets', 'logstash.ssl', 'strelka.manager']
9790
),
9891
'so-manager': (
99-
ssl_states +
10092
manager_states +
10193
['salt.cloud', 'libvirt.packages', 'libvirt.ssh.users', 'strelka.manager'] +
10294
stig_states +
10395
kafka_states +
10496
elastic_stack_states
10597
),
10698
'so-managerhype': (
107-
ssl_states +
10899
manager_states +
109100
['salt.cloud', 'strelka.manager', 'hypervisor', 'libvirt'] +
110101
stig_states +
111102
kafka_states +
112103
elastic_stack_states
113104
),
114105
'so-managersearch': (
115-
ssl_states +
116106
manager_states +
117107
['salt.cloud', 'libvirt.packages', 'libvirt.ssh.users', 'strelka.manager'] +
118108
stig_states +
119109
kafka_states +
120110
elastic_stack_states
121111
),
122112
'so-searchnode': (
123-
ssl_states +
124113
['kafka.ca', 'kafka.ssl', 'elasticsearch', 'logstash', 'nginx'] +
125114
stig_states
126115
),
127116
'so-standalone': (
128-
ssl_states +
129117
manager_states +
130118
['salt.cloud', 'libvirt.packages', 'libvirt.ssh.users'] +
131119
sensor_states +
@@ -134,29 +122,24 @@
134122
elastic_stack_states
135123
),
136124
'so-sensor': (
137-
ssl_states +
138125
sensor_states +
139126
['nginx'] +
140127
stig_states
141128
),
142129
'so-fleet': (
143-
ssl_states +
144130
stig_states +
145131
['logstash', 'nginx', 'healthcheck', 'elasticfleet']
146132
),
147133
'so-receiver': (
148-
ssl_states +
149134
kafka_states +
150135
stig_states +
151136
['logstash', 'redis']
152137
),
153138
'so-hypervisor': (
154-
ssl_states +
155139
stig_states +
156140
['hypervisor', 'libvirt']
157141
),
158142
'so-desktop': (
159-
['ssl', 'docker_clean', 'telegraf'] +
160143
stig_states
161144
)
162145
} %}

salt/bpf/macros.jinja

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,12 @@
11
{% macro remove_comments(bpfmerged, app) %}
22

33
{# remove comments from the bpf #}
4+
{% set app_list = [] %}
45
{% for bpf in bpfmerged[app] %}
5-
{% if bpf.strip().startswith('#') %}
6-
{% do bpfmerged[app].pop(loop.index0) %}
6+
{% if not bpf.strip().startswith('#') %}
7+
{% do app_list.append(bpf) %}
78
{% endif %}
89
{% endfor %}
10+
{% do bpfmerged.update({app: app_list}) %}
911

1012
{% endmacro %}

salt/bpf/pcap.map.jinja

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
{% endif %}
1414

1515
{% if PCAPBPF %}
16-
{% set PCAP_BPF_CALC = salt['cmd.run_all']('/usr/sbin/so-bpf-compile ' ~ GLOBALS.sensor.interface ~ ' ' ~ PCAPBPF|join(" "), cwd='/root') %}
16+
{% set PCAP_BPF_CALC = salt['cmd.script']('salt://common/tools/sbin/so-bpf-compile', GLOBALS.sensor.interface + ' ' + PCAPBPF|join(" "),cwd='/root') %}
1717
{% if PCAP_BPF_CALC['retcode'] == 0 %}
1818
{% set PCAP_BPF_STATUS = 1 %}
1919
{% set STENO_BPF_COMPILED = ",\\\"--filter=" + PCAP_BPF_CALC['stdout'] + "\\\"" %}

salt/bpf/suricata.map.jinja

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
{% set SURICATABPF = BPFMERGED.suricata %}
1010

1111
{% if SURICATABPF %}
12-
{% set SURICATA_BPF_CALC = salt['cmd.run_all']('/usr/sbin/so-bpf-compile ' ~ GLOBALS.sensor.interface ~ ' ' ~ SURICATABPF|join(" "), cwd='/root') %}
12+
{% set SURICATA_BPF_CALC = salt['cmd.script']('salt://common/tools/sbin/so-bpf-compile', GLOBALS.sensor.interface + ' ' + SURICATABPF|join(" "),cwd='/root') %}
1313
{% if SURICATA_BPF_CALC['retcode'] == 0 %}
1414
{% set SURICATA_BPF_STATUS = 1 %}
1515
{% endif %}

0 commit comments

Comments
 (0)