soc-deploy-misp

Deploy MISP threat intelligence platform on any Docker-ready Linux host. Official misp-docker project with automatic MariaDB memory tuning (prevents OOM on small VMs), API key generation via cake CLI, and credential management.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "soc-deploy-misp" with this command: npx skills add solomonneas/soc-deploy-misp

SOC Deploy: MISP (Malware Information Sharing Platform)

Deploy MISP threat intelligence platform on any Docker-ready Linux host using the official misp-docker project.

This skill does NOT create VMs. It expects an SSH target with Docker installed. Use hyperv-create-vm or proxmox-create-vm first if you need infrastructure.

When to Use

  • "deploy misp"
  • "set up misp"
  • "install misp"
  • "threat intel platform"
  • "ioc sharing platform"

User Inputs

ParameterDefaultRequired
SSH target-Yes (user@host)
Admin emailadmin@misp.localNo
Admin passwordChangeMe123!No
Host RAM (for buffer pool)4GBNo

Prerequisites Check

# SSH works
ssh <target> "echo OK"

# Docker + Compose v2
ssh <target> "docker --version && docker compose version"

# RAM check (need 3GB+ free)
ssh <target> "free -h | grep Mem"

Execution

Single command deployment

scp scripts/setup.sh <target>:~/
ssh <target> "bash ~/setup.sh 'admin@misp.local' '<password>'"

What setup.sh does

  1. Clone official misp-docker from GitHub
  2. Configure .env:
    • MISP_BASEURL, MISP_ADMIN_EMAIL, MISP_ADMIN_PASSPHRASE
    • Generate random MySQL passwords
    • Set INNODB_BUFFER_POOL_SIZE based on host RAM (CRITICAL)
  3. docker compose up -d
  4. Poll for MISP readiness (5-10 min on first boot for DB migrations)
  5. Generate API key via cake CLI:
    docker compose exec -T misp /var/www/MISP/app/Console/cake user change_authkey <email>
    
  6. Verify API with /servers/getVersion
  7. Save credentials to ~/misp/api-key.txt

Output to User

MISP deployed!

URL: https://<target>
Admin: admin@misp.local / <password>
API Key: <key>

MCP Connection:
  MISP_URL=https://<target>
  MISP_API_KEY=<key>
  MISP_VERIFY_SSL=false

Note: Self-signed HTTPS. Use curl -k for API calls.
Credentials saved to: ~/misp/api-key.txt

InnoDB Buffer Pool Sizing

The #1 failure on small VMs. Default buffer pool is 2GB, which kills MariaDB on 4GB hosts.

Host RAMINNODB_BUFFER_POOL_SIZE
4 GB512M
8 GB2048M
16 GB4096M

Critical Gotchas

See references/gotchas.md for full details:

  1. MariaDB OOM (showstopper): Default InnoDB buffer pool is 2GB. On 4GB hosts, MariaDB crashes instantly. MUST set INNODB_BUFFER_POOL_SIZE in .env
  2. Recovery from OOM: docker compose down -v to wipe failed DB volume, fix .env, restart
  3. First boot is slow: 5-10 min for DB schema creation and initial data load
  4. Self-signed HTTPS: Use curl -k for all API calls
  5. Advanced authkeys: Enabled by default. cake CLI is the most reliable key generation method
  6. MISP web UI: https://<ip> (port 443, not 80)

Timeout Strategy

Total: ~12-15 min (docker pull + first boot + setup). Split:

  • Turn 1: Clone, configure, docker compose up -d (~3 min + pull time)
  • Turn 2: Wait for health + generate API key (~5-7 min)

Pairs With

  • hyperv-create-vm - create a Hyper-V VM, then deploy MISP on it
  • proxmox-create-vm - create a Proxmox LXC/VM, then deploy MISP on it
  • soc-deploy-thehive - deploy TheHive alongside for case management

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

OpenClaw n8n Orchestrator

When the user wants to connect an OpenClaw agent to n8n workflows, create n8n webhook skills for OpenClaw, route agent API calls through n8n for credential i...

Registry SourceRecently Updated
3661Profile unavailable
Security

SecOpsAI for OpenClaw

Conversational SecOps for OpenClaw audit logs. Run the live detection pipeline, inspect findings, triage incidents, and get mitigation guidance — all from chat.

Registry SourceRecently Updated
3041Profile unavailable
Security

Claude Agent

作为项目经理操作 Claude Code 完全体。包含:任务执行(提示词设计→执行→监控→质量检查→迭代→汇报)。通过 tmux 操作交互式 CLI,通过 hooks + pane monitor 实现异步唤醒。NOT for: 简单单行编辑(用 edit)、读文件(用 read)、快速问答(直接回答)。

Registry SourceRecently Updated
2570Profile unavailable
Security

Update Scout

Automate update tracking for OpenClaw and any other GitHub-released tools. Scout monitors your watchlist weekly, reviews release notes with a security lens,...

Registry SourceRecently Updated
2820Profile unavailable