Generate certs for use with elasticfleet kafka output policy

Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
This commit is contained in:
reyesj2
2024-04-03 14:34:07 -04:00
parent dc27bbb01d
commit 13105c4ab3

View File

@@ -702,27 +702,26 @@ kafka_crt:
- onchanges: - onchanges:
- x509: /etc/pki/kafka.key - x509: /etc/pki/kafka.key
# Kafka needs a keystore so just creating a new key / cert for that purpose elasticfleet_kafka_key:
etc_kafka_logstash_key:
x509.private_key_managed: x509.private_key_managed:
- name: /etc/pki/kafka-logstash.key - name: /etc/pki/elasticfleet-kafka.keyn
- keysize: 4096 - keysize: 4096
- backup: True - backup: True
- new: True - new: True
{% if salt['file.file_exists']('/etc/pki/kakfa-logstash.key') -%} {% if salt['file.file_exists']('/etc/pki/elasticfleet-kafka.key') -%}
- prereq: - prereq:
- x509: etc_kafka_logstash_crt - x509: elasticfleet_kafka_crt
{%- endif %} {%- endif %}
- retry: - retry:
attempts: 5 attempts: 5
interval: 30 interval: 30
etc_kafka_logstash_crt: elasticfleet_kafka_crt:
x509.certificate_managed: x509.certificate_managed:
- name: /etc/pki/kafka-logstash.crt - name: /etc/pki/elasticfleet-kafka.crt
- ca_server: {{ ca_server }} - ca_server: {{ ca_server }}
- signing_policy: elasticfleet - signing_policy: elasticfleet
- private_key: /etc/pki/kafka-logstash.key - private_key: /etc/pki/elasticfleet-kafka.key
- CN: {{ GLOBALS.hostname }} - CN: {{ GLOBALS.hostname }}
- subjectAltName: DNS:{{ GLOBALS.hostname }}, IP:{{ GLOBALS.node_ip }} - subjectAltName: DNS:{{ GLOBALS.hostname }}, IP:{{ GLOBALS.node_ip }}
- days_remaining: 0 - days_remaining: 0
@@ -732,10 +731,6 @@ etc_kafka_logstash_crt:
- retry: - retry:
attempts: 5 attempts: 5
interval: 30 interval: 30
cmd.run:
- name: "/usr/bin/openssl pkcs12 -inkey /etc/pki/kafka-logstash.key -in /etc/pki/kafka-logstash.crt -export -out /etc/pki/kafka-logstash.p12 -nodes -passout pass:"
- onchanges:
- x509: etc_kafka_logstash_key
kafka_key_perms: kafka_key_perms:
file.managed: file.managed:
@@ -756,7 +751,7 @@ kafka_crt_perms:
kafka_logstash_cert_perms: kafka_logstash_cert_perms:
file.managed: file.managed:
- replace: False - replace: False
- name: /etc/pki/kafka-logstash.crt - name: /etc/pki/elasticfleet-kafka.crt
- mode: 640 - mode: 640
- user: 960 - user: 960
- group: 939 - group: 939
@@ -764,27 +759,10 @@ kafka_logstash_cert_perms:
kafka_logstash_key_perms: kafka_logstash_key_perms:
file.managed: file.managed:
- replace: False - replace: False
- name: /etc/pki/kafka-logstash.key - name: /etc/pki/elasticfleet-kafka.key
- mode: 640 - mode: 640
- user: 960 - user: 960
- group: 939 - group: 939
kafka_logstash_keystore_perms:
file.managed:
- replace: False
- name: /etc/pki/kafka-logstash.p12
- mode: 640
- user: 960
- group: 939
kafka_keystore_perms:
file.managed:
- replace: False
- name: /etc/pki/kafka.p12
- mode: 640
- user: 960
- group: 939
{% endif %} {% endif %}
{% else %} {% else %}