mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 09:12:45 +01:00
[fix] More condition changes for Helix
This commit is contained in:
@@ -45,8 +45,10 @@
|
|||||||
{% set DOCKER_OPTIONS = salt['pillar.get']('logstash:docker_options', {}) %}
|
{% set DOCKER_OPTIONS = salt['pillar.get']('logstash:docker_options', {}) %}
|
||||||
{% set TEMPLATES = salt['pillar.get']('elasticsearch:templates', {}) %}
|
{% set TEMPLATES = salt['pillar.get']('elasticsearch:templates', {}) %}
|
||||||
|
|
||||||
|
{% if grains['role'] != 'so-helix' %}
|
||||||
include:
|
include:
|
||||||
- elasticsearch
|
- elasticsearch
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
# Create the logstash group
|
# Create the logstash group
|
||||||
logstashgroup:
|
logstashgroup:
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
{% set MAINIP = salt['grains.get']('ip_interfaces').get(MAININT)[0] %}
|
{% set MAINIP = salt['grains.get']('ip_interfaces').get(MAININT)[0] %}
|
||||||
{% set CUSTOM_FLEET_HOSTNAME = salt['pillar.get']('global:fleet_custom_hostname', None) %}
|
{% set CUSTOM_FLEET_HOSTNAME = salt['pillar.get']('global:fleet_custom_hostname', None) %}
|
||||||
|
|
||||||
{% if grains.id.split('_')|last in ['manager', 'eval', 'standalone', 'import'] %}
|
{% if grains.id.split('_')|last in ['manager', 'eval', 'standalone', 'import', 'helixsensor'] %}
|
||||||
{% set trusttheca_text = salt['cp.get_file_str']('/etc/pki/ca.crt')|replace('\n', '') %}
|
{% set trusttheca_text = salt['cp.get_file_str']('/etc/pki/ca.crt')|replace('\n', '') %}
|
||||||
{% set ca_server = grains.id %}
|
{% set ca_server = grains.id %}
|
||||||
{% else %}
|
{% else %}
|
||||||
|
|||||||
@@ -61,9 +61,7 @@ base:
|
|||||||
- suricata
|
- suricata
|
||||||
- zeek
|
- zeek
|
||||||
- redis
|
- redis
|
||||||
{%- if LOGSTASH %}
|
|
||||||
- logstash
|
- logstash
|
||||||
{%- endif %}
|
|
||||||
{%- if FILEBEAT %}
|
{%- if FILEBEAT %}
|
||||||
- filebeat
|
- filebeat
|
||||||
{%- endif %}
|
{%- endif %}
|
||||||
|
|||||||
@@ -526,10 +526,13 @@ set_redirect >> $setup_log 2>&1
|
|||||||
{
|
{
|
||||||
generate_passwords;
|
generate_passwords;
|
||||||
secrets_pillar;
|
secrets_pillar;
|
||||||
add_socore_user_manager;
|
|
||||||
} >> $setup_log 2>&1
|
} >> $setup_log 2>&1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
if [[ $is_manager || $is_import || $is_helix ]]; then
|
||||||
|
add_socore_user_manager >> $setup_log 2>&1
|
||||||
|
fi
|
||||||
|
|
||||||
if [[ $is_manager && ! $is_eval ]]; then
|
if [[ $is_manager && ! $is_eval ]]; then
|
||||||
add_soremote_user_manager >> $setup_log 2>&1
|
add_soremote_user_manager >> $setup_log 2>&1
|
||||||
fi
|
fi
|
||||||
@@ -680,8 +683,10 @@ set_redirect >> $setup_log 2>&1
|
|||||||
set_progress_str 63 "$(print_salt_state_apply 'common')"
|
set_progress_str 63 "$(print_salt_state_apply 'common')"
|
||||||
salt-call state.apply -l info common >> $setup_log 2>&1
|
salt-call state.apply -l info common >> $setup_log 2>&1
|
||||||
|
|
||||||
set_progress_str 64 "$(print_salt_state_apply 'nginx')"
|
if [[ ! $is_helix ]]; then
|
||||||
salt-call state.apply -l info nginx >> $setup_log 2>&1
|
set_progress_str 64 "$(print_salt_state_apply 'nginx')"
|
||||||
|
salt-call state.apply -l info nginx >> $setup_log 2>&1
|
||||||
|
fi
|
||||||
|
|
||||||
if [[ $is_manager || $is_node || $is_import ]]; then
|
if [[ $is_manager || $is_node || $is_import ]]; then
|
||||||
set_progress_str 64 "$(print_salt_state_apply 'elasticsearch')"
|
set_progress_str 64 "$(print_salt_state_apply 'elasticsearch')"
|
||||||
@@ -782,7 +787,7 @@ set_redirect >> $setup_log 2>&1
|
|||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [[ $is_manager || $is_helix || $is_import ]]; then
|
if [[ $is_manager || $is_import ]]; then
|
||||||
set_progress_str 82 "$(print_salt_state_apply 'utility')"
|
set_progress_str 82 "$(print_salt_state_apply 'utility')"
|
||||||
salt-call state.apply -l info utility >> $setup_log 2>&1
|
salt-call state.apply -l info utility >> $setup_log 2>&1
|
||||||
fi
|
fi
|
||||||
|
|||||||
Reference in New Issue
Block a user