ssl things for so-receiver

This commit is contained in:
m0duspwnens
2021-12-08 09:08:46 -05:00
parent c80059efb0
commit 1ef63f3a23
2 changed files with 6 additions and 2 deletions

View File

@@ -46,7 +46,9 @@
include: include:
- ssl - ssl
{% if grains.role not in ['so-receiver'] %}
- elasticsearch - elasticsearch
{% endif %}
# Create the logstash group # Create the logstash group
logstashgroup: logstashgroup:
@@ -210,8 +212,10 @@ so-logstash:
{% else %} {% else %}
- x509: pki_public_ca_crt - x509: pki_public_ca_crt
{% endif %} {% endif %}
{% if grains.role not in ['so-receiver'] %}
- file: cacertz - file: cacertz
- file: capemz - file: capemz
{% endif %}
append_so-logstash_so-status.conf: append_so-logstash_so-status.conf:
file.append: file.append:

View File

@@ -115,7 +115,7 @@ influxkeyperms:
- mode: 640 - mode: 640
- group: 939 - group: 939
{% if grains['role'] in ['so-manager', 'so-eval', 'so-helix', 'so-managersearch', 'so-standalone', 'so-import', 'so-heavynode', 'so-fleet'] %} {% if grains['role'] in ['so-manager', 'so-eval', 'so-helix', 'so-managersearch', 'so-standalone', 'so-import', 'so-heavynode', 'so-fleet', 'so-receiver'] %}
# Create a cert for Redis encryption # Create a cert for Redis encryption
redis_key: redis_key:
x509.private_key_managed: x509.private_key_managed:
@@ -484,7 +484,7 @@ fleetkeyperms:
- group: 939 - group: 939
{% endif %} {% endif %}
{% if grains['role'] in ['so-sensor', 'so-manager', 'so-node', 'so-eval', 'so-helix', 'so-managersearch', 'so-heavynode', 'so-fleet', 'so-standalone', 'so-import'] %} {% if grains['role'] in ['so-sensor', 'so-manager', 'so-node', 'so-eval', 'so-helix', 'so-managersearch', 'so-heavynode', 'so-fleet', 'so-standalone', 'so-import', 'so-receiver'] %}
fbcertdir: fbcertdir:
file.directory: file.directory: