mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 17:22:49 +01:00
Merge pull request #6195 from Security-Onion-Solutions/issue/6146
Issue/6146
This commit is contained in:
@@ -110,6 +110,9 @@ base:
|
|||||||
- elasticsearch.eval
|
- elasticsearch.eval
|
||||||
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
|
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
|
||||||
- elasticsearch.auth
|
- elasticsearch.auth
|
||||||
|
{% endif %}
|
||||||
|
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
|
||||||
|
- kibana.secrets
|
||||||
{% endif %}
|
{% endif %}
|
||||||
- global
|
- global
|
||||||
- minions.{{ grains.id }}
|
- minions.{{ grains.id }}
|
||||||
|
|||||||
@@ -6,8 +6,10 @@
|
|||||||
{% do KIBANACONFIG.kibana.config.xpack.update({'security': {'authc': {'providers': {'anonymous': {'anonymous1': {'order': 0, 'credentials': 'elasticsearch_anonymous_user'}}}}}}) %}
|
{% do KIBANACONFIG.kibana.config.xpack.update({'security': {'authc': {'providers': {'anonymous': {'anonymous1': {'order': 0, 'credentials': 'elasticsearch_anonymous_user'}}}}}}) %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/kibana/secrets.sls') %}
|
{% if salt['pillar.get']('kibana:secrets') %}
|
||||||
{% do KIBANACONFIG.kibana.config.xpack.update({'encryptedSavedObjects': {'encryptionKey': pillar['kibana']['secrets']['encryptedSavedObjects']['encryptionKey'] }}) %}
|
{% do KIBANACONFIG.kibana.config.xpack.update({'encryptedSavedObjects': {'encryptionKey': pillar['kibana']['secrets']['encryptedSavedObjects']['encryptionKey']}}) %}
|
||||||
|
{% do KIBANACONFIG.kibana.config.xpack.security.update({'encryptionKey': pillar['kibana']['secrets']['security']['encryptionKey']}) %}
|
||||||
|
{% do KIBANACONFIG.kibana.config.xpack.update({'reporting': {'encryptionKey': pillar['kibana']['secrets']['reporting']['encryptionKey']}}) %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% set KIBANACONFIG = salt['pillar.get']('kibana:config', default=KIBANACONFIG.kibana.config, merge=True) %}
|
{% set KIBANACONFIG = salt['pillar.get']('kibana:config', default=KIBANACONFIG.kibana.config, merge=True) %}
|
||||||
|
|||||||
@@ -30,3 +30,5 @@ kibana:
|
|||||||
xpack:
|
xpack:
|
||||||
ml:
|
ml:
|
||||||
enabled: False
|
enabled: False
|
||||||
|
security:
|
||||||
|
secureCookies: True
|
||||||
|
|||||||
@@ -2,6 +2,8 @@
|
|||||||
{% if sls in allowed_states %}
|
{% if sls in allowed_states %}
|
||||||
|
|
||||||
{% set kibana_encryptedSavedObjects_encryptionKey = salt['pillar.get']('kibana:secrets:encryptedSavedObjects:encryptionKey', salt['random.get_str'](72)) %}
|
{% set kibana_encryptedSavedObjects_encryptionKey = salt['pillar.get']('kibana:secrets:encryptedSavedObjects:encryptionKey', salt['random.get_str'](72)) %}
|
||||||
|
{% set kibana_security_encryptionKey = salt['pillar.get']('kibana:secrets:security:encryptionKey', salt['random.get_str'](72)) %}
|
||||||
|
{% set kibana_reporting_encryptionKey = salt['pillar.get']('kibana:secrets:reporting:encryptionKey', salt['random.get_str'](72)) %}
|
||||||
|
|
||||||
kibana_pillar_directory:
|
kibana_pillar_directory:
|
||||||
file.directory:
|
file.directory:
|
||||||
@@ -17,6 +19,10 @@ kibana_secrets_pillar:
|
|||||||
secrets:
|
secrets:
|
||||||
encryptedSavedObjects:
|
encryptedSavedObjects:
|
||||||
encryptionKey: {{ kibana_encryptedSavedObjects_encryptionKey }}
|
encryptionKey: {{ kibana_encryptedSavedObjects_encryptionKey }}
|
||||||
|
security:
|
||||||
|
encryptionKey: {{ kibana_security_encryptionKey }}
|
||||||
|
reporting:
|
||||||
|
encryptionKey: {{ kibana_reporting_encryptionKey }}
|
||||||
- show_changes: False
|
- show_changes: False
|
||||||
|
|
||||||
{% else %}
|
{% else %}
|
||||||
|
|||||||
Reference in New Issue
Block a user