From 2567ceea7449de97cd1b11bdebc3503733609f37 Mon Sep 17 00:00:00 2001 From: Josh Brower Date: Wed, 12 Apr 2023 16:51:40 -0400 Subject: [PATCH] Fix path --- salt/common/tools/sbin/so-elastic-fleet-setup | 34 ++----------------- 1 file changed, 2 insertions(+), 32 deletions(-) diff --git a/salt/common/tools/sbin/so-elastic-fleet-setup b/salt/common/tools/sbin/so-elastic-fleet-setup index 3b41dd960..87fe6f608 100755 --- a/salt/common/tools/sbin/so-elastic-fleet-setup +++ b/salt/common/tools/sbin/so-elastic-fleet-setup @@ -87,7 +87,7 @@ elastic_fleet_policy_create "FleetServer_{{ GLOBALS.hostname }}" "Fleet Server - # Initial Endpoints elastic_fleet_policy_create "endpoints-initial" "Initial Endpoint Policy" "false" | jq -for INTEGRATION in /opt/so/saltstack/opt/so/saltstack/default/salt/elasticfleet/files/integrations/endpoints-initial/*.json +for INTEGRATION in opt/so/saltstack/default/salt/elasticfleet/files/integrations/endpoints-initial/*.json do elastic_fleet_integration_create "@$INTEGRATION" | jq done @@ -123,34 +123,4 @@ printf '%s\n'\ "" >> "$global_pillar_file" # Call Elastic-Fleet Salt State -salt-call state.apply elasticfleet queue=True - - - - - - -### DEPRECATED - -# Temp -# Configure certificates -mkdir -p /opt/so/conf/elastic-fleet/certs -cp /etc/ssl/certs/intca.crt /opt/so/conf/elastic-fleet/certs -cp /etc/pki/elasticfleet* /opt/so/conf/elastic-fleet/certs - -wget --progress=bar:force:noscroll -P /opt/so/saltstack/default/salt/elasticfleet/files/elastic-agent/ https://github.com/Security-Onion-Solutions/securityonion-docker-rpm/releases/download/so_elastic-agent-8.7.0/so-elastic-agent-8.7.0-darwin-x86_64.tar.gz -wget --progress=bar:force:noscroll -P /opt/so/saltstack/default/salt/elasticfleet/files/elastic-agent/ https://github.com/Security-Onion-Solutions/securityonion-docker-rpm/releases/download/so_elastic-agent-8.7.0/so-elastic-agent-8.7.0-linux-x86_64.tar.gz -wget --progress=bar:force:noscroll -P /opt/so/saltstack/default/salt/elasticfleet/files/elastic-agent/ https://github.com/Security-Onion-Solutions/securityonion-docker-rpm/releases/download/so_elastic-agent-8.7.0/so-elastic-agent-8.7.0-windows-x86_64.tar.gz - -so-elastic-agent-gen-installers -salt-call state.apply elasticfleet.install_agent_grid queue=True - - -#Temp Fixup for Fleet Server Host Output -JSON_STRING_UPDATE=$( jq -n \ - --arg NAME "FleetServer_$MINIONID" \ - --arg DESC "Fleet Server - $MINIONID" \ - '{"name":$NAME,"description":$DESC,"namespace":"default","monitoring_enabled":["logs"],"inactivity_timeout":1209600,"data_output_id":"so-manager_elasticsearch"}' - ) -curl -K /opt/so/conf/elasticsearch/curl.config -L -X PUT "localhost:5601/api/fleet/agent_policies/FleetServer_$MINIONID" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d "$JSON_STRING_UPDATE" - +salt-call state.apply elasticfleet queue=True \ No newline at end of file