mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-07 01:32:47 +01:00
Merge pull request #9516 from Security-Onion-Solutions/mkr24
Add PW auth for Redis
This commit is contained in:
@@ -121,6 +121,7 @@ base:
|
|||||||
'*_heavynode':
|
'*_heavynode':
|
||||||
- elasticsearch.auth
|
- elasticsearch.auth
|
||||||
- soc_global
|
- soc_global
|
||||||
|
- redis.soc_redis
|
||||||
- minions.{{ grains.id }}
|
- minions.{{ grains.id }}
|
||||||
- minions.adv_{{ grains.id }}
|
- minions.adv_{{ grains.id }}
|
||||||
|
|
||||||
@@ -137,6 +138,7 @@ base:
|
|||||||
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
|
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
|
||||||
- elasticsearch.auth
|
- elasticsearch.auth
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
- redis.soc_redis
|
||||||
- soc_global
|
- soc_global
|
||||||
- adv_global
|
- adv_global
|
||||||
- minions.{{ grains.id }}
|
- minions.{{ grains.id }}
|
||||||
@@ -149,6 +151,8 @@ base:
|
|||||||
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
|
{% if salt['file.file_exists']('/opt/so/saltstack/local/pillar/elasticsearch/auth.sls') %}
|
||||||
- elasticsearch.auth
|
- elasticsearch.auth
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
- redis.soc_redis
|
||||||
|
- redis.adv_redis
|
||||||
- soc_global
|
- soc_global
|
||||||
- adv_global
|
- adv_global
|
||||||
- minions.{{ grains.id }}
|
- minions.{{ grains.id }}
|
||||||
|
|||||||
@@ -4,9 +4,7 @@
|
|||||||
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
|
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
|
||||||
# https://securityonion.net/license; you may not use this file except in compliance with the
|
# https://securityonion.net/license; you may not use this file except in compliance with the
|
||||||
# Elastic License 2.0.
|
# Elastic License 2.0.
|
||||||
|
{%- set REDIS_PASS = salt['pillar.get']('redis:config:requirepass', '0') %}
|
||||||
|
|
||||||
|
|
||||||
. /usr/sbin/so-common
|
. /usr/sbin/so-common
|
||||||
|
docker exec so-redis /bin/sh -c "export REDISCLI_AUTH={{ REDIS_PASS }} && redis-cli llen logstash:unparsed"
|
||||||
docker exec so-redis redis-cli llen logstash:unparsed
|
|
||||||
@@ -1,9 +1,10 @@
|
|||||||
{% set THREADS = salt['pillar.get']('logstash_settings:ls_input_threads', '') -%}
|
{%- set THREADS = salt['pillar.get']('logstash_settings:ls_input_threads', '') %}
|
||||||
{% set BATCH = salt['pillar.get']('logstash_settings:ls_pipeline_batch_size', 125) -%}
|
{%- set BATCH = salt['pillar.get']('logstash_settings:ls_pipeline_batch_size', 125) %}
|
||||||
{% from 'logstash/map.jinja' import REDIS_NODES with context -%}
|
{%- from 'logstash/map.jinja' import REDIS_NODES with context %}
|
||||||
|
{%- set REDIS_PASS = salt['pillar.get']('redis:config:requirepass') %}
|
||||||
|
|
||||||
{% for index in range(REDIS_NODES|length) -%}
|
{%- for index in range(REDIS_NODES|length) %}
|
||||||
{% for host in REDIS_NODES[index] -%}
|
{%- for host in REDIS_NODES[index] %}
|
||||||
input {
|
input {
|
||||||
redis {
|
redis {
|
||||||
host => '{{ host }}'
|
host => '{{ host }}'
|
||||||
@@ -14,6 +15,7 @@ input {
|
|||||||
type => 'redis-input'
|
type => 'redis-input'
|
||||||
threads => {{ THREADS }}
|
threads => {{ THREADS }}
|
||||||
batch_count => {{ BATCH }}
|
batch_count => {{ BATCH }}
|
||||||
|
password => {{ REDIS_PASS }}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
|
|||||||
@@ -4,6 +4,8 @@
|
|||||||
{%- set HOST = GLOBALS.manager %}
|
{%- set HOST = GLOBALS.manager %}
|
||||||
{%- endif %}
|
{%- endif %}
|
||||||
{%- set BATCH = salt['pillar.get']('logstash_settings:ls_pipeline_batch_size', 125) %}
|
{%- set BATCH = salt['pillar.get']('logstash_settings:ls_pipeline_batch_size', 125) %}
|
||||||
|
{%- set REDIS_PASS = salt['pillar.get']('redis:config:requirepass') %}
|
||||||
|
|
||||||
output {
|
output {
|
||||||
redis {
|
redis {
|
||||||
host => '{{ HOST }}'
|
host => '{{ HOST }}'
|
||||||
@@ -14,5 +16,6 @@ output {
|
|||||||
congestion_threshold => 50000000
|
congestion_threshold => 50000000
|
||||||
batch => true
|
batch => true
|
||||||
batch_events => {{ BATCH }}
|
batch_events => {{ BATCH }}
|
||||||
|
password => {{ REDIS_PASS }}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
redis:
|
redis:
|
||||||
config:
|
config:
|
||||||
bind: '0.0.0.0'
|
bind: '0.0.0.0'
|
||||||
protected-mode: 'no'
|
protected-mode: 'yes'
|
||||||
tls-cert-file: '/certs/redis.crt'
|
tls-cert-file: '/certs/redis.crt'
|
||||||
tls-key-file: '/certs/redis.key'
|
tls-key-file: '/certs/redis.key'
|
||||||
tls-ca-cert-file: '/certs/ca.crt'
|
tls-ca-cert-file: '/certs/ca.crt'
|
||||||
|
|||||||
@@ -10,6 +10,10 @@ redis:
|
|||||||
global: True
|
global: True
|
||||||
advanced: True
|
advanced: True
|
||||||
helpLink: redis.html
|
helpLink: redis.html
|
||||||
|
requirepass:
|
||||||
|
description: Password for accessing Redis.
|
||||||
|
global: True
|
||||||
|
sensitive: True
|
||||||
tls-cert-file:
|
tls-cert-file:
|
||||||
description: TLS cert file location.
|
description: TLS cert file location.
|
||||||
global: True
|
global: True
|
||||||
|
|||||||
@@ -4,9 +4,8 @@
|
|||||||
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
|
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
|
||||||
# https://securityonion.net/license; you may not use this file except in compliance with the
|
# https://securityonion.net/license; you may not use this file except in compliance with the
|
||||||
# Elastic License 2.0.
|
# Elastic License 2.0.
|
||||||
|
{%- set REDIS_PASS = salt['pillar.get']('redis:config:requirepass', '0') %}
|
||||||
|
export REDISCLI_AUTH={{ REDIS_PASS }}
|
||||||
|
|
||||||
# if this script isn't already running
|
# if this script isn't already running
|
||||||
if [[ ! "`pidof -x $(basename $0) -o %PPID`" ]]; then
|
if [[ ! "`pidof -x $(basename $0) -o %PPID`" ]]; then
|
||||||
|
|
||||||
|
|||||||
@@ -1209,6 +1209,7 @@ generate_passwords(){
|
|||||||
GRAFANAPASS=$(get_random_value)
|
GRAFANAPASS=$(get_random_value)
|
||||||
SENSORONIKEY=$(get_random_value)
|
SENSORONIKEY=$(get_random_value)
|
||||||
KRATOSKEY=$(get_random_value)
|
KRATOSKEY=$(get_random_value)
|
||||||
|
REDISPASS=$(get_random_value)
|
||||||
}
|
}
|
||||||
|
|
||||||
generate_interface_vars() {
|
generate_interface_vars() {
|
||||||
@@ -1503,7 +1504,10 @@ docker_pillar() {
|
|||||||
redis_pillar() {
|
redis_pillar() {
|
||||||
title "Create the redis pillar file"
|
title "Create the redis pillar file"
|
||||||
touch $adv_redis_pillar_file
|
touch $adv_redis_pillar_file
|
||||||
touch $redis_pillar_file
|
printf '%s\n'\
|
||||||
|
"redis:"\
|
||||||
|
" config:"\
|
||||||
|
" requirepass: '$REDISPASS'" > $redis_pillar_file
|
||||||
}
|
}
|
||||||
|
|
||||||
influxdb_pillar() {
|
influxdb_pillar() {
|
||||||
|
|||||||
Reference in New Issue
Block a user