mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 17:22:49 +01:00
Revert "Elastic Agent and Fleet - Import Mode"
This commit is contained in:
@@ -107,8 +107,7 @@
|
|||||||
'zeek',
|
'zeek',
|
||||||
'schedule',
|
'schedule',
|
||||||
'tcpreplay',
|
'tcpreplay',
|
||||||
'docker_clean',
|
'docker_clean'
|
||||||
'elastic-fleet'
|
|
||||||
],
|
],
|
||||||
'so-manager': [
|
'so-manager': [
|
||||||
'salt.master',
|
'salt.master',
|
||||||
|
|||||||
@@ -19,18 +19,10 @@ printf "\n"
|
|||||||
curl -K /opt/so/conf/elasticsearch/curl.config -L -X PUT "localhost:5601/api/fleet/settings" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d '{"fleet_server_hosts":["https://{{ GLOBALS.manager_ip }}:8220"]}'
|
curl -K /opt/so/conf/elasticsearch/curl.config -L -X PUT "localhost:5601/api/fleet/settings" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d '{"fleet_server_hosts":["https://{{ GLOBALS.manager_ip }}:8220"]}'
|
||||||
printf "\n\n"
|
printf "\n\n"
|
||||||
|
|
||||||
# Configure certificates
|
# Create Logstash Output payload
|
||||||
mkdir -p /opt/so/conf/elastic-fleet/certs
|
mkdir -p /opt/so/conf/elastic-fleet/certs
|
||||||
cp /etc/ssl/certs/intca.crt /opt/so/conf/elastic-fleet/certs
|
cp /etc/ssl/certs/intca.crt /opt/so/conf/elastic-fleet/certs
|
||||||
cp /etc/pki/elasticfleet* /opt/so/conf/elastic-fleet/certs
|
cp /etc/pki/elasticfleet* /opt/so/conf/elastic-fleet/certs
|
||||||
|
|
||||||
{% if grains.role == 'so-import' %}
|
|
||||||
# Add SO-Manager Elasticsearch Ouput
|
|
||||||
curl -K /opt/so/conf/elasticsearch/curl.config -L -X POST "localhost:5601/api/fleet/outputs" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d '{"name":"so-manager_elasticsearch","id":"so-manager_elasticsearch","type":"elasticsearch","hosts":["https://{{ GLOBALS.manager_ip }}:9200"],"is_default":true,"is_default_monitoring":true,"config_yaml":"","ssl":{"certificate_authorities":[ "/etc/pki/ca.crt" ]}}'
|
|
||||||
printf "\n\n"
|
|
||||||
|
|
||||||
{% else %}
|
|
||||||
# Create Logstash Output payload
|
|
||||||
LOGSTASHCRT=$(openssl x509 -in /opt/so/conf/elastic-fleet/certs/elasticfleet.crt)
|
LOGSTASHCRT=$(openssl x509 -in /opt/so/conf/elastic-fleet/certs/elasticfleet.crt)
|
||||||
LOGSTASHKEY=$(openssl rsa -in /opt/so/conf/elastic-fleet/certs/elasticfleet.key)
|
LOGSTASHKEY=$(openssl rsa -in /opt/so/conf/elastic-fleet/certs/elasticfleet.key)
|
||||||
LOGSTASHCA=$(openssl x509 -in /opt/so/conf/elastic-fleet/certs/intca.crt)
|
LOGSTASHCA=$(openssl x509 -in /opt/so/conf/elastic-fleet/certs/intca.crt)
|
||||||
@@ -44,7 +36,6 @@ JSON_STRING=$( jq -n \
|
|||||||
# Add SO-Manager Logstash Ouput
|
# Add SO-Manager Logstash Ouput
|
||||||
curl -K /opt/so/conf/elasticsearch/curl.config -L -X POST "localhost:5601/api/fleet/outputs" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d "$JSON_STRING"
|
curl -K /opt/so/conf/elasticsearch/curl.config -L -X POST "localhost:5601/api/fleet/outputs" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d "$JSON_STRING"
|
||||||
printf "\n\n"
|
printf "\n\n"
|
||||||
{%- endif %}
|
|
||||||
|
|
||||||
# Add Elastic Fleet Integrations
|
# Add Elastic Fleet Integrations
|
||||||
|
|
||||||
|
|||||||
@@ -24,8 +24,6 @@ container_list() {
|
|||||||
|
|
||||||
if [ $MANAGERCHECK == 'so-import' ]; then
|
if [ $MANAGERCHECK == 'so-import' ]; then
|
||||||
TRUSTED_CONTAINERS=(
|
TRUSTED_CONTAINERS=(
|
||||||
"so-elastic-agent"
|
|
||||||
"so-elastic-agent-builder"
|
|
||||||
"so-elasticsearch"
|
"so-elasticsearch"
|
||||||
"so-filebeat"
|
"so-filebeat"
|
||||||
"so-idstools"
|
"so-idstools"
|
||||||
|
|||||||
@@ -436,7 +436,6 @@ role:
|
|||||||
- {{ portgroups.influxdb }}
|
- {{ portgroups.influxdb }}
|
||||||
- {{ portgroups.elasticsearch_rest }}
|
- {{ portgroups.elasticsearch_rest }}
|
||||||
- {{ portgroups.elasticsearch_node }}
|
- {{ portgroups.elasticsearch_node }}
|
||||||
- {{ portgroups.elastic_agent_control }}
|
|
||||||
sensors:
|
sensors:
|
||||||
portgroups:
|
portgroups:
|
||||||
- {{ portgroups.beats_5044 }}
|
- {{ portgroups.beats_5044 }}
|
||||||
@@ -454,10 +453,6 @@ role:
|
|||||||
elasticsearch_rest:
|
elasticsearch_rest:
|
||||||
portgroups:
|
portgroups:
|
||||||
- {{ portgroups.elasticsearch_rest }}
|
- {{ portgroups.elasticsearch_rest }}
|
||||||
elastic_agent_endpoint:
|
|
||||||
portgroups:
|
|
||||||
- {{ portgroups.elasticsearch_rest }}
|
|
||||||
- {{ portgroups.elastic_agent_control }}
|
|
||||||
analyst:
|
analyst:
|
||||||
portgroups:
|
portgroups:
|
||||||
- {{ portgroups.nginx }}
|
- {{ portgroups.nginx }}
|
||||||
|
|||||||
@@ -344,7 +344,6 @@ base:
|
|||||||
- zeek
|
- zeek
|
||||||
- schedule
|
- schedule
|
||||||
- docker_clean
|
- docker_clean
|
||||||
- elastic-fleet
|
|
||||||
|
|
||||||
'*_receiver and G@saltversion:{{saltversion}}':
|
'*_receiver and G@saltversion:{{saltversion}}':
|
||||||
- match: compound
|
- match: compound
|
||||||
|
|||||||
@@ -587,9 +587,9 @@ if ! [[ -f $install_opt_file ]]; then
|
|||||||
add_web_user
|
add_web_user
|
||||||
info "Restarting SOC to pick up initial user"
|
info "Restarting SOC to pick up initial user"
|
||||||
logCmd "so-soc-restart"
|
logCmd "so-soc-restart"
|
||||||
|
if [[ ! $is_import ]]; then
|
||||||
title "Setting up Elastic Fleet"
|
title "Setting up Elastic Fleet"
|
||||||
logCmd "so-elastic-fleet-setup"
|
logCmd "so-elastic-fleet-setup"
|
||||||
if [[ ! $is_import ]]; then
|
|
||||||
title "Setting up Playbook"
|
title "Setting up Playbook"
|
||||||
logCmd "so-playbook-reset"
|
logCmd "so-playbook-reset"
|
||||||
fi
|
fi
|
||||||
|
|||||||
Reference in New Issue
Block a user