mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-07 17:52:46 +01:00
fix merge issue
This commit is contained in:
@@ -56,12 +56,14 @@ rulesdir:
|
|||||||
- group: 939
|
- group: 939
|
||||||
- makedirs: True
|
- makedirs: True
|
||||||
|
|
||||||
|
# Don't show changes because all.rules can be large
|
||||||
synclocalnidsrules:
|
synclocalnidsrules:
|
||||||
file.recurse:
|
file.recurse:
|
||||||
- name: /opt/so/rules/nids/
|
- name: /opt/so/rules/nids/
|
||||||
- source: salt://idstools/
|
- source: salt://idstools/
|
||||||
- user: 939
|
- user: 939
|
||||||
- group: 939
|
- group: 939
|
||||||
|
- show_changes: False
|
||||||
- include_pat: 'E@.rules'
|
- include_pat: 'E@.rules'
|
||||||
|
|
||||||
so-idstools:
|
so-idstools:
|
||||||
|
|||||||
@@ -74,6 +74,7 @@ surirulesync:
|
|||||||
- source: salt://suricata/rules/
|
- source: salt://suricata/rules/
|
||||||
- user: 940
|
- user: 940
|
||||||
- group: 940
|
- group: 940
|
||||||
|
- show_changes: False
|
||||||
|
|
||||||
surilogscript:
|
surilogscript:
|
||||||
file.managed:
|
file.managed:
|
||||||
|
|||||||
@@ -708,32 +708,33 @@ set_redirect >> $setup_log 2>&1
|
|||||||
|
|
||||||
set_progress_str 60 "$(print_salt_state_apply 'manager')"
|
set_progress_str 60 "$(print_salt_state_apply 'manager')"
|
||||||
salt-call state.apply -l info manager >> $setup_log 2>&1
|
salt-call state.apply -l info manager >> $setup_log 2>&1
|
||||||
|
|
||||||
set_progress_str 61 "$(print_salt_state_apply 'idstools')"
|
|
||||||
create_local_nids_rules >> $setup_log 2>&1
|
|
||||||
salt-call state.apply -l info idstools >> $setup_log 2>&1
|
|
||||||
|
|
||||||
set_progress_str 61 "$(print_salt_state_apply 'suricata.manager')"
|
|
||||||
salt-call state.apply -l info suricata.manager >> $setup_log 2>&1
|
|
||||||
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
set_progress_str 62 "$(print_salt_state_apply 'firewall')"
|
set_progress_str 61 "$(print_salt_state_apply 'firewall')"
|
||||||
salt-call state.apply -l info firewall >> $setup_log 2>&1
|
salt-call state.apply -l info firewall >> $setup_log 2>&1
|
||||||
|
|
||||||
if [ $OS = 'centos' ]; then
|
if [ $OS = 'centos' ]; then
|
||||||
set_progress_str 63 'Installing Yum utilities'
|
set_progress_str 61 'Installing Yum utilities'
|
||||||
salt-call state.apply -l info yum.packages >> $setup_log 2>&1
|
salt-call state.apply -l info yum.packages >> $setup_log 2>&1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
set_progress_str 63 "$(print_salt_state_apply 'common')"
|
set_progress_str 62 "$(print_salt_state_apply 'common')"
|
||||||
salt-call state.apply -l info common >> $setup_log 2>&1
|
salt-call state.apply -l info common >> $setup_log 2>&1
|
||||||
|
|
||||||
if [[ ! $is_helix ]]; then
|
if [[ ! $is_helix ]]; then
|
||||||
set_progress_str 64 "$(print_salt_state_apply 'nginx')"
|
set_progress_str 62 "$(print_salt_state_apply 'nginx')"
|
||||||
salt-call state.apply -l info nginx >> $setup_log 2>&1
|
salt-call state.apply -l info nginx >> $setup_log 2>&1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
if [[ $is_manager || $is_helix || $is_import ]]; then
|
||||||
|
set_progress_str 63 "$(print_salt_state_apply 'idstools')"
|
||||||
|
create_local_nids_rules >> $setup_log 2>&1
|
||||||
|
salt-call state.apply -l info idstools >> $setup_log 2>&1
|
||||||
|
|
||||||
|
set_progress_str 63 "$(print_salt_state_apply 'suricata.manager')"
|
||||||
|
salt-call state.apply -l info suricata.manager >> $setup_log 2>&1
|
||||||
|
fi
|
||||||
|
|
||||||
if [[ $is_manager || $is_node || $is_import || $is_helix ]]; then
|
if [[ $is_manager || $is_node || $is_import || $is_helix ]]; then
|
||||||
set_progress_str 64 "$(print_salt_state_apply 'elasticsearch')"
|
set_progress_str 64 "$(print_salt_state_apply 'elasticsearch')"
|
||||||
salt-call state.apply -l info elasticsearch >> $setup_log 2>&1
|
salt-call state.apply -l info elasticsearch >> $setup_log 2>&1
|
||||||
|
|||||||
Reference in New Issue
Block a user