From 841b91e0529c6cc0b752b26f03133fa7596fcd43 Mon Sep 17 00:00:00 2001 From: m0duspwnens Date: Tue, 14 Dec 2021 16:05:47 -0500 Subject: [PATCH] exclude elasticsearch and managerssl keys and certs from receiver --- salt/ssl/init.sls | 10 ++++++---- salt/top.sls | 1 - 2 files changed, 6 insertions(+), 5 deletions(-) diff --git a/salt/ssl/init.sls b/salt/ssl/init.sls index 3b4bb2bcf..c4c280da4 100644 --- a/salt/ssl/init.sls +++ b/salt/ssl/init.sls @@ -210,7 +210,6 @@ etc_filebeat_crt: - onchanges: - x509: etc_filebeat_key - fbperms: file.managed: - replace: False @@ -226,7 +225,7 @@ chownilogstashfilebeatp8: - user: 931 - group: 939 - {% if grains.role not in ['so-heavynode', 'so-receiver']%} + {% if grains.role not in ['so-heavynode', 'so-receiver'] %} # Create Symlinks to the keys so I can distribute it to all the things filebeatdir: file.directory: @@ -294,7 +293,7 @@ regkeyperms: - group: 939 {% endif %} - + {% if grains.role not in ['so-receiver'] %} # Create a cert for elasticsearch /etc/pki/elasticsearch.key: x509.private_key_managed: @@ -338,7 +337,7 @@ regkeyperms: - onchanges: - x509: /etc/pki/elasticsearch.key -ealstickeyperms: +elastickeyperms: file.managed: - replace: False - name: /etc/pki/elasticsearch.key @@ -398,6 +397,8 @@ msslkeyperms: - mode: 640 - group: 939 + {% endif %} + # Create a private key and cert for OSQuery fleet_key: x509.private_key_managed: @@ -443,6 +444,7 @@ fleetkeyperms: - group: 939 {% endif %} + {% if grains['role'] in ['so-sensor', 'so-manager', 'so-node', 'so-eval', 'so-helix', 'so-managersearch', 'so-heavynode', 'so-fleet', 'so-standalone', 'so-import', 'so-receiver'] %} fbcertdir: diff --git a/salt/top.sls b/salt/top.sls index 1f0a92898..aad8dc7ef 100644 --- a/salt/top.sls +++ b/salt/top.sls @@ -477,7 +477,6 @@ base: '*_receiver and G@saltversion:{{saltversion}}': - match: compound - - ca - ssl - telegraf - firewall