Remove references to kafkanode

Signed-off-by: reyesj2 <94730068+reyesj2@users.noreply.github.com>
This commit is contained in:
reyesj2
2024-04-11 15:32:00 -04:00
parent d3bd56b131
commit af53dcda1b
20 changed files with 17 additions and 218 deletions

View File

@@ -19,5 +19,4 @@ role:
receiver: receiver:
standalone: standalone:
searchnode: searchnode:
sensor: sensor:
kafkanode:

View File

@@ -1,4 +1,4 @@
{% set current_kafkanodes = salt.saltutil.runner('mine.get', tgt='G@role:so-kafkanode or G@role:so-manager', fun='network.ip_addrs', tgt_type='compound') %} {% set current_kafkanodes = salt.saltutil.runner('mine.get', tgt='G@role:so-receiver or G@role:so-manager', fun='network.ip_addrs', tgt_type='compound') %}
{% set pillar_kafkanodes = salt['pillar.get']('kafka:nodes', default={}, merge=True) %} {% set pillar_kafkanodes = salt['pillar.get']('kafka:nodes', default={}, merge=True) %}
{% set existing_ids = [] %} {% set existing_ids = [] %}

View File

@@ -2,7 +2,7 @@
{% set cached_grains = salt.saltutil.runner('cache.grains', tgt='*') %} {% set cached_grains = salt.saltutil.runner('cache.grains', tgt='*') %}
{% for minionid, ip in salt.saltutil.runner( {% for minionid, ip in salt.saltutil.runner(
'mine.get', 'mine.get',
tgt='G@role:so-manager or G@role:so-managersearch or G@role:so-standalone or G@role:so-searchnode or G@role:so-heavynode or G@role:so-receiver or G@role:so-fleet or G@role:so-kafkanode ', tgt='G@role:so-manager or G@role:so-managersearch or G@role:so-standalone or G@role:so-searchnode or G@role:so-heavynode or G@role:so-receiver or G@role:so-fleet ',
fun='network.ip_addrs', fun='network.ip_addrs',
tgt_type='compound') | dictsort() tgt_type='compound') | dictsort()
%} %}

View File

@@ -233,15 +233,8 @@ base:
- redis.adv_redis - redis.adv_redis
- minions.{{ grains.id }} - minions.{{ grains.id }}
- minions.adv_{{ grains.id }} - minions.adv_{{ grains.id }}
'*_kafkanode':
- logstash.nodes
- logstash.soc_logstash
- logstash.adv_logstash
- minions.{{ grains.id }}
- minions.adv_{{ grains.id }}
- secrets
- kafka.nodes - kafka.nodes
- secrets
'*_import': '*_import':
- secrets - secrets

View File

@@ -188,16 +188,8 @@
'telegraf', 'telegraf',
'firewall', 'firewall',
'schedule', 'schedule',
'docker_clean' 'docker_clean',
], 'kafka'
'so-kafkanode': [
'kafka',
'logstash',
'ssl',
'telegraf',
'firewall',
'schedule',
'docker_clean'
], ],
'so-desktop': [ 'so-desktop': [
'ssl', 'ssl',
@@ -214,7 +206,7 @@
{% do allowed_states.append('strelka') %} {% do allowed_states.append('strelka') %}
{% endif %} {% endif %}
{% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-searchnode', 'so-managersearch', 'so-heavynode', 'so-import', 'so-kafkanode'] %} {% if grains.role in ['so-eval', 'so-manager', 'so-standalone', 'so-searchnode', 'so-managersearch', 'so-heavynode', 'so-import'] %}
{% do allowed_states.append('elasticsearch') %} {% do allowed_states.append('elasticsearch') %}
{% endif %} {% endif %}

View File

@@ -81,11 +81,7 @@
{% set NODE_CONTAINERS = [ {% set NODE_CONTAINERS = [
'so-logstash', 'so-logstash',
'so-redis', 'so-redis',
] %} 'so-kafka'
{% elif GLOBALS.role == 'so-kafkanode' %}
{% set NODE_CONTAINERS = [
'so-logstash',
'so-kafka',
] %} ] %}
{% elif GLOBALS.role == 'so-idh' %} {% elif GLOBALS.role == 'so-idh' %}

View File

@@ -19,7 +19,6 @@ firewall:
manager: [] manager: []
managersearch: [] managersearch: []
receiver: [] receiver: []
kafkanode: []
searchnode: [] searchnode: []
self: [] self: []
sensor: [] sensor: []
@@ -443,15 +442,6 @@ firewall:
- elastic_agent_data - elastic_agent_data
- elastic_agent_update - elastic_agent_update
- sensoroni - sensoroni
kafkanode:
portgroups:
- yum
- docker_registry
- influxdb
- elastic_agent_control
- elastic_agent_data
- elastic_agent_update
- sensoroni
analyst: analyst:
portgroups: portgroups:
- nginx - nginx
@@ -530,9 +520,6 @@ firewall:
receiver: receiver:
portgroups: portgroups:
- salt_manager - salt_manager
kafkanode:
portgroups:
- salt_manager
desktop: desktop:
portgroups: portgroups:
- salt_manager - salt_manager
@@ -647,15 +634,6 @@ firewall:
- elastic_agent_data - elastic_agent_data
- elastic_agent_update - elastic_agent_update
- sensoroni - sensoroni
kafkanode:
portgroups:
- yum
- docker_registry
- influxdb
- elastic_agent_control
- elastic_agent_data
- elastic_agent_update
- sensoroni
analyst: analyst:
portgroups: portgroups:
- nginx - nginx
@@ -1305,14 +1283,17 @@ firewall:
- beats_5044 - beats_5044
- beats_5644 - beats_5644
- elastic_agent_data - elastic_agent_data
- kafka
searchnode: searchnode:
portgroups: portgroups:
- redis - redis
- beats_5644 - beats_5644
- kafka
managersearch: managersearch:
portgroups: portgroups:
- redis - redis
- beats_5644 - beats_5644
- kafka
self: self:
portgroups: portgroups:
- redis - redis
@@ -1383,73 +1364,6 @@ firewall:
portgroups: [] portgroups: []
customhostgroup9: customhostgroup9:
portgroups: [] portgroups: []
kafkanode:
chain:
DOCKER-USER:
hostgroups:
searchnode:
portgroups:
- kafka
kafkanode:
portgroups:
- kafka
customhostgroup0:
portgroups: []
customhostgroup1:
portgroups: []
customhostgroup2:
portgroups: []
customhostgroup3:
portgroups: []
customhostgroup4:
portgroups: []
customhostgroup5:
portgroups: []
customhostgroup6:
portgroups: []
customhostgroup7:
portgroups: []
customhostgroup8:
portgroups: []
customhostgroup9:
portgroups: []
INPUT:
hostgroups:
anywhere:
portgroups:
- ssh
dockernet:
portgroups:
- all
localhost:
portgroups:
- all
self:
portgroups:
- syslog
syslog:
portgroups:
- syslog
customhostgroup0:
portgroups: []
customhostgroup1:
portgroups: []
customhostgroup2:
portgroups: []
customhostgroup3:
portgroups: []
customhostgroup4:
portgroups: []
customhostgroup5:
portgroups: []
customhostgroup6:
portgroups: []
customhostgroup7:
portgroups: []
customhostgroup8:
portgroups: []
customhostgroup9:
portgroups: []
idh: idh:
chain: chain:
DOCKER-USER: DOCKER-USER:

View File

@@ -34,7 +34,6 @@ firewall:
heavynode: *hostgroupsettings heavynode: *hostgroupsettings
idh: *hostgroupsettings idh: *hostgroupsettings
import: *hostgroupsettings import: *hostgroupsettings
kafkanode: *hostgroupsettings
localhost: *ROhostgroupsettingsadv localhost: *ROhostgroupsettingsadv
manager: *hostgroupsettings manager: *hostgroupsettings
managersearch: *hostgroupsettings managersearch: *hostgroupsettings
@@ -361,8 +360,6 @@ firewall:
portgroups: *portgroupsdocker portgroups: *portgroupsdocker
endgame: endgame:
portgroups: *portgroupsdocker portgroups: *portgroupsdocker
kafkanode:
portgroups: *portgroupsdocker
analyst: analyst:
portgroups: *portgroupsdocker portgroups: *portgroupsdocker
desktop: desktop:
@@ -454,8 +451,6 @@ firewall:
portgroups: *portgroupsdocker portgroups: *portgroupsdocker
syslog: syslog:
portgroups: *portgroupsdocker portgroups: *portgroupsdocker
kafkanode:
portgroups: *portgroupsdocker
analyst: analyst:
portgroups: *portgroupsdocker portgroups: *portgroupsdocker
desktop: desktop:
@@ -940,63 +935,6 @@ firewall:
portgroups: *portgroupshost portgroups: *portgroupshost
customhostgroup9: customhostgroup9:
portgroups: *portgroupshost portgroups: *portgroupshost
kafkanode:
chain:
DOCKER-USER:
hostgroups:
searchnode:
portgroups: *portgroupsdocker
kafkanode:
portgroups: *portgroupsdocker
customhostgroup0:
portgroups: *portgroupsdocker
customhostgroup1:
portgroups: *portgroupsdocker
customhostgroup2:
portgroups: *portgroupsdocker
customhostgroup3:
portgroups: *portgroupsdocker
customhostgroup4:
portgroups: *portgroupsdocker
customhostgroup5:
portgroups: *portgroupsdocker
customhostgroup6:
portgroups: *portgroupsdocker
customhostgroup7:
portgroups: *portgroupsdocker
customhostgroup8:
portgroups: *portgroupsdocker
customhostgroup9:
portgroups: *portgroupsdocker
INPUT:
hostgroups:
anywhere:
portgroups: *portgroupshost
dockernet:
portgroups: *portgroupshost
localhost:
portgroups: *portgroupshost
customhostgroup0:
portgroups: *portgroupshost
customhostgroup1:
portgroups: *portgroupshost
customhostgroup2:
portgroups: *portgroupshost
customhostgroup3:
portgroups: *portgroupshost
customhostgroup4:
portgroups: *portgroupshost
customhostgroup5:
portgroups: *portgroupshost
customhostgroup6:
portgroups: *portgroupshost
customhostgroup7:
portgroups: *portgroupshost
customhostgroup8:
portgroups: *portgroupshost
customhostgroup9:
portgroups: *portgroupshost
idh: idh:
chain: chain:
DOCKER-USER: DOCKER-USER:

View File

@@ -7,7 +7,7 @@
{% if sls.split('.')[0] in allowed_states %} {% if sls.split('.')[0] in allowed_states %}
{% from 'vars/globals.map.jinja' import GLOBALS %} {% from 'vars/globals.map.jinja' import GLOBALS %}
{% from 'docker/docker.map.jinja' import DOCKER %} {% from 'docker/docker.map.jinja' import DOCKER %}
{% set KAFKANODES = salt['pillar.get']('kafka:nodes', {}) %} {% set KAFKANODES = salt['pillar.get']('kafka:nodes', {}) %}
include: include:
- kafka.sostatus - kafka.sostatus

View File

@@ -12,7 +12,7 @@
include: include:
- ssl - ssl
{% if GLOBALS.role not in ['so-receiver','so-fleet', 'so-kafkanode'] %} {% if GLOBALS.role not in ['so-receiver','so-fleet'] %}
- elasticsearch - elasticsearch
{% endif %} {% endif %}

View File

@@ -19,8 +19,6 @@ logstash:
- search - search
fleet: fleet:
- fleet - fleet
kafkanode:
- kafkanode
defined_pipelines: defined_pipelines:
fleet: fleet:
- so/0012_input_elastic_agent.conf.jinja - so/0012_input_elastic_agent.conf.jinja
@@ -39,8 +37,6 @@ logstash:
- so/0900_input_redis.conf.jinja - so/0900_input_redis.conf.jinja
- so/9805_output_elastic_agent.conf.jinja - so/9805_output_elastic_agent.conf.jinja
- so/9900_output_endgame.conf.jinja - so/9900_output_endgame.conf.jinja
kafkanode:
- so/0899_output_kafka.conf.jinja
custom0: [] custom0: []
custom1: [] custom1: []
custom2: [] custom2: []

View File

@@ -75,7 +75,7 @@ so-logstash:
{% else %} {% else %}
- /etc/pki/tls/certs/intca.crt:/usr/share/filebeat/ca.crt:ro - /etc/pki/tls/certs/intca.crt:/usr/share/filebeat/ca.crt:ro
{% endif %} {% endif %}
{% if GLOBALS.role in ['so-manager', 'so-managersearch', 'so-standalone', 'so-import', 'so-heavynode', 'so-searchnode', 'so-kafkanode' ] %} {% if GLOBALS.role in ['so-manager', 'so-managersearch', 'so-standalone', 'so-import', 'so-heavynode', 'so-searchnode' ] %}
- /opt/so/conf/ca/cacerts:/etc/pki/ca-trust/extracted/java/cacerts:ro - /opt/so/conf/ca/cacerts:/etc/pki/ca-trust/extracted/java/cacerts:ro
- /opt/so/conf/ca/tls-ca-bundle.pem:/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem:ro - /opt/so/conf/ca/tls-ca-bundle.pem:/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem:ro
- /etc/pki/kafka-logstash.p12:/usr/share/logstash/kafka-logstash.p12:ro - /etc/pki/kafka-logstash.p12:/usr/share/logstash/kafka-logstash.p12:ro

View File

@@ -1,11 +1,9 @@
{% set kafka_brokers = salt['pillar.get']('logstash:nodes:kafkanode', {}) %} {% set kafka_brokers = salt['pillar.get']('logstash:nodes:receiver', {}) %}
{% set kafka_on_mngr = salt ['pillar.get']('logstash:nodes:manager', {}) %} {% set kafka_on_mngr = salt ['pillar.get']('logstash:nodes:manager', {}) %}
{% set broker_ips = [] %} {% set broker_ips = [] %}
{% for node, node_data in kafka_brokers.items() %} {% for node, node_data in kafka_brokers.items() %}
{% do broker_ips.append(node_data['ip'] + ":9092") %} {% do broker_ips.append(node_data['ip'] + ":9092") %}
{% endfor %} {% endfor %}
{# For testing kafka stuff from manager not dedicated kafkanodes #}
{% for node, node_data in kafka_on_mngr.items() %} {% for node, node_data in kafka_on_mngr.items() %}
{% do broker_ips.append(node_data['ip'] + ":9092") %} {% do broker_ips.append(node_data['ip'] + ":9092") %}
{% endfor %} {% endfor %}

View File

@@ -16,7 +16,6 @@ logstash:
manager: *assigned_pipelines manager: *assigned_pipelines
managersearch: *assigned_pipelines managersearch: *assigned_pipelines
fleet: *assigned_pipelines fleet: *assigned_pipelines
kafkanode: *assigned_pipelines
defined_pipelines: defined_pipelines:
receiver: &defined_pipelines receiver: &defined_pipelines
description: List of pipeline configurations assign to this group. description: List of pipeline configurations assign to this group.
@@ -27,7 +26,6 @@ logstash:
fleet: *defined_pipelines fleet: *defined_pipelines
manager: *defined_pipelines manager: *defined_pipelines
search: *defined_pipelines search: *defined_pipelines
kafkanode: *defined_pipelines
custom0: *defined_pipelines custom0: *defined_pipelines
custom1: *defined_pipelines custom1: *defined_pipelines
custom2: *defined_pipelines custom2: *defined_pipelines

View File

@@ -79,9 +79,6 @@ fi
'RECEIVER') 'RECEIVER')
so-firewall includehost receiver "$IP" --apply so-firewall includehost receiver "$IP" --apply
;; ;;
'KAFKANODE')
so-firewall includehost kafkanode "$IP" --apply
;;
'DESKTOP') 'DESKTOP')
so-firewall includehost desktop "$IP" --apply so-firewall includehost desktop "$IP" --apply
;; ;;

View File

@@ -565,11 +565,6 @@ function createRECEIVER() {
add_telegraf_to_minion add_telegraf_to_minion
} }
function createKAFKANODE() {
add_logstash_to_minion
# add_telegraf_to_minion
}
function createDESKTOP() { function createDESKTOP() {
add_desktop_to_minion add_desktop_to_minion
add_telegraf_to_minion add_telegraf_to_minion

View File

@@ -664,10 +664,7 @@ elastickeyperms:
{%- endif %} {%- endif %}
# Roles will need to be modified. Below is just for testing encrypted kafka pipelines {% if grains['role'] in ['so-manager', 'so-searchnode', 'so-receiver'] %}
# Remove so-manager. Just inplace for testing
{% if grains['role'] in ['so-manager', 'so-kafkanode', 'so-searchnode'] %}
# Create a cert for Redis encryption
kafka_key: kafka_key:
x509.private_key_managed: x509.private_key_managed:
- name: /etc/pki/kafka.key - name: /etc/pki/kafka.key

View File

@@ -235,16 +235,7 @@ base:
- firewall - firewall
- logstash - logstash
- redis - redis
- elasticfleet.install_agent_grid
'*_kafkanode and G@saltversion:{{saltversion}}':
- match: compound
- kafka - kafka
- logstash
- ssl
- telegraf
- firewall
- docker_clean
- elasticfleet.install_agent_grid - elasticfleet.install_agent_grid
'*_idh and G@saltversion:{{saltversion}}': '*_idh and G@saltversion:{{saltversion}}':

View File

@@ -1143,7 +1143,7 @@ get_redirect() {
get_minion_type() { get_minion_type() {
local minion_type local minion_type
case "$install_type" in case "$install_type" in
'EVAL' | 'MANAGERSEARCH' | 'MANAGER' | 'SENSOR' | 'HEAVYNODE' | 'SEARCHNODE' | 'FLEET' | 'IDH' | 'STANDALONE' | 'IMPORT' | 'RECEIVER' | 'DESKTOP' | 'KAFKANODE') 'EVAL' | 'MANAGERSEARCH' | 'MANAGER' | 'SENSOR' | 'HEAVYNODE' | 'SEARCHNODE' | 'FLEET' | 'IDH' | 'STANDALONE' | 'IMPORT' | 'RECEIVER' | 'DESKTOP')
minion_type=$(echo "$install_type" | tr '[:upper:]' '[:lower:]') minion_type=$(echo "$install_type" | tr '[:upper:]' '[:lower:]')
;; ;;
esac esac
@@ -1505,8 +1505,6 @@ process_installtype() {
is_import=true is_import=true
elif [ "$install_type" = 'RECEIVER' ]; then elif [ "$install_type" = 'RECEIVER' ]; then
is_receiver=true is_receiver=true
elif [ "$install_type" = 'KAFKANODE' ]; then
is_kafka=true
elif [ "$install_type" = 'DESKTOP' ]; then elif [ "$install_type" = 'DESKTOP' ]; then
is_desktop=true is_desktop=true
fi fi

View File

@@ -681,7 +681,6 @@ whiptail_install_type_dist_existing() {
"HEAVYNODE" "Sensor + Search Node " \ "HEAVYNODE" "Sensor + Search Node " \
"IDH" "Intrusion Detection Honeypot Node " \ "IDH" "Intrusion Detection Honeypot Node " \
"RECEIVER" "Receiver Node " \ "RECEIVER" "Receiver Node " \
"KAFKANODE" "Kafka Broker + Kraft controller" \
3>&1 1>&2 2>&3 3>&1 1>&2 2>&3
# "HOTNODE" "Add Hot Node (Uses Elastic Clustering)" \ # TODO # "HOTNODE" "Add Hot Node (Uses Elastic Clustering)" \ # TODO
# "WARMNODE" "Add Warm Node to existing Hot or Search node" \ # TODO # "WARMNODE" "Add Warm Node to existing Hot or Search node" \ # TODO
@@ -712,8 +711,6 @@ whiptail_install_type_dist_existing() {
is_import=true is_import=true
elif [ "$install_type" = 'RECEIVER' ]; then elif [ "$install_type" = 'RECEIVER' ]; then
is_receiver=true is_receiver=true
elif [ "$install_type" = 'KAFKANODE' ]; then
is_kafka=true
elif [ "$install_type" = 'DESKTOP' ]; then elif [ "$install_type" = 'DESKTOP' ]; then
is_desktop=true is_desktop=true
fi fi