Merge pull request #10277 from Security-Onion-Solutions/2.4/package-registry

Reenable Elastic Package Registry
This commit is contained in:
Josh Brower
2023-05-03 12:57:21 -04:00
committed by GitHub
5 changed files with 10 additions and 1 deletions

View File

@@ -119,6 +119,7 @@
'soc', 'soc',
'kratos', 'kratos',
'elasticfleet', 'elasticfleet',
'elastic-fleet-package-registry',
'firewall', 'firewall',
'idstools', 'idstools',
'suricata.manager', 'suricata.manager',
@@ -137,6 +138,7 @@
'influxdb', 'influxdb',
'soc', 'soc',
'kratos', 'kratos',
'elastic-fleet-package-registry',
'elasticfleet', 'elasticfleet',
'firewall', 'firewall',
'manager', 'manager',
@@ -166,6 +168,7 @@
'influxdb', 'influxdb',
'soc', 'soc',
'kratos', 'kratos',
'elastic-fleet-package-registry',
'elasticfleet', 'elasticfleet',
'firewall', 'firewall',
'idstools', 'idstools',

View File

@@ -38,6 +38,7 @@ container_list() {
"so-zeek" "so-zeek"
"so-elastic-agent" "so-elastic-agent"
"so-elastic-agent-builder" "so-elastic-agent-builder"
"so-elastic-fleet-package-registry"
) )
elif [ $MANAGERCHECK != 'so-helix' ]; then elif [ $MANAGERCHECK != 'so-helix' ]; then
TRUSTED_CONTAINERS=( TRUSTED_CONTAINERS=(
@@ -45,6 +46,7 @@ container_list() {
"so-elastalert" "so-elastalert"
"so-elastic-agent" "so-elastic-agent"
"so-elastic-agent-builder" "so-elastic-agent-builder"
"so-elastic-fleet-package-registry"
"so-elasticsearch" "so-elasticsearch"
"so-idh" "so-idh"
"so-idstools" "so-idstools"

View File

@@ -7,6 +7,7 @@
{% do KIBANACONFIG.kibana.config.elasticsearch.update({'username': salt['pillar.get']('elasticsearch:auth:users:so_kibana_user:user'), 'password': salt['pillar.get']('elasticsearch:auth:users:so_kibana_user:pass')}) %} {% do KIBANACONFIG.kibana.config.elasticsearch.update({'username': salt['pillar.get']('elasticsearch:auth:users:so_kibana_user:user'), 'password': salt['pillar.get']('elasticsearch:auth:users:so_kibana_user:pass')}) %}
{% do KIBANACONFIG.kibana.config.xpack.fleet.update({'registryUrl': 'http://' ~ GLOBALS.manager_ip ~ ':8080'}) %}
{% if salt['pillar.get']('kibana:secrets') %} {% if salt['pillar.get']('kibana:secrets') %}
{% do KIBANACONFIG.kibana.config.xpack.update({'encryptedSavedObjects': {'encryptionKey': pillar['kibana']['secrets']['encryptedSavedObjects']['encryptionKey']}}) %} {% do KIBANACONFIG.kibana.config.xpack.update({'encryptedSavedObjects': {'encryptionKey': pillar['kibana']['secrets']['encryptedSavedObjects']['encryptionKey']}}) %}

View File

@@ -31,3 +31,5 @@ kibana:
reporting: reporting:
kibanaServer: kibanaServer:
hostname: localhost hostname: localhost
fleet:
registryUrl: ""

View File

@@ -176,6 +176,7 @@ base:
- redis - redis
{%- endif %} {%- endif %}
{%- if KIBANA %} {%- if KIBANA %}
- elastic-fleet-package-registry
- kibana.so_savedobjects_defaults - kibana.so_savedobjects_defaults
{%- endif %} {%- endif %}
- pcap - pcap