mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 17:22:49 +01:00
Merge pull request #13624 from Security-Onion-Solutions/esver
fix es agent update for soup
This commit is contained in:
@@ -677,7 +677,8 @@ has_uppercase() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
update_elastic_agent() {
|
update_elastic_agent() {
|
||||||
get_elastic_agent_vars
|
local path="${1:-/opt/so/saltstack/default}"
|
||||||
|
get_elastic_agent_vars "$path"
|
||||||
echo "Checking if Elastic Agent update is necessary..."
|
echo "Checking if Elastic Agent update is necessary..."
|
||||||
download_and_verify "$ELASTIC_AGENT_URL" "$ELASTIC_AGENT_MD5_URL" "$ELASTIC_AGENT_FILE" "$ELASTIC_AGENT_MD5" "$ELASTIC_AGENT_EXPANSION_DIR"
|
download_and_verify "$ELASTIC_AGENT_URL" "$ELASTIC_AGENT_MD5_URL" "$ELASTIC_AGENT_FILE" "$ELASTIC_AGENT_MD5" "$ELASTIC_AGENT_EXPANSION_DIR"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -5,7 +5,7 @@
|
|||||||
# this file except in compliance with the Elastic License 2.0.
|
# this file except in compliance with the Elastic License 2.0.
|
||||||
|
|
||||||
. /usr/sbin/so-common
|
. /usr/sbin/so-common
|
||||||
{%- import_yaml 'elasticsearch/defaults.yaml' as ELASTICSEARCHDEFAULTS -%}
|
{%- import_yaml 'elasticsearch/defaults.yaml' as ELASTICSEARCHDEFAULTS %}
|
||||||
|
|
||||||
# Only run on Managers
|
# Only run on Managers
|
||||||
if ! is_manager_node; then
|
if ! is_manager_node; then
|
||||||
|
|||||||
@@ -837,12 +837,13 @@ determine_elastic_agent_upgrade() {
|
|||||||
if [[ $is_airgap -eq 0 ]]; then
|
if [[ $is_airgap -eq 0 ]]; then
|
||||||
update_elastic_agent_airgap
|
update_elastic_agent_airgap
|
||||||
else
|
else
|
||||||
update_elastic_agent
|
# the new elasticsearch defaults.yaml file is not yet placed in /opt/so/saltstack/default/salt/elasticsearch yet
|
||||||
|
update_elastic_agent "$UPDATE_DIR"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
update_elastic_agent_airgap() {
|
update_elastic_agent_airgap() {
|
||||||
get_elastic_agent_vars
|
get_elastic_agent_vars "/tmp/soagupdate/SecurityOnion"
|
||||||
rsync -av /tmp/soagupdate/fleet/* /nsm/elastic-fleet/artifacts/
|
rsync -av /tmp/soagupdate/fleet/* /nsm/elastic-fleet/artifacts/
|
||||||
tar -xf "$ELASTIC_AGENT_FILE" -C "$ELASTIC_AGENT_EXPANSION_DIR"
|
tar -xf "$ELASTIC_AGENT_FILE" -C "$ELASTIC_AGENT_EXPANSION_DIR"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -7,5 +7,5 @@
|
|||||||
|
|
||||||
. /usr/sbin/so-common
|
. /usr/sbin/so-common
|
||||||
|
|
||||||
retry 40 3 'docker exec -it so-suricata /opt/suricata/bin/suricatasc -c reload-rules /var/run/suricata/suricata-command.socket' '{"message": "done", "return": "OK"}'
|
retry 60 3 'docker exec -it so-suricata /opt/suricata/bin/suricatasc -c reload-rules /var/run/suricata/suricata-command.socket' '{"message": "done", "return": "OK"}' || fail "The Suricata container was not ready in time."
|
||||||
retry 40 3 'docker exec -it so-suricata /opt/suricata/bin/suricatasc -c ruleset-reload-nonblocking /var/run/suricata/suricata-command.socket' '{"message": "done", "return": "OK"}'
|
retry 60 3 'docker exec -it so-suricata /opt/suricata/bin/suricatasc -c ruleset-reload-nonblocking /var/run/suricata/suricata-command.socket' '{"message": "done", "return": "OK"}' || fail "The Suricata container was not ready in time."
|
||||||
|
|||||||
@@ -759,8 +759,8 @@ if ! [[ -f $install_opt_file ]]; then
|
|||||||
title "Downloading IDS Rules"
|
title "Downloading IDS Rules"
|
||||||
logCmd "so-rule-update"
|
logCmd "so-rule-update"
|
||||||
if [[ $monints || $is_import ]]; then
|
if [[ $monints || $is_import ]]; then
|
||||||
title "Restarting Suricata to pick up the new rules"
|
title "Applying the Suricata state to load the new rules"
|
||||||
logCmd "so-suricata-restart"
|
logCmd "salt-call state.apply suricata -l info"
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
title "Setting up Kibana Default Space"
|
title "Setting up Kibana Default Space"
|
||||||
|
|||||||
Reference in New Issue
Block a user