Merge pull request #10604 from Security-Onion-Solutions/2.4/receiver

2.4/receiver
This commit is contained in:
Josh Patterson
2023-06-15 15:42:34 -04:00
committed by GitHub
59 changed files with 38 additions and 3 deletions

View File

@@ -417,6 +417,14 @@ firewall:
- elastic_agent_control - elastic_agent_control
- elastic_agent_data - elastic_agent_data
- elastic_agent_update - elastic_agent_update
receiver:
portgroups:
- yum
- docker_registry
- influxdb
- elastic_agent_control
- elastic_agent_data
- elastic_agent_update
self: self:
portgroups: portgroups:
- syslog - syslog
@@ -486,6 +494,9 @@ firewall:
heavynode: heavynode:
portgroups: portgroups:
- salt_manager - salt_manager
receiver:
portgroups:
- salt_manager
customhostgroup0: customhostgroup0:
portgroups: [] portgroups: []
customhostgroup1: customhostgroup1:
@@ -569,6 +580,14 @@ firewall:
- elastic_agent_control - elastic_agent_control
- elastic_agent_data - elastic_agent_data
- elastic_agent_update - elastic_agent_update
receiver:
portgroups:
- yum
- docker_registry
- influxdb
- elastic_agent_control
- elastic_agent_data
- elastic_agent_update
self: self:
portgroups: portgroups:
- syslog - syslog
@@ -638,6 +657,9 @@ firewall:
heavynode: heavynode:
portgroups: portgroups:
- salt_manager - salt_manager
receiver:
portgroups:
- salt_manager
customhostgroup0: customhostgroup0:
portgroups: [] portgroups: []
customhostgroup1: customhostgroup1:
@@ -731,6 +753,14 @@ firewall:
- redis - redis
- elasticsearch_rest - elasticsearch_rest
- elasticsearch_node - elasticsearch_node
receiver:
portgroups:
- yum
- docker_registry
- influxdb
- elastic_agent_control
- elastic_agent_data
- elastic_agent_update
self: self:
portgroups: portgroups:
- syslog - syslog
@@ -806,6 +836,9 @@ firewall:
heavynode: heavynode:
portgroups: portgroups:
- salt_manager - salt_manager
receiver:
portgroups:
- salt_manager
customhostgroup0: customhostgroup0:
portgroups: [] portgroups: []
customhostgroup1: customhostgroup1:
@@ -1128,7 +1161,9 @@ firewall:
hostgroups: hostgroups:
sensor: sensor:
portgroups: portgroups:
- beats_5044
- beats_5644 - beats_5644
- elastic_agent_data
searchnode: searchnode:
portgroups: portgroups:
- redis - redis

View File

@@ -58,7 +58,7 @@ so-logstash:
- /etc/pki/filebeat.crt:/usr/share/logstash/filebeat.crt:ro - /etc/pki/filebeat.crt:/usr/share/logstash/filebeat.crt:ro
- /etc/pki/filebeat.p8:/usr/share/logstash/filebeat.key:ro - /etc/pki/filebeat.p8:/usr/share/logstash/filebeat.key:ro
{% endif %} {% endif %}
{% if GLOBALS.role in ['so-manager', 'so-managersearch', 'so-standalone', 'so-import', 'so-eval','so-fleet', 'so-heavynode'] %} {% if GLOBALS.role in ['so-manager', 'so-managersearch', 'so-standalone', 'so-import', 'so-eval','so-fleet', 'so-heavynode', 'so-receiver'] %}
- /opt/so/conf/elastic-fleet/certs/elasticfleet-logstash.crt:/usr/share/logstash/elasticfleet-logstash.crt:ro - /opt/so/conf/elastic-fleet/certs/elasticfleet-logstash.crt:/usr/share/logstash/elasticfleet-logstash.crt:ro
- /opt/so/conf/elastic-fleet/certs/elasticfleet-logstash.p8:/usr/share/logstash/elasticfleet-logstash.key:ro - /opt/so/conf/elastic-fleet/certs/elasticfleet-logstash.p8:/usr/share/logstash/elasticfleet-logstash.key:ro
{% endif %} {% endif %}

View File

@@ -3,7 +3,6 @@
{% if GLOBALS.role in ['so-eval', 'so-managersearch', 'so-manager', 'so-standalone'] %} {% if GLOBALS.role in ['so-eval', 'so-managersearch', 'so-manager', 'so-standalone'] %}
Access the Security Onion web interface at https://{{ GLOBALS.url_base }} Access the Security Onion web interface at https://{{ GLOBALS.url_base }}
(You may need to run so-allow first if you haven't yet)
{% endif %} {% endif %}
{%- if needs_restarting_check %} {%- if needs_restarting_check %}

View File

@@ -140,7 +140,7 @@ rediskeyperms:
- group: 939 - group: 939
{% endif %} {% endif %}
{% if grains['role'] in ['so-manager', 'so-eval', 'so-managersearch', 'so-standalone', 'so-import', 'so-heavynode', 'so-fleet'] %} {% if grains['role'] in ['so-manager', 'so-eval', 'so-managersearch', 'so-standalone', 'so-import', 'so-heavynode', 'so-fleet', 'so-receiver'] %}
# Create cert for Elastic Fleet Host # Create cert for Elastic Fleet Host
etc_elasticfleet_key: etc_elasticfleet_key:

View File

@@ -0,0 +1 @@
{% set ROLE_GLOBALS = {} %}