Merge pull request #9912 from Security-Onion-Solutions/2.4/heavynode

2.4/heavynode
This commit is contained in:
Josh Patterson
2023-03-08 14:11:43 -05:00
committed by GitHub
10 changed files with 37 additions and 12 deletions
+3
View File
@@ -10,6 +10,7 @@ base:
- sensoroni.adv_sensoroni - sensoroni.adv_sensoroni
- telegraf.soc_telegraf - telegraf.soc_telegraf
- telegraf.adv_telegraf - telegraf.adv_telegraf
- influxdb.token
- node_data.ips - node_data.ips
'* and not *_eval and not *_import': '* and not *_eval and not *_import':
@@ -27,6 +28,8 @@ base:
- logstash.soc_logstash - logstash.soc_logstash
- logstash.adv_logstash - logstash.adv_logstash
- elasticsearch.index_templates - elasticsearch.index_templates
- elasticsearch.soc_elasticsearch
- elasticsearch.adv_elasticsearch
'*_manager': '*_manager':
- logstash - logstash
+2 -2
View File
@@ -411,11 +411,9 @@ role:
elasticsearch_rest: elasticsearch_rest:
portgroups: portgroups:
- {{ portgroups.elasticsearch_rest }} - {{ portgroups.elasticsearch_rest }}
{% if TRUE_CLUSTER %}
searchnodes: searchnodes:
portgroups: portgroups:
- {{ portgroups.elasticsearch_node }} - {{ portgroups.elasticsearch_node }}
{% endif %}
self: self:
portgroups: portgroups:
- {{ portgroups.syslog}} - {{ portgroups.syslog}}
@@ -469,6 +467,8 @@ role:
self: self:
portgroups: portgroups:
- {{ portgroups.syslog}} - {{ portgroups.syslog}}
- {{ portgroups.elasticsearch_node }}
- {{ portgroups.elasticsearch_rest }}
strelka_frontend: strelka_frontend:
portgroups: portgroups:
- {{ portgroups.strelka_frontend }} - {{ portgroups.strelka_frontend }}
+1 -1
View File
@@ -1 +1 @@
header = "Authorization: Token {{ salt['pillar.get']('secrets:influx_token') }}" header = "Authorization: Token {{ salt['pillar.get']('influxdb:token') }}"
+1 -1
View File
@@ -6,7 +6,7 @@
{% if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-eval', 'so-import'] %} {% if grains['role'] in ['so-manager', 'so-managersearch', 'so-standalone', 'so-eval', 'so-import'] %}
{% set PASSWORD = salt['pillar.get']('secrets:influx_pass') %} {% set PASSWORD = salt['pillar.get']('secrets:influx_pass') %}
{% set TOKEN = salt['pillar.get']('secrets:influx_token') %} {% set TOKEN = salt['pillar.get']('influxdb:token') %}
include: include:
- salt.minion - salt.minion
+1 -1
View File
@@ -1,7 +1,7 @@
{% import_yaml 'soc/defaults.yaml' as SOCDEFAULTS %} {% import_yaml 'soc/defaults.yaml' as SOCDEFAULTS %}
{% from 'vars/globals.map.jinja' import GLOBALS %} {% from 'vars/globals.map.jinja' import GLOBALS %}
{% from 'docker/docker.map.jinja' import DOCKER -%} {% from 'docker/docker.map.jinja' import DOCKER -%}
{% set INFLUXDB_TOKEN = salt['pillar.get']('secrets:influx_token') %} {% set INFLUXDB_TOKEN = salt['pillar.get']('influxdb:token') %}
{% import_text 'influxdb/metrics_link.txt' as METRICS_LINK %} {% import_text 'influxdb/metrics_link.txt' as METRICS_LINK %}
{% for module, application_url in GLOBALS.application_urls.items() %} {% for module, application_url in GLOBALS.application_urls.items() %}
+1 -1
View File
@@ -2,7 +2,7 @@
{%- set INFLUXDBHOST = GLOBALS.influxdb_host %} {%- set INFLUXDBHOST = GLOBALS.influxdb_host %}
{%- set ES_USER = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:user', '') %} {%- set ES_USER = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:user', '') %}
{%- set ES_PASS = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %} {%- set ES_PASS = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %}
{%- set TOKEN = salt['pillar.get']('secrets:influx_token', '') %} {%- set TOKEN = salt['pillar.get']('influxdb:token', '') %}
{%- set NODEIP = GLOBALS.node_ip %} {%- set NODEIP = GLOBALS.node_ip %}
{%- set UNIQUEID = salt['pillar.get']('sensor:uniqueid', '') %} {%- set UNIQUEID = salt['pillar.get']('sensor:uniqueid', '') %}
{%- set ZEEK_ENABLED = salt['pillar.get']('zeek:enabled', True) %} {%- set ZEEK_ENABLED = salt['pillar.get']('zeek:enabled', True) %}
+4 -2
View File
@@ -147,6 +147,7 @@ base:
- schedule - schedule
- soctopus - soctopus
- playbook - playbook
- elastic-fleet
- docker_clean - docker_clean
'*_standalone and G@saltversion:{{saltversion}}': '*_standalone and G@saltversion:{{saltversion}}':
@@ -197,8 +198,8 @@ base:
- schedule - schedule
- soctopus - soctopus
- playbook - playbook
- docker_clean
- elastic-fleet - elastic-fleet
- docker_clean
'*_searchnode and G@saltversion:{{saltversion}}': '*_searchnode and G@saltversion:{{saltversion}}':
- match: compound - match: compound
@@ -256,6 +257,7 @@ base:
- schedule - schedule
- soctopus - soctopus
- playbook - playbook
- elastic-fleet
- docker_clean - docker_clean
'*_heavynode and G@saltversion:{{saltversion}}': '*_heavynode and G@saltversion:{{saltversion}}':
@@ -315,8 +317,8 @@ base:
- suricata - suricata
- zeek - zeek
- schedule - schedule
- docker_clean
- elastic-fleet - elastic-fleet
- docker_clean
'*_receiver and G@saltversion:{{saltversion}}': '*_receiver and G@saltversion:{{saltversion}}':
- match: compound - match: compound
+17
View File
@@ -0,0 +1,17 @@
{% from 'vars/elasticsearch.map.jinja' import ELASTICSEARCH_GLOBALS %}
{% from 'vars/logstash.map.jinja' import LOGSTASH_GLOBALS %}
{% from 'vars/sensor.map.jinja' import SENSOR_GLOBALS %}
{% set ROLE_GLOBALS = {} %}
{% set HEAVYNODE_GLOBALS =
[
SENSOR_GLOBALS,
ELASTICSEARCH_GLOBALS,
LOGSTASH_GLOBALS
]
%}
{% for sg in HEAVYNODE_GLOBALS %}
{% do salt['defaults.merge'](ROLE_GLOBALS, sg, merge_lists=False, in_place=True) %}
{% endfor %}
+6 -3
View File
@@ -899,6 +899,7 @@ create_manager_pillars() {
kratos_pillar kratos_pillar
soc_pillar soc_pillar
idh_pillar idh_pillar
influxdb_pillar
} }
@@ -1538,6 +1539,9 @@ influxdb_pillar() {
title "Create the influxdb pillar file" title "Create the influxdb pillar file"
touch $adv_influxdb_pillar_file touch $adv_influxdb_pillar_file
touch $influxdb_pillar_file touch $influxdb_pillar_file
printf '%s\n'\
"influxdb:"\
" token: $INFLUXTOKEN" > $local_salt_dir/pillar/influxdb/token.sls
} }
make_some_dirs() { make_some_dirs() {
@@ -1704,7 +1708,7 @@ process_installtype() {
elif [ "$install_type" = 'SEARCHNODE' ]; then elif [ "$install_type" = 'SEARCHNODE' ]; then
is_searchnode=true is_searchnode=true
elif [ "$install_type" = 'HEAVYNODE' ]; then elif [ "$install_type" = 'HEAVYNODE' ]; then
is_heavy=true is_heavynode=true
elif [ "$install_type" = 'FLEET' ]; then elif [ "$install_type" = 'FLEET' ]; then
is_fleet=true is_fleet=true
elif [ "$install_type" = 'IDH' ]; then elif [ "$install_type" = 'IDH' ]; then
@@ -2066,8 +2070,7 @@ secrets_pillar(){
" playbook_admin: $PLAYBOOKADMINPASS"\ " playbook_admin: $PLAYBOOKADMINPASS"\
" playbook_automation: $PLAYBOOKAUTOMATIONPASS"\ " playbook_automation: $PLAYBOOKAUTOMATIONPASS"\
" playbook_automation_api_key: "\ " playbook_automation_api_key: "\
" influx_pass: $INFLUXPASS"\ " influx_pass: $INFLUXPASS" > $local_salt_dir/pillar/secrets.sls
" influx_token: $INFLUXTOKEN" > $local_salt_dir/pillar/secrets.sls
fi fi
} }
+1 -1
View File
@@ -638,5 +638,5 @@ if ! [[ -f $install_opt_file ]]; then
verify_setup verify_setup
fi fi
# Need to make sure the latest install is located on the web server of the manager to check the versions and donwload the code if required # Need to make sure the latest install is located on the web server of the manager to check the versions and download the code if required
fi fi