mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 17:22:49 +01:00
add elasticsearch.auth state to statnalone node
This commit is contained in:
@@ -7,3 +7,6 @@ elastic_auth_pillar:
|
|||||||
enabled: False
|
enabled: False
|
||||||
user: so_elastic
|
user: so_elastic
|
||||||
pass: {{ salt['random.get_str'](20) }}
|
pass: {{ salt['random.get_str'](20) }}
|
||||||
|
# since we are generating a random password, and we don't want that to happen everytime
|
||||||
|
# a highstate runs, we only manage the file if it doesn't exist
|
||||||
|
- unless: ls /opt/so/saltstack/local/pillar/elasticsearch/auth.sls
|
||||||
|
|||||||
@@ -260,9 +260,6 @@ elastic_curl_config:
|
|||||||
file.managed:
|
file.managed:
|
||||||
- name: /opt/so/conf/elasticsearch/curl.config
|
- name: /opt/so/conf/elasticsearch/curl.config
|
||||||
- mode: 600
|
- mode: 600
|
||||||
# since we are generating a random password, and we don't want that to happen everytime
|
|
||||||
# a highstate runs, we only manage the file if it doesn't exist
|
|
||||||
- unless: ls /opt/so/conf/elasticsearch/curl.config
|
|
||||||
|
|
||||||
{% endif %} {# if grains['role'] != 'so-helix' #}
|
{% endif %} {# if grains['role'] != 'so-helix' #}
|
||||||
|
|
||||||
|
|||||||
@@ -238,6 +238,7 @@ base:
|
|||||||
{%- endif %}
|
{%- endif %}
|
||||||
{%- if ELASTICSEARCH %}
|
{%- if ELASTICSEARCH %}
|
||||||
- elasticsearch
|
- elasticsearch
|
||||||
|
- elasticsearch.auth
|
||||||
{%- endif %}
|
{%- endif %}
|
||||||
{%- if LOGSTASH %}
|
{%- if LOGSTASH %}
|
||||||
- logstash
|
- logstash
|
||||||
|
|||||||
Reference in New Issue
Block a user