mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-08 02:02:50 +01:00
Enable SSL in elastic
This commit is contained in:
@@ -5,6 +5,7 @@
|
|||||||
{%- set ESCLUSTERNAME = salt['pillar.get']('elasticsearch:esclustername', '') %}
|
{%- set ESCLUSTERNAME = salt['pillar.get']('elasticsearch:esclustername', '') %}
|
||||||
{%- endif %}
|
{%- endif %}
|
||||||
{%- set NODEIP = salt['pillar.get']('elasticsearch:mainip', '') -%}
|
{%- set NODEIP = salt['pillar.get']('elasticsearch:mainip', '') -%}
|
||||||
|
{% set FEATURES = salt['pillar.get']('elastic:features', False) %}
|
||||||
cluster.name: "{{ ESCLUSTERNAME }}"
|
cluster.name: "{{ ESCLUSTERNAME }}"
|
||||||
network.host: 0.0.0.0
|
network.host: 0.0.0.0
|
||||||
|
|
||||||
@@ -22,6 +23,17 @@ cluster.routing.allocation.disk.threshold_enabled: true
|
|||||||
cluster.routing.allocation.disk.watermark.low: 95%
|
cluster.routing.allocation.disk.watermark.low: 95%
|
||||||
cluster.routing.allocation.disk.watermark.high: 98%
|
cluster.routing.allocation.disk.watermark.high: 98%
|
||||||
cluster.routing.allocation.disk.watermark.flood_stage: 98%
|
cluster.routing.allocation.disk.watermark.flood_stage: 98%
|
||||||
|
{%- if FEATURES is sameas true %}
|
||||||
|
xpack.security.enabled: true
|
||||||
|
xpack.security.http.ssl.enabled: true
|
||||||
|
xpack.security.transport.ssl.enabled: true
|
||||||
|
xpack.security.http.ssl.key: /ca/elasticsearch.key
|
||||||
|
xpack.security.http.ssl.certificate: /ca/elasticsearch.crt
|
||||||
|
xpack.security.http.ssl.certificate_authorities: /ca/ca.crt
|
||||||
|
xpack.security.transport.ssl.key: /ca/elasticsearch.key
|
||||||
|
xpack.security.transport.ssl.certificate: /ca/elasticsearch.crt
|
||||||
|
xpack.security.transport.ssl.certificate_authorities: /ca/ca.crt
|
||||||
|
{%- endif %}
|
||||||
node.attr.box_type: {{ NODE_ROUTE_TYPE }}
|
node.attr.box_type: {{ NODE_ROUTE_TYPE }}
|
||||||
node.name: {{ ESCLUSTERNAME }}
|
node.name: {{ ESCLUSTERNAME }}
|
||||||
script.max_compilations_rate: 1000/1m
|
script.max_compilations_rate: 1000/1m
|
||||||
|
|||||||
@@ -192,6 +192,11 @@ so-elasticsearch:
|
|||||||
- /nsm/elasticsearch:/usr/share/elasticsearch/data:rw
|
- /nsm/elasticsearch:/usr/share/elasticsearch/data:rw
|
||||||
- /opt/so/log/elasticsearch:/var/log/elasticsearch:rw
|
- /opt/so/log/elasticsearch:/var/log/elasticsearch:rw
|
||||||
- /opt/so/conf/ca/cacerts:/etc/pki/ca-trust/extracted/java/cacerts:ro
|
- /opt/so/conf/ca/cacerts:/etc/pki/ca-trust/extracted/java/cacerts:ro
|
||||||
|
{%- if FEATURES is sameas true %}
|
||||||
|
- /etc/pki/ca.crt:/ca/ca.cert:ro
|
||||||
|
- /etc/pki/elasticsearch.key:/ca/elasticsearch.key:ro
|
||||||
|
- /etc/pki/elasticsearch.crt:/ca/elasticsearch.crt:ro
|
||||||
|
{%- endif %}
|
||||||
- watch:
|
- watch:
|
||||||
- file: cacertz
|
- file: cacertz
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user