mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2026-03-26 06:22:39 +01:00
Add ulimits as a configurable advanced setting for every container, allowing customization through the web UI. Move hardcoded ulimits from elasticsearch and zeek into defaults.yaml and fix elasticsearch ulimits that were incorrectly nested under the environment key. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
103 lines
3.5 KiB
Plaintext
103 lines
3.5 KiB
Plaintext
# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one
|
|
# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at
|
|
# https://securityonion.net/license; you may not use this file except in compliance with the
|
|
# Elastic License 2.0.
|
|
|
|
{% from 'allowed_states.map.jinja' import allowed_states %}
|
|
{% if sls.split('.')[0] in allowed_states %}
|
|
{% from 'vars/globals.map.jinja' import GLOBALS %}
|
|
{% from 'docker/docker.map.jinja' import DOCKER %}
|
|
{% from 'telegraf/map.jinja' import TELEGRAFMERGED %}
|
|
|
|
include:
|
|
- ca
|
|
- telegraf.ssl
|
|
- telegraf.config
|
|
- telegraf.sostatus
|
|
|
|
so-telegraf:
|
|
docker_container.running:
|
|
- image: {{ GLOBALS.registry_host }}:5000/{{ GLOBALS.image_repo }}/so-telegraf:{{ GLOBALS.so_version }}
|
|
- user: 939
|
|
- group_add: 939,920
|
|
- environment:
|
|
- HOST_ETC=/host/etc
|
|
- HOST_SYS=/host/sys
|
|
- HOST_MOUNT_PREFIX=/host
|
|
- GODEBUG=x509ignoreCN=0
|
|
{% if DOCKER.containers['so-telegraf'].extra_env %}
|
|
{% for XTRAENV in DOCKER.containers['so-telegraf'].extra_env %}
|
|
- {{ XTRAENV }}
|
|
{% endfor %}
|
|
{% endif %}
|
|
- network_mode: host
|
|
- init: True
|
|
- binds:
|
|
- /opt/so/log/telegraf:/var/log/telegraf:rw
|
|
- /opt/so/conf/telegraf/etc/telegraf.conf:/etc/telegraf/telegraf.conf:ro
|
|
- /opt/so/conf/telegraf/node_config.json:/etc/telegraf/node_config.json:ro
|
|
- /var/run/utmp:/var/run/utmp:ro
|
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
|
- /:/host:ro
|
|
- /sys:/host/sys:ro
|
|
- /proc:/host/proc:ro
|
|
- /nsm:/host/nsm:ro
|
|
- /etc:/host/etc:ro
|
|
- /etc/pki/tls/certs/intca.crt:/etc/telegraf/ca.crt:ro
|
|
- /etc/pki/telegraf.crt:/etc/telegraf/telegraf.crt:ro
|
|
- /etc/pki/telegraf.key:/etc/telegraf/telegraf.key:ro
|
|
- /opt/so/conf/telegraf/scripts:/scripts:ro
|
|
- /opt/so/log/suricata:/var/log/suricata:ro
|
|
- /opt/so/log/raid:/var/log/raid:ro
|
|
- /opt/so/log/sostatus:/var/log/sostatus:ro
|
|
- /opt/so/log/salt:/var/log/salt:ro
|
|
- /opt/so/log/agents:/var/log/agents:ro
|
|
{% if GLOBALS.is_manager or GLOBALS.role == 'so-heavynode' %}
|
|
- /opt/so/conf/telegraf/etc/escurl.config:/etc/telegraf/elasticsearch.config:ro
|
|
{% endif %}
|
|
{% if DOCKER.containers['so-telegraf'].custom_bind_mounts %}
|
|
{% for BIND in DOCKER.containers['so-telegraf'].custom_bind_mounts %}
|
|
- {{ BIND }}
|
|
{% endfor %}
|
|
{% endif %}
|
|
{% if DOCKER.containers['so-telegraf'].extra_hosts %}
|
|
- extra_hosts:
|
|
{% for XTRAHOST in DOCKER.containers['so-telegraf'].extra_hosts %}
|
|
- {{ XTRAHOST }}
|
|
{% endfor %}
|
|
{% endif %}
|
|
{% if DOCKER.containers['so-telegraf'].ulimits %}
|
|
- ulimits:
|
|
{% for ULIMIT in DOCKER.containers['so-telegraf'].ulimits %}
|
|
- {{ ULIMIT }}
|
|
{% endfor %}
|
|
{% endif %}
|
|
- watch:
|
|
- file: trusttheca
|
|
- x509: telegraf_crt
|
|
- x509: telegraf_key
|
|
- file: tgrafconf
|
|
- file: node_config
|
|
{% for script in TELEGRAFMERGED.scripts[GLOBALS.role.split('-')[1]] %}
|
|
- file: tgraf_sync_script_{{script}}
|
|
{% endfor %}
|
|
- require:
|
|
- file: trusttheca
|
|
- x509: telegraf_crt
|
|
- x509: telegraf_key
|
|
- file: tgrafconf
|
|
- file: node_config
|
|
|
|
delete_so-telegraf_so-status.disabled:
|
|
file.uncomment:
|
|
- name: /opt/so/conf/so-status/so-status.conf
|
|
- regex: ^so-telegraf$
|
|
|
|
{% else %}
|
|
|
|
{{sls}}_state_not_allowed:
|
|
test.fail_without_changes:
|
|
- name: {{sls}}_state_not_allowed
|
|
|
|
{% endif %}
|