mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 09:12:45 +01:00
73 lines
2.8 KiB
Bash
Executable File
73 lines
2.8 KiB
Bash
Executable File
#!/bin/bash
|
|
# Copyright 2014,2015,2016,2017,2018,2019,2020 Security Onion Solutions, LLC
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
. /usr/sbin/so-common
|
|
local_salt_dir=/opt/so/saltstack/local
|
|
|
|
cat << EOF
|
|
This program will switch from the open source version of the Elastic Stack to the Features version licensed under the Elastic license.
|
|
If you proceed, then we will download new Docker images and restart services.
|
|
|
|
Please review the Elastic license:
|
|
https://raw.githubusercontent.com/elastic/elasticsearch/master/licenses/ELASTIC-LICENSE.txt
|
|
|
|
Please also note that, if you have a distributed deployment and continue with this change, Elastic traffic between nodes will change from encrypted to cleartext!
|
|
(We expect to support Elastic Features Security at some point in the future.)
|
|
|
|
Do you agree to the terms of the Elastic license and understand the note about encryption?
|
|
|
|
If so, type AGREE to accept the Elastic license and continue. Otherwise, just press Enter to exit this program without making any changes.
|
|
EOF
|
|
|
|
read INPUT
|
|
if [ "$INPUT" != "AGREE" ]; then
|
|
exit
|
|
fi
|
|
|
|
echo "Please wait while switching to Elastic Features."
|
|
|
|
manager_check() {
|
|
# Check to see if this is a manager
|
|
MANAGERCHECK=$(cat /etc/salt/grains | grep role | awk '{print $2}')
|
|
if [[ "$MANAGERCHECK" =~ ^('so-eval'|'so-manager'|'so-standalone'|'so-managersearch')$ ]]; then
|
|
echo "This is a manager. We can proceed"
|
|
else
|
|
echo "Please run so-features-enable on the manager."
|
|
exit 0
|
|
fi
|
|
}
|
|
|
|
manager_check
|
|
VERSION=$(grep soversion $local_salt_dir/pillar/global.sls | cut -d':' -f2|sed 's/ //g')
|
|
# Modify global.sls to enable Features
|
|
sed -i 's/features: False/features: True/' $local_salt_dir/pillar/global.sls
|
|
SUFFIX="-features"
|
|
TRUSTED_CONTAINERS=( \
|
|
"so-elasticsearch:$VERSION$SUFFIX" \
|
|
"so-filebeat:$VERSION$SUFFIX" \
|
|
"so-kibana:$VERSION$SUFFIX" \
|
|
"so-logstash:$VERSION$SUFFIX" )
|
|
|
|
for i in "${TRUSTED_CONTAINERS[@]}"
|
|
do
|
|
# Pull down the trusted docker image
|
|
echo "Downloading $i"
|
|
docker pull --disable-content-trust=false docker.io/$IMAGEREPO/$i
|
|
# Tag it with the new registry destination
|
|
docker tag $IMAGEREPO/$i $HOSTNAME:5000/$IMAGEREPO/$i
|
|
docker push $HOSTNAME:5000/$IMAGEREPO/$i
|
|
done
|