Merge pull request #212 from wazuh/3.9.3_7.2.0_issue_#184
Fixes for Elasticsearch issue #184 - Testing Elasticsearch functionality when network.host is not localhost.
This commit is contained in:
commit
befe2b6a98
@ -23,12 +23,12 @@ platforms:
|
||||
command: /sbin/init
|
||||
ulimits:
|
||||
- nofile:262144:262144
|
||||
# - name: trusty
|
||||
# image: ubuntu:trusty
|
||||
# privileged: true
|
||||
# memory_reservation: 2048m
|
||||
# ulimits:
|
||||
# - nofile:262144:262144
|
||||
#- name: trusty
|
||||
#image: ubuntu:trusty
|
||||
#privileged: true
|
||||
#memory_reservation: 2048m
|
||||
#ulimits:
|
||||
#- nofile:262144:262144
|
||||
- name: centos6
|
||||
image: centos:6
|
||||
privileged: true
|
||||
|
||||
@ -3,6 +3,7 @@ elasticsearch_cluster_name: wazuh
|
||||
elasticsearch_node_name: node-1
|
||||
elasticsearch_http_port: 9200
|
||||
elasticsearch_network_host: 127.0.0.1
|
||||
elasticsearch_host: 127.0.0.1
|
||||
elasticsearch_jvm_xms: null
|
||||
elastic_stack_version: 7.2.0
|
||||
single_node: false
|
||||
|
||||
@ -26,7 +26,7 @@
|
||||
|
||||
- name: Install Oracle Java 8
|
||||
become: true
|
||||
apt: name=openjdk-8-jdk state=latest
|
||||
apt: name=openjdk-8-jdk
|
||||
|
||||
when:
|
||||
- ansible_distribution == "Ubuntu"
|
||||
|
||||
@ -65,7 +65,7 @@
|
||||
|
||||
- name: Check if certificate exists locally
|
||||
stat:
|
||||
path: "{{node_certs_destination}}/{{ elasticsearch_node_name }}.crt"
|
||||
path: "{{ node_certs_destination }}/{{ elasticsearch_node_name }}.crt"
|
||||
register: certificate_file_exists
|
||||
when:
|
||||
- elasticsearch_xpack_security
|
||||
@ -73,7 +73,7 @@
|
||||
- name: Write the instances.yml file in the selected node (force = no)
|
||||
template:
|
||||
src: instances.yml.j2
|
||||
dest: "{{node_certs_source}}/instances.yml"
|
||||
dest: "{{ node_certs_source }}/instances.yml"
|
||||
force: no
|
||||
register: instances_file_exists
|
||||
tags:
|
||||
@ -86,23 +86,25 @@
|
||||
|
||||
- name: Update instances.yml status after generation
|
||||
stat:
|
||||
path: "{{node_certs_source}}/instances.yml"
|
||||
path: "{{ node_certs_source }}/instances.yml"
|
||||
register: instances_file_exists
|
||||
when:
|
||||
when:
|
||||
- node_certs_generator
|
||||
- elasticsearch_xpack_security
|
||||
|
||||
- name: Check if the certificates ZIP file exists
|
||||
stat:
|
||||
path: "{{node_certs_source}}/certs.zip"
|
||||
path: "{{ node_certs_source }}/certs.zip"
|
||||
register: xpack_certs_zip
|
||||
when:
|
||||
when:
|
||||
- node_certs_generator
|
||||
- elasticsearch_xpack_security
|
||||
|
||||
- name: Generating certificates for Elasticsearch security
|
||||
shell: "/usr/share/elasticsearch/bin/elasticsearch-certutil cert ca --pem --in {{node_certs_source}}/instances.yml --out {{node_certs_source}}/certs.zip"
|
||||
when:
|
||||
command: >-
|
||||
"/usr/share/elasticsearch/bin/elasticsearch-certutil cert ca --pem --in
|
||||
{{ node_certs_source }}/instances.yml --out {{ node_certs_source }}/certs.zip"
|
||||
when:
|
||||
- node_certs_generator
|
||||
- elasticsearch_xpack_security
|
||||
- not xpack_certs_zip.stat.exists
|
||||
@ -112,10 +114,10 @@
|
||||
|
||||
- name: Unzip generated certs.zip
|
||||
unarchive:
|
||||
src: "{{node_certs_source}}/certs.zip"
|
||||
dest: "{{node_certs_source}}/"
|
||||
src: "{{ node_certs_source }}/certs.zip"
|
||||
dest: "{{ node_certs_source }}/"
|
||||
remote_src: yes
|
||||
when:
|
||||
when:
|
||||
- node_certs_generator
|
||||
- elasticsearch_xpack_security
|
||||
- certs_file_generated is defined
|
||||
@ -124,35 +126,39 @@
|
||||
|
||||
- name: Copy key & certificate files in generator node (locally)
|
||||
synchronize:
|
||||
src: "{{node_certs_source}}/{{elasticsearch_node_name}}/"
|
||||
dest: "{{node_certs_destination}}/"
|
||||
src: "{{ node_certs_source }}/{{ elasticsearch_node_name }}/"
|
||||
dest: "{{ node_certs_destination }}/"
|
||||
delegate_to: "{{ node_certs_generator_ip }}"
|
||||
when:
|
||||
when:
|
||||
- node_certs_generator
|
||||
- elasticsearch_xpack_security
|
||||
tags: xpack-security
|
||||
|
||||
- name: Copy ca certificate file in generator node (locally)
|
||||
synchronize:
|
||||
src: "{{node_certs_source}}/ca/"
|
||||
dest: "{{node_certs_destination}}/"
|
||||
src: "{{ node_certs_source }}/ca/"
|
||||
dest: "{{ node_certs_destination }}/"
|
||||
delegate_to: "{{ node_certs_generator_ip }}"
|
||||
register: check_certs_permissions
|
||||
when:
|
||||
when:
|
||||
- node_certs_generator
|
||||
- elasticsearch_xpack_security
|
||||
tags: xpack-security
|
||||
|
||||
- name: Importing key & certificate files from generator node
|
||||
shell: "{{rsync_path}} {{rsync_extra_parameters}} {{rsync_user}}@{{node_certs_generator_ip}}:{{node_certs_source}}/{{elasticsearch_node_name}}/ {{node_certs_destination}}/"
|
||||
command: >-
|
||||
{{ rsync_path }} {{ rsync_extra_parameters }} {{ rsync_user }}@{{ node_certs_generator_ip }}:
|
||||
{{ node_certs_source }}/{{ elasticsearch_node_name }}/ {{ node_certs_destination }}/
|
||||
when:
|
||||
- not node_certs_generator
|
||||
- elasticsearch_xpack_security
|
||||
- not certificate_file_exists.stat.exists
|
||||
tags: xpack-security
|
||||
|
||||
- name: Importing ca certificate file from generator node
|
||||
shell: "{{rsync_path}} {{rsync_extra_parameters}} {{rsync_user}}@{{node_certs_generator_ip}}:{{node_certs_source}}/ca/ {{node_certs_destination}}/"
|
||||
- name: Importing ca certificate file from generator node
|
||||
command: >-
|
||||
{{ rsync_path }} {{ rsync_extra_parameters }} {{ rsync_user }}@{{ node_certs_generator_ip }}:
|
||||
{{ node_certs_source }}/ca/ {{ node_certs_destination }}/
|
||||
when:
|
||||
- not node_certs_generator
|
||||
- elasticsearch_xpack_security
|
||||
@ -161,23 +167,32 @@
|
||||
tags: xpack-security
|
||||
|
||||
- name: Ensuring certificates folder owner
|
||||
shell: "chown -R elasticsearch: {{node_certs_destination}}/"
|
||||
file:
|
||||
path: "{{ node_certs_destination }}/"
|
||||
state: directory
|
||||
recurse: yes
|
||||
owner: elasticsearch
|
||||
group: elasticsearch
|
||||
when:
|
||||
- check_certs_permissions is defined
|
||||
- elasticsearch_xpack_security
|
||||
tags: xpack-security
|
||||
|
||||
- name: Ensuring certificates folder owner
|
||||
shell: "chmod -R 770 {{node_certs_destination}}/"
|
||||
file:
|
||||
path: "{{ node_certs_destination }}/"
|
||||
mode: '0770'
|
||||
recurse: yes
|
||||
when:
|
||||
- check_certs_permissions is defined
|
||||
- elasticsearch_xpack_security
|
||||
tags: xpack-security
|
||||
|
||||
|
||||
- name: Remove generated certs file
|
||||
shell: /bin/rm -f {{node_certs_source}}/certs.zip*
|
||||
when:
|
||||
file:
|
||||
state: absent
|
||||
path: "{{ node_certs_source }}/certs.zip*"
|
||||
when:
|
||||
- node_certs_generator
|
||||
- elasticsearch_xpack_security
|
||||
tags: xpack-security
|
||||
@ -193,10 +208,12 @@
|
||||
tags: configure
|
||||
|
||||
- name: Set elasticsearch bootstrap password
|
||||
shell: "echo '{{elasticsearch_xpack_security_password}}' | {{node_certs_source}}/bin/elasticsearch-keystore add -xf 'bootstrap.password'"
|
||||
shell: |
|
||||
set -o pipefail
|
||||
"echo '{{ elasticsearch_xpack_security_password }}' | {{ node_certs_source }}/bin/elasticsearch-keystore add -xf 'bootstrap.password'"
|
||||
when:
|
||||
- elasticsearch_xpack_security
|
||||
|
||||
|
||||
- name: Trusty | set MAX_LOCKED_MEMORY=unlimited in Elasticsearch in /etc/security/limits.conf
|
||||
lineinfile:
|
||||
path: /etc/security/limits.conf
|
||||
@ -242,7 +259,7 @@
|
||||
state: started
|
||||
|
||||
- name: Make sure Elasticsearch is running before proceeding
|
||||
wait_for: host={{ elasticsearch_network_host }} port={{ elasticsearch_http_port }} delay=3 timeout=300
|
||||
wait_for: host={{ elasticsearch_host }} port={{ elasticsearch_http_port }} delay=3 timeout=400
|
||||
tags:
|
||||
- configure
|
||||
- init
|
||||
@ -252,7 +269,7 @@
|
||||
url: "http://{{ elasticsearch_network_host }}:{{ elasticsearch_http_port }}/_template/wazuh"
|
||||
method: GET
|
||||
status_code: 200, 404
|
||||
when:
|
||||
when:
|
||||
- elasticsearch_bootstrap_node or single_node
|
||||
- not elasticsearch_xpack_security
|
||||
poll: 30
|
||||
@ -267,7 +284,7 @@
|
||||
status_code: 200
|
||||
body_format: json
|
||||
body: "{{ lookup('template','wazuh-elastic7-template-alerts.json.j2') }}"
|
||||
when:
|
||||
when:
|
||||
- wazuh_alerts_template_exits.status is defined
|
||||
- wazuh_alerts_template_exits.status != 200
|
||||
- not elasticsearch_xpack_security
|
||||
|
||||
Loading…
Reference in New Issue
Block a user