Merge pull request #212 from wazuh/3.9.3_7.2.0_issue_#184
Fixes for Elasticsearch issue #184 - Testing Elasticsearch functionality when network.host is not localhost.
This commit is contained in:
commit
befe2b6a98
@ -3,6 +3,7 @@ elasticsearch_cluster_name: wazuh
|
|||||||
elasticsearch_node_name: node-1
|
elasticsearch_node_name: node-1
|
||||||
elasticsearch_http_port: 9200
|
elasticsearch_http_port: 9200
|
||||||
elasticsearch_network_host: 127.0.0.1
|
elasticsearch_network_host: 127.0.0.1
|
||||||
|
elasticsearch_host: 127.0.0.1
|
||||||
elasticsearch_jvm_xms: null
|
elasticsearch_jvm_xms: null
|
||||||
elastic_stack_version: 7.2.0
|
elastic_stack_version: 7.2.0
|
||||||
single_node: false
|
single_node: false
|
||||||
|
|||||||
@ -26,7 +26,7 @@
|
|||||||
|
|
||||||
- name: Install Oracle Java 8
|
- name: Install Oracle Java 8
|
||||||
become: true
|
become: true
|
||||||
apt: name=openjdk-8-jdk state=latest
|
apt: name=openjdk-8-jdk
|
||||||
|
|
||||||
when:
|
when:
|
||||||
- ansible_distribution == "Ubuntu"
|
- ansible_distribution == "Ubuntu"
|
||||||
|
|||||||
@ -101,7 +101,9 @@
|
|||||||
- elasticsearch_xpack_security
|
- elasticsearch_xpack_security
|
||||||
|
|
||||||
- name: Generating certificates for Elasticsearch security
|
- name: Generating certificates for Elasticsearch security
|
||||||
shell: "/usr/share/elasticsearch/bin/elasticsearch-certutil cert ca --pem --in {{node_certs_source}}/instances.yml --out {{node_certs_source}}/certs.zip"
|
command: >-
|
||||||
|
"/usr/share/elasticsearch/bin/elasticsearch-certutil cert ca --pem --in
|
||||||
|
{{ node_certs_source }}/instances.yml --out {{ node_certs_source }}/certs.zip"
|
||||||
when:
|
when:
|
||||||
- node_certs_generator
|
- node_certs_generator
|
||||||
- elasticsearch_xpack_security
|
- elasticsearch_xpack_security
|
||||||
@ -144,7 +146,9 @@
|
|||||||
tags: xpack-security
|
tags: xpack-security
|
||||||
|
|
||||||
- name: Importing key & certificate files from generator node
|
- name: Importing key & certificate files from generator node
|
||||||
shell: "{{rsync_path}} {{rsync_extra_parameters}} {{rsync_user}}@{{node_certs_generator_ip}}:{{node_certs_source}}/{{elasticsearch_node_name}}/ {{node_certs_destination}}/"
|
command: >-
|
||||||
|
{{ rsync_path }} {{ rsync_extra_parameters }} {{ rsync_user }}@{{ node_certs_generator_ip }}:
|
||||||
|
{{ node_certs_source }}/{{ elasticsearch_node_name }}/ {{ node_certs_destination }}/
|
||||||
when:
|
when:
|
||||||
- not node_certs_generator
|
- not node_certs_generator
|
||||||
- elasticsearch_xpack_security
|
- elasticsearch_xpack_security
|
||||||
@ -152,7 +156,9 @@
|
|||||||
tags: xpack-security
|
tags: xpack-security
|
||||||
|
|
||||||
- name: Importing ca certificate file from generator node
|
- name: Importing ca certificate file from generator node
|
||||||
shell: "{{rsync_path}} {{rsync_extra_parameters}} {{rsync_user}}@{{node_certs_generator_ip}}:{{node_certs_source}}/ca/ {{node_certs_destination}}/"
|
command: >-
|
||||||
|
{{ rsync_path }} {{ rsync_extra_parameters }} {{ rsync_user }}@{{ node_certs_generator_ip }}:
|
||||||
|
{{ node_certs_source }}/ca/ {{ node_certs_destination }}/
|
||||||
when:
|
when:
|
||||||
- not node_certs_generator
|
- not node_certs_generator
|
||||||
- elasticsearch_xpack_security
|
- elasticsearch_xpack_security
|
||||||
@ -161,22 +167,31 @@
|
|||||||
tags: xpack-security
|
tags: xpack-security
|
||||||
|
|
||||||
- name: Ensuring certificates folder owner
|
- name: Ensuring certificates folder owner
|
||||||
shell: "chown -R elasticsearch: {{node_certs_destination}}/"
|
file:
|
||||||
|
path: "{{ node_certs_destination }}/"
|
||||||
|
state: directory
|
||||||
|
recurse: yes
|
||||||
|
owner: elasticsearch
|
||||||
|
group: elasticsearch
|
||||||
when:
|
when:
|
||||||
- check_certs_permissions is defined
|
- check_certs_permissions is defined
|
||||||
- elasticsearch_xpack_security
|
- elasticsearch_xpack_security
|
||||||
tags: xpack-security
|
tags: xpack-security
|
||||||
|
|
||||||
- name: Ensuring certificates folder owner
|
- name: Ensuring certificates folder owner
|
||||||
shell: "chmod -R 770 {{node_certs_destination}}/"
|
file:
|
||||||
|
path: "{{ node_certs_destination }}/"
|
||||||
|
mode: '0770'
|
||||||
|
recurse: yes
|
||||||
when:
|
when:
|
||||||
- check_certs_permissions is defined
|
- check_certs_permissions is defined
|
||||||
- elasticsearch_xpack_security
|
- elasticsearch_xpack_security
|
||||||
tags: xpack-security
|
tags: xpack-security
|
||||||
|
|
||||||
|
|
||||||
- name: Remove generated certs file
|
- name: Remove generated certs file
|
||||||
shell: /bin/rm -f {{node_certs_source}}/certs.zip*
|
file:
|
||||||
|
state: absent
|
||||||
|
path: "{{ node_certs_source }}/certs.zip*"
|
||||||
when:
|
when:
|
||||||
- node_certs_generator
|
- node_certs_generator
|
||||||
- elasticsearch_xpack_security
|
- elasticsearch_xpack_security
|
||||||
@ -193,7 +208,9 @@
|
|||||||
tags: configure
|
tags: configure
|
||||||
|
|
||||||
- name: Set elasticsearch bootstrap password
|
- name: Set elasticsearch bootstrap password
|
||||||
shell: "echo '{{elasticsearch_xpack_security_password}}' | {{node_certs_source}}/bin/elasticsearch-keystore add -xf 'bootstrap.password'"
|
shell: |
|
||||||
|
set -o pipefail
|
||||||
|
"echo '{{ elasticsearch_xpack_security_password }}' | {{ node_certs_source }}/bin/elasticsearch-keystore add -xf 'bootstrap.password'"
|
||||||
when:
|
when:
|
||||||
- elasticsearch_xpack_security
|
- elasticsearch_xpack_security
|
||||||
|
|
||||||
@ -242,7 +259,7 @@
|
|||||||
state: started
|
state: started
|
||||||
|
|
||||||
- name: Make sure Elasticsearch is running before proceeding
|
- name: Make sure Elasticsearch is running before proceeding
|
||||||
wait_for: host={{ elasticsearch_network_host }} port={{ elasticsearch_http_port }} delay=3 timeout=300
|
wait_for: host={{ elasticsearch_host }} port={{ elasticsearch_http_port }} delay=3 timeout=400
|
||||||
tags:
|
tags:
|
||||||
- configure
|
- configure
|
||||||
- init
|
- init
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user