diff --git a/.DS_Store b/.DS_Store new file mode 100644 index 0000000..e874941 Binary files /dev/null and b/.DS_Store differ diff --git a/Apps_for_DS/01-Conf_license_slave/default/app.conf b/Apps_for_DS/01-Conf_license_slave/default/app.conf new file mode 100755 index 0000000..149b00b --- /dev/null +++ b/Apps_for_DS/01-Conf_license_slave/default/app.conf @@ -0,0 +1,11 @@ + [launcher] + version = 1.0.0 + author = VABOS + description = Configure instance as License Slave + + [package] + id = Conf_license_slave + + + [ui] + is_visible = false \ No newline at end of file diff --git a/Apps_for_DS/01-Conf_license_slave/default/server.conf b/Apps_for_DS/01-Conf_license_slave/default/server.conf new file mode 100755 index 0000000..b852a52 --- /dev/null +++ b/Apps_for_DS/01-Conf_license_slave/default/server.conf @@ -0,0 +1,9 @@ + # In distributed environments, it's common to have a lone search head acting + # as the license master as well. In this configuration, providing the URI + # of the license master is easiest within the indexer_base configuration. + # In the event that there are multiple search heads, you could instead use + # the org_all_license app, shipped to the non-license SH, as well as all of + # the indexers. In either event, the settings are the same. + + [license] + master_uri = https://SVLCTPLOGLMR.mom.fr:8089 \ No newline at end of file diff --git a/Apps_for_DS/01-Conf_license_slave/local/app.conf b/Apps_for_DS/01-Conf_license_slave/local/app.conf new file mode 100755 index 0000000..1173ea8 --- /dev/null +++ b/Apps_for_DS/01-Conf_license_slave/local/app.conf @@ -0,0 +1 @@ +# Autogenerated file \ No newline at end of file diff --git a/Apps_for_DS/01-idx_kvstore_base/default/app.conf b/Apps_for_DS/01-idx_kvstore_base/default/app.conf new file mode 100755 index 0000000..693301d --- /dev/null +++ b/Apps_for_DS/01-idx_kvstore_base/default/app.conf @@ -0,0 +1,11 @@ +[launcher] +version = 1.0.0 +author = VABOS +description = Disable Kvstore on Indexers + +[package] +id = edf_idx_kvstore_base + + +[ui] +is_visible = false diff --git a/Apps_for_DS/01-idx_kvstore_base/default/server.conf b/Apps_for_DS/01-idx_kvstore_base/default/server.conf new file mode 100755 index 0000000..f4cf81b --- /dev/null +++ b/Apps_for_DS/01-idx_kvstore_base/default/server.conf @@ -0,0 +1,4 @@ +# kvstore not needed on indexers, let's disable it +# even when distributing collection via bundle, it won't be used on indexer as this use lookups in the background +[kvstore] +disabled = true diff --git a/Apps_for_DS/01-idx_kvstore_base/local/app.conf b/Apps_for_DS/01-idx_kvstore_base/local/app.conf new file mode 100755 index 0000000..1173ea8 --- /dev/null +++ b/Apps_for_DS/01-idx_kvstore_base/local/app.conf @@ -0,0 +1 @@ +# Autogenerated file \ No newline at end of file diff --git a/Apps_for_DS/01-idx_receiver_port/default/app.conf b/Apps_for_DS/01-idx_receiver_port/default/app.conf new file mode 100755 index 0000000..c02c82c --- /dev/null +++ b/Apps_for_DS/01-idx_receiver_port/default/app.conf @@ -0,0 +1,11 @@ +[launcher] +version = 1.0.0 +author = VABOS +description = Enable receiving on Indexer layer + +[package] +id = edf_idx_receiver_port + + +[ui] +is_visible = false diff --git a/Apps_for_DS/01-idx_receiver_port/default/inputs.conf b/Apps_for_DS/01-idx_receiver_port/default/inputs.conf new file mode 100755 index 0000000..f9562b9 --- /dev/null +++ b/Apps_for_DS/01-idx_receiver_port/default/inputs.conf @@ -0,0 +1 @@ +[splunktcp://9997] diff --git a/Apps_for_DS/01-idx_receiver_port/local/app.conf b/Apps_for_DS/01-idx_receiver_port/local/app.conf new file mode 100755 index 0000000..1173ea8 --- /dev/null +++ b/Apps_for_DS/01-idx_receiver_port/local/app.conf @@ -0,0 +1 @@ +# Autogenerated file \ No newline at end of file diff --git a/Apps_for_DS/01-idx_volume_indexes/.DS_Store b/Apps_for_DS/01-idx_volume_indexes/.DS_Store new file mode 100644 index 0000000..028aabb Binary files /dev/null and b/Apps_for_DS/01-idx_volume_indexes/.DS_Store differ diff --git a/Apps_for_DS/01-idx_volume_indexes/default/app.conf b/Apps_for_DS/01-idx_volume_indexes/default/app.conf new file mode 100755 index 0000000..538800e --- /dev/null +++ b/Apps_for_DS/01-idx_volume_indexes/default/app.conf @@ -0,0 +1,11 @@ + +[launcher] +version = 1.0.0 +author = VABOS +description = Contient la configuration des volumes de données + +[package] +id = edf_idx_volume_indexes + +[ui] +is_visible = false \ No newline at end of file diff --git a/Apps_for_DS/01-idx_volume_indexes/default/indexes.conf b/Apps_for_DS/01-idx_volume_indexes/default/indexes.conf new file mode 100755 index 0000000..840aac3 --- /dev/null +++ b/Apps_for_DS/01-idx_volume_indexes/default/indexes.conf @@ -0,0 +1,7 @@ +[volume:primary] +path = /data/splunk_data +maxVolumeDataSizeMB = 60000 + +[volume:secondary] +path = /data_cold/splunk_data +maxVolumeDataSizeMB = 240000 diff --git a/Apps_for_DS/01-idx_volume_indexes/local/app.conf b/Apps_for_DS/01-idx_volume_indexes/local/app.conf new file mode 100755 index 0000000..1173ea8 --- /dev/null +++ b/Apps_for_DS/01-idx_volume_indexes/local/app.conf @@ -0,0 +1 @@ +# Autogenerated file \ No newline at end of file diff --git a/Apps_for_DS/01-idx_volume_indexes/metadata/local.meta b/Apps_for_DS/01-idx_volume_indexes/metadata/local.meta new file mode 100755 index 0000000..d827768 --- /dev/null +++ b/Apps_for_DS/01-idx_volume_indexes/metadata/local.meta @@ -0,0 +1,3 @@ +[] +access = read : [ * ], write : [ admin ] +export = system diff --git a/Apps_for_DS/01-idx_web_base/.DS_Store b/Apps_for_DS/01-idx_web_base/.DS_Store new file mode 100644 index 0000000..0f32880 Binary files /dev/null and b/Apps_for_DS/01-idx_web_base/.DS_Store differ diff --git a/Apps_for_DS/01-idx_web_base/default/app.conf b/Apps_for_DS/01-idx_web_base/default/app.conf new file mode 100755 index 0000000..184f4ca --- /dev/null +++ b/Apps_for_DS/01-idx_web_base/default/app.conf @@ -0,0 +1,11 @@ +[launcher] +version = 1.0.0 +author = Mattys Hervé (OBS) +description = Disable Web access on Indexers + +[package] +id = odin_idx_web_base + + +[ui] +is_visible = false diff --git a/Apps_for_DS/01-idx_web_base/default/web.conf b/Apps_for_DS/01-idx_web_base/default/web.conf new file mode 100755 index 0000000..ccb5abc --- /dev/null +++ b/Apps_for_DS/01-idx_web_base/default/web.conf @@ -0,0 +1,12 @@ +# In larger environments, where there are more than, say, three indexers, +# it's common to disable the Splunk UI. This helps avoid configuration issues +# caused by logging in to the UI to do something directly via the manager, +# as well as saving some system resources. + +[settings] + startwebserver = 0 + +# avoid timeout when indexer loaded +splunkdConnectionTimeout = 120 + + diff --git a/Apps_for_DS/01-idx_web_base/local/app.conf b/Apps_for_DS/01-idx_web_base/local/app.conf new file mode 100755 index 0000000..1173ea8 --- /dev/null +++ b/Apps_for_DS/01-idx_web_base/local/app.conf @@ -0,0 +1 @@ +# Autogenerated file \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_CM/local/app.conf b/Apps_for_DS/02-M-TIC_CM/local/app.conf new file mode 100755 index 0000000..7ed6d3d --- /dev/null +++ b/Apps_for_DS/02-M-TIC_CM/local/app.conf @@ -0,0 +1,11 @@ +[launcher] +author = VABOS +description = Configure Distributed Search for Monitoring Console +version = 1.0 + +[package] +id = MAQ_M-TIC_DSMC + + +[ui] +is_visible = false diff --git a/Apps_for_DS/02-M-TIC_CM/local/distsearch.conf b/Apps_for_DS/02-M-TIC_CM/local/distsearch.conf new file mode 100755 index 0000000..345f2ef --- /dev/null +++ b/Apps_for_DS/02-M-TIC_CM/local/distsearch.conf @@ -0,0 +1,19 @@ +[distributedSearch:dmc_group_search_head] +servers = localhost:localhost +[distributedSearch:dmc_group_cluster_master] + + +[distributedSearch:dmc_group_license_master] + +[distributedSearch:dmc_group_deployment_server] + +[distributedSearch:dmc_group_indexer] +default = false +servers = SVLCTPLOGIDX01.mom.fr:8089,SVLCTPLOGIDX02.mom.fr:8089 + +[distributedSearch:dmc_group_shc_deployer] + +[distributedSearch:dmc_group_kv_store] + +[distributedSearch:dmc_indexerclustergroup_Cluster_M-TIC] +servers = localhost:localhost,SVLCTPLOGIDX01.mom.fr:8089,SVLCTPLOGIDX02.mom.fr:8089 diff --git a/Apps_for_DS/02-M-TIC_all_forwarding_outputs/default/app.conf b/Apps_for_DS/02-M-TIC_all_forwarding_outputs/default/app.conf new file mode 100755 index 0000000..ff2b941 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_all_forwarding_outputs/default/app.conf @@ -0,0 +1,11 @@ +[launcher] +version = 1.0 +author = VABOS +description = Enable forwarding to Indexer layer + +[package] +id = m-tic_all_forwarding_outputs + + +[ui] +is_visible = false diff --git a/Apps_for_DS/02-M-TIC_all_forwarding_outputs/default/outputs.conf b/Apps_for_DS/02-M-TIC_all_forwarding_outputs/default/outputs.conf new file mode 100755 index 0000000..2fb176a --- /dev/null +++ b/Apps_for_DS/02-M-TIC_all_forwarding_outputs/default/outputs.conf @@ -0,0 +1,12 @@ +# BASE SETTINGS + +[tcpout] +# Change here to specify the indexer group +defaultGroup = m-tic_indexer +maxQueueSize = 7MB +useACK = true +forceTimebasedAutoLB = true + +[tcpout:m-tic_indexer] +server = SVLCTPLOGIDX01.mom.fr:9997, SVLCTPLOGIDX02.mom.fr:9997 +~ diff --git a/Apps_for_DS/02-M-TIC_all_forwarding_outputs/local/app.conf b/Apps_for_DS/02-M-TIC_all_forwarding_outputs/local/app.conf new file mode 100755 index 0000000..1173ea8 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_all_forwarding_outputs/local/app.conf @@ -0,0 +1 @@ +# Autogenerated file \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_catchall_forwarders_inputs/local/app.conf b/Apps_for_DS/02-M-TIC_catchall_forwarders_inputs/local/app.conf new file mode 100755 index 0000000..771fc72 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_catchall_forwarders_inputs/local/app.conf @@ -0,0 +1,9 @@ +[install] +state = enabled + +[package] +check_for_updates = false + +[ui] +is_visible = false +is_manageable = false diff --git a/Apps_for_DS/02-M-TIC_catchall_forwarders_inputs/local/inputs.conf b/Apps_for_DS/02-M-TIC_catchall_forwarders_inputs/local/inputs.conf new file mode 100755 index 0000000..42ce7ae --- /dev/null +++ b/Apps_for_DS/02-M-TIC_catchall_forwarders_inputs/local/inputs.conf @@ -0,0 +1,4 @@ +[monitor:///var/rsyslog/*/catchother/*/*/*.log] +disabled = false +index = idx_m-tic_catchall +sourcetype = catchall \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_catchall_forwarders_inputs/metadata/local.meta b/Apps_for_DS/02-M-TIC_catchall_forwarders_inputs/metadata/local.meta new file mode 100755 index 0000000..04740cf --- /dev/null +++ b/Apps_for_DS/02-M-TIC_catchall_forwarders_inputs/metadata/local.meta @@ -0,0 +1,3 @@ +[] +access = read : [ * ], write : [ admin ] +export = system diff --git a/Apps_for_DS/02-M-TIC_cisco_forwarders_inputs/local/app.conf b/Apps_for_DS/02-M-TIC_cisco_forwarders_inputs/local/app.conf new file mode 100755 index 0000000..771fc72 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_cisco_forwarders_inputs/local/app.conf @@ -0,0 +1,9 @@ +[install] +state = enabled + +[package] +check_for_updates = false + +[ui] +is_visible = false +is_manageable = false diff --git a/Apps_for_DS/02-M-TIC_cisco_forwarders_inputs/local/inputs.conf b/Apps_for_DS/02-M-TIC_cisco_forwarders_inputs/local/inputs.conf new file mode 100755 index 0000000..d205169 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_cisco_forwarders_inputs/local/inputs.conf @@ -0,0 +1,4 @@ +[monitor:///var/rsyslog/*/cisco/.../*.log] +disabled = false +index = idx_m-tic_cisco +sourcetype = cisco \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_cisco_forwarders_inputs/metadata/local.meta b/Apps_for_DS/02-M-TIC_cisco_forwarders_inputs/metadata/local.meta new file mode 100755 index 0000000..04740cf --- /dev/null +++ b/Apps_for_DS/02-M-TIC_cisco_forwarders_inputs/metadata/local.meta @@ -0,0 +1,3 @@ +[] +access = read : [ * ], write : [ admin ] +export = system diff --git a/Apps_for_DS/02-M-TIC_cluster_forwarder_outputs/local/app.conf b/Apps_for_DS/02-M-TIC_cluster_forwarder_outputs/local/app.conf new file mode 100644 index 0000000..658f61e --- /dev/null +++ b/Apps_for_DS/02-M-TIC_cluster_forwarder_outputs/local/app.conf @@ -0,0 +1,9 @@ +[install] +state = enabled + +[package] +check_for_update = false + +[ui] +is_visible = false +is_manageable = false \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_cluster_forwarder_outputs/local/outputs.conf b/Apps_for_DS/02-M-TIC_cluster_forwarder_outputs/local/outputs.conf new file mode 100644 index 0000000..bba60aa --- /dev/null +++ b/Apps_for_DS/02-M-TIC_cluster_forwarder_outputs/local/outputs.conf @@ -0,0 +1,12 @@ +[tcpout] +defautlGroup = primary_indexers +maxQueuSize = 100MB +useACK = true +forceTimebaseAutoLB = true +forwardedindex.2.whitelist = (_audit|_introspection|_internal) + +[tcpout:primary_indexers] +server = SVLCTPLOGIDX01.mom.fr:9997, SVLCTPLOGIDX02.mom.fr:9997 + +#clientCert = $SPLUNK_HOME/etc/auth/server.pem +#sslPassword = diff --git a/Apps_for_DS/02-M-TIC_cluster_forwarder_outputs/local/server.conf b/Apps_for_DS/02-M-TIC_cluster_forwarder_outputs/local/server.conf new file mode 100644 index 0000000..e05e21c --- /dev/null +++ b/Apps_for_DS/02-M-TIC_cluster_forwarder_outputs/local/server.conf @@ -0,0 +1,2 @@ +[sslConfig] +sslRootCAPath = $SPLUNK_HOME/etc/auth/ca.pem \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_cluster_master_base/default/app.conf b/Apps_for_DS/02-M-TIC_cluster_master_base/default/app.conf new file mode 100755 index 0000000..1c4bb3d --- /dev/null +++ b/Apps_for_DS/02-M-TIC_cluster_master_base/default/app.conf @@ -0,0 +1,11 @@ +[launcher] +version = 1.0.0 +author = VABOS +description = Configure Cluster Master + +[package] +id = M-TIC_cluster_master_base + + +[ui] +is_visible = false diff --git a/Apps_for_DS/02-M-TIC_cluster_master_base/default/server.conf b/Apps_for_DS/02-M-TIC_cluster_master_base/default/server.conf new file mode 100755 index 0000000..4ea84ee --- /dev/null +++ b/Apps_for_DS/02-M-TIC_cluster_master_base/default/server.conf @@ -0,0 +1,5 @@ +[clustering] +cluster_label = Cluster_M-TIC +mode = master +pass4SymmKey = $7$iQ3wl+w1tMlCZXopQ/BDXHv8e+xGXGR10mvQYOiCdPxZuIkKX87oMm85MSkitkPk3PYW2Qhjc/kSMq2B5M0= +replication_factor = 2 diff --git a/Apps_for_DS/02-M-TIC_cluster_master_base/local/app.conf b/Apps_for_DS/02-M-TIC_cluster_master_base/local/app.conf new file mode 100755 index 0000000..1173ea8 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_cluster_master_base/local/app.conf @@ -0,0 +1 @@ +# Autogenerated file \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_deployer_base/local/app.conf b/Apps_for_DS/02-M-TIC_deployer_base/local/app.conf new file mode 100644 index 0000000..658f61e --- /dev/null +++ b/Apps_for_DS/02-M-TIC_deployer_base/local/app.conf @@ -0,0 +1,9 @@ +[install] +state = enabled + +[package] +check_for_update = false + +[ui] +is_visible = false +is_manageable = false \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_deployer_base/local/server.conf b/Apps_for_DS/02-M-TIC_deployer_base/local/server.conf new file mode 100644 index 0000000..a0cfec9 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_deployer_base/local/server.conf @@ -0,0 +1,3 @@ +[shclustering] +pass4SymmKey = $7$iQ3wl+w1tMlCZXopQ/BDXHv8e+xGXGR10mvQYOiCdPxZuIkKX87oMm85MSkitkPk3PYW2Qhjc/kSMq2B5M0= +shcluster_label = M-TIC_shcluster \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_esxi_forwarders_inputs/local/app.conf b/Apps_for_DS/02-M-TIC_esxi_forwarders_inputs/local/app.conf new file mode 100755 index 0000000..771fc72 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_esxi_forwarders_inputs/local/app.conf @@ -0,0 +1,9 @@ +[install] +state = enabled + +[package] +check_for_updates = false + +[ui] +is_visible = false +is_manageable = false diff --git a/Apps_for_DS/02-M-TIC_esxi_forwarders_inputs/local/inputs.conf b/Apps_for_DS/02-M-TIC_esxi_forwarders_inputs/local/inputs.conf new file mode 100755 index 0000000..d108a5d --- /dev/null +++ b/Apps_for_DS/02-M-TIC_esxi_forwarders_inputs/local/inputs.conf @@ -0,0 +1,4 @@ +[monitor:///var/rsyslog/*/esxi/*/*/*.log] +disabled = false +index = idx_m-tic_esxi +sourcetype = esxi \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_esxi_forwarders_inputs/metadata/local.meta b/Apps_for_DS/02-M-TIC_esxi_forwarders_inputs/metadata/local.meta new file mode 100755 index 0000000..04740cf --- /dev/null +++ b/Apps_for_DS/02-M-TIC_esxi_forwarders_inputs/metadata/local.meta @@ -0,0 +1,3 @@ +[] +access = read : [ * ], write : [ admin ] +export = system diff --git a/Apps_for_DS/02-M-TIC_fortigate_forwarders_inputs/local/app.conf b/Apps_for_DS/02-M-TIC_fortigate_forwarders_inputs/local/app.conf new file mode 100755 index 0000000..771fc72 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_fortigate_forwarders_inputs/local/app.conf @@ -0,0 +1,9 @@ +[install] +state = enabled + +[package] +check_for_updates = false + +[ui] +is_visible = false +is_manageable = false diff --git a/Apps_for_DS/02-M-TIC_fortigate_forwarders_inputs/local/inputs.conf b/Apps_for_DS/02-M-TIC_fortigate_forwarders_inputs/local/inputs.conf new file mode 100755 index 0000000..a94ccf2 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_fortigate_forwarders_inputs/local/inputs.conf @@ -0,0 +1,4 @@ +[monitor:///var/rsyslog/*/fortigate/*/*/*.log] +disabled = false +index = idx_m-tic_fortigate +sourcetype = fortigate \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_fortigate_forwarders_inputs/metadata/local.meta b/Apps_for_DS/02-M-TIC_fortigate_forwarders_inputs/metadata/local.meta new file mode 100755 index 0000000..04740cf --- /dev/null +++ b/Apps_for_DS/02-M-TIC_fortigate_forwarders_inputs/metadata/local.meta @@ -0,0 +1,3 @@ +[] +access = read : [ * ], write : [ admin ] +export = system diff --git a/Apps_for_DS/02-M-TIC_idx_cluster_base/.DS_Store b/Apps_for_DS/02-M-TIC_idx_cluster_base/.DS_Store new file mode 100644 index 0000000..0f32880 Binary files /dev/null and b/Apps_for_DS/02-M-TIC_idx_cluster_base/.DS_Store differ diff --git a/Apps_for_DS/02-M-TIC_idx_cluster_base/default/app.conf b/Apps_for_DS/02-M-TIC_idx_cluster_base/default/app.conf new file mode 100755 index 0000000..9cfba3a --- /dev/null +++ b/Apps_for_DS/02-M-TIC_idx_cluster_base/default/app.conf @@ -0,0 +1,11 @@ +[launcher] +version = 1.0.0 +author = VABOS +description = Configure default clustering options on Indexers + +[package] +id = M-TIC_idx_cluster_base + + +[ui] +is_visible = false diff --git a/Apps_for_DS/02-M-TIC_idx_cluster_base/default/fields.conf b/Apps_for_DS/02-M-TIC_idx_cluster_base/default/fields.conf new file mode 100755 index 0000000..1b1a8f3 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_idx_cluster_base/default/fields.conf @@ -0,0 +1,2 @@ +[edfZone] +INDEXED = true \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_idx_cluster_base/default/server.conf b/Apps_for_DS/02-M-TIC_idx_cluster_base/default/server.conf new file mode 100755 index 0000000..9fc6dc0 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_idx_cluster_base/default/server.conf @@ -0,0 +1,6 @@ +[replication_port://9100] + +[clustering] +manager_uri = https://SVLCTPLOGCLM01.mom.fr:8089 +mode = peer +pass4SymmKey = $7$iQ3wl+w1tMlCZXopQ/BDXHv8e+xGXGR10mvQYOiCdPxZuIkKX87oMm85MSkitkPk3PYW2Qhjc/kSMq2B5M0= diff --git a/Apps_for_DS/02-M-TIC_idx_cluster_base/local/app.conf b/Apps_for_DS/02-M-TIC_idx_cluster_base/local/app.conf new file mode 100755 index 0000000..1173ea8 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_idx_cluster_base/local/app.conf @@ -0,0 +1 @@ +# Autogenerated file \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_idx_indexes_base/default/app.conf b/Apps_for_DS/02-M-TIC_idx_indexes_base/default/app.conf new file mode 100755 index 0000000..b17b3c9 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_idx_indexes_base/default/app.conf @@ -0,0 +1,11 @@ +[launcher] +version = 1.0.0 +author = VABOS +description = Configure default optimisation on Indexers + +[package] +id = edf_idx_indexes_base + + +[ui] +is_visible = false diff --git a/Apps_for_DS/02-M-TIC_idx_indexes_base/default/indexes.conf b/Apps_for_DS/02-M-TIC_idx_indexes_base/default/indexes.conf new file mode 100755 index 0000000..ba562f9 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_idx_indexes_base/default/indexes.conf @@ -0,0 +1,65 @@ +[default] +thawedPath = $SPLUNK_DB/$_index_name/thaweddb +coldPath = volume:secondary/$_index_name/colddb +homePath = volume:primary/$_index_name/db +tstatsHomePath = volume:primary/$_index_name/datamodel_summary +tsidxWritingLevel = 4 +journalCompression = zstd +enableDataIntegrityControl = 0 +enableTsidxReduction = 0 +archiver.enableDataArchive = 0 +bucketRebuildMemoryHint = 1 +compressRawdata = 1 +enableOnlineBucketRepair = 1 +rtRouterQueueSize = +rtRouterThreads = +selfStorageThreads = +suspendHotRollByDeleteQuery = 0 +syncMeta = 1 + +[idx_m-tic_windows] + +[idx_m-tic_fortigate] + +[idx_m-tic_linux] + +[idx_m-tic_esxi] + +[vmware-esxilog] + +[vmware-perf-metrics] +datatype = metric + +[vmware-inv] + +[vmware-taskevent] + +[vmware-vclog] + +[idx_m-tic_alcatel] + +[idx_m-tic_cisco] + +[idx_m-tic_switch] + +[idx_m-tic_catchall] + +[idx_m-tic_catchother] + +[idx_m-tic_other] + +[idx_m-tic_glpi] + +[idx_m-tic_glpi_vm] + +[idx_m-tic_glpi_kb] + +[idx_m-tic_glpi_sep] + +[idx_m-tic_glpi_obsolescence] + +[idx_m-tic_genetec_sc] + +[idx_ldap] + +[idx_m-tic_synology] \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_idx_indexes_base/local/app.conf b/Apps_for_DS/02-M-TIC_idx_indexes_base/local/app.conf new file mode 100755 index 0000000..1173ea8 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_idx_indexes_base/local/app.conf @@ -0,0 +1 @@ +# Autogenerated file \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_linux_forwarders_inputs/local/app.conf b/Apps_for_DS/02-M-TIC_linux_forwarders_inputs/local/app.conf new file mode 100755 index 0000000..771fc72 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_linux_forwarders_inputs/local/app.conf @@ -0,0 +1,9 @@ +[install] +state = enabled + +[package] +check_for_updates = false + +[ui] +is_visible = false +is_manageable = false diff --git a/Apps_for_DS/02-M-TIC_linux_forwarders_inputs/local/inputs.conf b/Apps_for_DS/02-M-TIC_linux_forwarders_inputs/local/inputs.conf new file mode 100755 index 0000000..c179be9 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_linux_forwarders_inputs/local/inputs.conf @@ -0,0 +1,5 @@ +[monitor:///var/rsyslog/*/linux/.../*.log] +disabled = 0 +host_segment = 6 +index = idx_m-tic_linux +sourcetype = syslog_linux diff --git a/Apps_for_DS/02-M-TIC_linux_forwarders_inputs/metadata/local.meta b/Apps_for_DS/02-M-TIC_linux_forwarders_inputs/metadata/local.meta new file mode 100755 index 0000000..04740cf --- /dev/null +++ b/Apps_for_DS/02-M-TIC_linux_forwarders_inputs/metadata/local.meta @@ -0,0 +1,3 @@ +[] +access = read : [ * ], write : [ admin ] +export = system diff --git a/Apps_for_DS/02-M-TIC_sh_cluster_base/default/app.conf b/Apps_for_DS/02-M-TIC_sh_cluster_base/default/app.conf new file mode 100644 index 0000000..b67d010 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_sh_cluster_base/default/app.conf @@ -0,0 +1,9 @@ +[install] +state = enabled + +[package] +check_for_updates = false + +[ui] +is_visible = false +is_manageable = false \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_sh_cluster_base/default/authorize.conf b/Apps_for_DS/02-M-TIC_sh_cluster_base/default/authorize.conf new file mode 100644 index 0000000..e69de29 diff --git a/Apps_for_DS/02-M-TIC_sh_cluster_base/default/fields.conf b/Apps_for_DS/02-M-TIC_sh_cluster_base/default/fields.conf new file mode 100644 index 0000000..e69de29 diff --git a/Apps_for_DS/02-M-TIC_sh_cluster_base/default/server.conf b/Apps_for_DS/02-M-TIC_sh_cluster_base/default/server.conf new file mode 100644 index 0000000..c458e92 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_sh_cluster_base/default/server.conf @@ -0,0 +1,17 @@ +[clustering] +mode = searchhead +manager_uri = clustermanager:one + +[clustermanager:one] +manager_uri = https://SVLCTPLOGCLM01.mom.fr:8089 +pass4SymmKey = $7$iQ3wl+w1tMlCZXopQ/BDXHv8e+xGXGR10mvQYOiCdPxZuIkKX87oMm85MSkitkPk3PYW2Qhjc/kSMq2B5M0= +multisite = false + +[shclustering] +shcluster_label = M-TIC_shcluster +conf_deploy_fetch_url = https://SVLCTPLOGSUP01.mom.fr:8089 +pass4SymmKey = $7$iQ3wl+w1tMlCZXopQ/BDXHv8e+xGXGR10mvQYOiCdPxZuIkKX87oMm85MSkitkPk3PYW2Qhjc/kSMq2B5M0= + +[httpServer] +maxThreads = 150000 +maxSockets = 250000 \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_sh_cluster_base/metadata/default.meta b/Apps_for_DS/02-M-TIC_sh_cluster_base/metadata/default.meta new file mode 100644 index 0000000..0e683b4 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_sh_cluster_base/metadata/default.meta @@ -0,0 +1,3 @@ +[] +acces = read : [ * ], write : [ admin ] +export = system \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_sh_idxcluster_base/default/app.conf b/Apps_for_DS/02-M-TIC_sh_idxcluster_base/default/app.conf new file mode 100755 index 0000000..a662815 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_sh_idxcluster_base/default/app.conf @@ -0,0 +1,11 @@ +[launcher] +version = 1.0.0 +author = VABOS +description = Configure Search Head for IDX Clustering + +[package] +id = M-TIN_sh_idxcluster_base + + +[ui] +is_visible = false diff --git a/Apps_for_DS/02-M-TIC_sh_idxcluster_base/default/server.conf b/Apps_for_DS/02-M-TIC_sh_idxcluster_base/default/server.conf new file mode 100755 index 0000000..97e5758 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_sh_idxcluster_base/default/server.conf @@ -0,0 +1,9 @@ +[general] +site = site2 + +[clustering] +multisite = true +master_uri = https://SVLCTPLOGCLM01.mom.fr:8089 +mode = searchhead +pass4SymmKey = $7$i7IqoiyC1DpnVbSVtwGzuVTO5rmVyPCI2CMacpHEFs3N2oFAaF0EJ049Otza + diff --git a/Apps_for_DS/02-M-TIC_sh_idxcluster_base/local/app.conf b/Apps_for_DS/02-M-TIC_sh_idxcluster_base/local/app.conf new file mode 100755 index 0000000..1173ea8 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_sh_idxcluster_base/local/app.conf @@ -0,0 +1 @@ +# Autogenerated file \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_sh_volume_indexes/default/app.conf b/Apps_for_DS/02-M-TIC_sh_volume_indexes/default/app.conf new file mode 100644 index 0000000..658f61e --- /dev/null +++ b/Apps_for_DS/02-M-TIC_sh_volume_indexes/default/app.conf @@ -0,0 +1,9 @@ +[install] +state = enabled + +[package] +check_for_update = false + +[ui] +is_visible = false +is_manageable = false \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_sh_volume_indexes/default/indexes.conf b/Apps_for_DS/02-M-TIC_sh_volume_indexes/default/indexes.conf new file mode 100644 index 0000000..bc5dee3 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_sh_volume_indexes/default/indexes.conf @@ -0,0 +1,6 @@ +# One Volume for Hot and Cold +[volume:primary] +path = /opt/splunk/var/lib/splunk + +[volume:secondary] +path = /opt/splunk/var/lib/splunk \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_windows_forwarders_inputs/local/app.conf b/Apps_for_DS/02-M-TIC_windows_forwarders_inputs/local/app.conf new file mode 100755 index 0000000..771fc72 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_windows_forwarders_inputs/local/app.conf @@ -0,0 +1,9 @@ +[install] +state = enabled + +[package] +check_for_updates = false + +[ui] +is_visible = false +is_manageable = false diff --git a/Apps_for_DS/02-M-TIC_windows_forwarders_inputs/local/inputs.conf b/Apps_for_DS/02-M-TIC_windows_forwarders_inputs/local/inputs.conf new file mode 100755 index 0000000..c3a0e72 --- /dev/null +++ b/Apps_for_DS/02-M-TIC_windows_forwarders_inputs/local/inputs.conf @@ -0,0 +1,7 @@ +[WinEventLog] +interval=60 +evt_resolve_ad_obj = 0 +evt_dc_name= +evt_dns_name= +index = idx_m-tic_windows +sourcetype = events_windows \ No newline at end of file diff --git a/Apps_for_DS/02-M-TIC_windows_forwarders_inputs/metadata/local.meta b/Apps_for_DS/02-M-TIC_windows_forwarders_inputs/metadata/local.meta new file mode 100755 index 0000000..04740cf --- /dev/null +++ b/Apps_for_DS/02-M-TIC_windows_forwarders_inputs/metadata/local.meta @@ -0,0 +1,3 @@ +[] +access = read : [ * ], write : [ admin ] +export = system diff --git a/Apps_for_DS/For_MC/local/distsearch.conf b/Apps_for_DS/For_MC/local/distsearch.conf new file mode 100644 index 0000000..56c99f5 --- /dev/null +++ b/Apps_for_DS/For_MC/local/distsearch.conf @@ -0,0 +1,23 @@ +[distributedSearch] +servers = https://SVLCTPLOGCLM01.mom.fr:8089,https://SVLCTPLOGIDX01.mom.fr:8089,https://SVLCTPLOGIDX02.mom.fr:8089,https://SVLCTPLOGLMR.mom.fr:8089,https://SVLCTPLOGPUB01.mom.fr:8089,https://SVLCTPLOGPUB02.mom.fr:8089 + +[distributedSearch:dmc_group_deployment_server] +servers = localhost:localhost + +[distributedSearch:dmc_group_kv_store] +servers = SVLCTPLOGCLM01.mom.fr:8089,SVLCTPLOGIDX01.mom.fr:8089,SVLCTPLOGIDX02.mom.fr:8089,SVLCTPLOGPUB01.mom.fr:8089,SVLCTPLOGPUB02.mom.fr:8089 + +[distributedSearch:dmc_group_license_master] +servers = SVLCTPLOGLMR.mom.fr:8089 + +[distributedSearch:dmc_group_shc_deployer] +servers = localhost:localhost + +[distributedSearch:dmc_group_cluster_master] + +[distributedSearch:dmc_group_indexer] +default = true +servers = SVLCTPLOGIDX01.mom.fr:8089,SVLCTPLOGIDX02.mom.fr:8089 + +[distributedSearch:dmc_group_search_head] +servers = SVLCTPLOGCLM01.mom.fr:8089,SVLCTPLOGPUB01.mom.fr:8089,SVLCTPLOGPUB02.mom.fr:8089 \ No newline at end of file diff --git a/Apps_for_DS/splunk_monitoring_console/local/splunk_monitoring_console_assets.conf b/Apps_for_DS/splunk_monitoring_console/local/splunk_monitoring_console_assets.conf new file mode 100644 index 0000000..9dfef85 --- /dev/null +++ b/Apps_for_DS/splunk_monitoring_console/local/splunk_monitoring_console_assets.conf @@ -0,0 +1,3 @@ +[settings] +disabled = 0 +configuredPeers = SVLCTPLOGPUB01.mom.fr:8089,SVLCTPLOGPUB02.mom.fr:8089,SVLCTPLOGIDX01.mom.fr:8089,SVLCTPLOGIDX02.mom.fr:8089,SVLCTPLOGLMR.mom.fr:8089,SVLCTPLOGCLM01.mom.fr:8089 \ No newline at end of file diff --git a/Apps_for_Splunk/01-Conf_ServerClass/local/serverclass.conf b/Apps_for_Splunk/01-Conf_ServerClass/local/serverclass.conf new file mode 100644 index 0000000..b929085 --- /dev/null +++ b/Apps_for_Splunk/01-Conf_ServerClass/local/serverclass.conf @@ -0,0 +1,27 @@ +[global] +crossServerChecksum = false +repositoryLocation = $SPLUNK_HOME/etc/deployment-apps +targetRepositoryLocation = $SPLUNK_HOME/etc/apps +tmpFolder = $SPLUNK_HOME/var/run/tmp + +stateOnClient = enabled + +restartSplunkWeb = False +restartSplunkd = False +issueReload = false +continueMatching = true +endpoint = $deploymentServerUri$/services/streams/deployment?name=$tenantName$:$serverClassName$:$appName$ + +filterType = whitelist + +[serverClass:Licence_Master_TIC] + +[serverClass:Cluster_Master_TIC] + +[serverClass:Cluster_Indexer_TIC] + +[serverClass:Cluster_SH_TIC] + +[serverClass:Forwarder_Linux_TIC] + +[serverClass:Forwarder_Windows_TIC] \ No newline at end of file diff --git a/Apps_for_Splunk/01-Conf_deploy_client/local/deploymentclient.conf b/Apps_for_Splunk/01-Conf_deploy_client/local/deploymentclient.conf new file mode 100644 index 0000000..5779d89 --- /dev/null +++ b/Apps_for_Splunk/01-Conf_deploy_client/local/deploymentclient.conf @@ -0,0 +1,5 @@ +[target-broker:deploymentServer] +targetUri = https://SVLCTPLOGSUP01.mom.fr:8089 + +[deployment-client] +disabled = 0 \ No newline at end of file diff --git a/Copy_Files.yml b/Copy_Files.yml new file mode 100644 index 0000000..3287890 --- /dev/null +++ b/Copy_Files.yml @@ -0,0 +1,61 @@ +--- +- name: Copier un fichier via SCP + hosts: all:!splunk_uf_Linux_TIC + become: true + become_user: root + vars: + source_file: "/tmp/splunk-8.2.3-cd0848707637-Linux-x86_64.tgz" + destination_file: "/tmp/splunk-8.2.3-cd0848707637-Linux-x86_64.tgz" + remote_host: "10.10.30.38" + remote_user: "admin" + remote_password: "921223Jocpam!?" + tasks: + - name: Copier le fichier via SCP + command: scp -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null {{ remote_user }}@{{ remote_host }}:{{ source_file }} {{ destination_file }} + + - name: Vérifier si le fichier a été copié + stat: + path: "{{ destination_file }}" + register: file_stat + + - name: Afficher un message d'erreur si le fichier n'a pas été copié + fail: + msg: "La copie SCP a échoué" + when: not file_stat.stat.exists + + + +#- name: Copier depuis repo + #hosts: SVLCTPSUPPFI02.mom.fr + #become: true + #tasks: + #- name: copy + #copy: + #src: /tmp/splunkforwarder-8.2.3-cd0848707637-Linux-x86_64.tgz + #dest: /home/admin/splunkforwarder.tgz + #remote_src: true + #owner: admin + #group: admin + #mode: "0644" + #delegate_to: 10.10.30.38 + +# - name: Récupérer le fichier depuis l'hôte source et le copier sur l'hôte distant +# hosts: SVLCTPSUPPFI02.mom.fr +# become: true +# tasks: +# - name: Récupérer le fichier depuis l'hôte source +# fetch: +# src: /tmp/splunkforwarder-8.2.3-cd0848707637-Linux-x86_64.tgz +# dest: /tmp/ +# flat: yes +# validate_checksum: yes +# fail_on_missing: yes +# fail_on_unreachable: yes +# delegate_to: 10.10.30.38 +# - name: Copier le fichier vers l'hôte distant +# copy: +# src: /tmp/splunkforwarder-8.2.3-cd0848707637-Linux-x86_64.tgz +# dest: "{{ splunk_build_location_uf }}" +# owner: admin +# group: admin +# mode: "0644" diff --git a/Copy_keys.yml b/Copy_keys.yml new file mode 100644 index 0000000..620ef18 --- /dev/null +++ b/Copy_keys.yml @@ -0,0 +1,12 @@ +--- +- name: Copie de la clé du DSMC sur les instances splunk + become: yes + become_user: "{{ privileged_user }}" + hosts: all:!splunk_deployement_TIC:!splunk_uf_Linux + tasks: + - name: Copie de la clé du DSMC sur les instances splunk + copy: + src: "{{ playbook_dir }}/Keys_public/SVLCTPLOGSUP01.mom.fr/" + dest: /opt/splunk/etc/auth/distServerKeys/SVLCTPLOGSUP01.mom.fr/ + owner: root + group: root \ No newline at end of file diff --git a/Deleted_Splunk.yml b/Deleted_Splunk.yml new file mode 100644 index 0000000..d13cb55 --- /dev/null +++ b/Deleted_Splunk.yml @@ -0,0 +1,33 @@ +--- +- name: Supprimer Splunk de Linux + hosts: all:!splunk_uf_Linux + become: true + become_user: root + vars: + splunk_dir: "/opt/splunk" + tasks: + - name: Arrêter tous les processus Splunk en cours d'exécution + shell: "{{ splunk_dir }}/bin/splunk stop" + ignore_errors: true + + - name: Désinstaller le service Splunk + shell: "{{ splunk_dir }}/bin/splunk disable boot-start" + + - name: Supprimer le répertoire d'installation de Splunk + file: + path: "{{ splunk_dir }}" + state: absent + + - name: Supprimer l'utilisateur Splunk et son groupe + user: + name: splunk + state: absent + ignore_errors: true + + - name: Supprimer les entrées de démarrage automatique de Splunk + file: + path: "{{ item }}" + state: absent + with_items: + - /etc/init.d/splunk + - /etc/systemd/system/splunk.service diff --git a/Deleted_SplunkForwarder.yml b/Deleted_SplunkForwarder.yml new file mode 100644 index 0000000..fc0087d --- /dev/null +++ b/Deleted_SplunkForwarder.yml @@ -0,0 +1,33 @@ +--- +- name: Supprimer Splunk de Linux + hosts: splunk_uf_Linux + become: true + become_user: root + vars: + splunkforwarder_dir: "/opt/splunkforwarder" + tasks: + - name: Arrêter tous les processus Splunkforwarder en cours d'exécution + shell: "{{ splunkforwarder_dir }}/bin/splunk stop" + ignore_errors: true + + - name: Désinstaller le service Splunk + shell: "{{ splunkforwarder_dir }}/bin/splunk disable boot-start" + + - name: Supprimer le répertoire d'installation de Splunk + file: + path: "{{ splunkforwarder_dir }}" + state: absent + + - name: Supprimer l'utilisateur Splunk et son groupe + user: + name: splunk + state: absent + ignore_errors: true + + - name: Supprimer les entrées de démarrage automatique de Splunk + file: + path: "{{ item }}" + state: absent + with_items: + - /etc/init.d/Splunkforwarder + - /etc/systemd/system/Splunk.service diff --git a/Deploy_Conf-to-uf.yml b/Deploy_Conf-to-uf.yml new file mode 100644 index 0000000..5e501e4 --- /dev/null +++ b/Deploy_Conf-to-uf.yml @@ -0,0 +1,16 @@ +- name: Copie de la configuration du deploiment server + become: yes + become_user: "{{ privileged_user }}" + hosts: splunk_uf_Linux + tasks: + - name: Copier le répertoire dans SplunkForwarder + copy: + src: "{{ playbook_dir }}/Apps_for_Splunk/01-Conf_deploy_client" + dest: /opt/splunkforwarder/etc/apps/ + owner: splunk + group: splunk + + - name: "Start Splunk via cli" + command: "{{ splunk_exec_uf }} restart" + become: yes + become_user: "{{ privileged_user }}" \ No newline at end of file diff --git a/Deploy_Conf.yml b/Deploy_Conf.yml new file mode 100644 index 0000000..7cce9c6 --- /dev/null +++ b/Deploy_Conf.yml @@ -0,0 +1,20 @@ +--- +- name: Copie de la configuration du deploiment server + become: yes + become_user: "{{ privileged_user }}" + hosts: all:!splunk_uf_Linux + tasks: + - name: Copier le configuration DS dans Splunk + copy: + src: "{{ playbook_dir }}/Apps_for_Splunk/01-Conf_deploy_client" + dest: /opt/splunk/etc/apps/ + owner: splunk + group: splunk + + - name: Activer le démarrage automatique + shell: "/opt/splunk/bin/splunk enable boot-start" + + - name: "Start Splunk via cli" + command: "{{ splunk_exec }} restart" + become: yes + become_user: "{{ privileged_user }}" \ No newline at end of file diff --git a/Deploy_Conf_DSMC.yml b/Deploy_Conf_DSMC.yml new file mode 100644 index 0000000..679445e --- /dev/null +++ b/Deploy_Conf_DSMC.yml @@ -0,0 +1,42 @@ +--- +- name: Copie de la configuration du DSMC + become: yes + become_user: "{{ privileged_user }}" + hosts: splunk_deployement_TIC + tasks: + - name: Copier configuration serverClass sur le DS + copy: + src: "{{ playbook_dir }}/Apps_for_Splunk/01-Conf_ServerClass" + dest: /opt/splunk/etc/apps/ + owner: splunk + group: splunk + - name: Copier configuration cluster_SH sur le DS + copy: + src: "{{ playbook_dir }}/Apps_for_DS/02-M-TIC_sh_cluster_base" + dest: /opt/splunk/etc/apps/ + owner: splunk + group: splunk + - name: Copier configuration deployer sur le DS + copy: + src: "{{ playbook_dir }}/Apps_for_DS/02-M-TIC_deployer_base" + dest: /opt/splunk/etc/apps/ + owner: splunk + group: splunk + - name: Copier configuration volume_sh sur le DS + copy: + src: "{{ playbook_dir }}/Apps_for_DS/02-M-TIC_sh_volume_indexes" + dest: /opt/splunk/etc/apps/ + owner: splunk + group: splunk + - name: Copier configuration distributsearch + copy: + src: "{{ playbook_dir }}/Apps_for_DS/For_MC/local/" + dest: /opt/splunk/etc/system/local/ + owner: splunk + group: splunk + - name: Copier configuration MonitoringConsole + copy: + src: "{{ playbook_dir }}/Apps_for_DS/splunk_monitoring_console/" + dest: /opt/splunk/etc/apps/splunk_monitoring_console/ + owner: splunk + group: splunk \ No newline at end of file diff --git a/Deploy_apps-to_DS.yml b/Deploy_apps-to_DS.yml new file mode 100644 index 0000000..9114739 --- /dev/null +++ b/Deploy_apps-to_DS.yml @@ -0,0 +1,17 @@ +--- +- name: Copie des apps sur le deploiment server + become: yes + become_user: "{{ privileged_user }}" + hosts: splunk_deployement_TIC + tasks: + - name: Copier application sur le DS + copy: + src: "{{ playbook_dir }}/Apps_for_DS/" + dest: /opt/splunk/etc/deployment-apps/ + owner: splunk + group: splunk + +# - name: "Restart Splunk via cli" +# command: "{{ splunk_exec }} restart" +# become: yes +# become_user: "{{ privileged_user }}" \ No newline at end of file diff --git a/Inventories/cluster/group_vars/vars.yml b/Inventories/cluster/group_vars/vars.yml new file mode 100644 index 0000000..f670e85 --- /dev/null +++ b/Inventories/cluster/group_vars/vars.yml @@ -0,0 +1,49 @@ +--- +ansible_user: admin +privileged_user: root +retry_num: 3 +delay_num: 3 +hide_password: false + +ansible_script_version: 1.0 +author: VABOS + +splunk_upgrade: false + +splunk_home_ownership_enforcement: true +splunk_user: splunk +splunk_group: splunk +splunk_build_location: /tmp/splunk +splunk_build_location_uf: /tmp/splunk +splunk_build_remote_src: true +splunk_build_type: tgz +splunk_opt: /opt +splunk_home: /opt/splunk +splunk_home_uf: /opt/splunkforwarder +splunk_exec: /opt/splunk/bin/splunk +splunk_exec_uf: /opt/splunkforwarder/bin/splunk +splunk_enable_service: false +splunk_password: 921223Jocpam!? +splunk_admin_user: adminsplunk +splunk_general_pass4SymmKey: Asf#oQcAjOAnw^#zCE#Nd2R0#27j0@ +splunk_secret: 6XHPsFI2^jsYI&^ITvxzk#SZBcr1^n +splunk_svc_port: 8089 +splunk_http_port: 8000 +splunk_enableSSL: true +splunk_ssl_cert_password: CHANGEME +splunk_ssl_generate_cert: false +splunk_ssl_generate_root_cert: false +splunk_s2s_port: 9997 +splunk_replication_port: 9100 +splunk_shcluster_replication_port: 9200 +splunk_shcluster_mode: member + +splunk_optimistic_about_file_locking: true +splunk_single_instance: false + +#splunk_site: site0 +#splunk_multisite: false +#splunk_license_uri: /splunk_apps/splunk.license + +splunk_idxc_pass4SymmKey: 1nZ7lubH^KTqKyS3#h5Ad9V^Xkrttq +splunk_app_prefix: SPL \ No newline at end of file diff --git a/Inventories/cluster/host_vars/README.md b/Inventories/cluster/host_vars/README.md new file mode 100644 index 0000000..e69de29 diff --git a/Inventories/cluster/hosts-TIA.yml b/Inventories/cluster/hosts-TIA.yml new file mode 100644 index 0000000..e009264 --- /dev/null +++ b/Inventories/cluster/hosts-TIA.yml @@ -0,0 +1,16 @@ +all_splunk_instances: + children: + splunk_indexer: + hosts: + SVLATPLOGIDX01.mom.fr: + SVLATPLOGIDX02.mom.fr: + splunk_uf_Linux: + hosts: + SVLATPSUPPFI01.mom.fr: + SVLATPSUPPFI02.mom.fr: + splunk_uf_Windows: + hosts: + SVWATPSUPPFI01.mom.fr: + splunk_cluster_master: + hosts: + SVLATPLOGCLM01.mom.fr: \ No newline at end of file diff --git a/Inventories/cluster/hosts-TIC.yml b/Inventories/cluster/hosts-TIC.yml new file mode 100644 index 0000000..a895960 --- /dev/null +++ b/Inventories/cluster/hosts-TIC.yml @@ -0,0 +1,30 @@ +--- + all_splunk_instances: + children: + splunk_search_head: + hosts: + SVLCTPLOGPUB01.mom.fr: + SVLCTPLOGPUB02.mom.fr: + splunk_indexer: + hosts: + SVLCTPLOGIDX01.mom.fr: + SVLCTPLOGIDX02.mom.fr: + splunk_licence_master: + hosts: + SVLCTPLOGLMR.mom.fr: + splunk_uf_Linux: + hosts: + SVLCTPSUPPFI01.mom.fr: + SVLCTPSUPPFI02.mom.fr: + splunk_uf_Windows: + hosts: + SVWCTPSUPPFI01.mom.fr: + splunk_deployement: + hosts: + SVLCTPLOGSUP01.mom.fr: + splunk_monitoring: + hosts: + SVLCTPLOGSUP01.mom.fr: + splunk_cluster_master: + hosts: + SVLCTPLOGCLM01.mom.fr: diff --git a/Inventories/group_vars_all.yml.spec b/Inventories/group_vars_all.yml.spec new file mode 100755 index 0000000..a101074 --- /dev/null +++ b/Inventories/group_vars_all.yml.spec @@ -0,0 +1,107 @@ +--- +# user used by ansible on client +ansible_user: admin +# number of retry for a command +retry_num: 3 +# delay in sec between 2 retry +delay_num: 3 +# password visible in std_out +hide_password: false + +# version use for all the auto_generated_apps +ansible_script_version: 1.0 +# author displayed in all the auto_generated_apps +author: Louis-Marie NOGUES +# prefix set in the name of all the auto generated apps +splunk_app_prefix: ansbl + +create_base_apps: true + +### SPLUNK BASIC INSTALL ### +# apply the chwon +splunk_home_ownership_enforcement: true +# cli user for splunk +splunk_user: splunk +splunk_group: splunk +# path to the package on ansible host +splunk_build_location: /mnt/e/prj/splunk/splunk-7.3.2-c60db69f8e32-Linux-x86_64.tgz +# /mnt/e/prj/splunk/splunk-8.0.0-1357bef0a7f6-Linux-x86_64.tgz +# path is a http link +splunk_build_remote_src: false +# splunk path +splunk_opt: /opt +splunk_home: /opt/splunk +splunk_exec: /opt/splunk/bin/splunk + +### SPLUNK BASIC CONFIG ### + +# start splunk as a service +splunk_enable_service: true + +# splunk admin info +splunk_password: +splunk_admin_user: admin + +# splunk default configuration +splunk_general_pass4SymmKey: +splunk_secret: +splunk_svc_port: 8089 +splunk_http_port: 8000 +splunk_s2s_port: 9997 +splunk_disable_kvstore_on_idx: false +splunk_disable_web_on_idx: false + +# default site, can be override on each host_vars +splunk_license_uri: + - + - + +### SPLUNK BASIC SSL ### +splunk_enableSSL: false +splunk_ssl_cert_password: password +splunk_ssl_generate_cert: false +splunk_ssl_generate_root_cert: false + +### SPLUNK INDEX CLUSTERING ### +splunk_indexer_cluster: true +splunk_replication_port: 9100 +splunk_site: site0 +splunk_multisite: true +splunk_idxc_pass4SymmKey: +splunk_search_factor: +splunk_replication_factor: +splunk_idx_discovery_pass4SymmKey: +splunk_idxcluster_label: +splunk_all_sites: site1,site2 +splunk_multisite_replication_factor_origin: +splunk_multisite_replication_factor_total: +splunk_multisite_search_factor_origin: +splunk_multisite_search_factor_total: + +### SPLUNK SH CLUSTERING ### +splunk_search_head_cluster: true +splunk_shcluster_replication_port: 9200 +splunk_shcluster_mode: member +splunk_shcluster_label: +splunk_shcluster_pass4SymmKey: +splunk_shcluster_election: false + +### PREMIUM APPS ### + +## ITSI ## +# Flag to trigger installation of Premium Apps +splunk_itsi: True +# local_path for the itsi package +splunk_itsi_local_path: + +### JAVA ### +# which version of java to be installed (oracle:8,openjdk:8,openjdk:11,openjdk:13,openjdk:9 (windows)) +java_version: openjdk:11 +java_update_version: 11.0.2 +java_download_url: /mnt/e/prj/splunk/tools/openjdk-11.0.2_linux-x64_bin.tar.gz +java_download_url_remote: false + + +# add optimitstic_about_file_locking flag in the splunk splunk-launch.conf +# usefull for docker + Windows +splunk_optimistic_about_file_locking: false \ No newline at end of file diff --git a/Keys_public/SVLCTPLOGSUP01.mom.fr/trusted.pem b/Keys_public/SVLCTPLOGSUP01.mom.fr/trusted.pem new file mode 100644 index 0000000..a5e9f1c --- /dev/null +++ b/Keys_public/SVLCTPLOGSUP01.mom.fr/trusted.pem @@ -0,0 +1,9 @@ +-----BEGIN PUBLIC KEY----- +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1D1hzIW8IXb1htSMGRMQ +rmtJYfaLI0QAlsEwXute2ioMZu5cL2Fn3NqI2py0F0kyyRio82nPZIeFer67tpup +yU6/nCiXs6upNcDGZyUdoYwzA/D2HiE0CHQXR7ppfXjFiltm7HcQF+t3mHL+dSe+ +/9DLQgfe0yGHwPMoN2SyQSHUD3dn9T9k0zgo8M4jHu/JEw9DXBmtRXf9Q2/PTMNU +YyBaYhgb0zYIA1RCuT1Ha1EmX+utQ1Rf8BHamBv7lYbHIPkpSQD+PHy+W8RmiwWe +KoYu+rE7Vtf7bxNhyAq3TzaJlHum1s3GBGP5r6r+HpdP9sDrmC5TDAuX8xdtwbY5 +pQIDAQAB +-----END PUBLIC KEY----- diff --git a/README.md b/README.md index e1dee40..e69de29 100644 --- a/README.md +++ b/README.md @@ -1,2 +0,0 @@ -# Splunk-Install-Final - diff --git a/Restart_Splunk.yml b/Restart_Splunk.yml new file mode 100644 index 0000000..2f8366a --- /dev/null +++ b/Restart_Splunk.yml @@ -0,0 +1,11 @@ +--- +- name: Restart Splunk + become: yes + become_user: "{{ privileged_user }}" + hosts: all + tasks: + - name: "Start Splunk via cli" + command: "{{ splunk_exec }} restart" + + - name: "Start Splunk via cli" + command: "{{ splunk_exec_uf }} restart" \ No newline at end of file diff --git a/Start_Splunk.yml b/Start_Splunk.yml new file mode 100644 index 0000000..fb22681 --- /dev/null +++ b/Start_Splunk.yml @@ -0,0 +1,8 @@ +--- +- name: Start Splunk + become: yes + become_user: "{{ privileged_user }}" + hosts: all + tasks: + - name: "Start Splunk via cli" + command: "{{ splunk_exec }} start" \ No newline at end of file diff --git a/Update_Splunk.yml b/Update_Splunk.yml new file mode 100644 index 0000000..02dc2f6 --- /dev/null +++ b/Update_Splunk.yml @@ -0,0 +1,97 @@ +- name: Mise à jour de Splunk + hosts: all:!splunk_uf_Linux:!splunk_uf_windows + become: yes + become_user: root + vars: + splunk_version: "9.0.4.1-419ad9369127-Linux-x86_64" + + tasks: + + - name: Sauvegarder la configuration des indexeurs + command: "{{ splunk_home }}/bin/splunk cmd btool --debug > {{ backup_dir }}/btool_{{ inventory_hostname }}.txt" + run_once: yes + + - name: Arrêter le service Splunk + systemd: + name: splunk + state: stopped + + - name: Extraire le fichier d'installation de Splunk + unarchive: + src: "/tmp/splunk-{{ splunk_version }}.tgz" + dest: "/opt" + remote_src: yes + creates: "{{ splunk_home }}/etc/system/local/.upgrade_marker" + when: inventory_hostname == groups['all:!splunk_uf_Linux:!splunk_uf_windows'][0] + + - name: Attribution des droits + shell: "chown -R splunk:splunk /opt/splunk/*" + + - name: Attendre que la mise à jour soit appliquée à tous les indexeurs + wait_for: + path: "{{ splunk_home }}/etc/system/local/.upgrade_marker" + state: present + when: inventory_hostname != groups['all:!splunk_uf_Linux:!splunk_uf_windows'][0] + + - name: Vérifier l'état du cluster + command: "{{ splunk_home }}/bin/splunk show cluster-status" + register: cluster_status + ignore_errors: true + run_once: yes + + - name: Afficher l'état du cluster + debug: + var: cluster_status.stdout_lines + run_once: yes + + - name: Desactiver le démarrage automatique + shell: "/opt/splunk/bin/splunk disable boot-start" + + - name: Supprimer les entrées de démarrage automatique de Splunk + file: + path: "{{ item }}" + state: absent + with_items: + - /etc/init.d/splunk + - /etc/systemd/system/splunk.service + + - name: Redémarrer le serveur + reboot: + pre_reboot_delay: 0 + reboot_timeout: 300 + msg: "Redémarrage du serveur nécessaire pour la mise à jour de Splunk" + + - name: Démarrer Splunk + shell: "/opt/splunk/bin/splunk start --accept-license --answer-yes --no-prompt" + + - name: Boot-start Enable + shell: "/opt/splunk/bin/splunk enable boot-start" + + #- name: Attente de la disponibilité de Splunk + #uri: + #url: "http://localhost:8000/" + #return_content: no + #status_code: 200 + #register: result + #retries: 30 + #delay: 10 + #until: result.status == 200 + + #- name: Appliquer les changements de configuration + #shell: "/opt/splunk/bin/splunk apply cluster-bundle --answer-yes --no-prompt" + + #- name: Redémarrer le service Splunk + #systemd: + #name: splunk + #state: started + + + #- name: Sauvegarder la configuration et les données + #shell: /opt/splunk/bin/splunk cmd splunkd print-paths --propagation none + #register: splunk_paths + + #- name: Installer la nouvelle version de Splunk + #unarchive: + #src: /tmp/splunk-{{ splunk_version }}.tgz + #dest: /opt + #creates: /opt/splunk-{{ splunk_version }} diff --git a/Update_SplunkV2.yml b/Update_SplunkV2.yml new file mode 100644 index 0000000..5760b00 --- /dev/null +++ b/Update_SplunkV2.yml @@ -0,0 +1,144 @@ +--- +- name: Mettre à jour le cluster de Search Head + hosts: splunk_deployement + become: yes + become_user: root + vars: + splunk_version: "9.0.4.1-419ad9369127-Linux-x86_64" + + + tasks: + - name: Arrêter les processus Splunk + shell: "/opt/splunk/bin/splunk stop" + become: yes + + - name: Extraire le fichier d'installation de Splunk + unarchive: + src: "/tmp/splunk-{{ splunk_version }}.tgz" + dest: "/opt" + remote_src: yes + + - name: Attribution des droits + shell: "chown -R splunk:splunk /opt/splunk/*" + + - name: Mettre à jour Splunk + shell: "/opt/splunk/bin/splunk start --accept-license --answer-yes --no-prompt" + + - name: Vérifier l'état de Splunk + wait_for: + host: localhost + port: 8089 + delay: 10 + timeout: 180 + state: started + msg: "Splunk n'a pas redémarré correctement" + +- name: Mettre à jour le master cluster Splunk + hosts: splunk_cluster_master + become: yes + become_user: root + vars: + splunk_version: "9.0.4.1-419ad9369127-Linux-x86_64" + + + tasks: + - name: Arrêter les processus Splunk + shell: "/opt/splunk/bin/splunk stop" + become: yes + + - name: Extraire le fichier d'installation de Splunk + unarchive: + src: "/tmp/splunk-{{ splunk_version }}.tgz" + dest: "/opt" + remote_src: yes + + - name: Attribution des droits + shell: "chown -R splunk:splunk /opt/splunk/*" + + - name: Mettre à jour Splunk + shell: "/opt/splunk/bin/splunk start --accept-license --answer-yes --no-prompt" + + - name: Vérifier l'état de Splunk + wait_for: + host: localhost + port: 8089 + delay: 10 + timeout: 180 + state: started + msg: "Splunk n'a pas redémarré correctement" + +- name: Mettre à jour un cluster Splunk avec un fichier .tgz + hosts: splunk_indexer + become: yes + become_user: root + vars: + splunk_version: "9.0.4.1-419ad9369127-Linux-x86_64" + + tasks: + - name: Arrêter les processus Splunk + shell: "/opt/splunk/bin/splunk stop" + become: yes + + - name: Extraire le fichier d'installation de Splunk + unarchive: + src: "/tmp/splunk-{{ splunk_version }}.tgz" + dest: "/opt" + remote_src: yes + + - name: Attribution des droits + shell: "chown -R splunk:splunk /opt/splunk/*" + + - name: Mettre à jour Splunk + shell: "/opt/splunk/bin/splunk start --accept-license --answer-yes --no-prompt" + + - name: Vérifier l'état de Splunk + wait_for: + host: localhost + port: 8089 + delay: 10 + timeout: 180 + state: started + msg: "Splunk n'a pas redémarré correctement" + + #- name: Attendre que l'indexer rejoigne le cluster + #shell: "/opt/splunk/bin/splunk show cluster-state -auth adminsplunk:921223Jocpam!? | grep 'Instance type=peer' | wc -l" + #register: peers_count + #until: peers_count.stdout == "2" + #retries: 5 + #delay: 10 + #become: yes + + +- name: Mettre à jour le cluster de Search Head + hosts: splunk_search_head + become: yes + become_user: root + vars: + splunk_version: "9.0.4.1-419ad9369127-Linux-x86_64" + + + tasks: + - name: Arrêter les processus Splunk + shell: "/opt/splunk/bin/splunk stop" + become: yes + + - name: Extraire le fichier d'installation de Splunk + unarchive: + src: "/tmp/splunk-{{ splunk_version }}.tgz" + dest: "/opt" + remote_src: yes + + - name: Attribution des droits + shell: "chown -R splunk:splunk /opt/splunk/*" + + - name: Mettre à jour Splunk + shell: "/opt/splunk/bin/splunk start --accept-license --answer-yes --no-prompt" + + - name: Vérifier l'état de Splunk + wait_for: + host: localhost + port: 8089 + delay: 10 + timeout: 180 + state: started + msg: "Splunk n'a pas redémarré correctement" \ No newline at end of file diff --git a/Update_Splunk_UF.yml b/Update_Splunk_UF.yml new file mode 100644 index 0000000..64ace9a --- /dev/null +++ b/Update_Splunk_UF.yml @@ -0,0 +1,48 @@ +- name: Mise à jour de Splunk + hosts: splunk_uf_Linux + become: yes + become_user: "{{ privileged_user }}" + vars: + splunk_version_uf: "9.0.4-de405f4a7979-Linux-x86_64" + + tasks: + + - name: Arrêter le service Splunk + systemd: + name: splunk + state: stopped + + - name: Extraire le fichier d'installation de Splunk + unarchive: + src: "/tmp/splunkforwarder-{{ splunk_version_uf }}.tgz" + dest: "/opt" + remote_src: yes + + - name: Desactiver le démarrage automatique + shell: "/opt/splunkforwarder/bin/splunk disable boot-start" + + - name: Supprimer les entrées de démarrage automatique de Splunk + file: + path: "{{ item }}" + state: absent + with_items: + - /etc/init.d/splunk + - /etc/systemd/system/splunk.service + + #- name: Arrêt de splunk + #shell: "/opt/splunkforwarder/bin/splunk stop" + + - name: Attribution des droits + shell: "chown -R splunk:splunk /opt/splunkforwarder/*" + + - name: Mettre à jour le Splunk Universal Forwarder + shell: "/opt/splunkforwarder/bin/splunk stop; /opt/splunkforwarder/bin/splunk start --accept-license --answer-yes --no-prompt --answer-accept-changes && /opt/splunkforwarder/bin/splunk enable boot-start -user splunk" + become: yes + + #- name: Activer le démarrage automatique + #shell: "/opt/splunkforwarder/bin/splunk enable boot-start" + + - name: Redémarrer le service Splunk + systemd: + name: SplunkForwarder + state: started \ No newline at end of file diff --git a/Update_Splunk_UFV2.yml b/Update_Splunk_UFV2.yml new file mode 100644 index 0000000..5b95216 --- /dev/null +++ b/Update_Splunk_UFV2.yml @@ -0,0 +1,26 @@ +- name: Mise à jour de Splunk + hosts: splunk_uf_Linux + become: yes + become_user: "{{ privileged_user }}" + vars: + splunk_version_uf: "9.0.4-de405f4a7979-Linux-x86_64" + + tasks: + + - name: Arrêter le service Splunk + systemd: + name: splunk + state: stopped + + - name: Extraire le fichier d'installation de Splunk + unarchive: + src: "/tmp/splunkforwarder-{{ splunk_version_uf }}.tgz" + dest: "/opt" + remote_src: yes + + - name: Attribution des droits + shell: "chown -R splunk:splunk /opt/splunkforwarder/*" + + - name: Mettre à jour le Splunk Universal Forwarder + shell: "/opt/splunkforwarder/bin/splunk stop; /opt/splunkforwarder/bin/splunk start --accept-license --answer-yes --no-prompt" + become: yes diff --git a/common/handlers/restart_splunk.yml b/common/handlers/restart_splunk.yml new file mode 100755 index 0000000..d2b642b --- /dev/null +++ b/common/handlers/restart_splunk.yml @@ -0,0 +1,37 @@ +--- +- name: "Retrieve PID 1 process information (Linux)" + command: "ps 1" + register: pid1 + when: + - ansible_system is match("Linux") + - pid1 is not defined + +- name: "Restart the splunkd service - Via CLI" + command: "{{ splunk_exec }} restart --answer-yes --accept-license" + become: yes + become_user: "{{ splunk_user }}" + register: task_result + until: task_result.rc == 0 + retries: 3 + delay: "{{ delay_num }}" + when: not splunk_enable_service + +- name: "Restart the splunkd service - Via systemd" + service: + name: "{% if pid1.stdout.find('systemd') != -1 %}Splunkd{% else %}splunk{% endif %}" + state: restarted + when: + - splunk_enable_service + - ansible_system is match("Linux") + become: yes + become_user: "{{ privileged_user }}" + +- name: "Restart the splunkd service - Via windows system" + win_service: + name: splunkd + state: restarted + when: splunk_enable_service and not ansible_system is match("Linux") + +- name: "Wait for splunkd management port" + wait_for: + port: "{{ splunk_svc_port }}" diff --git a/common/tasks/apply_dmc_trusted_pem.yml b/common/tasks/apply_dmc_trusted_pem.yml new file mode 100755 index 0000000..296a85e --- /dev/null +++ b/common/tasks/apply_dmc_trusted_pem.yml @@ -0,0 +1,29 @@ +--- +- name: Get DMC Name + set_fact: + dmc_name: "{{ hostvars[groups.splunk_monitoring_console[0]].inventory_hostname_short }}" + when: not splunk_single_instance + +- name: "Ensure that {{ dest_path }} exists" + file: + path: "{{ splunk_home }}/etc/{{ dest_path | dirname }}" + state: directory + recurse: yes + group: "{{ splunk_group }}" + owner: "{{ splunk_user }}" + ignore_errors: true + vars: + dest_path: "auth/distServerKeys/{{ dmc_name }}/" + become: yes + become_user: "{{ splunk_user }}" + when: not splunk_single_instance + +- name: Copy trusted.pem to server + copy: + src: "/tmp/trusted.pem" + dest: "{{ splunk_home }}/etc/auth/distServerKeys/{{ dmc_name }}/trusted.pem" + group: "{{ splunk_group }}" + owner: "{{ splunk_user }}" + become: yes + become_user: "{{ splunk_user }}" + when: not splunk_single_instance diff --git a/common/tasks/create_app_via_template.yml b/common/tasks/create_app_via_template.yml new file mode 100755 index 0000000..3ca88fa --- /dev/null +++ b/common/tasks/create_app_via_template.yml @@ -0,0 +1,47 @@ +--- +- name: Default files added to the list + set_fact: + app_configs: + - template_path: "{{ playbook_dir }}/common/templates/app.j2" + template_output_path: "app.conf" + +- name: Ensure that all local paths exists + file: + path: "{{ playbook_dir }}/splunk_apps/base_apps/{{ app_name }}/local" + state: directory + recurse: yes + force: true + ignore_errors: true + loop: "{{ configs|flatten + app_configs | flatten }}" + +- name: Apply provided template.j2 on the provided target file + template: + src: "{{ item.template_path }}" + dest: "{{ playbook_dir }}/splunk_apps/base_apps/{{ app_name }}/local/{{ item.template_output_path }}" + force: true + loop: "{{ configs|flatten + app_configs | flatten }}" + +- name: Ensure that all custom paths exists + file: + path: "{{ playbook_dir }}/splunk_apps/base_apps/{{ app_name }}/{{ item.dest_dir }}" + state: directory + recurse: yes + force: true + ignore_errors: true + loop: "{{ files |flatten }}" + when: files is defined + +- name: Copy specific files to their local dir + copy: + src: "{{ item.src }}" + dest: "{{ playbook_dir }}/splunk_apps/base_apps/{{ app_name }}/{{ item.dest_dir }}" + force: true + loop: "{{ files |flatten }}" + when: files is defined + +- name: Copy app to the different Splunk Topology + copy: + src: "{{ playbook_dir }}/splunk_apps/base_apps/{{ app_name }}" + dest: "{{ playbook_dir }}/splunk_apps/{{ item }}/" + force: yes + loop: "{{ splunk_target_topology }}" \ No newline at end of file diff --git a/common/tasks/disable_dmc.yml b/common/tasks/disable_dmc.yml new file mode 100755 index 0000000..99f45d3 --- /dev/null +++ b/common/tasks/disable_dmc.yml @@ -0,0 +1,10 @@ + +- name: "disable dmc on client instances" + ini_file: + dest: "{{ splunk_home }}/etc/apps/splunk_monitoring_console/local/app.conf" + section: install + option: "state" + value: "disabled" + become: yes + become_user: "{{ splunk_user }}" + when: "{{ groups.splunk_monitoring_console | length |int }} >= 1" diff --git a/common/tasks/set_certificate_prefix.yml b/common/tasks/set_certificate_prefix.yml new file mode 100755 index 0000000..390179c --- /dev/null +++ b/common/tasks/set_certificate_prefix.yml @@ -0,0 +1,17 @@ +--- +- name: "Test basic https endpoint" + uri: + url: "https://127.0.0.1:{{ splunk_svc_port }}/services/properties" + method: GET + user: "{{ splunk_admin_user }}" + password: "{{ splunk_password }}" + validate_certs: false + status_code: 200,404 + timeout: 10 + register: ssl_enabled + ignore_errors: true + +# If the https call failed, we will revert to http and continue REST with normal error handling +- name: "Set url prefix for future REST calls" + set_fact: + cert_prefix: "{% if ssl_enabled.status == 200 %}https{% else %}http{% endif %}" diff --git a/common/tasks/set_conf_stanza.yml b/common/tasks/set_conf_stanza.yml new file mode 100755 index 0000000..e36b4aa --- /dev/null +++ b/common/tasks/set_conf_stanza.yml @@ -0,0 +1,33 @@ +--- +- name: Create {{ conf_directory }} directory if not existing + file: + path: "{{ conf_directory }}" + state: directory + when: conf_directory is defined + become: yes + become_user: "{{ splunk_user }}" + +- name: Create {{ conf_file }} if not existing + copy: + dest: "{{ conf_directory }}/{{ conf_file }}" + mode: u=rw,g=,o= + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + content: "" + force: no + become: yes + become_user: "{{ privileged_user }}" + +- name: "Set options in {{ stanza_name }}" + ini_file: + path: "{{ conf_directory }}/{{ conf_file }}" + section: "{{ stanza_name }}" + option: "{{ stanza_setting.key }}" + value: "{{ stanza_setting.value }}" + allow_no_value: True + state: present + with_dict: "{{ conf_stanzas }}" + loop_control: + loop_var: stanza_setting + become: yes + become_user: "{{ splunk_user }}" diff --git a/common/tasks/wait_for_splunk_instance.yml b/common/tasks/wait_for_splunk_instance.yml new file mode 100755 index 0000000..c934a43 --- /dev/null +++ b/common/tasks/wait_for_splunk_instance.yml @@ -0,0 +1,20 @@ +--- +- name: Check Splunk instance is running + uri: + url: "{{ cert_prefix }}://{{ inventory_hostname }}:{{ splunk_svc_port }}/services/server/info?output_mode=json" + method: GET + user: "{{ splunk_admin_user }}" + password: "{{ splunk_password }}" + validate_certs: false + register: task_response + until: + - task_response.status == 200 + - lookup('pipe', 'date +"%s"')|int - task_response.json.entry[0].content.startup_time > 10 + retries: "{{ retry_num }}" + delay: 3 + ignore_errors: true + no_log: "{{ hide_password }}" + +- name: Print response + debug: + var: task_response diff --git a/common/templates/app.j2 b/common/templates/app.j2 new file mode 100755 index 0000000..c007875 --- /dev/null +++ b/common/templates/app.j2 @@ -0,0 +1,11 @@ +[launcher] +author = {{ author }} via Ansible (OBS) +description = {{ app_desc }} +version = {{ ansible_script_version }} + +[package] +id = {{ app_name }} + + +[ui] +is_visible = false diff --git a/common/templates/cluster_master_server_conf.j2 b/common/templates/cluster_master_server_conf.j2 new file mode 100755 index 0000000..57d39ff --- /dev/null +++ b/common/templates/cluster_master_server_conf.j2 @@ -0,0 +1,15 @@ + +[clustering] +available_sites = {{ splunk_all_sites }} +cluster_label = {{ splunk_idxcluster_label }} +mode = master +multisite = {{ splunk_multisite }} +replication_factor = {{ splunk_replication_factor }} +search_factor = {{ splunk_search_factor }} +site_replication_factor = origin:{{ splunk_multisite_replication_factor_origin }}, total:{{ splunk_multisite_replication_factor_total }} +site_search_factor = origin:{{ splunk_multisite_search_factor_origin }}, total:{{ splunk_multisite_search_factor_total }} +summary_replication = true + +[general] +site = {{ splunk_site }} + diff --git a/common/templates/deployer.j2 b/common/templates/deployer.j2 new file mode 100755 index 0000000..e698cd5 --- /dev/null +++ b/common/templates/deployer.j2 @@ -0,0 +1,2 @@ +[shclustering] +shcluster_label = {{ splunk_shcluster_label }} diff --git a/common/templates/deploymentclient.j2 b/common/templates/deploymentclient.j2 new file mode 100755 index 0000000..b6b26d5 --- /dev/null +++ b/common/templates/deploymentclient.j2 @@ -0,0 +1,10 @@ +[deployment-client] +{% if splunk_enableSSL %} + sslVersions = tls1.2 + sslVerifyServerCert = true + sslCommonNameToCheck = {% for host in groups.splunk_deployment_server %} {{ host }}, {% endfor %} +{% endif %} + +[target-broker:deploymentServer] +# Change the targetUri +targetUri = {{ groups.splunk_deployment_server[0] }}:{{ splunk_svc_port }} diff --git a/common/templates/dist_search.j2 b/common/templates/dist_search.j2 new file mode 100755 index 0000000..1af0638 --- /dev/null +++ b/common/templates/dist_search.j2 @@ -0,0 +1,30 @@ +[distributedSearch] +servers = {% if sh_list is not none %} {% for host in sh_list %} https://{{ host }}:{{ splunk_svc_port }}, {% endfor %} {%endif %}{% if lm_list is not none %} ,{% for host in lm_list %} https://{{ host }}:{{ splunk_svc_port }}, {% endfor %}{%endif %}{% if cm_list is not none %} ,{% for host in cm_list %} https://{{ host }}:{{ splunk_svc_port }}, {% endfor %}{%endif %}{% if ds_list is not none %} ,{% for host in ds_list %} https://{{ host }}:{{ splunk_svc_port }}, {% endfor %}{%endif %}{% if deployer_list is not none %} ,{% for host in deployer_list %} https://{{ host }}:{{ splunk_svc_port }}, {% endfor %}{%endif %} + +[distributedSearch:dmc_group_cluster_master] +servers={% if cm_list is not none %} {% for host in cm_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %} {% else %} localhost:localhost {%endif %} + +[distributedSearch:dmc_group_deployment_server] +servers={% if ds_list is not none %} {% for host in ds_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %}{% else %} localhost:localhost {%endif %} + +[distributedSearch:dmc_group_indexer] +default = true +servers={% if indexer_list is not none %} {% for host in indexer_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %} {% else %} localhost:localhost {%endif %} + +[distributedSearch:dmc_group_kv_store] +servers={% if sh_list is not none %} {% for host in sh_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %}{% else %} localhost:localhost {%endif %} + +[distributedSearch:dmc_group_license_master] +servers={% if lm_list is not none %} {% for host in lm_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %}{% else %} localhost:localhost {%endif %} + +[distributedSearch:dmc_group_search_head] +servers={% if cm_list is not none %}{% for host in cm_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %}{% else %} localhost:localhost {%endif %}{% if sh_list is not none %},{% for host in sh_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %} {%endif %} + +[distributedSearch:dmc_group_shc_deployer] +servers={% if deployer_list is not none %} {% for host in deployer_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %}{% else %} localhost:localhost {%endif %} + +[distributedSearch:dmc_indexerclustergroup_{{ splunk_idxcluster_label }}] +servers={% if cm_list is not none %}{% for host in cm_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %}{% else %} localhost:localhost {%endif %}{% if indexer_list is not none %},{% for host in indexer_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %} {%endif %}{% if sh_list is not none %},{% for host in sh_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %} {%endif %} + +[distributedSearch:dmc_searchheadclustergroup_{{ splunk_shcluster_label }}] +servers={% if sh_list is not none %}{% for host in sh_list %} {{ host }}:{{ splunk_svc_port }}, {% endfor %}{% else %} localhost:localhost {%endif %} diff --git a/common/templates/enable_receiver.j2 b/common/templates/enable_receiver.j2 new file mode 100755 index 0000000..766dbdc --- /dev/null +++ b/common/templates/enable_receiver.j2 @@ -0,0 +1,12 @@ +{% if splunk_enableSSL %} +[splunktcp-ssl:{{ splunk_s2s_port }}] +connection_host = ip + +[SSL] +serverCert = $SPLUNK_HOME/etc/auth/servercertificate.pem +sslPassword = {{ splunk_ssl_cert_password }} +requireClientCert = false +sslVersions = tls1.2 +{% else %} +[splunktcp://{{ splunk_s2s_port }}] +{% endif %} \ No newline at end of file diff --git a/common/templates/forwarding_s2s_outputs_conf.j2 b/common/templates/forwarding_s2s_outputs_conf.j2 new file mode 100755 index 0000000..d383e5e --- /dev/null +++ b/common/templates/forwarding_s2s_outputs_conf.j2 @@ -0,0 +1,19 @@ +# BASE SETTINGS + +[tcpout] +# Change here to specify the indexer group +defaultGroup = all_{{ splunk_app_prefix }}_indexer +forceTimebasedAutoLB = true +maxQueueSize = 7MB +useACK = true + +[tcpout:all_{{ splunk_app_prefix }}_indexer] +{% if splunk_enableSSL %} +clientCert = $SPLUNK_HOME/etc/auth/servercertificate.pem +{% endif %} +server = {% for host in indexer_list %}{{ host }}:{{ splunk_s2s_port }}, {% endfor %} +{% if splunk_enableSSL %} +sslCommonNameToCheck = {% for host in groups.all_splunk_instances %}{{ host }}, {% endfor %} +sslPassword = {{ splunk_ssl_cert_password }} +sslVerifyServerCert = true +{% endif %} \ No newline at end of file diff --git a/common/templates/forwarding_uf_outputs_conf.j2 b/common/templates/forwarding_uf_outputs_conf.j2 new file mode 100755 index 0000000..a714e83 --- /dev/null +++ b/common/templates/forwarding_uf_outputs_conf.j2 @@ -0,0 +1,19 @@ +# BASE SETTINGS + +[tcpout] +# Change here to specify the indexer group +defaultGroup = all_{{ splunk_app_prefix }}_indexer +forceTimebasedAutoLB = true +maxQueueSize = 7MB +useACK = true + +[tcpout:all_{{ splunk_app_prefix }}_indexer] +{% if splunk_enableSSL %} +clientCert = $SPLUNK_HOME/etc/apps/{{ app_name }}/{{ custom_cert_path }} +{% endif %} +server = {% for host in indexer_list %}{{ host }}:{{ splunk_s2s_port }}, {% endfor %} +{% if splunk_enableSSL %} +sslCommonNameToCheck = {% for host in indexer_list %}{{ host }}, {% endfor %} +sslPassword = {{ splunk_ssl_cert_password }} +sslVerifyServerCert = true +{% endif %} \ No newline at end of file diff --git a/common/templates/idx_indexes_base.j2 b/common/templates/idx_indexes_base.j2 new file mode 100755 index 0000000..7d92ebc --- /dev/null +++ b/common/templates/idx_indexes_base.j2 @@ -0,0 +1,5 @@ +# performance optimisation +[default] +journalCompression = zstd +tsidxWritingLevel = 4 + diff --git a/common/templates/idx_kvstore_base.j2 b/common/templates/idx_kvstore_base.j2 new file mode 100755 index 0000000..91223e7 --- /dev/null +++ b/common/templates/idx_kvstore_base.j2 @@ -0,0 +1,5 @@ +# kvstore not needed on indexers, let's disable it +# even when distributing collection via bundle, it won't be used on indexer as this use lookups in the background + +[kvstore] +disabled = true \ No newline at end of file diff --git a/common/templates/idx_web_base.j2 b/common/templates/idx_web_base.j2 new file mode 100755 index 0000000..dfe7c76 --- /dev/null +++ b/common/templates/idx_web_base.j2 @@ -0,0 +1,9 @@ +# In larger environments, where there are more than, say, three indexers, +# it's common to disable the Splunk UI. This helps avoid configuration issues +# caused by logging in to the UI to do something directly via the manager, +# as well as saving some system resources. + +[settings] +startwebserver = 0 +# avoid timeout when indexer loaded +splunkdConnectionTimeout = 120 diff --git a/common/templates/indexer_cluster.j2 b/common/templates/indexer_cluster.j2 new file mode 100755 index 0000000..b93d28f --- /dev/null +++ b/common/templates/indexer_cluster.j2 @@ -0,0 +1,10 @@ + +# clustering parameters are local and moved in a cluster specific package +# this can be a site specific if only one site per cluster + +[clustering] +master_uri = https://{{ groups.splunk_cluster_master[0] }}:{{ splunk_svc_port }} +mode = slave + +[replication_port://{{ splunk_replication_port }}] +disabled = false diff --git a/common/templates/indexer_multisite.j2 b/common/templates/indexer_multisite.j2 new file mode 100755 index 0000000..a0d328c --- /dev/null +++ b/common/templates/indexer_multisite.j2 @@ -0,0 +1,15 @@ +# This app is expected to be layered on top of org_cluster_indexer_base; +# the settings there establish the general relationship with the master and +# set up clustered indexing behavior. This is another layer to provide the +# site number of the host, and to indicate that the clustering should be of +# the multi-site variety. + +# *** This app cannot be shipped via the master-apps mechanism; it would +# make all sites the same. Place it in etc/apps on the affected indexer. *** + +[general] +site = {{ splunk_site }} + +[clustering] +multisite = {{ splunk_multisite }} + diff --git a/common/templates/license_server_conf.j2 b/common/templates/license_server_conf.j2 new file mode 100755 index 0000000..efbe1b0 --- /dev/null +++ b/common/templates/license_server_conf.j2 @@ -0,0 +1,10 @@ +# In distributed environments, it's common to have a lone search head acting +# as the license master as well. In this configuration, providing the URI +# of the license master is easiest within the indexer_base configuration. +# In the event that there are multiple search heads, you could instead use +# the org_all_license app, shipped to the non-license SH, as well as all of +# the indexers. In either event, the settings are the same. + +[license] +master_uri = https://{{ groups.splunk_license_master[0] }}:{{ splunk_svc_port }} + diff --git a/common/templates/server_SSLconfig.j2 b/common/templates/server_SSLconfig.j2 new file mode 100755 index 0000000..c904964 --- /dev/null +++ b/common/templates/server_SSLconfig.j2 @@ -0,0 +1,12 @@ +[sslConfig] +sslRootCAPath = $SPLUNK_HOME/etc/auth/ca-cert.pem +enableSplunkdSSL = true +sslVersions = tls1.2 +serverCert = $SPLUNK_HOME/etc/auth/servercertificate.pem +# servercertificate.pem is a symlink to the real cert.pem on the instance + +sslPassword = {{ splunk_ssl_cert_password }} +requireClientCert = false + +sslVerifyServerCert = true +sslCommonNameToCheck = {% for host in groups.all_splunk_instances %}{{ host }}, {% endfor %} \ No newline at end of file diff --git a/common/templates/sh_idxcluster.j2 b/common/templates/sh_idxcluster.j2 new file mode 100755 index 0000000..945ab52 --- /dev/null +++ b/common/templates/sh_idxcluster.j2 @@ -0,0 +1,8 @@ +[clustering] +master_uri = https://{{ groups.splunk_cluster_master[0] }}:{{ splunk_svc_port }} +mode = searchhead +multisite = {{ splunk_multisite }} + +[general] +site = {{ splunk_site }} + diff --git a/common/templates/sh_shcluster.j2 b/common/templates/sh_shcluster.j2 new file mode 100755 index 0000000..13ab1ef --- /dev/null +++ b/common/templates/sh_shcluster.j2 @@ -0,0 +1,2 @@ +[replication_port://{{ splunk_shcluster_replication_port }}] + diff --git a/common/templates/uf_ssl_server_conf.j2 b/common/templates/uf_ssl_server_conf.j2 new file mode 100755 index 0000000..7ff1cf2 --- /dev/null +++ b/common/templates/uf_ssl_server_conf.j2 @@ -0,0 +1,7 @@ +[sslConfig] +enableSplunkdSSL = true +requireClientCert = false +sslPassword = {{ splunk_ssl_cert_password }} +sslRootCAPath = $SPLUNK_HOME/etc/apps/{{ splunk_app_prefix }}_uf_ssl/certs/ca-cert.pem +serverCert = $SPLUNK_HOME/etc/apps/{{ splunk_app_prefix }}_uf_ssl/certs/splunk_universal_forwarder-cert-concatenated.pem +sslVersions = tls1.2 \ No newline at end of file diff --git a/common/templates/web_sslConfig.j2 b/common/templates/web_sslConfig.j2 new file mode 100755 index 0000000..c3b7527 --- /dev/null +++ b/common/templates/web_sslConfig.j2 @@ -0,0 +1,5 @@ +[settings] +enableSplunkWebSSL = true +privKeyPath = $SPLUNK_HOME/etc/auth/web-nopwd-key.pem +serverCert = $SPLUNK_HOME/etc/auth/web-servercertificate.pem +sslVersions = tls1.2 \ No newline at end of file diff --git a/install_splunk.yml b/install_splunk.yml new file mode 100644 index 0000000..f83eb73 --- /dev/null +++ b/install_splunk.yml @@ -0,0 +1,52 @@ +- hosts: all_splunk_instances:!splunk_uf_linux:!splunk_uf_windows + tasks: + - name: Gathering Facts + include_tasks: roles/splunk_common/tasks/pre_install_subtasks/get_facts.yml + when: + - splunk_get_fact is not defined + +- hosts: all_splunk_instances:!splunk_uf_linux:!splunk_uf_windows + serial: + - 1 + - 100% + roles: + - splunk_common + tags: all,installation + +- hosts: localhost + connection: local + tasks: + - name: Cleanup secret + file: + dest: "/tmp/splunk_secret" + state: "absent" + become: yes + become_user: root + +- hosts: splunk_indexer + become: true + become_user: root + tasks: + - name: Changer le propriétaire et le groupe du répertoire1 + file: + path: /data/splunk_data + owner: splunk + group: splunk + state: directory + + - name: Changer le propriétaire et le groupe du répertoire2 + file: + path: /data_cold/splunk_data + owner: splunk + group: splunk + state: directory + + - name: "Start Splunk via cli" + command: "{{ splunk_exec }} start --accept-license --answer-yes --no-prompt" + become: yes + become_user: "{{ privileged_user }}" + + - name: "Boot-Start Splunk via cli" + command: "{{ splunk_exec }} enable boot-start" + become: yes + become_user: "{{ privileged_user }}" diff --git a/install_splunk_uf.yml b/install_splunk_uf.yml new file mode 100755 index 0000000..bf833ba --- /dev/null +++ b/install_splunk_uf.yml @@ -0,0 +1,35 @@ +--- +- hosts: splunk_uf_Linux + tasks: + - name: Gathering Facts + include_tasks: roles/splunk_common_uf/tasks/pre_install_subtasks/get_facts.yml + when: + - splunk_get_fact is not defined + +- hosts: splunk_uf_Linux + serial: + - 1 + - 100% + roles: + - splunk_common_uf + tags: all,installation + +- hosts: splunk_uf_Linux + tasks: + - name: "Start Splunk via cli" + command: "{{ splunk_exec_uf }} start --accept-license --answer-yes --no-prompt" + become: yes + become_user: "{{ privileged_user }}" + + - name: "Boot-Start Splunk via cli" + command: "{{ splunk_exec_uf }} enable boot-start" + become: yes + become_user: "{{ privileged_user }}" + +- hosts: localhost + connection: local + tasks: + - name: Cleanup secret + file: + dest: "/tmp/splunk_secret" + state: "absent" \ No newline at end of file diff --git a/install_splunk_uf_win.yml b/install_splunk_uf_win.yml new file mode 100755 index 0000000..8798066 --- /dev/null +++ b/install_splunk_uf_win.yml @@ -0,0 +1,10 @@ +- hosts: splunk_uf_win_m-tic + name: Copy source forwarder windows + ansible.windows.win.copy: + src: "{{ playbook_dir }}/roles/sources/{{ hostvars ['127.0.0.1'].splunkforwarder-8.1.3-63079c59e632-x64-release.msi }}" + dest: "C:\Temp\" + +- hosts: splunk_uf_win_m-tic + name: Install SplunkForwarder Windows + win_command: C:\Windows\System32\msiexec.exe /i C:\Temp\splunkforwarder-8.1.3-63079c59e632-x64-release.msi AGREETOLICENSE=Yes SPLUNKUSERNAME=admin SPLUNKPASSWORD=Adm1nPa$$w0rd /quiet + when: splunkforwarder_installed.exists == false \ No newline at end of file diff --git a/roles/splunk_common/handlers/main.yml b/roles/splunk_common/handlers/main.yml new file mode 100755 index 0000000..fd2f43a --- /dev/null +++ b/roles/splunk_common/handlers/main.yml @@ -0,0 +1,4 @@ +--- +# handlers file for splunk_common +- name: "Restart the splunkd service" + include_tasks: "{{ playbook_dir }}/common/handlers/restart_splunk.yml" diff --git a/roles/splunk_common/tasks/install_splunk.yml b/roles/splunk_common/tasks/install_splunk.yml new file mode 100755 index 0000000..7c08fc4 --- /dev/null +++ b/roles/splunk_common/tasks/install_splunk.yml @@ -0,0 +1,39 @@ +--- +- name: Remove old manifest files + file: + path: "{{ item.path }}" + state: "absent" + ignore_errors: yes + become: yes + become_user: "{{ privileged_user }}" + with_items: + - "{{ manifests.files }}" + when: splunk_upgrade | bool + +- name: Remove old directories + file: + path: "{{ item }}" + state: "absent" + ignore_errors: yes + become: yes + become_user: "{{ privileged_user }}" + with_items: + - "{{ splunk_home }}/bin" + - "{{ splunk_home }}/lib" + - "{{ splunk_home }}/share" + - "{{ splunk_home }}/Python-2.7" + when: splunk_upgrade | bool + +- name: Install Splunk + include_tasks: install_tasks/install_splunk_{{ splunk_build_type }}.yml + +- name: Remove installers + file: + dest: "{{ item }}" + state: "absent" + ignore_errors: yes + become: yes + become_user: "{{ privileged_user }}" + with_items: + - "{{ splunk_build_location }}" + - "/tmp/splunk_msi" diff --git a/roles/splunk_common/tasks/install_tasks/install_splunk_msi.yml b/roles/splunk_common/tasks/install_tasks/install_splunk_msi.yml new file mode 100644 index 0000000..d2ed314 --- /dev/null +++ b/roles/splunk_common/tasks/install_tasks/install_splunk_msi.yml @@ -0,0 +1,7 @@ +- name: Install Splunk (Windows) + command: "msiexec /I {{ splunk_build_location }}" AGREETOLICENSE=yes LAUNCHSPLUNK=0 /passive /qn" + when: ansible_system is match("CYGWIN*|Win32NT") + register: install_result + until: install_result is succeeded + retries: "{{ retry_num }}" + delay: 3 \ No newline at end of file diff --git a/roles/splunk_common/tasks/install_tasks/install_splunk_tgz.yml b/roles/splunk_common/tasks/install_tasks/install_splunk_tgz.yml new file mode 100644 index 0000000..55d7a44 --- /dev/null +++ b/roles/splunk_common/tasks/install_tasks/install_splunk_tgz.yml @@ -0,0 +1,13 @@ +- name: Install Splunk (Linux) + unarchive: + src: "{{ splunk_build_location }}" + dest: "{{ splunk_opt }}" + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + remote_src: "{{ splunk_build_remote_src }}" + register: install_result + until: install_result is succeeded + retries: " {{ retry_num}}" + delay: 3 + become: yes + become_user: "{{ privileged_user }}" \ No newline at end of file diff --git a/roles/splunk_common/tasks/main.yml b/roles/splunk_common/tasks/main.yml new file mode 100755 index 0000000..4233414 --- /dev/null +++ b/roles/splunk_common/tasks/main.yml @@ -0,0 +1,138 @@ +--- +- name: Check if splunk user exists + getent: + database: passwd + key: "{{ splunk_user }}" + fail_key: yes + register: user_exist + ignore_errors: true + become: yes + +- name: Setup the splunk user + user: + name: "{{ splunk_user }}" + comment: Splunk User + shell: /bin/bash + generate_ssh_key: yes + ssh_key_bits: 2048 + ssh_key_file: .ssh/id_rsa + state: present + when: user_exist["failed"] == true + become: yes + become_user: "{{ privileged_user }}" + +- name: Changing Splunk directory Owner + include_tasks: pre_install_subtasks/change_splunk_directory_owner.yml + when: + - ansible_system is match("Linux") + - splunk_home_ownership_enforcement is defined + - splunk_home_ownership_enforcement | bool + +- name: Stop existing Splunk + include_tasks: stop_splunk.yml + when: + - splunk_upgrade | bool + +# Below we will either install or upgrade, which at this moment is the same task. +- name: "Install Splunk" + include_tasks: install_splunk.yml + when: + - splunk_install | bool or (first_run | bool and splunk_build_location and splunk_build_location is match("^(https?|file)://.*")) + +- name: "Upgrade Splunk" + include_tasks: install_splunk.yml + when: + - not splunk_install + - not first_run + - splunk_upgrade | bool + +- name: Remove First Login + include_tasks: post_install_subtasks/remove_first_login.yml + when: + - first_run | bool + +# This needs to be done before any encrypted passkeys are generated +- name: setup splunk_secret + include_tasks: post_install_subtasks/set_splunk_secret.yml + when: + - first_run | bool + +- name: Generate user_seed.conf + include_tasks: post_install_subtasks/set_user_seed.yml + when: + - first_run | bool + +- name: setup the [general] pass4SymmKey in system/local + include_tasks: "{{ playbook_dir }}/common/tasks/set_conf_stanza.yml" + vars: + conf_file: "server.conf" + conf_directory: "{{ splunk_home }}/etc/system/local" + stanza_name: general + conf_stanzas: + - pass4SymmKey: "{{ splunk_general_pass4SymmKey }}" + +- name: Enable Splunk Service + include_tasks: post_install_subtasks/enable_service.yml + when: + - splunk_enable_service and ansible_system is match("Linux") + - first_run | bool + +- name: Setup HTTP port + include_tasks: post_install_subtasks/set_http_port.yml + when: + - splunk_http_port | int != 8000 + +- name: Setup MGMT port + include_tasks: post_install_subtasks/set_mgmt_port.yml + when: + - splunk_svc_port | int != 8089 + +- name : Setup SSL + include_tasks: post_install_subtasks/configure_ssl_on_splunk.yml + when: + - splunk_enableSSL | bool + - first_run | bool + +- name: Setup Optimistic locking + include_tasks: post_install_subtasks/setup_optimistic_locking.yml + when: + - splunk_optimistic_about_file_locking + +- name: "Add generic ssl apps" + copy: + src: "{{ playbook_dir }}/splunk_apps/base_ssl_apps/" + dest: "{{ splunk_home }}/etc/apps/" + group: "{{ splunk_group }}" + owner: "{{ splunk_user }}" + follow: yes + local_follow: yes + become: yes + become_user: "{{ privileged_user }}" + when: + - splunk_enableSSL | bool + +- name: Start Splunk + include_tasks: start_splunk.yml + +- name: setup http or https for further processing + include_tasks: "{{ playbook_dir }}/common/tasks/set_certificate_prefix.yml" + when : + - cert_prefix is not defined + +- name: setup root_endpoint for further processing + include_tasks: post_install_subtasks/set_root_endpoint.yml + when: + - splunk_root_endpoint is defined + - splunk_root_endpoint != None + - first_run | bool + +- name: Clean user_seed.conf + include_tasks: post_install_subtasks/clean_user_seed.yml + when: + - first_run | bool + +- name: Get splunk.secret if not provided initially + include_tasks: post_install_subtasks/register_splunk_secret.yml + when: + - first_run | bool + - splunk_secret is undefined or splunk_secret is none \ No newline at end of file diff --git a/roles/splunk_common/tasks/post_install_subtasks/clean_user_seed.yml b/roles/splunk_common/tasks/post_install_subtasks/clean_user_seed.yml new file mode 100755 index 0000000..b0aa661 --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/clean_user_seed.yml @@ -0,0 +1,7 @@ +--- +- name: Remove user-seed.conf + file: + dest: "{{ splunk_home }}/etc/system/local/user-seed.conf" + state: "absent" + notify: + - Restart the splunkd service diff --git a/roles/splunk_common/tasks/post_install_subtasks/configure_ssl_on_splunk.yml b/roles/splunk_common/tasks/post_install_subtasks/configure_ssl_on_splunk.yml new file mode 100755 index 0000000..137e91a --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/configure_ssl_on_splunk.yml @@ -0,0 +1,48 @@ +--- +- name: "Transmit certificates from host" + copy: + src: "{{ playbook_dir }}/ssl/{{ item }}" + dest: "{{ splunk_home }}/etc/auth/{{ item }}" + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + local_follow: true + mode: 0400 + loop: + - ca-cert.pem + - ca-key.pem + - "{{ inventory_hostname }}-cert-concatenated.pem" + - "{{ inventory_hostname }}-cert-concatenated-web.pem" + - "{{ inventory_hostname }}-nopwd-key.pem" + become: yes + become_user: "{{ privileged_user }}" + +- name: "Rename Server certificate for simplified usage via symbolic link" + file: + src: "{{ splunk_home }}/etc/auth/{{ inventory_hostname }}-cert-concatenated.pem" + dest: "{{ splunk_home }}/etc/auth/servercertificate.pem" + state: link + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + become: yes + become_user: "{{ privileged_user }}" + +- name: "Rename Web Server certificate for simplified usage via symbolic link" + file: + src: "{{ splunk_home }}/etc/auth/{{ inventory_hostname }}-cert-concatenated-web.pem" + dest: "{{ splunk_home }}/etc/auth/web-servercertificate.pem" + state: link + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + become: yes + become_user: "{{ privileged_user }}" + + +- name: "Rename Web Server certificate Key for simplified usage via symbolic link" + file: + src: "{{ splunk_home }}/etc/auth/{{ inventory_hostname }}-nopwd-key.pem" + dest: "{{ splunk_home }}/etc/auth/web-nopwd-key.pem" + state: link + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + become: yes + become_user: "{{ privileged_user }}" diff --git a/roles/splunk_common/tasks/post_install_subtasks/enable_service.yml b/roles/splunk_common/tasks/post_install_subtasks/enable_service.yml new file mode 100755 index 0000000..d3256dc --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/enable_service.yml @@ -0,0 +1,109 @@ +--- +- name: "Retrieve PID 1 process information (Linux)" + command: "ps 1" + register: pid1 + when: ansible_system is match("Linux") + +- name: "Retrieve Splunk version" + command: "{{ splunk_exec }} version --accept-license --answer-yes --no-prompt" + register: installed_splunk_version + when: ansible_system is match("Linux") + become: yes + become_user: "{{ splunk_user }}" + +- name: "Set installed version fact" + set_fact: + installed_splunk_version: "{{ installed_splunk_version.stdout | regex_search(regexp, '\\1') }}" + vars: + regexp: 'Splunk\s((\d+)\.(\d+)\.(\d+)).*' + when: ansible_system is match("Linux") + +- name: "Enable service via boot-start - Linux (systemd)" + become: yes + become_user: "{{ privileged_user }}" + command: "{{ splunk_exec }} enable boot-start -systemd-managed 1 -user {{ splunk_user }} --accept-license --answer-yes --no-prompt" + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + - installed_splunk_version[0] is version("7.2.2", ">=") + +# Using service file approach for systemd rather than 'boot-start' with +# 'systemd-unit-file-name' option because cli's versions older than 7.2.2 do +# not implement systemd in boot-start command. +- name: "Copy Splunkd unit file - Linux (systemd)" + template: + src: Splunkd.service.j2 + dest: /etc/systemd/system/Splunkd.service + owner: "{{ privileged_user }}" + group: "{{ privileged_user }}" + mode: 0644 + become: yes + become_user: "{{ privileged_user }}" + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + - installed_splunk_version[0] is version("7.2.2", "<") + +- name: "Reload daemons via systemctl - Linux (systemd)" + become: yes + become_user: "{{ privileged_user }}" + systemd: + daemon-reload: yes + name: Splunkd.service + enabled: true + when: + - ansible_system is match("Linux") + - pid1.stdout.find('systemd') != -1 + +- name: "Enable service via boot-start - Linux (init)" + become: yes + become_user: "{{ privileged_user }}" + command: "{{ splunk_exec }} enable boot-start -user {{ splunk_user }} --accept-license --answer-yes --no-prompt" + when: + - ansible_system is match("Linux") + - pid1.stdout.find('systemd') == -1 + +- name: "Enable service via boot-start - Windows" + command: "{{ splunk_exec }} enable boot-start -user {{ splunk_user }} --accept-license --answer-yes --no-prompt" + when: ansible_os_family == "Windows" + +- name: add splunk user to sudoer for systemd + lineinfile: + path: /etc/sudoers + state: present + line: "{{ splunk_user }} ALL=(root) NOPASSWD: /usr/bin/systemctl restart Splunkd.service" + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + become: yes + +- name: add splunk user to sudoer for systemd + lineinfile: + path: /etc/sudoers + state: present + line: "{{ splunk_user }} ALL=(root) NOPASSWD: /usr/bin/systemctl start Splunkd.service" + + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + become: yes + +- name: add splunk user to sudoer for systemd + lineinfile: + path: /etc/sudoers + state: present + line: "{{ splunk_user }} ALL=(root) NOPASSWD: /usr/bin/systemctl stop Splunkd.service" + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + become: yes + +- name: add splunk user to sudoer for systemd + lineinfile: + path: /etc/sudoers + state: present + line: "{{ splunk_user }} ALL=(root) NOPASSWD: /usr/bin/systemctl status Splunkd.service" + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + become: yes diff --git a/roles/splunk_common/tasks/post_install_subtasks/install_java.yml b/roles/splunk_common/tasks/post_install_subtasks/install_java.yml new file mode 100755 index 0000000..bca5d89 --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/install_java.yml @@ -0,0 +1,30 @@ +--- +- name: Install Oracle8 JDK + include_tasks: java_tasks/install_oracle8_jdk.yml + when: + - java_version == "oracle:8" + - ansible_system is match("Linux") + +- name: Install Openjdk8 JDK + include_tasks: java_tasks/install_openjdk8_jdk.yml + when: + - java_version == "openjdk:8" + - ansible_system is match("Linux") + +- name: Install Openjdk11 JDK + include_tasks: java_tasks/install_openjdk11_jdk.yml + when: + - java_version == "openjdk:11" + - ansible_system is match("Linux") + +- name: Install Openjdk13 JDK + include_tasks: java_tasks/install_openjdk11_jdk.yml + when: + - java_version == "openjdk:13" + - ansible_system is match("Linux") + +- name: Install Openjdk9 JDK for Windows + include_tasks: java_tasks/install_openjdk9_jdk_windows.yml + when: + - java_version == "openjdk:9" + - ansible_system is match("CYGWIN*|Win32NT") diff --git a/roles/splunk_common/tasks/post_install_subtasks/register_splunk_secret.yml b/roles/splunk_common/tasks/post_install_subtasks/register_splunk_secret.yml new file mode 100755 index 0000000..85db2a6 --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/register_splunk_secret.yml @@ -0,0 +1,21 @@ +--- + +# - name: Get the Splunk secret +# shell: cat "{{ splunk_home }}/etc/auth/splunk.secret" +# register: splunk_secret_content +# when: +# - splunk_secret is undefined or splunk_secret is none +# - not tmp_splunk_secret.stat.exists +# become: yes +# become_user: "{{ privileged_user }}" + +- name: register Splunk secret for use on other hosts + fetch: + src: "{{ splunk_home }}/etc/auth/splunk.secret" + dest: "/tmp/splunk_secret" + flat: yes + become: yes + become_user: "{{ privileged_user }}" + when: + - splunk_secret is undefined or splunk_secret is none + - not tmp_splunk_secret.stat.exists diff --git a/roles/splunk_common/tasks/post_install_subtasks/remove_first_login.yml b/roles/splunk_common/tasks/post_install_subtasks/remove_first_login.yml new file mode 100755 index 0000000..e7e3e7b --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/remove_first_login.yml @@ -0,0 +1,10 @@ +--- +- name: "Create .ui_login" + file: + path: "{{ splunk_home }}/etc/.ui_login" + state: touch + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + mode: "u=rw,g=,o=" + become: yes + become_user: "{{ splunk_user }}" \ No newline at end of file diff --git a/roles/splunk_common/tasks/post_install_subtasks/set_http_port.yml b/roles/splunk_common/tasks/post_install_subtasks/set_http_port.yml new file mode 100755 index 0000000..e361809 --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/set_http_port.yml @@ -0,0 +1,8 @@ +--- +- name: Set HTTP Port + ini_file: + dest: "{{ splunk_home }}/etc/system/local/web.conf" + section: settings + option: "httpport" + value: "{{ splunk_http_port }}" + diff --git a/roles/splunk_common/tasks/post_install_subtasks/set_mgmt_port.yml b/roles/splunk_common/tasks/post_install_subtasks/set_mgmt_port.yml new file mode 100755 index 0000000..e958959 --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/set_mgmt_port.yml @@ -0,0 +1,7 @@ +--- +- name: Set mgmt port + ini_file: + dest: "{{ splunk_home }}/etc/system/local/web.conf" + section: settings + option: "mgmtHostPort" + value: "127.0.0.1:{{ splunk_svc_port }}" diff --git a/roles/splunk_common/tasks/post_install_subtasks/set_root_endpoint.yml b/roles/splunk_common/tasks/post_install_subtasks/set_root_endpoint.yml new file mode 100755 index 0000000..7e8a4aa --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/set_root_endpoint.yml @@ -0,0 +1,19 @@ +--- +- name: Set root endpoint + uri: + url: "{{ cert_prefix }}://127.0.0.1:{{ splunk_svc_port }}/servicesNS/nobody/system/configs/conf-web/settings" + method: POST + user: "{{ splunk_admin_user }}" + password: "{{ splunk_password }}" + validate_certs: false + body: + root_endpoint: "{{ splunk_root_endpoint }}" + body_format: "form-urlencoded" + status_code: 200 + timeout: 10 + when: splunk_root_endpoint + register: set_root_endpoint + changed_when: set_root_endpoint.status == 200 + no_log: "{{ hide_password }}" + notify: + - Restart the splunkd service diff --git a/roles/splunk_common/tasks/post_install_subtasks/set_splunk_secret.yml b/roles/splunk_common/tasks/post_install_subtasks/set_splunk_secret.yml new file mode 100755 index 0000000..0b1630e --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/set_splunk_secret.yml @@ -0,0 +1,35 @@ +--- + +- name: Set the Splunk secret from Config + copy: + dest: "{{ splunk_home }}/etc/auth/splunk.secret" + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + mode: 0400 + content: "{{ splunk_secret }}" + when: + - splunk_secret is defined and splunk_secret is not none + become: yes + become_user: "{{ privileged_user }}" + +# Checking that a splunk_secret exists on ansible host +- name: "Checking that a splunk_secret exists on ansible host" + local_action: stat path=/tmp/splunk_secret + register: tmp_splunk_secret + + become: yes + become_user: "{{ privileged_user }}" + + +- name: Set the Splunk secret from First Host + copy: + dest: "{{ splunk_home }}/etc/auth/splunk.secret" + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + mode: 0400 + src: "/tmp/splunk_secret" + when: + - splunk_secret is undefined or splunk_secret is none + - tmp_splunk_secret.stat.exists + become: yes + become_user: "{{ privileged_user }}" \ No newline at end of file diff --git a/roles/splunk_common/tasks/post_install_subtasks/set_user_seed.yml b/roles/splunk_common/tasks/post_install_subtasks/set_user_seed.yml new file mode 100755 index 0000000..4c554ba --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/set_user_seed.yml @@ -0,0 +1,42 @@ +--- +- name: "Hash the password" + command: "{{ splunk_exec }} hash-passwd {{ splunk_password }}" + register: hashed_pwd + changed_when: hashed_pwd.rc == 0 + become: yes + become_user: "{{ splunk_user }}" + no_log: "{{ hide_password }}" + +- name: "Generate user-seed.conf (Linux)" + ini_file: + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + dest: "{{ splunk_home }}/etc/system/local/user-seed.conf" + section: user_info + option: "{{ item.opt }}" + value: "{{ item.val }}" + with_items: + - { opt: "USERNAME", val: "{{ splunk_admin_user }}" } + - { opt: "HASHED_PASSWORD", val: "{{ hashed_pwd.stdout }}" } + loop_control: + label: "{{ item.opt }}" + when: ansible_system is match("Linux") + no_log: "{{ hide_password }}" + become: yes + become_user: "{{ splunk_user }}" + +- name: "Generate user-seed.conf (Windows)" + ini_file: + dest: "{{ splunk_home }}/etc/system/local/user-seed.conf" + section: user_info + option: "{{ item.opt }}" + value: "{{ item.val }}" + with_items: + - { opt: "USERNAME", val: "{{ splunk_admin_user }}" } + - { opt: "HASHED_PASSWORD", val: "{{ hashed_pwd.stdout }}" } + loop_control: + label: "{{ item.opt }}" + when: ansible_system is match("CYGWIN*|Win32NT") + no_log: "{{ hide_password }}" + become: yes + become_user: "{{ splunk_user }}" diff --git a/roles/splunk_common/tasks/post_install_subtasks/setup_optimistic_locking.yml b/roles/splunk_common/tasks/post_install_subtasks/setup_optimistic_locking.yml new file mode 100755 index 0000000..99860c5 --- /dev/null +++ b/roles/splunk_common/tasks/post_install_subtasks/setup_optimistic_locking.yml @@ -0,0 +1,7 @@ +- name: Ensure Optimistic locking is set to splunk-launch.conf + lineinfile: + path: "{{ splunk_home }}/etc/splunk-launch.conf" + regexp: "^OPTIMISTIC_ABOUT_FILE_LOCKING=" + line: OPTIMISTIC_ABOUT_FILE_LOCKING=1 + become: yes + become_user: "{{ privileged_user }}" \ No newline at end of file diff --git a/roles/splunk_common/tasks/pre_install_subtasks/change_splunk_directory_owner.yml b/roles/splunk_common/tasks/pre_install_subtasks/change_splunk_directory_owner.yml new file mode 100644 index 0000000..4c0d51f --- /dev/null +++ b/roles/splunk_common/tasks/pre_install_subtasks/change_splunk_directory_owner.yml @@ -0,0 +1,10 @@ +--- +- name: Update Splunk directory owner + file: + path: "{{ splunk_home }}" + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + recurse: yes + state: directory + become: yes + become_user: "{{ privileged_user }}" \ No newline at end of file diff --git a/roles/splunk_common/tasks/pre_install_subtasks/get_facts.yml b/roles/splunk_common/tasks/pre_install_subtasks/get_facts.yml new file mode 100644 index 0000000..2fdde54 --- /dev/null +++ b/roles/splunk_common/tasks/pre_install_subtasks/get_facts.yml @@ -0,0 +1,56 @@ +--- +- name: "Set privilege escalation user" + set_fact: + privileged_user: "{% if ansible_system is match('CYGWIN*|Win32NT') %}Administrator{% else %}root{% endif %}" + +- name: "Check for existing installation" + stat: + path: "{{ splunk_exec }}" + become: yes + register: pre_existing_splunk_exec + +- name: "Set splunk install fact" + set_fact: + splunk_install: "{{ not pre_existing_splunk_exec.stat.exists | default(True) }}" + +- name: "Check for existing splunk secret" + stat: + path: "{{ splunk_home }}/etc/auth/splunk.secret" + register: pre_existing_splunk_secret + become: yes + become_user: "{{ privileged_user }}" + +- name: "Set first run fact" + set_fact: + first_run: "{{ not pre_existing_splunk_secret.stat.exists | default(True) }}" + become: yes + become_user: "{{ privileged_user }}" + +- name : "Set splunk_build_type fact" + include_tasks: get_facts_build_type.yml + +- name: "Set target version fact" + include_tasks: get_facts_target_version.yml + when: splunk_target_version is not defined or splunk_target_version == none + +- name: "Find manifest" + find: + paths: "{{ splunk_home }}" + patterns: ".*-manifest$" + use_regex: yes + become: yes + register: manifests + +- name: "Set current version fact" + set_fact: + splunk_current_version: "{{ manifests.files[0].path | regex_search(regexp, '\\1') if (manifests.matched == 1) else '0' }}" + vars: + regexp: 'splunk\D*?-((\d+)\.(\d+)\.(\d+))' + +- name: "Setting upgrade fact" + set_fact: + splunk_upgrade: "{{ splunk_build_location and not splunk_install and splunk_target_version and splunk_target_version != splunk_current_version | default(False) }}" + +- name: "Register the fact that we've gather the fact" + set_fact: + splunk_get_fact: true \ No newline at end of file diff --git a/roles/splunk_common/tasks/pre_install_subtasks/get_facts_build_type.yml b/roles/splunk_common/tasks/pre_install_subtasks/get_facts_build_type.yml new file mode 100644 index 0000000..f81116d --- /dev/null +++ b/roles/splunk_common/tasks/pre_install_subtasks/get_facts_build_type.yml @@ -0,0 +1,21 @@ +- name: Set splunk_build_type from variable + set_fact: + splunk_build_type: "{{ splunk_build_type }}" + when: + - "splunk_build_type is defined" + +- name: Set splunk_build_type from build_location + block: + #check if the build_location is a tgz + - name: "Set build_type (tgz)" + set_fact: + splunk_build_type: "tgz" + when: splunk_build_location is match(".*(\.tar\.gz|\.tgz)$") + - name: "Set build_type (msi)" + set_fact: + splunk_build_type: "msi" + when: splunk_build_location is match(".*\.msi$") + when: + - splunk_build_type is not defined + - splunk_build_type is not none + - splunk_build_location is not none diff --git a/roles/splunk_common/tasks/pre_install_subtasks/get_facts_target_version.yml b/roles/splunk_common/tasks/pre_install_subtasks/get_facts_target_version.yml new file mode 100644 index 0000000..ecb8021 --- /dev/null +++ b/roles/splunk_common/tasks/pre_install_subtasks/get_facts_target_version.yml @@ -0,0 +1,13 @@ +# Use a manually set version, if a it is set +- name: "Set target version fact" + set_fact: + splunk_target_version: "{{ splunk_target_version }}" + when: "splunk_target_version is defined" + +# Extracting the numbers from the Splunk installer file name allows us to know the version we are targeting. +- name: "Set target version fact (file)" + set_fact: + splunk_target_version: "{{ splunk_build_location | regex_search(regexp, '\\1') | default('0') }}" + vars: + regexp: 'splunk\D*?-((\d+)\.(\d+)\.(\d+))' + when: "splunk_build_type is defined and splunk_build_type is match('(tgz|msi|rpm|deb)')" \ No newline at end of file diff --git a/roles/splunk_common/tasks/start_splunk.yml b/roles/splunk_common/tasks/start_splunk.yml new file mode 100755 index 0000000..f656f23 --- /dev/null +++ b/roles/splunk_common/tasks/start_splunk.yml @@ -0,0 +1,45 @@ +--- +- name: "Get Splunk status" + command: "{{ splunk_exec }} status --accept-license --answer-yes --no-prompt" + become: yes + become_user: "{{ splunk_user }}" + register: splunk_status + changed_when: False + failed_when: False + ignore_errors: yes + +- name: "Start Splunk via cli" + command: "{{ splunk_exec }} start --accept-license --answer-yes --no-prompt" + become: yes + become_user: "{{ splunk_user }}" + register: start_splunk + changed_when: start_splunk.rc == 0 and 'already running' not in start_splunk.stdout + when: + - not splunk_enable_service or pid1 is not defined + - splunk_status.rc != 0 + ignore_errors: yes + +- name: "Start Splunk via service" + service: + name: "{% if pid1.stdout.find('systemd') != -1 %}Splunkd{% else %}splunk{% endif %}" + state: restarted + when: + - splunk_enable_service + - splunk_status.rc != 0 + - ansible_system is match("Linux") + - pid1 is defined + become: yes + become_user: "{{ privileged_user }}" + +- name: "Start Splunk via Windows service" + win_service: + name: splunkd + state: restarted + when: + - splunk_enable_service + - splunk_status.rc != 0 + - ansible_os_family == "Windows" + +- name: "Wait for splunkd management port" + wait_for: + port: "{{ splunk_svc_port }}" diff --git a/roles/splunk_common/tasks/stop_splunk.yml b/roles/splunk_common/tasks/stop_splunk.yml new file mode 100755 index 0000000..0b19892 --- /dev/null +++ b/roles/splunk_common/tasks/stop_splunk.yml @@ -0,0 +1,40 @@ +--- +- name: "Get Splunk status" + command: "{{ splunk_exec }} status --accept-license --answer-yes --no-prompt" + become: yes + become_user: "{{ splunk_user }}" + register: splunk_status + changed_when: False + failed_when: False + ignore_errors: yes + +- name: "Stop Splunk via cli" + command: "{{ splunk_exec }} stop --accept-license --answer-yes --no-prompt" + become: yes + become_user: "{{ splunk_user }}" + register: stop_splunk + changed_when: stop_splunk.rc == 0 + when: + - not splunk_enable_service + - splunk_status.rc == 0 + +- name: "Stop Splunk via systemctl" + service: + name: Splunkd + state: stopped + when: + - splunk_enable_service + - splunk_status.rc == 0 + - ansible_system is match("Linux") + become: yes + become_user: "{{ privileged_user }}" + ignore_errors: yes + +- name: "Stop Splunk via Windows service" + win_service: + name: splunkd + state: stopped + when: + - splunk_enable_service + - splunk_status.rc == 0 + - ansible_os_family == "Windows" diff --git a/roles/splunk_common/vars/main.yml b/roles/splunk_common/vars/main.yml new file mode 100644 index 0000000..2d7fb35 --- /dev/null +++ b/roles/splunk_common/vars/main.yml @@ -0,0 +1,3 @@ +splunk_version: "8.3.1" +splunk_download_url: "https://download.splunk.com/products/splunk/releases/{{ splunk_version }}/linux/splunk-{{ splunk_version }}-aa7ca5cfbb32-Linux-x86_64.tgz" +splunk_user: "splunk" \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/install_splunk.yml b/roles/splunk_common_uf/tasks/install_splunk.yml new file mode 100755 index 0000000..a46c54c --- /dev/null +++ b/roles/splunk_common_uf/tasks/install_splunk.yml @@ -0,0 +1,39 @@ +--- +- name: Remove old manifest files + file: + path: "{{ item.path }}" + state: "absent" + ignore_errors: yes + become: yes + become_user: "{{ privileged_user }}" + with_items: + - "{{ manifests.files }}" + when: splunk_upgrade | bool + +- name: Remove old directories + file: + path: "{{ item }}" + state: "absent" + ignore_errors: yes + become: yes + become_user: "{{ privileged_user }}" + with_items: + - "{{ splunk_home_uf }}/bin" + - "{{ splunk_home_uf }}/lib" + - "{{ splunk_home_uf }}/share" + - "{{ splunk_home_uf }}/Python-2.7" + when: splunk_upgrade | bool + +- name: Install Splunk + include_tasks: install_tasks/install_splunk_{{ splunk_build_type }}.yml + +- name: Remove installers + file: + dest: "{{ item }}" + state: "absent" + ignore_errors: yes + become: yes + become_user: "{{ privileged_user }}" + with_items: + - "{{ splunk_build_location_uf }}" + - "/tmp/splunk_msi" \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/install_tasks/install_splunk_tgz.yml b/roles/splunk_common_uf/tasks/install_tasks/install_splunk_tgz.yml new file mode 100755 index 0000000..dd2a34e --- /dev/null +++ b/roles/splunk_common_uf/tasks/install_tasks/install_splunk_tgz.yml @@ -0,0 +1,13 @@ +- name: Install Splunk (Linux) + unarchive: + src: "{{ splunk_build_location_uf }}" + dest: "{{ splunk_opt }}" + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + remote_src: "{{ splunk_build_remote_src }}" + register: install_result + until: install_result is succeeded + retries: "{{ retry_num }}" + delay: 3 + become: yes + become_user: "{{ privileged_user }}" \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/main.yml b/roles/splunk_common_uf/tasks/main.yml new file mode 100755 index 0000000..b84b328 --- /dev/null +++ b/roles/splunk_common_uf/tasks/main.yml @@ -0,0 +1,92 @@ +--- +- name: Check if splunk user exists + getent: + database: passwd + key: "{{ splunk_user }}" + fail_key: yes + register: user_exist + ignore_errors: true + become: yes + +- name: Setup the splunk user + user: + name: "{{ splunk_user }}" + comment: Splunk User + shell: /bin/bash + generate_ssh_key: yes + ssh_key_bits: 2048 + ssh_key_file: .ssh/id_rsa + state: present + when: user_exist["failed"] == true + become: yes + become_user: "{{ privileged_user }}" + +- name: Changing Splunk directory Owner + include_tasks: pre_install_subtasks/change_splunk_directory_owner.yml + when: + - ansible_system is match("Linux") + - splunk_home_ownership_enforcement is defined + - splunk_home_ownership_enforcement | bool + +- name: Stop existing Splunk + include_tasks: stop_splunk.yml + when: + - splunk_upgrade | bool + +# Below we will either install or upgrade, which at this moment is the same task. +- name: "Install Splunk" + include_tasks: install_splunk.yml + when: + - splunk_install | bool or (first_run | bool and splunk_build_location and splunk_build_location is match("^(https?|file)://.*")) + +- name: "Upgrade Splunk" + include_tasks: install_splunk.yml + when: + - not splunk_install + - not first_run + - splunk_upgrade | bool + +- name: Remove First Login + include_tasks: post_install_subtasks/remove_first_login.yml + when: + - first_run | bool + +# This needs to be done before any encrypted passkeys are generated +- name: setup splunk_secret + include_tasks: post_install_subtasks/set_splunk_secret.yml + when: + - first_run | bool + +- name: Generate user_seed.conf + include_tasks: post_install_subtasks/set_user_seed.yml + when: + - first_run | bool + +- name: setup the [general] pass4SymmKey in system/local + include_tasks: "{{ playbook_dir }}/common/tasks/set_conf_stanza.yml" + vars: + conf_file: "server.conf" + conf_directory: "{{ splunk_home_uf }}/etc/system/local" + stanza_name: general + conf_stanzas: + - pass4SymmKey: "{{ splunk_general_pass4SymmKey }}" + +- name: Enable Splunk Service + include_tasks: post_install_subtasks/enable_service.yml + when: + - splunk_enable_service and ansible_system is match("Linux") + - first_run | bool + +- name: Start Splunk + include_tasks: start_splunk.yml + +- name: Clean user_seed.conf + include_tasks: post_install_subtasks/clean_user_seed.yml + when: + - first_run | bool + +- name: Get splunk.secret if not provided initially + include_tasks: post_install_subtasks/register_splunk_secret.yml + when: + - first_run | bool + - splunk_secret is undefined or splunk_secret is none \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/post_install_subtasks/clean_user_seed.yml b/roles/splunk_common_uf/tasks/post_install_subtasks/clean_user_seed.yml new file mode 100755 index 0000000..d0334cd --- /dev/null +++ b/roles/splunk_common_uf/tasks/post_install_subtasks/clean_user_seed.yml @@ -0,0 +1,7 @@ +--- +- name: Remove user-seed.conf + file: + dest: "{{ splunk_home_uf }}/etc/system/local/user-seed.conf" + state: "absent" + notify: + - Restart the splunkd service \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/post_install_subtasks/enable_service.yml b/roles/splunk_common_uf/tasks/post_install_subtasks/enable_service.yml new file mode 100755 index 0000000..efe3720 --- /dev/null +++ b/roles/splunk_common_uf/tasks/post_install_subtasks/enable_service.yml @@ -0,0 +1,109 @@ +--- +- name: "Retrieve PID 1 process information (Linux)" + command: "ps 1" + register: pid1 + when: ansible_system is match("Linux") + +- name: "Retrieve Splunk version" + command: "{{ splunk_exec_uf }} version --accept-license --answer-yes --no-prompt" + register: installed_splunk_version + when: ansible_system is match("Linux") + become: yes + become_user: "{{ splunk_user }}" + +- name: "Set installed version fact" + set_fact: + installed_splunk_version: "{{ installed_splunk_version.stdout | regex_search(regexp, '\\1') }}" + vars: + regexp: 'Splunk\s((\d+)\.(\d+)\.(\d+)).*' + when: ansible_system is match("Linux") + +- name: "Enable service via boot-start - Linux (systemd)" + become: yes + become_user: "{{ privileged_user }}" + command: "{{ splunk_exec_uf }} enable boot-start -systemd-managed 1 -user {{ splunk_user }} --accept-license --answer-yes --no-prompt" + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + - installed_splunk_version[0] is version("7.2.2", ">=") + +# Using service file approach for systemd rather than 'boot-start' with +# 'systemd-unit-file-name' option because cli's versions older than 7.2.2 do +# not implement systemd in boot-start command. +- name: "Copy Splunkd unit file - Linux (systemd)" + template: + src: Splunkd.service.j2 + dest: /etc/systemd/system/Splunkd.service + owner: "{{ privileged_user }}" + group: "{{ privileged_user }}" + mode: 0644 + become: yes + become_user: "{{ privileged_user }}" + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + - installed_splunk_version[0] is version("7.2.2", "<") + +- name: "Reload daemons via systemctl - Linux (systemd)" + become: yes + become_user: "{{ privileged_user }}" + systemd: + daemon-reload: yes + name: Splunkd.service + enabled: true + when: + - ansible_system is match("Linux") + - pid1.stdout.find('systemd') != -1 + +- name: "Enable service via boot-start - Linux (init)" + become: yes + become_user: "{{ privileged_user }}" + command: "{{ splunk_exec_uf }} enable boot-start -user {{ splunk_user }} --accept-license --answer-yes --no-prompt" + when: + - ansible_system is match("Linux") + - pid1.stdout.find('systemd') == -1 + +- name: "Enable service via boot-start - Windows" + command: "{{ splunk_exec_uf }} enable boot-start -user {{ splunk_user }} --accept-license --answer-yes --no-prompt" + when: ansible_os_family == "Windows" + +- name: add splunk user to sudoer for systemd + lineinfile: + path: /etc/sudoers + state: present + line: "{{ splunk_user }} ALL=(root) NOPASSWD: /usr/bin/systemctl restart Splunkd.service" + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + become: yes + +- name: add splunk user to sudoer for systemd + lineinfile: + path: /etc/sudoers + state: present + line: "{{ splunk_user }} ALL=(root) NOPASSWD: /usr/bin/systemctl start Splunkd.service" + + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + become: yes + +- name: add splunk user to sudoer for systemd + lineinfile: + path: /etc/sudoers + state: present + line: "{{ splunk_user }} ALL=(root) NOPASSWD: /usr/bin/systemctl stop Splunkd.service" + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + become: yes + +- name: add splunk user to sudoer for systemd + lineinfile: + path: /etc/sudoers + state: present + line: "{{ splunk_user }} ALL=(root) NOPASSWD: /usr/bin/systemctl status Splunkd.service" + when: + - ansible_system is match("Linux") + - pid1.stdout.find("systemd") != -1 + become: yes \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/post_install_subtasks/install_java.yml b/roles/splunk_common_uf/tasks/post_install_subtasks/install_java.yml new file mode 100755 index 0000000..bca5d89 --- /dev/null +++ b/roles/splunk_common_uf/tasks/post_install_subtasks/install_java.yml @@ -0,0 +1,30 @@ +--- +- name: Install Oracle8 JDK + include_tasks: java_tasks/install_oracle8_jdk.yml + when: + - java_version == "oracle:8" + - ansible_system is match("Linux") + +- name: Install Openjdk8 JDK + include_tasks: java_tasks/install_openjdk8_jdk.yml + when: + - java_version == "openjdk:8" + - ansible_system is match("Linux") + +- name: Install Openjdk11 JDK + include_tasks: java_tasks/install_openjdk11_jdk.yml + when: + - java_version == "openjdk:11" + - ansible_system is match("Linux") + +- name: Install Openjdk13 JDK + include_tasks: java_tasks/install_openjdk11_jdk.yml + when: + - java_version == "openjdk:13" + - ansible_system is match("Linux") + +- name: Install Openjdk9 JDK for Windows + include_tasks: java_tasks/install_openjdk9_jdk_windows.yml + when: + - java_version == "openjdk:9" + - ansible_system is match("CYGWIN*|Win32NT") diff --git a/roles/splunk_common_uf/tasks/post_install_subtasks/register_splunk_secret.yml b/roles/splunk_common_uf/tasks/post_install_subtasks/register_splunk_secret.yml new file mode 100755 index 0000000..343a207 --- /dev/null +++ b/roles/splunk_common_uf/tasks/post_install_subtasks/register_splunk_secret.yml @@ -0,0 +1,21 @@ +--- + +# - name: Get the Splunk secret +# shell: cat "{{ splunk_home }}/etc/auth/splunk.secret" +# register: splunk_secret_content +# when: +# - splunk_secret is undefined or splunk_secret is none +# - not tmp_splunk_secret.stat.exists +# become: yes +# become_user: "{{ privileged_user }}" + +- name: register Splunk secret for use on other hosts + fetch: + src: "{{ splunk_home_uf }}/etc/auth/splunk.secret" + dest: "/tmp/splunk_secret" + flat: yes + become: yes + become_user: "{{ privileged_user }}" + when: + - splunk_secret is undefined or splunk_secret is none + - not tmp_splunk_secret.stat.exists \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/post_install_subtasks/remove_first_login.yml b/roles/splunk_common_uf/tasks/post_install_subtasks/remove_first_login.yml new file mode 100755 index 0000000..829e63e --- /dev/null +++ b/roles/splunk_common_uf/tasks/post_install_subtasks/remove_first_login.yml @@ -0,0 +1,10 @@ +--- +- name: "Create .ui_login" + file: + path: "{{ splunk_home_uf }}/etc/.ui_login" + state: touch + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + mode: "u=rw,g=,o=" + become: yes + become_user: "{{ splunk_user }}" \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/post_install_subtasks/set_splunk_secret.yml b/roles/splunk_common_uf/tasks/post_install_subtasks/set_splunk_secret.yml new file mode 100755 index 0000000..c2d56ad --- /dev/null +++ b/roles/splunk_common_uf/tasks/post_install_subtasks/set_splunk_secret.yml @@ -0,0 +1,33 @@ +--- + +- name: Set the Splunk secret from Config + copy: + dest: "{{ splunk_home_uf }}/etc/auth/splunk.secret" + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + mode: 0400 + content: "{{ splunk_secret }}" + when: + - splunk_secret is defined and splunk_secret is not none + become: yes + become_user: "{{ privileged_user }}" + +# Checking that a splunk_secret exists on ansible host +- name: "Checking that a splunk_secret exists on ansible host" + local_action: stat path=/tmp/splunk_secret + register: tmp_splunk_secret + become: yes + become_user: "{{ privileged_user }}" + +- name: Set the Splunk secret from First Host + copy: + dest: "{{ splunk_home_uf }}/etc/auth/splunk.secret" + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + mode: 0400 + src: "/tmp/splunk_secret" + when: + - splunk_secret is undefined or splunk_secret is none + - tmp_splunk_secret.stat.exists + become: yes + become_user: "{{ privileged_user }}" \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/post_install_subtasks/set_user_seed.yml b/roles/splunk_common_uf/tasks/post_install_subtasks/set_user_seed.yml new file mode 100755 index 0000000..40c7841 --- /dev/null +++ b/roles/splunk_common_uf/tasks/post_install_subtasks/set_user_seed.yml @@ -0,0 +1,42 @@ +--- +- name: "Hash the password" + command: "{{ splunk_exec_uf }} hash-passwd {{ splunk_password }}" + register: hashed_pwd + changed_when: hashed_pwd.rc == 0 + become: yes + become_user: "{{ splunk_user }}" + no_log: "{{ hide_password }}" + +- name: "Generate user-seed.conf (Linux)" + ini_file: + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + dest: "{{ splunk_home_uf }}/etc/system/local/user-seed.conf" + section: user_info + option: "{{ item.opt }}" + value: "{{ item.val }}" + with_items: + - { opt: "USERNAME", val: "{{ splunk_admin_user }}" } + - { opt: "HASHED_PASSWORD", val: "{{ hashed_pwd.stdout }}" } + loop_control: + label: "{{ item.opt }}" + when: ansible_system is match("Linux") + no_log: "{{ hide_password }}" + become: yes + become_user: "{{ splunk_user }}" + +- name: "Generate user-seed.conf (Windows)" + ini_file: + dest: "{{ splunk_home_uf }}/etc/system/local/user-seed.conf" + section: user_info + option: "{{ item.opt }}" + value: "{{ item.val }}" + with_items: + - { opt: "USERNAME", val: "{{ splunk_admin_user }}" } + - { opt: "HASHED_PASSWORD", val: "{{ hashed_pwd.stdout }}" } + loop_control: + label: "{{ item.opt }}" + when: ansible_system is match("CYGWIN*|Win32NT") + no_log: "{{ hide_password }}" + become: yes + become_user: "{{ splunk_user }}" diff --git a/roles/splunk_common_uf/tasks/pre_install_subtasks/change_splunk_directory_owner.yml b/roles/splunk_common_uf/tasks/pre_install_subtasks/change_splunk_directory_owner.yml new file mode 100755 index 0000000..57a5880 --- /dev/null +++ b/roles/splunk_common_uf/tasks/pre_install_subtasks/change_splunk_directory_owner.yml @@ -0,0 +1,10 @@ +--- +- name: Update Splunk directory owner + file: + path: "{{ splunk_home_uf }}" + owner: "{{ splunk_user }}" + group: "{{ splunk_group }}" + recurse: yes + state: directory + become: yes + become_user: "{{ privileged_user }}" \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/pre_install_subtasks/get_facts.yml b/roles/splunk_common_uf/tasks/pre_install_subtasks/get_facts.yml new file mode 100755 index 0000000..df8bee2 --- /dev/null +++ b/roles/splunk_common_uf/tasks/pre_install_subtasks/get_facts.yml @@ -0,0 +1,72 @@ +--- +- name: "Set privilege escalation user" + set_fact: + privileged_user: "{% if ansible_system is match('CYGWIN*|Win32NT') %}Administrator{% else %}root{% endif %}" + +- name: "Check for existing installation" + stat: + path: "{{ splunk_exec_uf }}" + become: yes + register: pre_existing_splunk_exec + +#- name: Récupérer le fichier depuis l'hôte source + #fetch: + #src: /tmp/splunkforwarder-8.2.3-cd0848707637-Linux-x86_64.tgz + #dest: /tmp/ + #flat: yes + #validate_checksum: yes + #fail_on_missing: yes + #fail_on_unreachable: yes + #delegate_to: 10.10.30.38 + +#- name: Copier le fichier vers l'hôte distant + #copy: + #src: /tmp/splunkforwarder-8.2.3-cd0848707637-Linux-x86_64.tgz + #dest: "{{ splunk_build_location_uf }}" + #owner: admin + #group: admin + #mode: "0644" + + +- name: "Set splunk install fact" + set_fact: + splunk_install: "{{ not pre_existing_splunk_exec.stat.exists | default(True) }}" + +- name: "Check for existing splunk secret" + stat: + path: "{{ splunk_home_uf }}/etc/auth/splunk.secret" + register: pre_existing_splunk_secret + become: yes + +- name: "Set first run fact" + set_fact: + first_run: "{{ not pre_existing_splunk_secret.stat.exists | default(True) }}" + +- name: "Set splunk_build_type fact" + include_tasks: get_facts_build_type.yml + +- name: "Set target version fact" + include_tasks: get_facts_target_version.yml + when: splunk_target_version is not defined or splunk_target_version == none + +- name: "Find manifests" + find: + paths: "{{ splunk_home_uf }}" + patterns: ".*-manifest$" + use_regex: yes + become: yes + register: manifests + +- name: "Set current version fact" + set_fact: + splunk_current_version: "{{ manifests.files[0].path | regex_search(regexp, '\\1') if (manifests.matched == 1) else '0' }}" + vars: + regexp: 'splunk\D*?-((\d+)\.(\d+)\.(\d+))' + +- name: "Setting upgrade fact" + set_fact: + splunk_upgrade: "{{ splunk_build_location_uf and not splunk_install and splunk_target_version and splunk_target_version != splunk_current_version | default(False) }}" + +- name: "Register the fact that we've gather the fact" + set_fact: + splunk_get_fact: true \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/pre_install_subtasks/get_facts_build_type.yml b/roles/splunk_common_uf/tasks/pre_install_subtasks/get_facts_build_type.yml new file mode 100755 index 0000000..fdf20dd --- /dev/null +++ b/roles/splunk_common_uf/tasks/pre_install_subtasks/get_facts_build_type.yml @@ -0,0 +1,21 @@ +- name: Set splunk_build_type from variable + set_fact: + splunk_build_type: "{{ splunk_build_type }}" + when: + - "splunk_build_type is defined" + +- name: Set splunk_build_type from build_location + block: + #check if the build_location is a tgz + - name: "Set build_type (tgz)" + set_fact: + splunk_build_type: "tgz" + when: splunk_build_location is match(".*(\.tar\.gz|\.tgz)$") + - name: "Set build_type (msi)" + set_fact: + splunk_build_type: "msi" + when: splunk_build_location is match(".*\.msi$") + when: + - splunk_build_type is not defined + - splunk_build_type is not none + - splunk_build_location is not none \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/pre_install_subtasks/get_facts_target_version.yml b/roles/splunk_common_uf/tasks/pre_install_subtasks/get_facts_target_version.yml new file mode 100755 index 0000000..4957e66 --- /dev/null +++ b/roles/splunk_common_uf/tasks/pre_install_subtasks/get_facts_target_version.yml @@ -0,0 +1,13 @@ +# Use a manually set version, if a it is set +- name: "Set target version fact" + set_fact: + splunk_target_version: "{{ splunk_target_version }}" + when: "splunk_target_version is defined" + +# Extracting the numbers from the Splunk installer file name allows us to know the version we are targeting. +- name: "Set target version fact (file)" + set_fact: + splunk_target_version: "{{ splunk_build_location | regex_search(regexp, '\\1') | default('0') }}" + vars: + regexp: 'splunk\D*?-((\d+)\.(\d+)\.(\d+))' + when: "splunk_build_type is defined and splunk_build_type is match('(tgz|msi|rpm|deb)')" \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/start_splunk.yml b/roles/splunk_common_uf/tasks/start_splunk.yml new file mode 100755 index 0000000..d32697b --- /dev/null +++ b/roles/splunk_common_uf/tasks/start_splunk.yml @@ -0,0 +1,45 @@ +--- +- name: "Get Splunk status" + command: "{{ splunk_exec_uf }} status --accept-license --answer-yes --no-prompt" + become: yes + become_user: "{{ splunk_user }}" + register: splunk_status + changed_when: False + failed_when: False + ignore_errors: yes + +- name: "Start Splunk via cli" + command: "{{ splunk_exec_uf }} start --accept-license --answer-yes --no-prompt" + become: yes + become_user: "{{ splunk_user }}" + register: start_splunk + changed_when: start_splunk.rc == 0 and 'already running' not in start_splunk.stdout + when: + - not splunk_enable_service or pid1 is not defined + - splunk_status.rc != 0 + ignore_errors: yes + +- name: "Start Splunk via service" + service: + name: "{% if pid1.stdout.find('systemd') != -1 %}Splunkd{% else %}splunk{% endif %}" + state: restarted + when: + - splunk_enable_service + - splunk_status.rc != 0 + - ansible_system is match("Linux") + - pid1 is defined + become: yes + become_user: "{{ privileged_user }}" + +- name: "Start Splunk via Windows service" + win_service: + name: splunkd + state: restarted + when: + - splunk_enable_service + - splunk_status.rc != 0 + - ansible_os_family == "Windows" + +- name: "Wait for splunkd management port" + wait_for: + port: "{{ splunk_svc_port }}" \ No newline at end of file diff --git a/roles/splunk_common_uf/tasks/stop_splunk.yml b/roles/splunk_common_uf/tasks/stop_splunk.yml new file mode 100755 index 0000000..3b8a097 --- /dev/null +++ b/roles/splunk_common_uf/tasks/stop_splunk.yml @@ -0,0 +1,40 @@ +--- +- name: "Get Splunk status" + command: "{{ splunk_exec_uf }} status --accept-license --answer-yes --no-prompt" + become: yes + become_user: "{{ splunk_user }}" + register: splunk_status + changed_when: False + failed_when: False + ignore_errors: yes + +- name: "Stop Splunk via cli" + command: "{{ splunk_exec_uf }} stop --accept-license --answer-yes --no-prompt" + become: yes + become_user: "{{ splunk_user }}" + register: stop_splunk + changed_when: stop_splunk.rc == 0 + when: + - not splunk_enable_service + - splunk_status.rc == 0 + +- name: "Stop Splunk via systemctl" + service: + name: Splunkd + state: stopped + when: + - splunk_enable_service + - splunk_status.rc == 0 + - ansible_system is match("Linux") + become: yes + become_user: "{{ privileged_user }}" + ignore_errors: yes + +- name: "Stop Splunk via Windows service" + win_service: + name: splunkd + state: stopped + when: + - splunk_enable_service + - splunk_status.rc == 0 + - ansible_os_family == "Windows" \ No newline at end of file diff --git a/test_ping.yml b/test_ping.yml new file mode 100644 index 0000000..21eda00 --- /dev/null +++ b/test_ping.yml @@ -0,0 +1,7 @@ +- name: Test de connectivité ping pong + hosts: all_splunk_instances + become: true + + tasks: + - name: Test de ping pong + ping: \ No newline at end of file