Merge 26bf87125d
into 46cbe43c54
This commit is contained in:
commit
7e186c0e01
1
.gitignore
vendored
1
.gitignore
vendored
@ -1 +1,2 @@
|
||||
modules/
|
||||
.onceover
|
||||
|
23
Puppetfile
23
Puppetfile
@ -15,3 +15,26 @@ forge 'https://forge.puppet.com'
|
||||
#mod 'apache',
|
||||
# git: 'https://github.com/puppetlabs/puppetlabs-apache',
|
||||
# branch: 'docs_experiment'
|
||||
# latest
|
||||
|
||||
mod 'puppetlabs/concat','6.1.0'
|
||||
mod 'puppetlabs/stdlib','6.0.0'
|
||||
mod 'puppetlabs/translate','2.0.0'
|
||||
mod 'puppetlabs/haproxy','4.0.0'
|
||||
mod 'puppetlabs/puppet_agent','2.2.0'
|
||||
mod 'puppetlabs/apt','7.1.0'
|
||||
mod 'puppetlabs/facts','0.6.0'
|
||||
mod 'puppetlabs/inifile','2.4.0'
|
||||
mod 'danieldreier-autosign','0.2.0'
|
||||
mod 'puppetlabs-firewall', '2.0.0'
|
||||
mod 'puppetlabs-satellite_pe_tools', '2.0.0'
|
||||
mod 'puppetlabs-puppet_metrics_collector', '5.2.0'
|
||||
mod 'puppet-grafana', '6.1.0'
|
||||
mod 'puppet-telegraf', '2.1.0'
|
||||
mod 'puppetlabs-puppet_metrics_dashboard', '2.2.0'
|
||||
mod 'puppetlabs-puppetserver_gem', '1.1.1'
|
||||
mod 'herculesteam/augeasproviders_core', '2.5.0'
|
||||
mod 'herculesteam/augeasproviders_mounttab', '2.0.2'
|
||||
mod 'herculesteam/augeasproviders_pam', '2.1.0'
|
||||
mod 'puppetlabs-support_tasks', '1.1.0'
|
||||
mod 'puppetlabs-sqlserver', '2.6.2'
|
||||
|
@ -1,2 +1,7 @@
|
||||
---
|
||||
message: "This node is using common data"
|
||||
controlm::controlm_agent::agent2server_port: 7005
|
||||
controlm::controlm_agent::server2agent_port: 7006
|
||||
controlm::controlm_agent::tracker_port: 7035
|
||||
controlm::controlm_agent::server_host: ctmgnpappla013
|
||||
controlm::controlm_agent::primary_server_host: ctmgnpappla013.optus.com.au
|
||||
|
938
data/nodes/LinuxAgent2CM.platform9.puppet.net.yaml
Normal file
938
data/nodes/LinuxAgent2CM.platform9.puppet.net.yaml
Normal file
@ -0,0 +1,938 @@
|
||||
---
|
||||
|
||||
# Some standard permissions to use
|
||||
root_0000: { owner: root, group: root, mode: '0000' }
|
||||
root_0444: { owner: root, group: root, mode: '0444' }
|
||||
root_0600: { owner: root, group: root, mode: '0600' }
|
||||
root_0640: { owner: root, group: root, mode: '0640' }
|
||||
root_0644: { owner: root, group: root, mode: '0644' }
|
||||
root_0700: { owner: root, group: root, mode: '0700' }
|
||||
root_4755: { owner: root, group: root, mode: '4755' }
|
||||
root_2755: { owner: root, group: root, mode: '2755' }
|
||||
#
|
||||
|
||||
filesystems:
|
||||
# CIS 1.1.2 L2 Ensure separate partition exists for /tmp
|
||||
# CIS 1.1.3 L1 Ensure nodev option set on /tmp partition
|
||||
# CIS 1.1.4 L1 Ensure nosuid option set on /tmp partition
|
||||
# CIS 1.1.5 L1 Ensure noexec option set on /tmp partition
|
||||
/tmp:
|
||||
options: nodev,nosuid,noexec
|
||||
size: 512M
|
||||
# CIS 1.1.6 L2 Ensure separate partition exists for /var
|
||||
/var:
|
||||
size: 2048M
|
||||
# CIS 1.1.7 L2 Ensure separate partition exists for /var/tmp
|
||||
# CIS 1.1.8 L1 Ensure nodev option set on /var/tmp partition
|
||||
# CIS 1.1.9 L1 Ensure nosuid option set on /var/tmp partition
|
||||
# CIS 1.1.10 L1 Ensure noexec option set on /var/tmp partition
|
||||
/var/tmp:
|
||||
options: nodev,nosuid,noexec
|
||||
size: 512M
|
||||
# CIS 1.1.11 L2 Ensure separate partition exists for /var/log
|
||||
/var/log:
|
||||
size: 512M
|
||||
# CIS 1.1.12 L2 Ensure separate partition exists for /var/log/audit
|
||||
/var/log/audit:
|
||||
size: 512M
|
||||
# CIS 1.1.13 L2 Ensure separate partition exists for /home
|
||||
# CIS 1.1.14 L1 Ensure nodev option set on /home partition
|
||||
/home:
|
||||
size: 2048M
|
||||
options: nodev
|
||||
# CIS 1.1.15 L1 Ensure nodev option set on /dev/shm partition
|
||||
# CIS 1.1.16 L1 Ensure nosuid option set on /dev/shm partition
|
||||
# CIS 1.1.17 L1 Ensure noexec option set on /dev/shm partition
|
||||
/dev/shm:
|
||||
options: nodev,nosuid,noexec
|
||||
fstype: tmpfs
|
||||
device: tmpfs
|
||||
|
||||
|
||||
|
||||
# CIS 1.1.18 L1 Ensure nodev option set on removable media partitions
|
||||
# CIS 1.1.19 L1 Ensure nosuid option set on removable media partitions
|
||||
# CIS 1.1.20 L1 Ensure noexec option set on removable media partitions
|
||||
|
||||
# CIS 1.1.21 L1 Ensure sticky bit is set on all world-writable directories
|
||||
# CIS 1.2.1 L1 Ensure package manager repositories are configured
|
||||
# CIS 1.2.2 L1 Ensure gpgcheck is globally activated
|
||||
# CIS 1.2.3 L1 Ensure GPG keys are configured
|
||||
# CIS 1.2.4 L1 Ensure Red Hat Subscription Manager connection is configured
|
||||
# CIS 1.3.1 L1 Ensure AIDE is installed
|
||||
|
||||
# CIS 1.7.1.2 L1 Ensure local login warning banner is configured properly - banner text
|
||||
profile::ssh::banner_content: |2+
|
||||
|
||||
Do not logon unless you have read and agree to the following.
|
||||
|
||||
By continuing to logon you are representing that you are an authorised user
|
||||
and you accept and agree that:
|
||||
|
||||
1. use of Australia Post (AP) computers, systems, software and facilities
|
||||
including email and Internet Browsing is subject to policies and guidelines issued
|
||||
by Australia Post from time to time;
|
||||
|
||||
2. the contents of all internal, incoming and outgoing emails are the property of
|
||||
Australia Post;
|
||||
|
||||
3. Australia Post may take disciplinary action under the AP Employee Counselling
|
||||
and Disciplinary Process, and/or legal action against anyone failing to comply
|
||||
with relevant policy or misusing IT facilities including email and Internet;
|
||||
|
||||
4. misuse includes use, access or transmission of pornographic photos, animations,
|
||||
cartoons, and images (including screensavers), sexually explicit, sexist, racist
|
||||
material or material that offends, embarrasses or degrades a person because of
|
||||
disability, sex, religion or ethnic background, or unacceptable behaviour or
|
||||
harrassment as outlined in the Code of Ethics or Harrassment Policy;
|
||||
|
||||
5. Australia Post may monitor or audit the use of any of its IT facilities and
|
||||
any information stored or passed through these facilities including email and
|
||||
Internet browsing details;
|
||||
|
||||
It is your responsibility to read and comply with the Group Technology Use Policy.
|
||||
Should you have any questions about these conditions or the policies detailed here
|
||||
please contact your line manager. For all information security related issues
|
||||
contact the Information Security Office at secureatpost@auspost.com.au
|
||||
|
||||
I agree to these terms and conditions.
|
||||
|
||||
profile::file_ops::files:
|
||||
# CIS 1.4.1 L1 Ensure permissions on bootloader config are configured - grub.cfg
|
||||
/boot/grub2/grub.cfg: "%{alias('root_0640')}"
|
||||
# CIS 1.4.1 L1 Ensure permissions on bootloader config are configured - user.cfg
|
||||
/boot/grub2/user.cfg: "%{alias('root_0640')}"
|
||||
# CIS 1.7.1.1 L1 Ensure message of the day is configured properly - banner text
|
||||
# CIS 1.7.1.4 L1 Ensure permissions on /etc/motd are configured
|
||||
/etc/motd:
|
||||
content: ''
|
||||
mode: '0644'
|
||||
owner: root
|
||||
group: root
|
||||
# CIS 1.7.1.5 L1 Ensure permissions on /etc/issue are configured - already covered by SSH module
|
||||
#/etc/issue:
|
||||
#content: "%{hiera('profile::ssh::banner_content')}"
|
||||
#mode: 644
|
||||
#owner: root
|
||||
#group: root
|
||||
# CIS 1.7.1.3 L1 Ensure remote login warning banner is configured properly - banner text
|
||||
# CIS 1.7.1.6 L1 Ensure permissions on /etc/issue.net are configured - already covered by SSH module
|
||||
#/etc/issue.net:
|
||||
#content: "%{hiera('profile::ssh::banner_content')}"
|
||||
#mode: 644
|
||||
#owner: root
|
||||
#group: root
|
||||
# CIS 3.4.2 L1 Ensure /etc/hosts.allow is configured
|
||||
# CIS 3.4.4 L1 Ensure permissions on /etc/hosts.allow are configured
|
||||
/etc/hosts.allow:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
'ALL: 10.0.0.0/255.0.0.0'
|
||||
mode: '0644'
|
||||
owner: root
|
||||
group: root
|
||||
# CIS 3.4.3 L1 Ensure /etc/hosts.deny is configured
|
||||
# CIS 3.4.5 L1 Ensure permissions on /etc/hosts.deny are configured
|
||||
/etc/hosts.deny:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
'ALL: ALL'
|
||||
mode: '0644'
|
||||
owner: root
|
||||
group: root
|
||||
/etc/modprobe.d/CIS.conf:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
# CIS 1.1.1.1 L1 Ensure mounting of cramfs filesystems is disabled - modprobe
|
||||
install cramfs /bin/true
|
||||
# CIS 1.1.1.2 L1 Ensure mounting of freevxfs filesystems is disabled - lsmod
|
||||
install freevxfs /bin/true
|
||||
# CIS 1.1.1.3 L1 Ensure mounting of jffs2 filesystems is disabled - modprobe
|
||||
install jffs2 /bin/true
|
||||
# CIS 1.1.1.4 L1 Ensure mounting of hfs filesystems is disabled - modprobe
|
||||
install hfs /bin/true
|
||||
# CIS 1.1.1.5 L1 Ensure mounting of hfsplus filesystems is disabled - lsmod
|
||||
install hfsplus /bin/true
|
||||
# CIS 1.1.1.6 L1 Ensure mounting of squashfs filesystems is disabled - modprobe
|
||||
install squashfs /bin/true
|
||||
# CIS 1.1.1.7 L1 Ensure mounting of udf filesystems is disabled - lsmod
|
||||
install udf /bin/true
|
||||
# CIS 1.1.1.8 L2 Ensure mounting of FAT filesystems is disabled
|
||||
install vfat /bin/true
|
||||
|
||||
# CIS 3.5.1 L1 Ensure DCCP is disabled
|
||||
install dccp /bin/true
|
||||
# CIS 3.5.2 L1 Ensure SCTP is disabled
|
||||
install sctp /bin/true
|
||||
# CIS 3.5.3 L1 Ensure RDS is disabled
|
||||
install rds /bin/true
|
||||
# CIS 3.5.4 L1 Ensure TIPC is disabled
|
||||
install tipc /bin/true
|
||||
mode: '0644'
|
||||
owner: root
|
||||
group: root
|
||||
# CIS 5.1.2 L1 Ensure permissions on /etc/crontab are configured
|
||||
/etc/crontab: "%{alias('root_0600')}"
|
||||
# CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - cron.allow
|
||||
/etc/cron.allow: "%{alias('root_0600')}"
|
||||
# CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - cron.deny
|
||||
/etc/cron.deny:
|
||||
ensure: absent
|
||||
# CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - at.allow
|
||||
/etc/at.allow: "%{alias('root_0600')}"
|
||||
# CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - at.deny
|
||||
/etc/at.deny:
|
||||
ensure: absent
|
||||
/etc/security/pwquality.conf:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
difok = 5
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - minlen
|
||||
minlen = 9
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - dcredit
|
||||
dcredit = -1
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - ucredit
|
||||
ucredit = -1
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - lcredit
|
||||
lcredit = -1
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - ocredit
|
||||
ocredit = -1
|
||||
# minclass = 0
|
||||
# maxrepeat = 0
|
||||
# maxclassrepeat = 0
|
||||
# gecoscheck = 0
|
||||
# dictpath =
|
||||
mode: '0644'
|
||||
owner: root
|
||||
group: root
|
||||
# CIS 5.4.4 L1 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.d/*.sh
|
||||
/etc/profile.d/umask.sh:
|
||||
content: "umask 0027\n"
|
||||
/etc/profile.d/umask.csh:
|
||||
content: "umask 0027\n"
|
||||
# CIS 5.4.5 L2 Ensure default user shell timeout is 900 seconds or less - /etc/profile
|
||||
/etc/profile.d/autologout.sh:
|
||||
content: "export TMOUT=36000\n"
|
||||
/etc/profile.d/tmout.csh:
|
||||
content: "TMOUT=36000\n"
|
||||
# CIS 6.1.2 L1 Ensure permissions on /etc/passwd are configured
|
||||
/etc/passwd: "%{alias('root_0644')}"
|
||||
# CIS 6.1.3 L1 Ensure permissions on /etc/shadow are configured
|
||||
/etc/shadow: "%{alias('root_0000')}"
|
||||
# CIS 6.1.4 L1 Ensure permissions on /etc/group are configured
|
||||
/etc/group: "%{alias('root_0644')}"
|
||||
# CIS 6.1.5 L1 Ensure permissions on /etc/gshadow are configured
|
||||
/etc/gshadow: "%{alias('root_0000')}"
|
||||
# CIS 6.1.6 L1 Ensure permissions on /etc/passwd- are configured
|
||||
/etc/passwd-: "%{alias('root_0644')}"
|
||||
# CIS 6.1.7 L1 Ensure permissions on /etc/shadow- are configured
|
||||
/etc/shadow-: "%{alias('root_0000')}"
|
||||
# CIS 6.1.8 L1 Ensure permissions on /etc/group- are configured
|
||||
/etc/group-: "%{alias('root_0644')}"
|
||||
# CIS 6.1.9 L1 Ensure permissions on /etc/gshadow- are configured
|
||||
/etc/gshadow-: "%{alias('root_0000')}"
|
||||
# CIS 2.2.1.2 L1 Ensure ntp is configured - restrict -4 - not using NTP
|
||||
# CIS 2.2.1.2 L1 Ensure ntp is configured - restrict -6 - not using NTP
|
||||
# CIS 2.2.1.2 L1 Ensure ntp is configured - server - not using NTP
|
||||
# CIS 2.2.1.3 L1 Ensure chrony is configured - NTP server - set elsewhere in hiera
|
||||
# CIS 2.2.1.3 L1 Ensure chrony is configured - OPTIONS
|
||||
/etc/sysconfig/chronyd:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
OPTIONS='-u chrony'
|
||||
# CIS 4.1.1.1 L2 Ensure audit log storage size is configured
|
||||
# CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'space_left_action = email'
|
||||
# CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'action_mail_acct = root'
|
||||
# CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'admin_space_left_action = halt'
|
||||
# CIS 4.1.1.3 L2 Ensure audit logs are not automatically deleted
|
||||
# CIS 4.1.2 L2 Ensure auditd service is enabled
|
||||
# CIS 4.1.3 L2 Ensure auditing for processes that start prior to auditd is enabled
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl adjtimex (32-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - adjtimex (32-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl clock_settime (32-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - clock_settime (32-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl /etc/localtime
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - /etc/localtime
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl adjtimex (64-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl clock_settime (64-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - adjtimex (64-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - clock_settime (64-bit)
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/group'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/group'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/passwd'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/passwd'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/gshadow'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/gshadow'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/shadow'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/shadow'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/security/opasswd'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/security/opasswd'
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - sethostname (32-bit)
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl sethostname (32-bit)
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - issue
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl issue
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - issue.net
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl issue.net
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/hosts
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl hosts
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/sysconfig/network
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl network
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/sysconfig/network-scripts
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl network-scripts
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - sethostname (64-bit)
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl sethostname (64-bit)
|
||||
# CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/selinux/
|
||||
# CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/selinux/
|
||||
# CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - /usr/share/selinux/
|
||||
# CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /usr/share/selinux/
|
||||
# CIS 4.1.8 L2 Ensure login and logout events are collected - /var/log/lastlog
|
||||
# CIS 4.1.8 L2 Ensure login and logout events are collected - auditctl /var/log/lastlog
|
||||
# CIS 4.1.8 L2 Ensure login and logout events are collected - /var/run/faillock/
|
||||
# CIS 4.1.8 L2 Ensure login and logout events are collected - auditctl /var/run/faillock/
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - utmp
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl utmp
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - wtmp
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl wtmp
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - btmp
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl btmp
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chmod/fchmod/fchmodat
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chmod/fchmod/fchmodat
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chown/fchown/fchownat/lchown
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chown/fchown/fchownat/lchown
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - setxattr/lsetxattr/fsetxattr/removexattr
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl setxattr/lsetxattr/fsetxattr/removexattr
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chmod/fchmod/fchmodat (64-bit)
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chmod/fchmod/fchmodat (64-bit)
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chown/fchown/fchownat/lchown (64-bit)
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chown/fchown/fchownat/lchown (64-bit)
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - xattr (64-bit)
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl xattr (64-bit)
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EACCES
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EPERM
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EACCES (64-bit)
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES (64-bit)
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EPERM (64-bit)
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM (64-bit)
|
||||
# CIS 4.1.12 L2 Ensure use of privileged commands is collected
|
||||
# CIS 4.1.13 L2 Ensure successful file system mounts are collected
|
||||
# CIS 4.1.13 L2 Ensure successful file system mounts are collected - auditctl
|
||||
# CIS 4.1.13 L2 Ensure successful file system mounts are collected - b64
|
||||
# CIS 4.1.13 L2 Ensure successful file system mounts are collected - auditctl (64-bit)
|
||||
# CIS 4.1.14 L2 Ensure file deletion events by users are collected
|
||||
# CIS 4.1.14 L2 Ensure file deletion events by users are collected - auditctl
|
||||
# CIS 4.1.14 L2 Ensure file deletion events by users are collected - b64
|
||||
# CIS 4.1.14 L2 Ensure file deletion events by users are collected - auditctl (64-bit)
|
||||
# CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - sudoers
|
||||
# CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - auditctl sudoers
|
||||
# CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - sudoers.d
|
||||
# CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - auditctl sudoers.d
|
||||
# CIS 4.1.16 L2 Ensure system administrator actions (sudolog) are collected
|
||||
# CIS 4.1.16 L2 Ensure system administrator actions (sudolog) are collected - auditctl
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - insmod
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl insmod
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - rmmod
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl rmmod
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - modprobe
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl modprobe
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - init_module/delete_module
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl init_module/delete_module
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - init_module/delete_module
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl init_module/delete_module
|
||||
# CIS 4.1.18 L2 Ensure the audit configuration is immutable
|
||||
/etc/audit/auditd.conf:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
#
|
||||
# This file controls the configuration of the audit daemon
|
||||
#
|
||||
local_events = yes
|
||||
write_logs = yes
|
||||
log_file = /var/log/audit/audit.log
|
||||
log_group = root
|
||||
log_format = RAW
|
||||
flush = INCREMENTAL_ASYNC
|
||||
freq = 50
|
||||
max_log_file = 8
|
||||
num_logs = 5
|
||||
priority_boost = 4
|
||||
disp_qos = lossy
|
||||
dispatcher = /sbin/audispd
|
||||
name_format = NONE
|
||||
##name = mydomain
|
||||
max_log_file_action = ROTATE
|
||||
space_left = 75
|
||||
space_left_action = SYSLOG
|
||||
verify_email = yes
|
||||
action_mail_acct = root
|
||||
admin_space_left = 50
|
||||
admin_space_left_action = SUSPEND
|
||||
disk_full_action = SUSPEND
|
||||
disk_error_action = SUSPEND
|
||||
use_libwrap = yes
|
||||
##tcp_listen_port = 60
|
||||
tcp_listen_queue = 5
|
||||
tcp_max_per_addr = 1
|
||||
##tcp_client_ports = 1024-65535
|
||||
tcp_client_max_idle = 0
|
||||
enable_krb5 = no
|
||||
krb5_principal = auditd
|
||||
##krb5_key_file = /etc/audit/audit.key
|
||||
distribute_network = no
|
||||
|
||||
|
||||
profile::file_ops::directories:
|
||||
# CIS 5.1.3 L1 Ensure permissions on /etc/cron.hourly are configured
|
||||
/etc/cron.hourly: "%{alias('root_0700')}"
|
||||
# CIS 5.1.4 L1 Ensure permissions on /etc/cron.daily are configured
|
||||
/etc/cron.daily: "%{alias('root_0700')}"
|
||||
# CIS 5.1.5 L1 Ensure permissions on /etc/cron.weekly are configured
|
||||
/etc/cron.weekly: "%{alias('root_0700')}"
|
||||
# CIS 5.1.6 L1 Ensure permissions on /etc/cron.monthly are configured
|
||||
/etc/cron.monthly: "%{alias('root_0700')}"
|
||||
# CIS 5.1.7 L1 Ensure permissions on /etc/cron.d are configured
|
||||
/etc/cron.d: "%{alias('root_0700')}"
|
||||
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - password-auth try_first_pass
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - system-auth try_first_pass
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - password-auth retry=3
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - system-auth retry=3
|
||||
central_auth::pam::dfok: 5
|
||||
central_auth::pam::minlen: 9
|
||||
central_auth::pam::dcredit: -1
|
||||
central_auth::pam::ucredit: -1
|
||||
central_auth::pam::ocredit: -1
|
||||
central_auth::pam::lcredit: -1
|
||||
|
||||
|
||||
# CIS 1.4.2 L1 Ensure bootloader password is set
|
||||
# CIS 1.4.3 L1 Ensure authentication required for single user mode - rescue.service
|
||||
# CIS 1.4.3 L1 Ensure authentication required for single user mode - emergency.service
|
||||
|
||||
# CIS 1.5.1 L1 Ensure core dumps are restricted - limits.conf limits.d
|
||||
security::limits::limits_hash:
|
||||
"*/hard/core":
|
||||
value: '0'
|
||||
# CIS 1.5.1 L1 Ensure core dumps are restricted - sysctl
|
||||
# CIS 1.5.1 L1 Ensure core dumps are restricted - sysctl.conf sysctl.d
|
||||
profile::kernel::sysctl:
|
||||
fs.suid_dumpable: 0
|
||||
# CIS 1.5.3 L1 Ensure address space layout randomization (ASLR) is enabled - sysctl
|
||||
# CIS 1.5.3 L1 Ensure address space layout randomization (ASLR) is enabled - sysctl.conf sysctl.d
|
||||
kernel.randomize_va_space: 2
|
||||
# CIS 3.1.1 L1 Ensure IP forwarding is disabled - sysctl
|
||||
# CIS 3.1.1 L1 Ensure IP forwarding is disabled - sysctlc.conf sysctl.d
|
||||
net.ipv4.ip_forward: 0
|
||||
# CIS 3.1.2 L1 Ensure packet redirect sending is disabled - 'net.ipv4.conf.all.send_redirects = 0'
|
||||
# CIS 3.1.2 L1 Ensure packet redirect sending is disabled - 'net.ipv4.conf.default.send_redirects = 0'
|
||||
net.ipv4.conf.all.send_redirects: 0
|
||||
net.ipv4.conf.default.send_redirects: 0
|
||||
# CIS 3.2.1 L1 Ensure source routed packets are not accepted - 'net.ipv4.conf.default.accept_source_route = 0'
|
||||
# CIS 3.2.1 L1 Ensure source routed packets are not accepted - 'net.ipv4.conf.all.accept_source_route = 0'
|
||||
net.ipv4.conf.all.accept_source_route: 0
|
||||
net.ipv4.conf.default.accept_source_route: 0
|
||||
# CIS 3.2.2 L1 Ensure ICMP redirects are not accepted - 'net.ipv4.conf.all.accept_redirects = 0'
|
||||
# CIS 3.2.2 L1 Ensure ICMP redirects are not accepted - 'net.ipv4.conf.default.accept_redirects = 0'
|
||||
net.ipv4.conf.all.accept_redirects: 0
|
||||
net.ipv4.conf.default.accept_redirects: 0
|
||||
# CIS 3.2.3 L1 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.default.secure_redirects = 0'
|
||||
# CIS 3.2.3 L1 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.all.secure_redirects = 0'
|
||||
net.ipv4.conf.all.secure_redirects: 0
|
||||
net.ipv4.conf.default.secure_redirects: 0
|
||||
# CIS 3.2.4 L1 Ensure suspicious packets are logged - 'net.ipv4.conf.all.log_martians = 1'
|
||||
# CIS 3.2.4 L1 Ensure suspicious packets are logged - 'net.ipv4.conf.default.log_martians = 1'
|
||||
net.ipv4.conf.all.log_martians: 1
|
||||
net.ipv4.conf.default.log_martians: 1
|
||||
# CIS 3.2.5 L1 Ensure broadcast ICMP requests are ignored - sysctl
|
||||
# CIS 3.2.5 L1 Ensure broadcast ICMP requests are ignored - sysctl.conf sysctl.d
|
||||
net.ipv4.icmp_echo_ignore_broadcasts: 1
|
||||
# CIS 3.2.6 L1 Ensure bogus ICMP responses are ignored - sysctl
|
||||
# CIS 3.2.6 L1 Ensure bogus ICMP responses are ignored - sysctl.conf sysctl.d
|
||||
net.ipv4.icmp_ignore_bogus_error_responses: 1
|
||||
# CIS 3.2.7 L1 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.default.rp_filter = 1'
|
||||
# CIS 3.2.7 L1 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.all.rp_filter = 1'
|
||||
net.ipv4.conf.all.rp_filter: 1
|
||||
net.ipv4.conf.default.rp_filter: 1
|
||||
# CIS 3.2.8 L1 Ensure TCP SYN Cookies is enabled - sysctl
|
||||
# CIS 3.2.8 L1 Ensure TCP SYN Cookies is enabled - sysctl.conf sysctl.d
|
||||
net.ipv4.tcp_syncookies: 1
|
||||
# CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.all.accept_ra = 0'
|
||||
# CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.default.accept_ra = 0'
|
||||
# CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - files 'net.ipv6.conf.all.accept_ra = 0'
|
||||
# CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - files 'net.ipv6.conf.default.accept_ra = 0'
|
||||
net.ipv6.conf.all.accept_ra: 0
|
||||
net.ipv6.conf.default.accept_ra: 0
|
||||
# CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - 'net.ipv6.conf.default.accept_redirects = 0'
|
||||
# CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - 'net.ipv6.conf.all.accept_redirects = 0'
|
||||
# CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - files 'net.ipv6.conf.default.accept_redirects = 0'
|
||||
# CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - files 'net.ipv6.conf.all.accept_redirects = 0'
|
||||
net.ipv6.conf.all.accept_redirects: 0
|
||||
net.ipv6.conf.default.accept_redirects: 0
|
||||
|
||||
# CIS 1.5.2 L1 Ensure XD/NX support is enabled (32 bit only)
|
||||
# CIS 1.8 L1 Ensure updates, patches, and additional security software are installed
|
||||
|
||||
# CIS 2.2.15 L1 Ensure mail transfer agent is configured for local-only mode
|
||||
networking::mailclient::inet_interfaces: 'localhost'
|
||||
|
||||
packages::remove:
|
||||
RedHat:
|
||||
# CIS 1.1.22 L1 Disable Automounting
|
||||
- autofs
|
||||
# CIS 1.5.4 L1 Ensure prelink is disabled
|
||||
- prelink
|
||||
# CIS 1.6.1.4 L2 Ensure SETroubleshoot is not installed
|
||||
- setroubleshoot
|
||||
# CIS 1.6.1.5 L2 Ensure the MCS Translation Service (mcstrans) is not installed
|
||||
- mcstrans
|
||||
# CIS 1.7.2 L1 Ensure GDM login banner is configured - user-db
|
||||
# CIS 1.7.2 L1 Ensure GDM login banner is configured - system-db
|
||||
# CIS 1.7.2 L1 Ensure GDM login banner is configured - file-db
|
||||
# CIS 1.7.2 L1 Ensure GDM login banner is configured - banner message enabled
|
||||
# CIS 1.7.2 L1 Ensure GDM login banner is configured - banner message text
|
||||
- gdm
|
||||
# CIS 2.1.1 L1 Ensure chargen services are not enabled - dgram
|
||||
# CIS 2.1.1 L1 Ensure chargen services are not enabled - stream
|
||||
# CIS 2.1.2 L1 Ensure daytime services are not enabled - dgram
|
||||
# CIS 2.1.2 L1 Ensure daytime services are not enabled - stream
|
||||
# CIS 2.1.3 L1 Ensure discard services are not enabled - dgram
|
||||
# CIS 2.1.3 L1 Ensure discard services are not enabled - stream
|
||||
# CIS 2.1.4 L1 Ensure echo services are not enabled - dgram
|
||||
# CIS 2.1.4 L1 Ensure echo services are not enabled - stream
|
||||
# CIS 2.1.5 L1 Ensure time services are not enabled - dgram
|
||||
# CIS 2.1.5 L1 Ensure time services are not enabled - stream
|
||||
# CIS 2.1.7 L1 Ensure xinetd is not enabled
|
||||
- xinetd
|
||||
# CIS 2.1.6 L1 Ensure tftp server is not enabled
|
||||
# CIS 2.2.20 L1 Ensure tftp server is not enabled
|
||||
- tftp-server
|
||||
# CIS 2.2.2 L1 Ensure X Window System is not installed
|
||||
# CIS 2.2.3 L1 Ensure Avahi Server is not enabled
|
||||
- avahi
|
||||
# CIS 2.2.4 L1 Ensure CUPS is not enabled
|
||||
- cups
|
||||
# CIS 2.2.5 L1 Ensure DHCP Server is not enabled
|
||||
- dhcp
|
||||
- dnsmasq
|
||||
# CIS 2.2.6 L1 Ensure LDAP server is not enabled
|
||||
- openldap-servers
|
||||
# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - nfs
|
||||
# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - nfs-server
|
||||
# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - rpcbind
|
||||
# CIS 2.2.8 L1 Ensure DNS Server is not enabled
|
||||
- bind
|
||||
- pdns
|
||||
# CIS 2.2.9 L1 Ensure FTP Server is not enabled
|
||||
- vsftpd
|
||||
- pure-ftpd
|
||||
- perl-ftpd
|
||||
- proftpd
|
||||
# CIS 2.2.10 L1 Ensure HTTP server is not enabled
|
||||
- caddy
|
||||
- httpd
|
||||
- lighttpd
|
||||
- nginx
|
||||
- nginx14-nginx
|
||||
- nginx16-nginx
|
||||
- nodejs-ws
|
||||
- xbean
|
||||
- rubygem-thin
|
||||
# CIS 2.2.11 L1 Ensure IMAP and POP3 server is not enabled
|
||||
- dovecot
|
||||
- cyrus-imapd
|
||||
# CIS 2.2.12 L1 Ensure Samba is not enabled
|
||||
- samba
|
||||
- samba-dc
|
||||
# CIS 2.2.13 L1 Ensure HTTP Proxy Server is not enabled
|
||||
- squid
|
||||
# CIS 2.2.14 L1 Ensure SNMP Server is not enabled
|
||||
- net-snmp
|
||||
# CIS 2.2.16 L1 Ensure NIS Server is not enabled
|
||||
# CIS 2.3.1 L1 Ensure NIS Client is not installed
|
||||
- ypserv
|
||||
- ypbind
|
||||
# CIS 2.2.17 L1 Ensure rsh server is not enabled - rexec
|
||||
# CIS 2.2.17 L1 Ensure rsh server is not enabled - rlogin
|
||||
# CIS 2.2.17 L1 Ensure rsh server is not enabled - rsh
|
||||
# CIS 2.3.2 L1 Ensure rsh client is not installed
|
||||
- rsh-server
|
||||
- rsh
|
||||
# CIS 2.2.18 L1 Ensure talk server is not enabled
|
||||
# CIS 2.3.3 L1 Ensure talk client is not installed
|
||||
- ntalk
|
||||
- talk
|
||||
# CIS 2.2.19 L1 Ensure telnet server is not enabled
|
||||
- telnet-server
|
||||
profile::services:
|
||||
# CIS 1.2.5 L2 Disable the rhnsd Daemon
|
||||
rhnsd:
|
||||
ensure: stopped
|
||||
enable: false
|
||||
# CIS 2.2.21 L1 Ensure rsync service is not enabled
|
||||
rsyncd:
|
||||
ensure: stopped
|
||||
enable: false
|
||||
# CIS 5.1.1 L1 Ensure cron daemon is enabled
|
||||
crond:
|
||||
ensure: running
|
||||
enable: true
|
||||
|
||||
# CIS 2.3.4 L1 Ensure telnet client is not installed - disputed
|
||||
# CIS 2.3.5 L1 Ensure LDAP client is not installed - disputed
|
||||
|
||||
packages::add:
|
||||
RedHat:
|
||||
# CIS 3.4.1 L1 Ensure TCP Wrappers is installed
|
||||
- tcp_wrappers
|
||||
# CIS 1.6.2 L2 Ensure SELinux is installed
|
||||
- libselinux
|
||||
|
||||
# CIS 3.6.1 L1 Ensure iptables is installed
|
||||
profile::firewall::enable: true
|
||||
profile::firewall::chains:
|
||||
# CIS 3.6.2 L1 Ensure default deny firewall policy - Chain INPUT
|
||||
INPUT:filter:IPv4:
|
||||
policy: drop
|
||||
INPUT:filter:IPv6:
|
||||
policy: drop
|
||||
# CIS 3.6.2 L1 Ensure default deny firewall policy - Chain FORWARD
|
||||
FORWARD:filter:IPv4:
|
||||
policy: drop
|
||||
FORWARD:filter:IPv6:
|
||||
policy: drop
|
||||
# CIS 3.6.2 L1 Ensure default deny firewall policy - Chain OUTPUT
|
||||
OUTPUT:filter:IPv4:
|
||||
policy: drop
|
||||
OUTPUT:filter:IPv6:
|
||||
policy: drop
|
||||
# CIS 3.6.3 L1 Ensure loopback traffic is configured
|
||||
# Configured in code
|
||||
# CIS 3.6.4 L1 Ensure outbound and established connections are configured
|
||||
# Configured in code
|
||||
# CIS 3.6.5 L1 Ensure firewall rules exist for all open ports
|
||||
profile::firewall::inbound:
|
||||
'101 DHCP Server':
|
||||
sport: 67
|
||||
proto: udp
|
||||
'110 SSH Access':
|
||||
dport: 22
|
||||
'161 NetBackup Server':
|
||||
dport: [ 1556, 13724 ]
|
||||
profile::firewall::outbound:
|
||||
'101 DHCP Client':
|
||||
sport: 68
|
||||
proto: udp
|
||||
'120 SSH Access':
|
||||
sport: 22
|
||||
'130 Puppet Server Access':
|
||||
dport: [8140,8142]
|
||||
destination: 10.5.162.0/24
|
||||
'102 Network Time Protocol':
|
||||
dport: 123
|
||||
proto: udp
|
||||
'103 Name Resolution TCP':
|
||||
dport: 53
|
||||
proto: tcp
|
||||
'103 Name Resolution UDP':
|
||||
dport: 53
|
||||
proto: udp
|
||||
'104 AD Authentication TCP':
|
||||
dport: [ 88, 389, 445, 464, 3268 ]
|
||||
'104 AD Authentication UDP':
|
||||
dport: [ 88, 137, 389 ]
|
||||
proto: udp
|
||||
'140 RightLink Agent':
|
||||
# From here: https://docs.rightscale.com/faq/Firewall_Configuration_Ruleset.html
|
||||
dport: 443
|
||||
destination:
|
||||
- 54.225.248.128/27
|
||||
- 54.244.88.96/27
|
||||
- 54.86.63.128/26
|
||||
- 54.187.254.128/26
|
||||
- 54.246.247.16/28
|
||||
- 54.248.220.128/28
|
||||
- 54.255.255.208/28
|
||||
- 52.65.255.224/28
|
||||
'141 AWS Instance Data':
|
||||
dport: 80
|
||||
destination: 169.254.169.254/32
|
||||
'145 Sumo Logic Monitoring':
|
||||
# Unfortunately SUMO runs on AWS randomly, so we need to open up access to the whole of AWS EC2 for our region ap-southeast-2
|
||||
# https://help.sumologic.com/APIs/General-API-Information/Sumo-Logic-Endpoints-and-Firewall-Security
|
||||
dport: 443
|
||||
destination:
|
||||
- 13.210.0.0/15
|
||||
- 13.236.0.0/14
|
||||
- 13.54.0.0/15
|
||||
- 15.193.3.0/24
|
||||
- 3.104.0.0/14
|
||||
- 3.24.0.0/14
|
||||
- 52.62.0.0/15
|
||||
- 52.64.0.0/17
|
||||
- 52.64.128.0/17
|
||||
- 52.65.0.0/16
|
||||
- 52.94.248.64/28
|
||||
- 52.95.241.0/24
|
||||
- 52.95.255.16/28
|
||||
- 54.153.128.0/17
|
||||
- 54.206.0.0/16
|
||||
- 54.252.0.0/16
|
||||
- 54.253.0.0/16
|
||||
- 54.66.0.0/16
|
||||
- 54.79.0.0/16
|
||||
- 99.77.144.0/24
|
||||
# Currently some sumo installations are trying to hit the US AWS site us-east-1, hopefully we can delete these after getting the
|
||||
# sumo agent to just point to AU
|
||||
- 100.24.0.0/13
|
||||
- 107.20.0.0/14
|
||||
- 15.193.6.0/24
|
||||
- 162.250.236.0/24
|
||||
- 162.250.237.0/24
|
||||
- 162.250.238.0/23
|
||||
- 174.129.0.0/16
|
||||
- 18.204.0.0/14
|
||||
- 18.208.0.0/13
|
||||
- 18.232.0.0/14
|
||||
- 184.72.128.0/17
|
||||
- 184.72.64.0/18
|
||||
- 184.73.0.0/16
|
||||
- 204.236.192.0/18
|
||||
- 208.86.88.0/23
|
||||
- 216.182.224.0/21
|
||||
- 216.182.232.0/22
|
||||
- 216.182.238.0/23
|
||||
- 23.20.0.0/14
|
||||
- 3.208.0.0/12
|
||||
- 3.224.0.0/12
|
||||
- 3.80.0.0/12
|
||||
- 34.192.0.0/12
|
||||
- 34.224.0.0/12
|
||||
- 35.153.0.0/16
|
||||
- 35.168.0.0/13
|
||||
- 44.192.0.0/11
|
||||
- 50.16.0.0/15
|
||||
- 50.19.0.0/16
|
||||
- 52.0.0.0/15
|
||||
- 52.2.0.0/15
|
||||
- 52.20.0.0/14
|
||||
- 52.200.0.0/13
|
||||
- 52.4.0.0/14
|
||||
- 52.44.0.0/15
|
||||
- 52.54.0.0/15
|
||||
- 52.70.0.0/15
|
||||
- 52.72.0.0/15
|
||||
- 52.86.0.0/15
|
||||
- 52.90.0.0/15
|
||||
- 52.94.201.0/26
|
||||
- 52.94.248.0/28
|
||||
- 52.95.245.0/24
|
||||
- 52.95.255.80/28
|
||||
- 54.144.0.0/14
|
||||
- 54.152.0.0/16
|
||||
- 54.156.0.0/14
|
||||
- 54.160.0.0/13
|
||||
- 54.172.0.0/15
|
||||
- 54.174.0.0/15
|
||||
- 54.196.0.0/15
|
||||
- 54.198.0.0/16
|
||||
- 54.204.0.0/15
|
||||
- 54.208.0.0/15
|
||||
- 54.210.0.0/15
|
||||
- 54.221.0.0/16
|
||||
- 54.224.0.0/15
|
||||
- 54.226.0.0/15
|
||||
- 54.234.0.0/15
|
||||
- 54.236.0.0/15
|
||||
- 54.242.0.0/15
|
||||
- 54.80.0.0/13
|
||||
- 54.88.0.0/14
|
||||
- 54.92.128.0/17
|
||||
- 67.202.0.0/18
|
||||
- 72.44.32.0/19
|
||||
- 75.101.128.0/17
|
||||
- 99.77.128.0/24
|
||||
- 99.77.129.0/24
|
||||
- 99.77.191.0/24
|
||||
- 99.77.254.0/24
|
||||
'150 Telegraf Monitoring':
|
||||
dport: 80
|
||||
destination: [ 10.212.82.107/32, 10.212.85.6/32 ]
|
||||
'160 YUM Server':
|
||||
dport: [ 80, 443 ]
|
||||
destination: "%{::yum_server}"
|
||||
'161 NetBackup Server':
|
||||
dport: [ 1556, 13724 ]
|
||||
'162 Mail Server':
|
||||
dport: 25
|
||||
destination: "%{hiera('networking::mailclient::relayhost')}"
|
||||
'163 Log Server':
|
||||
dport: [ 5514, 6514 ]
|
||||
destination:
|
||||
- "%{hiera('profile::nxlog_client::logserver1')}"
|
||||
- "%{hiera('profile::nxlog_client::logserver2')}"
|
||||
# CIS 3.7 L1 Ensure wireless interfaces are disabled
|
||||
|
||||
|
||||
# CIS 4.2.1.1 L1 Ensure rsyslog Service is enabled
|
||||
# CIS 4.2.1.3 L1 Ensure rsyslog default file permissions configured
|
||||
# CIS 4.2.1.4 L1 Ensure rsyslog is configured to send logs to a remote log host
|
||||
# CIS 4.2.1.5 L1 Ensure remote rsyslog messages are only accepted on designated log hosts. - imtcp.so
|
||||
# CIS 4.2.1.5 L1 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun 514
|
||||
# CIS 4.2.2.1 L1 Ensure syslog-ng service is enabled
|
||||
# CIS 4.2.2.3 L1 Ensure syslog-ng default file permissions configured
|
||||
# CIS 4.2.2.4 L1 Ensure syslog-ng is configured to send logs to a remote log host - destination logserver
|
||||
# CIS 4.2.2.4 L1 Ensure syslog-ng is configured to send logs to a remote log host - log src
|
||||
# CIS 4.2.2.5 L1 Ensure remote syslog-ng messages are only accepted on designated log hosts
|
||||
# CIS 4.2.4 L1 Ensure permissions on all logfiles are configured
|
||||
|
||||
|
||||
# CIS 5.2.1 L1 Ensure permissions on /etc/ssh/sshd_config are configured
|
||||
# Set to 600 by SSH server module
|
||||
profile::ssh::options_hash:
|
||||
# CIS 5.2.2 L1 Ensure SSH Protocol is set to 2
|
||||
Protocol: '2'
|
||||
# CIS 5.2.3 L1 Ensure SSH LogLevel is set to INFO
|
||||
LogLevel: INFO
|
||||
# CIS 5.2.4 L1 Ensure SSH X11 forwarding is disabled
|
||||
X11Forwarding: no
|
||||
# CIS 5.2.5 L1 Ensure SSH MaxAuthTries is set to 4 or less
|
||||
MaxAuthTries: '4'
|
||||
# CIS 5.2.6 L1 Ensure SSH IgnoreRhosts is enabled
|
||||
IgnoreRhosts: yes
|
||||
# CIS 5.2.7 L1 Ensure SSH HostbasedAuthentication is disabled
|
||||
HostbasedAuthentication: no
|
||||
# CIS 5.2.8 L1 Ensure SSH root login is disabled
|
||||
PermitRootLogin: no
|
||||
# CIS 5.2.9 L1 Ensure SSH PermitEmptyPasswords is disabled
|
||||
PermitEmptyPasswords: no
|
||||
# CIS 5.2.10 L1 Ensure SSH PermitUserEnvironment is disabled
|
||||
PermitUserEnvironment: no
|
||||
# CIS 5.2.11 L1 Ensure only approved MAC algorithms are used
|
||||
MACs: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
|
||||
# CIS 5.2.12 L1 Ensure SSH Idle Timeout Interval is configured - ClientAliveInterval - setting to an hour to balance productivity
|
||||
ClientAliveInterval: '3600'
|
||||
# CIS 5.2.12 L1 Ensure SSH Idle Timeout Interval is configured - ClientAliveCountMax
|
||||
ClientAliveCountMax: '0'
|
||||
# CIS 5.2.13 L1 Ensure SSH LoginGraceTime is set to one minute or less
|
||||
LoginGraceTime: 60
|
||||
# CIS 5.2.15 L1 Ensure SSH warning banner is configured
|
||||
Banner: /etc/issue
|
||||
# CIS 5.2.14 L1 Ensure SSH access is limited
|
||||
profile::ssh::allowed_groups:
|
||||
- gg_linux_admins
|
||||
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth required pam_faillock.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth [success=1 default=bad] pam_unix.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth [default=die] pam_faillock.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth sufficient pam_faillock.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth required pam_faillock.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth [success=1 default=bad] pam_unix.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth [default=die] pam_faillock.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth sufficient pam_faillock.so'
|
||||
|
||||
# CIS 5.3.3 L1 Ensure password reuse is limited - system-auth
|
||||
# CIS 5.3.3 L1 Ensure password reuse is limited - password-auth
|
||||
|
||||
# CIS 5.3.4 L1 Ensure password hashing algorithm is SHA-512 - system-auth
|
||||
# CIS 5.3.4 L1 Ensure password hashing algorithm is SHA-512 - password-auth
|
||||
# Set via the central_auth module
|
||||
|
||||
# CIS 5.4.1.1 L1 Ensure password expiration is 365 days or less
|
||||
# CIS 5.4.1.2 L1 Ensure minimum days between password changes is 7 or more
|
||||
# CIS 5.4.1.3 L1 Ensure password expiration warning days is 7 or more
|
||||
# CIS 5.4.1.4 L1 Ensure inactive password lock is 30 days or less
|
||||
# CIS 5.4.1.5 L1 Ensure all users last password change date is in the past
|
||||
|
||||
# CIS 5.4.2 L1 Ensure system accounts are non-login
|
||||
|
||||
local_users::add::users:
|
||||
root:
|
||||
uid: 0
|
||||
# CIS 5.4.3 L1 Ensure default group for the root account is GID 0
|
||||
gid: 0
|
||||
# CIS 5.6 L1 Ensure access to the su command is restricted - wheel group contains root
|
||||
groups: [ wheel ]
|
||||
|
||||
profile::file_ops::file_lines:
|
||||
/etc/bashrc:
|
||||
# CIS 5.4.5 L2 Ensure default user shell timeout is 900 seconds or less - /etc/bashrc - setting to an hour to balance productivity
|
||||
- line : 'TMOUT=3600'
|
||||
match : 'TMOUT='
|
||||
# CIS 5.4.4 L1 Ensure default user umask is 027 or more restrictive - /etc/bashrc
|
||||
- line : ' umask 027'
|
||||
match : ' umask 0\d\d'
|
||||
multiple : true
|
||||
# CIS 5.6 L1 Ensure access to the su command is restricted - pam_wheel.so
|
||||
/etc/pam.d/su:
|
||||
line : 'auth required pam_wheel.so use_uid'
|
||||
match : '#auth required pam_wheel.so use_uid'
|
||||
# CIS 3.3.3 L1 Ensure IPv6 is disabled
|
||||
/etc/default/grub:
|
||||
line: GRUB_CMDLINE_LINUX='ipv6.disable=1'
|
||||
match: GRUB_CMDLINE_LINUX
|
||||
# CIS 6.2.2 L1 Ensure no legacy '+' entries exist in /etc/passwd
|
||||
/etc/passwd:
|
||||
ensure: absent
|
||||
line: '+'
|
||||
# CIS 6.2.3 L1 Ensure no legacy '+' entries exist in /etc/shadow
|
||||
/etc/shadow:
|
||||
ensure: absent
|
||||
line: '+'
|
||||
# CIS 6.2.4 L1 Ensure no legacy '+' entries exist in /etc/group
|
||||
/etc/group:
|
||||
ensure: absent
|
||||
line: '+'
|
||||
|
||||
# CIS 5.5 L1 Ensure root login is restricted to system console - TBD
|
||||
# CIS 6.1.10 L1 Ensure no world writable files exist
|
||||
# CIS 6.1.11 L1 Ensure no unowned files or directories exist
|
||||
# CIS 6.1.12 L1 Ensure no ungrouped files or directories exist
|
||||
# CIS 6.1.13 L1 Audit SUID executables
|
||||
# CIS 6.1.14 L1 Audit SGID executables
|
||||
# CIS 6.2.1 L1 Ensure password fields are not empty
|
||||
|
||||
# CIS 6.2.5 L1 Ensure root is the only UID 0 account
|
||||
# CIS 6.2.6 L1 Ensure root PATH Integrity
|
||||
# CIS 6.2.7 L1 Ensure all users' home directories exist
|
||||
# CIS 6.2.8 L1 Ensure users' home directories permissions are 750 or more restrictive
|
||||
# CIS 6.2.9 L1 Ensure users own their home directories
|
||||
# CIS 6.2.10 L1 Ensure users' dot files are not group or world writable
|
||||
# CIS 6.2.11 L1 Ensure no users have .forward files
|
||||
# CIS 6.2.12 L1 Ensure no users have .netrc files
|
||||
# CIS 6.2.13 L1 Ensure users' .netrc Files are not group or world accessible
|
||||
# CIS 6.2.14 L1 Ensure no users have .rhosts files
|
||||
# CIS 6.2.15 L1 Ensure all groups in /etc/passwd exist in /etc/group
|
||||
# CIS 6.2.16 L1 Ensure no duplicate UIDs exist
|
||||
# CIS 6.2.17 L1 Ensure no duplicate GIDs exist
|
||||
# CIS 6.2.18 L1 Ensure no duplicate user names exist
|
||||
# CIS 6.2.19 L1 Ensure no duplicate group names exist
|
||||
|
||||
# CIS 1.6.1.1 L2 Ensure SELinux is not disabled in bootloader configuration - selinux = 0
|
||||
# CIS 1.6.1.1 L2 Ensure SELinux is not disabled in bootloader configuration - enforcing = 0
|
||||
|
||||
profile::file_ops::templates:
|
||||
# CIS 1.6.1.2 L2 Ensure the SELinux state is enforcing
|
||||
# CIS 1.6.1.3 L2 Ensure SELinux policy is configured
|
||||
/etc/selinux/config:
|
||||
data:
|
||||
setting: permissive
|
||||
type: targeted
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
content: |
|
||||
# This file controls the state of SELinux on the system.
|
||||
# SELINUX= can take one of these three values:
|
||||
# enforcing - SELinux security policy is enforced.
|
||||
# permissive - SELinux prints warnings instead of enforcing.
|
||||
# disabled - No SELinux policy is loaded.
|
||||
SELINUX=<%= $setting %>
|
||||
# SELINUXTYPE= can take one of these two values:
|
||||
# targeted - Targeted processes are protected,
|
||||
# mls - Multi Level Security protection.
|
||||
SELINUXTYPE=<%= $type %>
|
||||
|
||||
# CIS 1.6.1.6 L2 Ensure no unconfined daemons exist
|
||||
|
||||
# CIS 6.1.1 L2 Audit system file permissions
|
6
data/nodes/compilemaster-01.platform9.puppet.net.yaml
Normal file
6
data/nodes/compilemaster-01.platform9.puppet.net.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
puppet_enterprise::master::puppetserver::jruby_max_active_instances: 3
|
||||
puppet_enterprise::profile::master::java_args:
|
||||
Xms: 1536m
|
||||
Xmx: 1536m
|
||||
puppet_enterprise::master::puppetserver::reserved_code_cache: 512m
|
6
data/nodes/compilemaster-02.platform9.puppet.net.yaml
Normal file
6
data/nodes/compilemaster-02.platform9.puppet.net.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
puppet_enterprise::master::puppetserver::jruby_max_active_instances: 3
|
||||
puppet_enterprise::profile::master::java_args:
|
||||
Xms: 1536m
|
||||
Xmx: 1536m
|
||||
puppet_enterprise::master::puppetserver::reserved_code_cache: 512m
|
@ -1 +0,0 @@
|
||||
---
|
938
data/nodes/linuxagent1forcmdeployment.platform9.puppet.net.yaml
Normal file
938
data/nodes/linuxagent1forcmdeployment.platform9.puppet.net.yaml
Normal file
@ -0,0 +1,938 @@
|
||||
---
|
||||
|
||||
# Some standard permissions to use
|
||||
root_0000: { owner: root, group: root, mode: '0000' }
|
||||
root_0444: { owner: root, group: root, mode: '0444' }
|
||||
root_0600: { owner: root, group: root, mode: '0600' }
|
||||
root_0640: { owner: root, group: root, mode: '0640' }
|
||||
root_0644: { owner: root, group: root, mode: '0644' }
|
||||
root_0700: { owner: root, group: root, mode: '0700' }
|
||||
root_4755: { owner: root, group: root, mode: '4755' }
|
||||
root_2755: { owner: root, group: root, mode: '2755' }
|
||||
|
||||
|
||||
filesystems:
|
||||
# CIS 1.1.2 L2 Ensure separate partition exists for /tmp
|
||||
# CIS 1.1.3 L1 Ensure nodev option set on /tmp partition
|
||||
# CIS 1.1.4 L1 Ensure nosuid option set on /tmp partition
|
||||
# CIS 1.1.5 L1 Ensure noexec option set on /tmp partition
|
||||
/tmp:
|
||||
options: nodev,nosuid,noexec
|
||||
size: 512M
|
||||
# CIS 1.1.6 L2 Ensure separate partition exists for /var
|
||||
/var:
|
||||
size: 2048M
|
||||
# CIS 1.1.7 L2 Ensure separate partition exists for /var/tmp
|
||||
# CIS 1.1.8 L1 Ensure nodev option set on /var/tmp partition
|
||||
# CIS 1.1.9 L1 Ensure nosuid option set on /var/tmp partition
|
||||
# CIS 1.1.10 L1 Ensure noexec option set on /var/tmp partition
|
||||
/var/tmp:
|
||||
options: nodev,nosuid,noexec
|
||||
size: 512M
|
||||
# CIS 1.1.11 L2 Ensure separate partition exists for /var/log
|
||||
/var/log:
|
||||
size: 512M
|
||||
# CIS 1.1.12 L2 Ensure separate partition exists for /var/log/audit
|
||||
/var/log/audit:
|
||||
size: 512M
|
||||
# CIS 1.1.13 L2 Ensure separate partition exists for /home
|
||||
# CIS 1.1.14 L1 Ensure nodev option set on /home partition
|
||||
/home:
|
||||
size: 2048M
|
||||
options: nodev
|
||||
# CIS 1.1.15 L1 Ensure nodev option set on /dev/shm partition
|
||||
# CIS 1.1.16 L1 Ensure nosuid option set on /dev/shm partition
|
||||
# CIS 1.1.17 L1 Ensure noexec option set on /dev/shm partition
|
||||
/dev/shm:
|
||||
options: nodev,nosuid,noexec
|
||||
fstype: tmpfs
|
||||
device: tmpfs
|
||||
|
||||
|
||||
|
||||
# CIS 1.1.18 L1 Ensure nodev option set on removable media partitions
|
||||
# CIS 1.1.19 L1 Ensure nosuid option set on removable media partitions
|
||||
# CIS 1.1.20 L1 Ensure noexec option set on removable media partitions
|
||||
|
||||
# CIS 1.1.21 L1 Ensure sticky bit is set on all world-writable directories
|
||||
# CIS 1.2.1 L1 Ensure package manager repositories are configured
|
||||
# CIS 1.2.2 L1 Ensure gpgcheck is globally activated
|
||||
# CIS 1.2.3 L1 Ensure GPG keys are configured
|
||||
# CIS 1.2.4 L1 Ensure Red Hat Subscription Manager connection is configured
|
||||
# CIS 1.3.1 L1 Ensure AIDE is installed
|
||||
|
||||
# CIS 1.7.1.2 L1 Ensure local login warning banner is configured properly - banner text
|
||||
profile::ssh::banner_content: |2+
|
||||
|
||||
Do not logon unless you have read and agree to the following.
|
||||
|
||||
By continuing to logon you are representing that you are an authorised user
|
||||
and you accept and agree that:
|
||||
|
||||
1. use of Australia Post (AP) computers, systems, software and facilities
|
||||
including email and Internet Browsing is subject to policies and guidelines issued
|
||||
by Australia Post from time to time;
|
||||
|
||||
2. the contents of all internal, incoming and outgoing emails are the property of
|
||||
Australia Post;
|
||||
|
||||
3. Australia Post may take disciplinary action under the AP Employee Counselling
|
||||
and Disciplinary Process, and/or legal action against anyone failing to comply
|
||||
with relevant policy or misusing IT facilities including email and Internet;
|
||||
|
||||
4. misuse includes use, access or transmission of pornographic photos, animations,
|
||||
cartoons, and images (including screensavers), sexually explicit, sexist, racist
|
||||
material or material that offends, embarrasses or degrades a person because of
|
||||
disability, sex, religion or ethnic background, or unacceptable behaviour or
|
||||
harrassment as outlined in the Code of Ethics or Harrassment Policy;
|
||||
|
||||
5. Australia Post may monitor or audit the use of any of its IT facilities and
|
||||
any information stored or passed through these facilities including email and
|
||||
Internet browsing details;
|
||||
|
||||
It is your responsibility to read and comply with the Group Technology Use Policy.
|
||||
Should you have any questions about these conditions or the policies detailed here
|
||||
please contact your line manager. For all information security related issues
|
||||
contact the Information Security Office at secureatpost@auspost.com.au
|
||||
|
||||
I agree to these terms and conditions.
|
||||
|
||||
profile::file_ops::files:
|
||||
# CIS 1.4.1 L1 Ensure permissions on bootloader config are configured - grub.cfg
|
||||
/boot/grub2/grub.cfg: "%{alias('root_0640')}"
|
||||
# CIS 1.4.1 L1 Ensure permissions on bootloader config are configured - user.cfg
|
||||
/boot/grub2/user.cfg: "%{alias('root_0640')}"
|
||||
# CIS 1.7.1.1 L1 Ensure message of the day is configured properly - banner text
|
||||
# CIS 1.7.1.4 L1 Ensure permissions on /etc/motd are configured
|
||||
/etc/motd:
|
||||
content: ''
|
||||
mode: '0644'
|
||||
owner: root
|
||||
group: root
|
||||
# CIS 1.7.1.5 L1 Ensure permissions on /etc/issue are configured - already covered by SSH module
|
||||
#/etc/issue:
|
||||
#content: "%{hiera('profile::ssh::banner_content')}"
|
||||
#mode: 644
|
||||
#owner: root
|
||||
#group: root
|
||||
# CIS 1.7.1.3 L1 Ensure remote login warning banner is configured properly - banner text
|
||||
# CIS 1.7.1.6 L1 Ensure permissions on /etc/issue.net are configured - already covered by SSH module
|
||||
#/etc/issue.net:
|
||||
#content: "%{hiera('profile::ssh::banner_content')}"
|
||||
#mode: 644
|
||||
#owner: root
|
||||
#group: root
|
||||
# CIS 3.4.2 L1 Ensure /etc/hosts.allow is configured
|
||||
# CIS 3.4.4 L1 Ensure permissions on /etc/hosts.allow are configured
|
||||
/etc/hosts.allow:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
'ALL: 10.0.0.0/255.0.0.0'
|
||||
mode: '0644'
|
||||
owner: root
|
||||
group: root
|
||||
# CIS 3.4.3 L1 Ensure /etc/hosts.deny is configured
|
||||
# CIS 3.4.5 L1 Ensure permissions on /etc/hosts.deny are configured
|
||||
/etc/hosts.deny:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
'ALL: ALL'
|
||||
mode: '0644'
|
||||
owner: root
|
||||
group: root
|
||||
/etc/modprobe.d/CIS.conf:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
# CIS 1.1.1.1 L1 Ensure mounting of cramfs filesystems is disabled - modprobe
|
||||
install cramfs /bin/true
|
||||
# CIS 1.1.1.2 L1 Ensure mounting of freevxfs filesystems is disabled - lsmod
|
||||
install freevxfs /bin/true
|
||||
# CIS 1.1.1.3 L1 Ensure mounting of jffs2 filesystems is disabled - modprobe
|
||||
install jffs2 /bin/true
|
||||
# CIS 1.1.1.4 L1 Ensure mounting of hfs filesystems is disabled - modprobe
|
||||
install hfs /bin/true
|
||||
# CIS 1.1.1.5 L1 Ensure mounting of hfsplus filesystems is disabled - lsmod
|
||||
install hfsplus /bin/true
|
||||
# CIS 1.1.1.6 L1 Ensure mounting of squashfs filesystems is disabled - modprobe
|
||||
install squashfs /bin/true
|
||||
# CIS 1.1.1.7 L1 Ensure mounting of udf filesystems is disabled - lsmod
|
||||
install udf /bin/true
|
||||
# CIS 1.1.1.8 L2 Ensure mounting of FAT filesystems is disabled
|
||||
install vfat /bin/true
|
||||
|
||||
# CIS 3.5.1 L1 Ensure DCCP is disabled
|
||||
install dccp /bin/true
|
||||
# CIS 3.5.2 L1 Ensure SCTP is disabled
|
||||
install sctp /bin/true
|
||||
# CIS 3.5.3 L1 Ensure RDS is disabled
|
||||
install rds /bin/true
|
||||
# CIS 3.5.4 L1 Ensure TIPC is disabled
|
||||
install tipc /bin/true
|
||||
mode: '0644'
|
||||
owner: root
|
||||
group: root
|
||||
# CIS 5.1.2 L1 Ensure permissions on /etc/crontab are configured
|
||||
/etc/crontab: "%{alias('root_0600')}"
|
||||
# CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - cron.allow
|
||||
/etc/cron.allow: "%{alias('root_0600')}"
|
||||
# CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - cron.deny
|
||||
/etc/cron.deny:
|
||||
ensure: absent
|
||||
# CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - at.allow
|
||||
/etc/at.allow: "%{alias('root_0600')}"
|
||||
# CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - at.deny
|
||||
/etc/at.deny:
|
||||
ensure: absent
|
||||
/etc/security/pwquality.conf:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
difok = 5
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - minlen
|
||||
minlen = 9
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - dcredit
|
||||
dcredit = -1
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - ucredit
|
||||
ucredit = -1
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - lcredit
|
||||
lcredit = -1
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - ocredit
|
||||
ocredit = -1
|
||||
# minclass = 0
|
||||
# maxrepeat = 0
|
||||
# maxclassrepeat = 0
|
||||
# gecoscheck = 0
|
||||
# dictpath =
|
||||
mode: '0644'
|
||||
owner: root
|
||||
group: root
|
||||
# CIS 5.4.4 L1 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.d/*.sh
|
||||
/etc/profile.d/umask.sh:
|
||||
content: "umask 0027\n"
|
||||
/etc/profile.d/umask.csh:
|
||||
content: "umask 0027\n"
|
||||
# CIS 5.4.5 L2 Ensure default user shell timeout is 900 seconds or less - /etc/profile
|
||||
/etc/profile.d/autologout.sh:
|
||||
content: "export TMOUT=36000\n"
|
||||
/etc/profile.d/tmout.csh:
|
||||
content: "TMOUT=36000\n"
|
||||
# CIS 6.1.2 L1 Ensure permissions on /etc/passwd are configured
|
||||
/etc/passwd: "%{alias('root_0644')}"
|
||||
# CIS 6.1.3 L1 Ensure permissions on /etc/shadow are configured
|
||||
/etc/shadow: "%{alias('root_0000')}"
|
||||
# CIS 6.1.4 L1 Ensure permissions on /etc/group are configured
|
||||
/etc/group: "%{alias('root_0644')}"
|
||||
# CIS 6.1.5 L1 Ensure permissions on /etc/gshadow are configured
|
||||
/etc/gshadow: "%{alias('root_0000')}"
|
||||
# CIS 6.1.6 L1 Ensure permissions on /etc/passwd- are configured
|
||||
/etc/passwd-: "%{alias('root_0644')}"
|
||||
# CIS 6.1.7 L1 Ensure permissions on /etc/shadow- are configured
|
||||
/etc/shadow-: "%{alias('root_0000')}"
|
||||
# CIS 6.1.8 L1 Ensure permissions on /etc/group- are configured
|
||||
/etc/group-: "%{alias('root_0644')}"
|
||||
# CIS 6.1.9 L1 Ensure permissions on /etc/gshadow- are configured
|
||||
/etc/gshadow-: "%{alias('root_0000')}"
|
||||
# CIS 2.2.1.2 L1 Ensure ntp is configured - restrict -4 - not using NTP
|
||||
# CIS 2.2.1.2 L1 Ensure ntp is configured - restrict -6 - not using NTP
|
||||
# CIS 2.2.1.2 L1 Ensure ntp is configured - server - not using NTP
|
||||
# CIS 2.2.1.3 L1 Ensure chrony is configured - NTP server - set elsewhere in hiera
|
||||
# CIS 2.2.1.3 L1 Ensure chrony is configured - OPTIONS
|
||||
/etc/sysconfig/chronyd:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
OPTIONS='-u chrony'
|
||||
# CIS 4.1.1.1 L2 Ensure audit log storage size is configured
|
||||
# CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'space_left_action = email'
|
||||
# CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'action_mail_acct = root'
|
||||
# CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'admin_space_left_action = halt'
|
||||
# CIS 4.1.1.3 L2 Ensure audit logs are not automatically deleted
|
||||
# CIS 4.1.2 L2 Ensure auditd service is enabled
|
||||
# CIS 4.1.3 L2 Ensure auditing for processes that start prior to auditd is enabled
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl adjtimex (32-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - adjtimex (32-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl clock_settime (32-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - clock_settime (32-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl /etc/localtime
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - /etc/localtime
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl adjtimex (64-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl clock_settime (64-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - adjtimex (64-bit)
|
||||
# CIS 4.1.4 L2 Ensure events that modify date and time information are collected - clock_settime (64-bit)
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/group'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/group'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/passwd'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/passwd'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/gshadow'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/gshadow'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/shadow'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/shadow'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/security/opasswd'
|
||||
# CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/security/opasswd'
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - sethostname (32-bit)
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl sethostname (32-bit)
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - issue
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl issue
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - issue.net
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl issue.net
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/hosts
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl hosts
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/sysconfig/network
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl network
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/sysconfig/network-scripts
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl network-scripts
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - sethostname (64-bit)
|
||||
# CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl sethostname (64-bit)
|
||||
# CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/selinux/
|
||||
# CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/selinux/
|
||||
# CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - /usr/share/selinux/
|
||||
# CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /usr/share/selinux/
|
||||
# CIS 4.1.8 L2 Ensure login and logout events are collected - /var/log/lastlog
|
||||
# CIS 4.1.8 L2 Ensure login and logout events are collected - auditctl /var/log/lastlog
|
||||
# CIS 4.1.8 L2 Ensure login and logout events are collected - /var/run/faillock/
|
||||
# CIS 4.1.8 L2 Ensure login and logout events are collected - auditctl /var/run/faillock/
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - utmp
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl utmp
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - wtmp
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl wtmp
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - btmp
|
||||
# CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl btmp
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chmod/fchmod/fchmodat
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chmod/fchmod/fchmodat
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chown/fchown/fchownat/lchown
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chown/fchown/fchownat/lchown
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - setxattr/lsetxattr/fsetxattr/removexattr
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl setxattr/lsetxattr/fsetxattr/removexattr
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chmod/fchmod/fchmodat (64-bit)
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chmod/fchmod/fchmodat (64-bit)
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chown/fchown/fchownat/lchown (64-bit)
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chown/fchown/fchownat/lchown (64-bit)
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - xattr (64-bit)
|
||||
# CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl xattr (64-bit)
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EACCES
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EPERM
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EACCES (64-bit)
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES (64-bit)
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EPERM (64-bit)
|
||||
# CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM (64-bit)
|
||||
# CIS 4.1.12 L2 Ensure use of privileged commands is collected
|
||||
# CIS 4.1.13 L2 Ensure successful file system mounts are collected
|
||||
# CIS 4.1.13 L2 Ensure successful file system mounts are collected - auditctl
|
||||
# CIS 4.1.13 L2 Ensure successful file system mounts are collected - b64
|
||||
# CIS 4.1.13 L2 Ensure successful file system mounts are collected - auditctl (64-bit)
|
||||
# CIS 4.1.14 L2 Ensure file deletion events by users are collected
|
||||
# CIS 4.1.14 L2 Ensure file deletion events by users are collected - auditctl
|
||||
# CIS 4.1.14 L2 Ensure file deletion events by users are collected - b64
|
||||
# CIS 4.1.14 L2 Ensure file deletion events by users are collected - auditctl (64-bit)
|
||||
# CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - sudoers
|
||||
# CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - auditctl sudoers
|
||||
# CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - sudoers.d
|
||||
# CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - auditctl sudoers.d
|
||||
# CIS 4.1.16 L2 Ensure system administrator actions (sudolog) are collected
|
||||
# CIS 4.1.16 L2 Ensure system administrator actions (sudolog) are collected - auditctl
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - insmod
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl insmod
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - rmmod
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl rmmod
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - modprobe
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl modprobe
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - init_module/delete_module
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl init_module/delete_module
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - init_module/delete_module
|
||||
# CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl init_module/delete_module
|
||||
# CIS 4.1.18 L2 Ensure the audit configuration is immutable
|
||||
/etc/audit/auditd.conf:
|
||||
content: |
|
||||
# File managed by Puppet
|
||||
#
|
||||
# This file controls the configuration of the audit daemon
|
||||
#
|
||||
local_events = yes
|
||||
write_logs = yes
|
||||
log_file = /var/log/audit/audit.log
|
||||
log_group = root
|
||||
log_format = RAW
|
||||
flush = INCREMENTAL_ASYNC
|
||||
freq = 50
|
||||
max_log_file = 8
|
||||
num_logs = 5
|
||||
priority_boost = 4
|
||||
disp_qos = lossy
|
||||
dispatcher = /sbin/audispd
|
||||
name_format = NONE
|
||||
##name = mydomain
|
||||
max_log_file_action = ROTATE
|
||||
space_left = 75
|
||||
space_left_action = SYSLOG
|
||||
verify_email = yes
|
||||
action_mail_acct = root
|
||||
admin_space_left = 50
|
||||
admin_space_left_action = SUSPEND
|
||||
disk_full_action = SUSPEND
|
||||
disk_error_action = SUSPEND
|
||||
use_libwrap = yes
|
||||
##tcp_listen_port = 60
|
||||
tcp_listen_queue = 5
|
||||
tcp_max_per_addr = 1
|
||||
##tcp_client_ports = 1024-65535
|
||||
tcp_client_max_idle = 0
|
||||
enable_krb5 = no
|
||||
krb5_principal = auditd
|
||||
##krb5_key_file = /etc/audit/audit.key
|
||||
distribute_network = no
|
||||
|
||||
|
||||
profile::file_ops::directories:
|
||||
# CIS 5.1.3 L1 Ensure permissions on /etc/cron.hourly are configured
|
||||
/etc/cron.hourly: "%{alias('root_0700')}"
|
||||
# CIS 5.1.4 L1 Ensure permissions on /etc/cron.daily are configured
|
||||
/etc/cron.daily: "%{alias('root_0700')}"
|
||||
# CIS 5.1.5 L1 Ensure permissions on /etc/cron.weekly are configured
|
||||
/etc/cron.weekly: "%{alias('root_0700')}"
|
||||
# CIS 5.1.6 L1 Ensure permissions on /etc/cron.monthly are configured
|
||||
/etc/cron.monthly: "%{alias('root_0700')}"
|
||||
# CIS 5.1.7 L1 Ensure permissions on /etc/cron.d are configured
|
||||
/etc/cron.d: "%{alias('root_0700')}"
|
||||
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - password-auth try_first_pass
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - system-auth try_first_pass
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - password-auth retry=3
|
||||
# CIS 5.3.1 L1 Ensure password creation requirements are configured - system-auth retry=3
|
||||
central_auth::pam::dfok: 5
|
||||
central_auth::pam::minlen: 9
|
||||
central_auth::pam::dcredit: -1
|
||||
central_auth::pam::ucredit: -1
|
||||
central_auth::pam::ocredit: -1
|
||||
central_auth::pam::lcredit: -1
|
||||
|
||||
|
||||
# CIS 1.4.2 L1 Ensure bootloader password is set
|
||||
# CIS 1.4.3 L1 Ensure authentication required for single user mode - rescue.service
|
||||
# CIS 1.4.3 L1 Ensure authentication required for single user mode - emergency.service
|
||||
|
||||
# CIS 1.5.1 L1 Ensure core dumps are restricted - limits.conf limits.d
|
||||
security::limits::limits_hash:
|
||||
"*/hard/core":
|
||||
value: '0'
|
||||
# CIS 1.5.1 L1 Ensure core dumps are restricted - sysctl
|
||||
# CIS 1.5.1 L1 Ensure core dumps are restricted - sysctl.conf sysctl.d
|
||||
profile::kernel::sysctl:
|
||||
fs.suid_dumpable: 0
|
||||
# CIS 1.5.3 L1 Ensure address space layout randomization (ASLR) is enabled - sysctl
|
||||
# CIS 1.5.3 L1 Ensure address space layout randomization (ASLR) is enabled - sysctl.conf sysctl.d
|
||||
kernel.randomize_va_space: 2
|
||||
# CIS 3.1.1 L1 Ensure IP forwarding is disabled - sysctl
|
||||
# CIS 3.1.1 L1 Ensure IP forwarding is disabled - sysctlc.conf sysctl.d
|
||||
net.ipv4.ip_forward: 0
|
||||
# CIS 3.1.2 L1 Ensure packet redirect sending is disabled - 'net.ipv4.conf.all.send_redirects = 0'
|
||||
# CIS 3.1.2 L1 Ensure packet redirect sending is disabled - 'net.ipv4.conf.default.send_redirects = 0'
|
||||
net.ipv4.conf.all.send_redirects: 0
|
||||
net.ipv4.conf.default.send_redirects: 0
|
||||
# CIS 3.2.1 L1 Ensure source routed packets are not accepted - 'net.ipv4.conf.default.accept_source_route = 0'
|
||||
# CIS 3.2.1 L1 Ensure source routed packets are not accepted - 'net.ipv4.conf.all.accept_source_route = 0'
|
||||
net.ipv4.conf.all.accept_source_route: 0
|
||||
net.ipv4.conf.default.accept_source_route: 0
|
||||
# CIS 3.2.2 L1 Ensure ICMP redirects are not accepted - 'net.ipv4.conf.all.accept_redirects = 0'
|
||||
# CIS 3.2.2 L1 Ensure ICMP redirects are not accepted - 'net.ipv4.conf.default.accept_redirects = 0'
|
||||
net.ipv4.conf.all.accept_redirects: 0
|
||||
net.ipv4.conf.default.accept_redirects: 0
|
||||
# CIS 3.2.3 L1 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.default.secure_redirects = 0'
|
||||
# CIS 3.2.3 L1 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.all.secure_redirects = 0'
|
||||
net.ipv4.conf.all.secure_redirects: 0
|
||||
net.ipv4.conf.default.secure_redirects: 0
|
||||
# CIS 3.2.4 L1 Ensure suspicious packets are logged - 'net.ipv4.conf.all.log_martians = 1'
|
||||
# CIS 3.2.4 L1 Ensure suspicious packets are logged - 'net.ipv4.conf.default.log_martians = 1'
|
||||
net.ipv4.conf.all.log_martians: 1
|
||||
net.ipv4.conf.default.log_martians: 1
|
||||
# CIS 3.2.5 L1 Ensure broadcast ICMP requests are ignored - sysctl
|
||||
# CIS 3.2.5 L1 Ensure broadcast ICMP requests are ignored - sysctl.conf sysctl.d
|
||||
net.ipv4.icmp_echo_ignore_broadcasts: 1
|
||||
# CIS 3.2.6 L1 Ensure bogus ICMP responses are ignored - sysctl
|
||||
# CIS 3.2.6 L1 Ensure bogus ICMP responses are ignored - sysctl.conf sysctl.d
|
||||
net.ipv4.icmp_ignore_bogus_error_responses: 1
|
||||
# CIS 3.2.7 L1 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.default.rp_filter = 1'
|
||||
# CIS 3.2.7 L1 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.all.rp_filter = 1'
|
||||
net.ipv4.conf.all.rp_filter: 1
|
||||
net.ipv4.conf.default.rp_filter: 1
|
||||
# CIS 3.2.8 L1 Ensure TCP SYN Cookies is enabled - sysctl
|
||||
# CIS 3.2.8 L1 Ensure TCP SYN Cookies is enabled - sysctl.conf sysctl.d
|
||||
net.ipv4.tcp_syncookies: 1
|
||||
# CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.all.accept_ra = 0'
|
||||
# CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.default.accept_ra = 0'
|
||||
# CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - files 'net.ipv6.conf.all.accept_ra = 0'
|
||||
# CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - files 'net.ipv6.conf.default.accept_ra = 0'
|
||||
net.ipv6.conf.all.accept_ra: 0
|
||||
net.ipv6.conf.default.accept_ra: 0
|
||||
# CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - 'net.ipv6.conf.default.accept_redirects = 0'
|
||||
# CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - 'net.ipv6.conf.all.accept_redirects = 0'
|
||||
# CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - files 'net.ipv6.conf.default.accept_redirects = 0'
|
||||
# CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - files 'net.ipv6.conf.all.accept_redirects = 0'
|
||||
net.ipv6.conf.all.accept_redirects: 0
|
||||
net.ipv6.conf.default.accept_redirects: 0
|
||||
|
||||
# CIS 1.5.2 L1 Ensure XD/NX support is enabled (32 bit only)
|
||||
# CIS 1.8 L1 Ensure updates, patches, and additional security software are installed
|
||||
|
||||
# CIS 2.2.15 L1 Ensure mail transfer agent is configured for local-only mode
|
||||
networking::mailclient::inet_interfaces: 'localhost'
|
||||
|
||||
packages::remove:
|
||||
RedHat:
|
||||
# CIS 1.1.22 L1 Disable Automounting
|
||||
- autofs
|
||||
# CIS 1.5.4 L1 Ensure prelink is disabled
|
||||
- prelink
|
||||
# CIS 1.6.1.4 L2 Ensure SETroubleshoot is not installed
|
||||
- setroubleshoot
|
||||
# CIS 1.6.1.5 L2 Ensure the MCS Translation Service (mcstrans) is not installed
|
||||
- mcstrans
|
||||
# CIS 1.7.2 L1 Ensure GDM login banner is configured - user-db
|
||||
# CIS 1.7.2 L1 Ensure GDM login banner is configured - system-db
|
||||
# CIS 1.7.2 L1 Ensure GDM login banner is configured - file-db
|
||||
# CIS 1.7.2 L1 Ensure GDM login banner is configured - banner message enabled
|
||||
# CIS 1.7.2 L1 Ensure GDM login banner is configured - banner message text
|
||||
- gdm
|
||||
# CIS 2.1.1 L1 Ensure chargen services are not enabled - dgram
|
||||
# CIS 2.1.1 L1 Ensure chargen services are not enabled - stream
|
||||
# CIS 2.1.2 L1 Ensure daytime services are not enabled - dgram
|
||||
# CIS 2.1.2 L1 Ensure daytime services are not enabled - stream
|
||||
# CIS 2.1.3 L1 Ensure discard services are not enabled - dgram
|
||||
# CIS 2.1.3 L1 Ensure discard services are not enabled - stream
|
||||
# CIS 2.1.4 L1 Ensure echo services are not enabled - dgram
|
||||
# CIS 2.1.4 L1 Ensure echo services are not enabled - stream
|
||||
# CIS 2.1.5 L1 Ensure time services are not enabled - dgram
|
||||
# CIS 2.1.5 L1 Ensure time services are not enabled - stream
|
||||
# CIS 2.1.7 L1 Ensure xinetd is not enabled
|
||||
- xinetd
|
||||
# CIS 2.1.6 L1 Ensure tftp server is not enabled
|
||||
# CIS 2.2.20 L1 Ensure tftp server is not enabled
|
||||
- tftp-server
|
||||
# CIS 2.2.2 L1 Ensure X Window System is not installed
|
||||
# CIS 2.2.3 L1 Ensure Avahi Server is not enabled
|
||||
- avahi
|
||||
# CIS 2.2.4 L1 Ensure CUPS is not enabled
|
||||
- cups
|
||||
# CIS 2.2.5 L1 Ensure DHCP Server is not enabled
|
||||
- dhcp
|
||||
- dnsmasq
|
||||
# CIS 2.2.6 L1 Ensure LDAP server is not enabled
|
||||
- openldap-servers
|
||||
# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - nfs
|
||||
# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - nfs-server
|
||||
# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - rpcbind
|
||||
# CIS 2.2.8 L1 Ensure DNS Server is not enabled
|
||||
- bind
|
||||
- pdns
|
||||
# CIS 2.2.9 L1 Ensure FTP Server is not enabled
|
||||
- vsftpd
|
||||
- pure-ftpd
|
||||
- perl-ftpd
|
||||
- proftpd
|
||||
# CIS 2.2.10 L1 Ensure HTTP server is not enabled
|
||||
- caddy
|
||||
- httpd
|
||||
- lighttpd
|
||||
- nginx
|
||||
- nginx14-nginx
|
||||
- nginx16-nginx
|
||||
- nodejs-ws
|
||||
- xbean
|
||||
- rubygem-thin
|
||||
# CIS 2.2.11 L1 Ensure IMAP and POP3 server is not enabled
|
||||
- dovecot
|
||||
- cyrus-imapd
|
||||
# CIS 2.2.12 L1 Ensure Samba is not enabled
|
||||
- samba
|
||||
- samba-dc
|
||||
# CIS 2.2.13 L1 Ensure HTTP Proxy Server is not enabled
|
||||
- squid
|
||||
# CIS 2.2.14 L1 Ensure SNMP Server is not enabled
|
||||
- net-snmp
|
||||
# CIS 2.2.16 L1 Ensure NIS Server is not enabled
|
||||
# CIS 2.3.1 L1 Ensure NIS Client is not installed
|
||||
- ypserv
|
||||
- ypbind
|
||||
# CIS 2.2.17 L1 Ensure rsh server is not enabled - rexec
|
||||
# CIS 2.2.17 L1 Ensure rsh server is not enabled - rlogin
|
||||
# CIS 2.2.17 L1 Ensure rsh server is not enabled - rsh
|
||||
# CIS 2.3.2 L1 Ensure rsh client is not installed
|
||||
- rsh-server
|
||||
- rsh
|
||||
# CIS 2.2.18 L1 Ensure talk server is not enabled
|
||||
# CIS 2.3.3 L1 Ensure talk client is not installed
|
||||
- ntalk
|
||||
- talk
|
||||
# CIS 2.2.19 L1 Ensure telnet server is not enabled
|
||||
- telnet-server
|
||||
profile::services:
|
||||
# CIS 1.2.5 L2 Disable the rhnsd Daemon
|
||||
rhnsd:
|
||||
ensure: stopped
|
||||
enable: false
|
||||
# CIS 2.2.21 L1 Ensure rsync service is not enabled
|
||||
rsyncd:
|
||||
ensure: stopped
|
||||
enable: false
|
||||
# CIS 5.1.1 L1 Ensure cron daemon is enabled
|
||||
crond:
|
||||
ensure: running
|
||||
enable: true
|
||||
|
||||
# CIS 2.3.4 L1 Ensure telnet client is not installed - disputed
|
||||
# CIS 2.3.5 L1 Ensure LDAP client is not installed - disputed
|
||||
|
||||
packages::add:
|
||||
RedHat:
|
||||
# CIS 3.4.1 L1 Ensure TCP Wrappers is installed
|
||||
- tcp_wrappers
|
||||
# CIS 1.6.2 L2 Ensure SELinux is installed
|
||||
- libselinux
|
||||
|
||||
# CIS 3.6.1 L1 Ensure iptables is installed
|
||||
profile::firewall::enable: true
|
||||
profile::firewall::chains:
|
||||
# CIS 3.6.2 L1 Ensure default deny firewall policy - Chain INPUT
|
||||
INPUT:filter:IPv4:
|
||||
policy: drop
|
||||
INPUT:filter:IPv6:
|
||||
policy: drop
|
||||
# CIS 3.6.2 L1 Ensure default deny firewall policy - Chain FORWARD
|
||||
FORWARD:filter:IPv4:
|
||||
policy: drop
|
||||
FORWARD:filter:IPv6:
|
||||
policy: drop
|
||||
# CIS 3.6.2 L1 Ensure default deny firewall policy - Chain OUTPUT
|
||||
OUTPUT:filter:IPv4:
|
||||
policy: drop
|
||||
OUTPUT:filter:IPv6:
|
||||
policy: drop
|
||||
# CIS 3.6.3 L1 Ensure loopback traffic is configured
|
||||
# Configured in code
|
||||
# CIS 3.6.4 L1 Ensure outbound and established connections are configured
|
||||
# Configured in code
|
||||
# CIS 3.6.5 L1 Ensure firewall rules exist for all open ports
|
||||
profile::firewall::inbound:
|
||||
'101 DHCP Server':
|
||||
sport: 67
|
||||
proto: udp
|
||||
'110 SSH Access':
|
||||
dport: 22
|
||||
'161 NetBackup Server':
|
||||
dport: [ 1556, 13724 ]
|
||||
profile::firewall::outbound:
|
||||
'101 DHCP Client':
|
||||
sport: 68
|
||||
proto: udp
|
||||
'120 SSH Access':
|
||||
sport: 22
|
||||
'130 Puppet Server Access':
|
||||
dport: [8140,8142]
|
||||
destination: 10.5.162.0/24
|
||||
'102 Network Time Protocol':
|
||||
dport: 123
|
||||
proto: udp
|
||||
'103 Name Resolution TCP':
|
||||
dport: 53
|
||||
proto: tcp
|
||||
'103 Name Resolution UDP':
|
||||
dport: 53
|
||||
proto: udp
|
||||
'104 AD Authentication TCP':
|
||||
dport: [ 88, 389, 445, 464, 3268 ]
|
||||
'104 AD Authentication UDP':
|
||||
dport: [ 88, 137, 389 ]
|
||||
proto: udp
|
||||
'140 RightLink Agent':
|
||||
# From here: https://docs.rightscale.com/faq/Firewall_Configuration_Ruleset.html
|
||||
dport: 443
|
||||
destination:
|
||||
- 54.225.248.128/27
|
||||
- 54.244.88.96/27
|
||||
- 54.86.63.128/26
|
||||
- 54.187.254.128/26
|
||||
- 54.246.247.16/28
|
||||
- 54.248.220.128/28
|
||||
- 54.255.255.208/28
|
||||
- 52.65.255.224/28
|
||||
'141 AWS Instance Data':
|
||||
dport: 80
|
||||
destination: 169.254.169.254/32
|
||||
'145 Sumo Logic Monitoring':
|
||||
# Unfortunately SUMO runs on AWS randomly, so we need to open up access to the whole of AWS EC2 for our region ap-southeast-2
|
||||
# https://help.sumologic.com/APIs/General-API-Information/Sumo-Logic-Endpoints-and-Firewall-Security
|
||||
dport: 443
|
||||
destination:
|
||||
- 13.210.0.0/15
|
||||
- 13.236.0.0/14
|
||||
- 13.54.0.0/15
|
||||
- 15.193.3.0/24
|
||||
- 3.104.0.0/14
|
||||
- 3.24.0.0/14
|
||||
- 52.62.0.0/15
|
||||
- 52.64.0.0/17
|
||||
- 52.64.128.0/17
|
||||
- 52.65.0.0/16
|
||||
- 52.94.248.64/28
|
||||
- 52.95.241.0/24
|
||||
- 52.95.255.16/28
|
||||
- 54.153.128.0/17
|
||||
- 54.206.0.0/16
|
||||
- 54.252.0.0/16
|
||||
- 54.253.0.0/16
|
||||
- 54.66.0.0/16
|
||||
- 54.79.0.0/16
|
||||
- 99.77.144.0/24
|
||||
# Currently some sumo installations are trying to hit the US AWS site us-east-1, hopefully we can delete these after getting the
|
||||
# sumo agent to just point to AU
|
||||
- 100.24.0.0/13
|
||||
- 107.20.0.0/14
|
||||
- 15.193.6.0/24
|
||||
- 162.250.236.0/24
|
||||
- 162.250.237.0/24
|
||||
- 162.250.238.0/23
|
||||
- 174.129.0.0/16
|
||||
- 18.204.0.0/14
|
||||
- 18.208.0.0/13
|
||||
- 18.232.0.0/14
|
||||
- 184.72.128.0/17
|
||||
- 184.72.64.0/18
|
||||
- 184.73.0.0/16
|
||||
- 204.236.192.0/18
|
||||
- 208.86.88.0/23
|
||||
- 216.182.224.0/21
|
||||
- 216.182.232.0/22
|
||||
- 216.182.238.0/23
|
||||
- 23.20.0.0/14
|
||||
- 3.208.0.0/12
|
||||
- 3.224.0.0/12
|
||||
- 3.80.0.0/12
|
||||
- 34.192.0.0/12
|
||||
- 34.224.0.0/12
|
||||
- 35.153.0.0/16
|
||||
- 35.168.0.0/13
|
||||
- 44.192.0.0/11
|
||||
- 50.16.0.0/15
|
||||
- 50.19.0.0/16
|
||||
- 52.0.0.0/15
|
||||
- 52.2.0.0/15
|
||||
- 52.20.0.0/14
|
||||
- 52.200.0.0/13
|
||||
- 52.4.0.0/14
|
||||
- 52.44.0.0/15
|
||||
- 52.54.0.0/15
|
||||
- 52.70.0.0/15
|
||||
- 52.72.0.0/15
|
||||
- 52.86.0.0/15
|
||||
- 52.90.0.0/15
|
||||
- 52.94.201.0/26
|
||||
- 52.94.248.0/28
|
||||
- 52.95.245.0/24
|
||||
- 52.95.255.80/28
|
||||
- 54.144.0.0/14
|
||||
- 54.152.0.0/16
|
||||
- 54.156.0.0/14
|
||||
- 54.160.0.0/13
|
||||
- 54.172.0.0/15
|
||||
- 54.174.0.0/15
|
||||
- 54.196.0.0/15
|
||||
- 54.198.0.0/16
|
||||
- 54.204.0.0/15
|
||||
- 54.208.0.0/15
|
||||
- 54.210.0.0/15
|
||||
- 54.221.0.0/16
|
||||
- 54.224.0.0/15
|
||||
- 54.226.0.0/15
|
||||
- 54.234.0.0/15
|
||||
- 54.236.0.0/15
|
||||
- 54.242.0.0/15
|
||||
- 54.80.0.0/13
|
||||
- 54.88.0.0/14
|
||||
- 54.92.128.0/17
|
||||
- 67.202.0.0/18
|
||||
- 72.44.32.0/19
|
||||
- 75.101.128.0/17
|
||||
- 99.77.128.0/24
|
||||
- 99.77.129.0/24
|
||||
- 99.77.191.0/24
|
||||
- 99.77.254.0/24
|
||||
'150 Telegraf Monitoring':
|
||||
dport: 80
|
||||
destination: [ 10.212.82.107/32, 10.212.85.6/32 ]
|
||||
'160 YUM Server':
|
||||
dport: [ 80, 443 ]
|
||||
destination: "%{::yum_server}"
|
||||
'161 NetBackup Server':
|
||||
dport: [ 1556, 13724 ]
|
||||
'162 Mail Server':
|
||||
dport: 25
|
||||
destination: "%{hiera('networking::mailclient::relayhost')}"
|
||||
'163 Log Server':
|
||||
dport: [ 5514, 6514 ]
|
||||
destination:
|
||||
- "%{hiera('profile::nxlog_client::logserver1')}"
|
||||
- "%{hiera('profile::nxlog_client::logserver2')}"
|
||||
# CIS 3.7 L1 Ensure wireless interfaces are disabled
|
||||
|
||||
|
||||
# CIS 4.2.1.1 L1 Ensure rsyslog Service is enabled
|
||||
# CIS 4.2.1.3 L1 Ensure rsyslog default file permissions configured
|
||||
# CIS 4.2.1.4 L1 Ensure rsyslog is configured to send logs to a remote log host
|
||||
# CIS 4.2.1.5 L1 Ensure remote rsyslog messages are only accepted on designated log hosts. - imtcp.so
|
||||
# CIS 4.2.1.5 L1 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun 514
|
||||
# CIS 4.2.2.1 L1 Ensure syslog-ng service is enabled
|
||||
# CIS 4.2.2.3 L1 Ensure syslog-ng default file permissions configured
|
||||
# CIS 4.2.2.4 L1 Ensure syslog-ng is configured to send logs to a remote log host - destination logserver
|
||||
# CIS 4.2.2.4 L1 Ensure syslog-ng is configured to send logs to a remote log host - log src
|
||||
# CIS 4.2.2.5 L1 Ensure remote syslog-ng messages are only accepted on designated log hosts
|
||||
# CIS 4.2.4 L1 Ensure permissions on all logfiles are configured
|
||||
|
||||
|
||||
# CIS 5.2.1 L1 Ensure permissions on /etc/ssh/sshd_config are configured
|
||||
# Set to 600 by SSH server module
|
||||
profile::ssh::options_hash:
|
||||
# CIS 5.2.2 L1 Ensure SSH Protocol is set to 2
|
||||
Protocol: '2'
|
||||
# CIS 5.2.3 L1 Ensure SSH LogLevel is set to INFO
|
||||
LogLevel: INFO
|
||||
# CIS 5.2.4 L1 Ensure SSH X11 forwarding is disabled
|
||||
X11Forwarding: no
|
||||
# CIS 5.2.5 L1 Ensure SSH MaxAuthTries is set to 4 or less
|
||||
MaxAuthTries: '4'
|
||||
# CIS 5.2.6 L1 Ensure SSH IgnoreRhosts is enabled
|
||||
IgnoreRhosts: yes
|
||||
# CIS 5.2.7 L1 Ensure SSH HostbasedAuthentication is disabled
|
||||
HostbasedAuthentication: no
|
||||
# CIS 5.2.8 L1 Ensure SSH root login is disabled
|
||||
PermitRootLogin: no
|
||||
# CIS 5.2.9 L1 Ensure SSH PermitEmptyPasswords is disabled
|
||||
PermitEmptyPasswords: no
|
||||
# CIS 5.2.10 L1 Ensure SSH PermitUserEnvironment is disabled
|
||||
PermitUserEnvironment: no
|
||||
# CIS 5.2.11 L1 Ensure only approved MAC algorithms are used
|
||||
MACs: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
|
||||
# CIS 5.2.12 L1 Ensure SSH Idle Timeout Interval is configured - ClientAliveInterval - setting to an hour to balance productivity
|
||||
ClientAliveInterval: '3600'
|
||||
# CIS 5.2.12 L1 Ensure SSH Idle Timeout Interval is configured - ClientAliveCountMax
|
||||
ClientAliveCountMax: '0'
|
||||
# CIS 5.2.13 L1 Ensure SSH LoginGraceTime is set to one minute or less
|
||||
LoginGraceTime: 60
|
||||
# CIS 5.2.15 L1 Ensure SSH warning banner is configured
|
||||
Banner: /etc/issue
|
||||
# CIS 5.2.14 L1 Ensure SSH access is limited
|
||||
profile::ssh::allowed_groups:
|
||||
- gg_linux_admins
|
||||
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth required pam_faillock.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth [success=1 default=bad] pam_unix.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth [default=die] pam_faillock.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth sufficient pam_faillock.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth required pam_faillock.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth [success=1 default=bad] pam_unix.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth [default=die] pam_faillock.so'
|
||||
# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth sufficient pam_faillock.so'
|
||||
|
||||
# CIS 5.3.3 L1 Ensure password reuse is limited - system-auth
|
||||
# CIS 5.3.3 L1 Ensure password reuse is limited - password-auth
|
||||
|
||||
# CIS 5.3.4 L1 Ensure password hashing algorithm is SHA-512 - system-auth
|
||||
# CIS 5.3.4 L1 Ensure password hashing algorithm is SHA-512 - password-auth
|
||||
# Set via the central_auth module
|
||||
|
||||
# CIS 5.4.1.1 L1 Ensure password expiration is 365 days or less
|
||||
# CIS 5.4.1.2 L1 Ensure minimum days between password changes is 7 or more
|
||||
# CIS 5.4.1.3 L1 Ensure password expiration warning days is 7 or more
|
||||
# CIS 5.4.1.4 L1 Ensure inactive password lock is 30 days or less
|
||||
# CIS 5.4.1.5 L1 Ensure all users last password change date is in the past
|
||||
|
||||
# CIS 5.4.2 L1 Ensure system accounts are non-login
|
||||
|
||||
local_users::add::users:
|
||||
root:
|
||||
uid: 0
|
||||
# CIS 5.4.3 L1 Ensure default group for the root account is GID 0
|
||||
gid: 0
|
||||
# CIS 5.6 L1 Ensure access to the su command is restricted - wheel group contains root
|
||||
groups: [ wheel ]
|
||||
|
||||
profile::file_ops::file_lines:
|
||||
/etc/bashrc:
|
||||
# CIS 5.4.5 L2 Ensure default user shell timeout is 900 seconds or less - /etc/bashrc - setting to an hour to balance productivity
|
||||
- line : 'TMOUT=3600'
|
||||
match : 'TMOUT='
|
||||
# CIS 5.4.4 L1 Ensure default user umask is 027 or more restrictive - /etc/bashrc
|
||||
- line : ' umask 027'
|
||||
match : ' umask 0\d\d'
|
||||
multiple : true
|
||||
# CIS 5.6 L1 Ensure access to the su command is restricted - pam_wheel.so
|
||||
/etc/pam.d/su:
|
||||
line : 'auth required pam_wheel.so use_uid'
|
||||
match : '#auth required pam_wheel.so use_uid'
|
||||
# CIS 3.3.3 L1 Ensure IPv6 is disabled
|
||||
/etc/default/grub:
|
||||
line: GRUB_CMDLINE_LINUX='ipv6.disable=1'
|
||||
match: GRUB_CMDLINE_LINUX
|
||||
# CIS 6.2.2 L1 Ensure no legacy '+' entries exist in /etc/passwd
|
||||
/etc/passwd:
|
||||
ensure: absent
|
||||
line: '+'
|
||||
# CIS 6.2.3 L1 Ensure no legacy '+' entries exist in /etc/shadow
|
||||
/etc/shadow:
|
||||
ensure: absent
|
||||
line: '+'
|
||||
# CIS 6.2.4 L1 Ensure no legacy '+' entries exist in /etc/group
|
||||
/etc/group:
|
||||
ensure: absent
|
||||
line: '+'
|
||||
|
||||
# CIS 5.5 L1 Ensure root login is restricted to system console - TBD
|
||||
# CIS 6.1.10 L1 Ensure no world writable files exist
|
||||
# CIS 6.1.11 L1 Ensure no unowned files or directories exist
|
||||
# CIS 6.1.12 L1 Ensure no ungrouped files or directories exist
|
||||
# CIS 6.1.13 L1 Audit SUID executables
|
||||
# CIS 6.1.14 L1 Audit SGID executables
|
||||
# CIS 6.2.1 L1 Ensure password fields are not empty
|
||||
|
||||
# CIS 6.2.5 L1 Ensure root is the only UID 0 account
|
||||
# CIS 6.2.6 L1 Ensure root PATH Integrity
|
||||
# CIS 6.2.7 L1 Ensure all users' home directories exist
|
||||
# CIS 6.2.8 L1 Ensure users' home directories permissions are 750 or more restrictive
|
||||
# CIS 6.2.9 L1 Ensure users own their home directories
|
||||
# CIS 6.2.10 L1 Ensure users' dot files are not group or world writable
|
||||
# CIS 6.2.11 L1 Ensure no users have .forward files
|
||||
# CIS 6.2.12 L1 Ensure no users have .netrc files
|
||||
# CIS 6.2.13 L1 Ensure users' .netrc Files are not group or world accessible
|
||||
# CIS 6.2.14 L1 Ensure no users have .rhosts files
|
||||
# CIS 6.2.15 L1 Ensure all groups in /etc/passwd exist in /etc/group
|
||||
# CIS 6.2.16 L1 Ensure no duplicate UIDs exist
|
||||
# CIS 6.2.17 L1 Ensure no duplicate GIDs exist
|
||||
# CIS 6.2.18 L1 Ensure no duplicate user names exist
|
||||
# CIS 6.2.19 L1 Ensure no duplicate group names exist
|
||||
|
||||
# CIS 1.6.1.1 L2 Ensure SELinux is not disabled in bootloader configuration - selinux = 0
|
||||
# CIS 1.6.1.1 L2 Ensure SELinux is not disabled in bootloader configuration - enforcing = 0
|
||||
|
||||
profile::file_ops::templates:
|
||||
# CIS 1.6.1.2 L2 Ensure the SELinux state is enforcing
|
||||
# CIS 1.6.1.3 L2 Ensure SELinux policy is configured
|
||||
/etc/selinux/config:
|
||||
data:
|
||||
setting: permissive
|
||||
type: targeted
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
content: |
|
||||
# This file controls the state of SELinux on the system.
|
||||
# SELINUX= can take one of these three values:
|
||||
# enforcing - SELinux security policy is enforced.
|
||||
# permissive - SELinux prints warnings instead of enforcing.
|
||||
# disabled - No SELinux policy is loaded.
|
||||
SELINUX=<%= $setting %>
|
||||
# SELINUXTYPE= can take one of these two values:
|
||||
# targeted - Targeted processes are protected,
|
||||
# mls - Multi Level Security protection.
|
||||
SELINUXTYPE=<%= $type %>
|
||||
|
||||
# CIS 1.6.1.6 L2 Ensure no unconfined daemons exist
|
||||
|
||||
# CIS 6.1.1 L2 Audit system file permissions
|
28
data/nodes/pe201811ha-master.platform9.puppet.net.yaml
Normal file
28
data/nodes/pe201811ha-master.platform9.puppet.net.yaml
Normal file
@ -0,0 +1,28 @@
|
||||
puppet_enterprise::master::puppetserver::jruby_max_active_instances: 1
|
||||
puppet_enterprise::master::puppetserver:reserved_code_cache: '96m'
|
||||
puppet_enterprise::profile::master::java_args:
|
||||
Xmx: '384m'
|
||||
Xms: '128m'
|
||||
'XX:MaxPermSize': '=96m'
|
||||
'XX:PermSize': '=64m'
|
||||
'XX:+UseG1GC': ''
|
||||
puppet_enterprise::profile::puppetdb::java_args:
|
||||
Xmx: '128m'
|
||||
Xms: '64m'
|
||||
'XX:MaxPermSize': '=96m'
|
||||
'XX:PermSize': '=64m'
|
||||
'XX:+UseG1GC': ''
|
||||
puppet_enterprise::profile::console::java_args:
|
||||
Xmx: '64m'
|
||||
Xms: '64m'
|
||||
'XX:MaxPermSize': '=96m'
|
||||
'XX:PermSize': '=64m'
|
||||
'XX:+UseG1GC': ''
|
||||
puppet_enterprise::profile::console::delayed_job_workers: 1
|
||||
#shared_buffers takes affect during install but is not managed after
|
||||
puppet_enterprise::profile::database::shared_buffers: '4MB'
|
||||
#2015.3.2 and above
|
||||
puppet_enterprise::profile::orchestrator::java_args:
|
||||
Xmx: '64m'
|
||||
Xms: '64m'
|
||||
'XX:+UseG1GC': ''
|
28
data/nodes/pe201811ha-replica.platform9.puppet.net.yaml
Normal file
28
data/nodes/pe201811ha-replica.platform9.puppet.net.yaml
Normal file
@ -0,0 +1,28 @@
|
||||
puppet_enterprise::master::puppetserver::jruby_max_active_instances: 1
|
||||
puppet_enterprise::master::puppetserver:reserved_code_cache: '96m'
|
||||
puppet_enterprise::profile::master::java_args:
|
||||
Xmx: '384m'
|
||||
Xms: '128m'
|
||||
'XX:MaxPermSize': '=96m'
|
||||
'XX:PermSize': '=64m'
|
||||
'XX:+UseG1GC': ''
|
||||
puppet_enterprise::profile::puppetdb::java_args:
|
||||
Xmx: '128m'
|
||||
Xms: '64m'
|
||||
'XX:MaxPermSize': '=96m'
|
||||
'XX:PermSize': '=64m'
|
||||
'XX:+UseG1GC': ''
|
||||
puppet_enterprise::profile::console::java_args:
|
||||
Xmx: '64m'
|
||||
Xms: '64m'
|
||||
'XX:MaxPermSize': '=96m'
|
||||
'XX:PermSize': '=64m'
|
||||
'XX:+UseG1GC': ''
|
||||
puppet_enterprise::profile::console::delayed_job_workers: 1
|
||||
#shared_buffers takes affect during install but is not managed after
|
||||
puppet_enterprise::profile::database::shared_buffers: '4MB'
|
||||
#2015.3.2 and above
|
||||
puppet_enterprise::profile::orchestrator::java_args:
|
||||
Xmx: '64m'
|
||||
Xms: '64m'
|
||||
'XX:+UseG1GC': ''
|
17
data/nodes/puppetmom.platform9.puppet.net.yaml
Normal file
17
data/nodes/puppetmom.platform9.puppet.net.yaml
Normal file
@ -0,0 +1,17 @@
|
||||
---
|
||||
puppet_enterprise::profile::database::shared_buffers: 3715MB
|
||||
puppet_enterprise::puppetdb::command_processing_threads: 4
|
||||
puppet_enterprise::profile::puppetdb::java_args:
|
||||
Xms: 2229m
|
||||
Xmx: 2229m
|
||||
puppet_enterprise::master::puppetserver::jruby_max_active_instances: 2
|
||||
puppet_enterprise::profile::master::java_args:
|
||||
Xms: 1536m
|
||||
Xmx: 1536m
|
||||
puppet_enterprise::master::puppetserver::reserved_code_cache: 512m
|
||||
puppet_enterprise::profile::console::java_args:
|
||||
Xms: 768m
|
||||
Xmx: 768m
|
||||
puppet_enterprise::profile::orchestrator::java_args:
|
||||
Xms: 768m
|
||||
Xmx: 768m
|
102
loadbalancer-improved.pp
Normal file
102
loadbalancer-improved.pp
Normal file
@ -0,0 +1,102 @@
|
||||
class role::loadbalancer (
|
||||
Optional[String] $ports1 = '80',
|
||||
Optional[String] $ports2 = undef,
|
||||
Optional[String] $rule1 = 'puppet00',
|
||||
Optional[String] $rule2 = undef,
|
||||
Optional[String] $backendserver_name1 = '',
|
||||
Optional[String] $backendserver_name2 = '',
|
||||
Optional[String] $backendserver_ipaddress1 = undef,
|
||||
Optional[String] $backendserver_ipaddress2 = undef,
|
||||
Optional[String] $connetc_timeout = '60s',
|
||||
) {
|
||||
|
||||
class { 'haproxy':
|
||||
merge_options => true,
|
||||
global_options => {
|
||||
'log' => "${::ipaddress} local0",
|
||||
'chroot' => '/var/lib/haproxy',
|
||||
'pidfile' => '/var/run/haproxy.pid',
|
||||
'maxconn' => '4000',
|
||||
'user' => 'haproxy',
|
||||
'group' => 'haproxy',
|
||||
'daemon' => '',
|
||||
'stats' => 'socket /var/lib/haproxy/stats',
|
||||
},
|
||||
defaults_options => {
|
||||
'log' => 'global',
|
||||
'stats' => 'enable',
|
||||
'option' => [
|
||||
'redispatch',
|
||||
],
|
||||
'retries' => '3',
|
||||
'timeout' => [
|
||||
'http-request 10s',
|
||||
'queue 1m',
|
||||
'connect 300s',
|
||||
'client 600s',
|
||||
'server 600s',
|
||||
'check 1m',
|
||||
],
|
||||
'maxconn' => '8000',
|
||||
},
|
||||
}
|
||||
|
||||
include ::haproxy
|
||||
|
||||
haproxy::listen { $rule1 :
|
||||
collect_exported => false,
|
||||
ipaddress => $::ipaddress,
|
||||
ports => $ports1,
|
||||
}
|
||||
|
||||
if $rule2 != undef
|
||||
{
|
||||
haproxy::listen { $rule2 :
|
||||
collect_exported => false,
|
||||
ipaddress => $::ipaddress,
|
||||
ports => $ports2,
|
||||
}
|
||||
|
||||
haproxy::balancermember { 'member3' :
|
||||
listening_service => $rule2,
|
||||
server_names => $backendserver_name1,
|
||||
ipaddresses => $backendserver_ipaddress1,
|
||||
ports => $ports2,
|
||||
options => 'check',
|
||||
|
||||
}
|
||||
|
||||
haproxy::balancermember { 'member4' :
|
||||
listening_service => $rule2,
|
||||
server_names => $backendserver_name2,
|
||||
ipaddresses => $backendserver_ipaddress2,
|
||||
ports => $ports2,
|
||||
options => 'check',
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
haproxy::balancermember { 'member1' :
|
||||
listening_service => $rule1,
|
||||
server_names => $backendserver_name1,
|
||||
ipaddresses => $backendserver_ipaddress1,
|
||||
ports => $ports1,
|
||||
options => 'check',
|
||||
|
||||
}
|
||||
|
||||
haproxy::balancermember { 'member2' :
|
||||
listening_service => $rule1,
|
||||
server_names => $backendserver_name2,
|
||||
ipaddresses => $backendserver_ipaddress2,
|
||||
ports => $ports1,
|
||||
options => 'check',
|
||||
}
|
||||
|
||||
#pending Improvement, possible areas: Array Input with multipal ports
|
||||
|
||||
|
||||
}
|
93
onceover-example.yaml
Normal file
93
onceover-example.yaml
Normal file
@ -0,0 +1,93 @@
|
||||
# Classes to be tested
|
||||
classes:
|
||||
- role::database_server
|
||||
- role::webserver
|
||||
- role::goldload_server
|
||||
- role::loadbalancer
|
||||
- role::example
|
||||
- role::callaugeas
|
||||
|
||||
# Nodes to tests classes on, this refers to a 'factset' or 'nodeset'
|
||||
# depending on whether you are running 'spec' or 'acceptance' tests
|
||||
nodes:
|
||||
- AIX-7.1-powerpc
|
||||
- SLES-12.1-64
|
||||
- Debian-6.0.10-32
|
||||
- CentOS-6.6-64
|
||||
- Ubuntu-12.04-32
|
||||
- Amazon-2018.03
|
||||
- Ubuntu-12.04-64
|
||||
- CentOS-6.6-32
|
||||
- Debian-6.0.10-64
|
||||
- AIX-6.1-powerpc
|
||||
- Windows_Server-2012r2-64
|
||||
- RHEL-7.4
|
||||
- Debian-7.8-32
|
||||
- windows-10-64
|
||||
- Windows_Server-2008r2-64
|
||||
- SLES-11.3-64
|
||||
- Debian-7.8-64
|
||||
- solaris-10_u9-sparc-64
|
||||
- solaris-11.2-sparc-64
|
||||
- Ubuntu-14.04-32
|
||||
- CentOS-5.11-64
|
||||
- CentOS-5.11-32
|
||||
- RHEL-6.7
|
||||
- CentOS-7.0-64
|
||||
- Ubuntu-14.04-64
|
||||
|
||||
# You can group classes here to save typing
|
||||
class_groups:
|
||||
general_class:
|
||||
- role::database_server
|
||||
- role::webserver
|
||||
- role::goldload_server
|
||||
- role::example
|
||||
|
||||
# You can group nodes here to save typing
|
||||
# We have created a 'non_windows_nodes' group because we can't
|
||||
# give you Windows vagrant boxes to test with because licensing,
|
||||
# we can give you fact sets though so go crazy with spec testing!
|
||||
node_groups:
|
||||
windows_nodes:
|
||||
- Windows_Server-2012r2-64
|
||||
- windows-10-64
|
||||
- Windows_Server-2008r2-64
|
||||
non_windows_nodes:
|
||||
include: 'all_nodes'
|
||||
exclude: 'windows_nodes'
|
||||
callaugeas_nodes:
|
||||
- RHEL-7.4
|
||||
- RHEL-6.7
|
||||
haproxy_nodes:
|
||||
- SLES-12.1-64
|
||||
- Debian-6.0.10-32
|
||||
- CentOS-6.6-64
|
||||
- Ubuntu-12.04-32
|
||||
- Amazon-2018.03
|
||||
- Ubuntu-12.04-64
|
||||
- CentOS-6.6-32
|
||||
- Debian-6.0.10-64
|
||||
- RHEL-7.4
|
||||
- Debian-7.8-32
|
||||
- SLES-11.3-64
|
||||
- Debian-7.8-64
|
||||
- Ubuntu-14.04-32
|
||||
- CentOS-5.11-64
|
||||
- CentOS-5.11-32
|
||||
- RHEL-6.7
|
||||
- CentOS-7.0-64
|
||||
- Ubuntu-14.04-64
|
||||
|
||||
test_matrix:
|
||||
- all_nodes:
|
||||
classes: 'general_class'
|
||||
tests: 'spec'
|
||||
- callaugeas_nodes:
|
||||
classes: 'role::callaugeas'
|
||||
tests: 'spec'
|
||||
- haproxy_nodes:
|
||||
classes: 'role::loadbalancer'
|
||||
tests: 'spec'
|
||||
|
||||
|
BIN
site-modules/.DS_Store
vendored
Normal file
BIN
site-modules/.DS_Store
vendored
Normal file
Binary file not shown.
BIN
site-modules/controlm/.DS_Store
vendored
Normal file
BIN
site-modules/controlm/.DS_Store
vendored
Normal file
Binary file not shown.
96
site-modules/controlm/README.md
Normal file
96
site-modules/controlm/README.md
Normal file
@ -0,0 +1,96 @@
|
||||
This installs the Optus standard controlm.
|
||||
|
||||
All hiera is managed in the approproate pp file under manifests and the various child .pp files use inherit to see the variables.
|
||||
|
||||
# CONTROLM AGENT
|
||||
All hiera has defaults. You will probably only need to set servers if anything.
|
||||
|
||||
## Software and patches
|
||||
The install script installs the main software and the patches as I couldn't get the patch script to run properly after the main install script. Patches are defaulted to the current ones or set in heira
|
||||
controlm::controlm_agent::patch_files:
|
||||
- file1
|
||||
- file2
|
||||
|
||||
|
||||
## Servers
|
||||
if the client is in a different domain to the server (eg client is nix.au.singtelgroup.net and server is optus.com.au) then need FQDN as below, else can use short form in both
|
||||
```
|
||||
controlm::controlm_agent::primary_server_host: ctmgnpappla012.optus.com.au
|
||||
controlm::controlm_agent::server_host: ctmgnpappla012
|
||||
```
|
||||
Note that you need to be able to contact the host[s] on the server2agent port listed in controlm_agent.pp for the install to work.
|
||||
|
||||
All DEV (DEV,PPT, SIT, GNP etc) must use ctmgnpappla012 as the control-m server, all PRD non BCC Agents must use ctmprdappla003.
|
||||
|
||||
|
||||
## Admins
|
||||
You need accounts for the admins and schedulers as below, subbing PRD for GNP in prd:
|
||||
```
|
||||
isnd_linux::profiles::soe::login_accounts::groups:
|
||||
- 'ocaus01\ACL-GNP-CTRLM-rwx-SMT-ADMIN':
|
||||
additional_groups:
|
||||
- controlm
|
||||
- 'ocaus01\ACL-GNP-CTRLM-rx-SMT-SCHED':
|
||||
additional_groups:
|
||||
- controlm
|
||||
|
||||
tpiam::profiles::sudoers:
|
||||
ocaus01aclgnpctrlmrwxsmtadmin:
|
||||
runas_users:
|
||||
- ctmagent
|
||||
commands: all_commands
|
||||
ocaus01aclgnpctrlmrxsmtsched:
|
||||
runas_users:
|
||||
- ctmagent
|
||||
commands: all_commands include controlm::controlm_agent::users
|
||||
|
||||
```
|
||||
## To reinstall
|
||||
```
|
||||
userdel -r ctmagent
|
||||
yum remove ctmagent_core_clean
|
||||
rm -rf /apps/bmc
|
||||
```
|
||||
# ctm.sh fails
|
||||
If puppet complains about ctm.sh, be sure everything is running as root properly. The install should do this, but exec is never reliable
|
||||
```
|
||||
[root@bdpprdedgla001 scripts_optus]# pwd
|
||||
/apps/bmc/ctm/scripts_optus
|
||||
[root@bdpprdedgla001 scripts_optus]# ./ctm.sh stop
|
||||
Stopping Control-M Agent
|
||||
Killing Control-M/Agent Listener pid:23639
|
||||
2018-01-09 11:06:33 Listener process stopped
|
||||
Killing Control-M/Agent Tracker pid:23693
|
||||
2018-01-09 11:06:34 Tracker process stopped
|
||||
```
|
||||
it might complain, so if it does, do as it says:
|
||||
```
|
||||
[root@bdpprdedgla002 scripts_optus]# ./ctm.sh stop
|
||||
Stopping Control-M Agent
|
||||
The agent is currently running as 'ctmagent'
|
||||
You need to login as 'ctmagent' and run this command again
|
||||
```
|
||||
so su - ctmagent, run the stop command and then as root
|
||||
```
|
||||
[root@bdpprdedgla001 scripts_optus]# ./ctm.sh mode_full
|
||||
Sudo mode is disabled
|
||||
|
||||
/apps/bmc/ctm/exe/vault/su_bmc ownership set to ctmagent
|
||||
/apps/bmc/ctm/exe/vault/su_bmc setuid bit was reset
|
||||
/apps/bmc/ctm/sysout permissions set to 755 without sticky bit
|
||||
/apps/bmc/ctm/sysout setgid bit was reset
|
||||
/apps/bmc/ctm/non-root deleted
|
||||
|
||||
Non-root mode was disabled.
|
||||
|
||||
[root@bdpprdedgla001 scripts_optus]# ./ctm.sh start
|
||||
|
||||
|
||||
Starting the agent as 'root' user
|
||||
|
||||
Control-M/Agent Listener started. pid: 10838
|
||||
Control-M/Agent Tracker started. pid: 10892
|
||||
|
||||
Control-M/Agent started successfully.
|
||||
Control-M Agent Started
|
||||
```
|
4
site-modules/controlm/files/controlm.csh
Normal file
4
site-modules/controlm/files/controlm.csh
Normal file
@ -0,0 +1,4 @@
|
||||
setenv PATH ${PATH}:/apps/bmc/ctm/exe:/apps/bmc/ctm/scripts:/apps/bmc/ctm/scripts_optus
|
||||
setenv CONTROLM /apps/bmc/ctm
|
||||
setenv LD_LIBRARY_PATH /apps/bmc/ctm/exe
|
||||
|
7
site-modules/controlm/files/controlm.sh
Normal file
7
site-modules/controlm/files/controlm.sh
Normal file
@ -0,0 +1,7 @@
|
||||
CONTROLM=/apps/bmc/ctm
|
||||
export CONTROLM
|
||||
PATH=${PATH}:/apps/bmc/ctm/exe:/apps/bmc/ctm/scripts:/apps/bmc/ctm/scripts_optus
|
||||
export PATH
|
||||
LD_LIBRARY_PATH=/apps/bmc/ctm/exe
|
||||
export LD_LIBRARY_PATH
|
||||
|
11
site-modules/controlm/files/controlm_agent_install.sh
Normal file
11
site-modules/controlm/files/controlm_agent_install.sh
Normal file
@ -0,0 +1,11 @@
|
||||
#!/bin/bash
|
||||
cd /apps/bmc/
|
||||
sudo -u ctmagent /apps/bmc/software/version_9/setup.sh -silent /apps/bmc/ctm/ctm_silentinstall_optus.xml
|
||||
RESULT=$?
|
||||
echo "exit status $RESULT"
|
||||
/bin/date > /apps/bmc/ctm/controlm_agent_install.hasrun
|
||||
echo "exit status $RESULT" >> /apps/bmc/ctm/controlm_agent_install.hasrun
|
||||
echo "do not remove this file unless you want to rerun the install" >> /apps/bmc/ctm/controlm_agent_install.hasrun
|
||||
chmod 444 /apps/bmc/ctm/controlm_agent_install.hasrun
|
||||
exit $RESULT
|
||||
|
49
site-modules/controlm/files/ctm.sh
Normal file
49
site-modules/controlm/files/ctm.sh
Normal file
@ -0,0 +1,49 @@
|
||||
#!/bin/bash
|
||||
# Startup Script for Control-M Agent Daemons
|
||||
# Creation Date: 2016-09-09
|
||||
# Created By: David Stephenson
|
||||
# Version: 1.0
|
||||
|
||||
# chkconfig: 2345 99 05
|
||||
# description: Controlm agent
|
||||
|
||||
|
||||
CTM_Dir=/apps/bmc/ctm
|
||||
CTM_OWNER=ctmagent
|
||||
CTM_GROUP=controlm
|
||||
|
||||
chown $CTM_OWNER:$CTM_GROUP $CTM_Dir/proclog/*.log
|
||||
|
||||
case "$1" in
|
||||
'start')
|
||||
cd $CTM_Dir/scripts
|
||||
./start-ag -u $CTM_OWNER -p ALL -s
|
||||
if [ "$?" = 0 ] ; then
|
||||
touch /var/lock/subsys/ctm
|
||||
echo "Control-M Agent Started"
|
||||
fi
|
||||
;;
|
||||
'stop')
|
||||
cd $CTM_Dir/scripts
|
||||
echo "Stopping Control-M Agent"
|
||||
./shut-ag -u $CTM_OWNER -p ALL
|
||||
RETVAL=$?
|
||||
echo
|
||||
[ $RETVAL -eq 0 ] && rm -f /var/lock/subsys/ctm;
|
||||
;;
|
||||
'mode_user')
|
||||
cd $CTM_Dir/scripts
|
||||
./set_agent_mode -u $CTM_OWNER -o 1
|
||||
;;
|
||||
'mode_full')
|
||||
cd $CTM_Dir/scripts
|
||||
./set_agent_mode -u $CTM_OWNER -o 2
|
||||
;;
|
||||
*)
|
||||
echo "Usage: /<install-dir>/ctm.sh { start | stop }"
|
||||
echo "or, if using sudo...."
|
||||
echo "Usage: sudo -u root ./ctm.sh { start | stop | mode_user | mode_full }"
|
||||
;;
|
||||
esac
|
||||
exit 0
|
||||
|
39
site-modules/controlm/files/setup_patch.sh
Executable file
39
site-modules/controlm/files/setup_patch.sh
Executable file
@ -0,0 +1,39 @@
|
||||
#!/bin/sh
|
||||
|
||||
# Description:
|
||||
# This setup.sh find and run the install-bin that is compatible to the installing environment
|
||||
|
||||
# Find this script's directory
|
||||
utl_dir=`dirname $0`
|
||||
|
||||
# set the INSTALL_BINs directory
|
||||
bin_dir=$utl_dir
|
||||
|
||||
# get all the INSTALL_BINs
|
||||
install_bin_list=`ls $bin_dir | grep INSTALL.BIN`
|
||||
|
||||
#get shell to be used to run "BIN" files
|
||||
__machine=`uname`
|
||||
shellInterpriter="/bin/ksh"
|
||||
if [ $__machine = "Linux" ] ; then
|
||||
shellInterpriter="/bin/sh"
|
||||
fi
|
||||
|
||||
|
||||
# loop on the install_bin_list and find the first one that is compatible with the environment
|
||||
for install_bin in $install_bin_list
|
||||
do
|
||||
${shellInterpriter} $bin_dir/$install_bin -m
|
||||
if [ $? -eq 0 ];then
|
||||
# Current install_bin is compatible with the environment was found, run it to install the FP
|
||||
$bin_dir/$install_bin $@
|
||||
exit $?
|
||||
fi
|
||||
done
|
||||
|
||||
echo ERROR: There is no available installation file for this platform: `uname -a`
|
||||
echo Installation files were found for the following platforms:
|
||||
echo ${install_bin_list}| tr " " "\n" | cut -f 2 -d_ | cut -f 1 -d.
|
||||
|
||||
exit 1
|
||||
|
48
site-modules/controlm/files/sleep.sh
Normal file
48
site-modules/controlm/files/sleep.sh
Normal file
@ -0,0 +1,48 @@
|
||||
#!/bin/bash
|
||||
# Sleep Script for Control-M
|
||||
# Use to Test Control-M Scheduling
|
||||
# Creation Date: 2016-09-09
|
||||
# Created By: David Stephenson
|
||||
# Version: 1.0
|
||||
exec 2> /dev/null
|
||||
echo "********************************"
|
||||
echo "** CONTROL-M Environment **"
|
||||
echo "********************************"
|
||||
echo PATH := $PATH
|
||||
echo LD_LIBRARY_PATH:= $LD_LIBRARY_PATH
|
||||
echo CONTROLM := $CONTROLM
|
||||
echo ""
|
||||
echo "********************************"
|
||||
echo "** Arguments passed to script **"
|
||||
echo "********************************"
|
||||
echo Number of ARGS: = $#
|
||||
echo ARGS := $*
|
||||
echo ""
|
||||
echo "********************************"
|
||||
echo "** Script Run times **"
|
||||
echo "********************************"
|
||||
echo START := $(date)
|
||||
|
||||
# Default RC to 0
|
||||
RC=0
|
||||
|
||||
# Search ARGS for RC=xxx If found Return an Error Code
|
||||
while (( "$#" )); do
|
||||
arg=$(echo $1 | awk '{ print $1 }')
|
||||
if [ "$arg" -eq "$arg" ] 2>/dev/null; then
|
||||
echo SLEEP := $arg SECONDS
|
||||
sleep $1 > /dev/null
|
||||
fi
|
||||
echo $arg | grep -qi "rc="
|
||||
if [ "$?" -eq "0" ]; then
|
||||
RC=$(echo $arg | grep -i "rc=" | awk -F= '{ print $2 }')
|
||||
echo "RETURN CODE ARGUMENT: 'RC=$RC' FOUND. RETURN CODE '$RC' SENT TO CONTROL_M"
|
||||
fi
|
||||
shift
|
||||
done
|
||||
|
||||
echo END := $(date)
|
||||
echo ""
|
||||
|
||||
exit $RC
|
||||
|
0
site-modules/controlm/files/ztest
Normal file
0
site-modules/controlm/files/ztest
Normal file
BIN
site-modules/controlm/manifests/.DS_Store
vendored
Normal file
BIN
site-modules/controlm/manifests/.DS_Store
vendored
Normal file
Binary file not shown.
56
site-modules/controlm/manifests/controlm_agent.pp
Normal file
56
site-modules/controlm/manifests/controlm_agent.pp
Normal file
@ -0,0 +1,56 @@
|
||||
class controlm::controlm_agent {
|
||||
|
||||
#used for the automated install file and firewall.
|
||||
|
||||
#MUST HAVE THESE TWO IN HIERA, use fqdn for primary if host in diff domain.
|
||||
#controlm::controlm_agent::primary_server_host: ctmgnpappla012.optus.com.au
|
||||
#controlm::controlm_agent::server_host: ctmgnpappla012
|
||||
$server_host = hiera('controlm::controlm_agent::server_host','ctmgnpappla012')
|
||||
$primary_server_host = hiera('controlm::controlm_agent::primary_server_host','ctmgnpappla012.optus.com.au')
|
||||
|
||||
$tracker_port = hiera('controlm::controlm_agent::tracker_port','7035')
|
||||
$a2s_port = hiera('controlm::controlm_agent::agent2server_port','7005')
|
||||
$s2a_port = hiera('controlm::controlm_agent::server2agent_port','7006')
|
||||
$tcp_timeout = hiera('controlm::controlm_agent::tcp_timeout','60')
|
||||
$ignore_fail = hiera('controlm::controlm_agent::ignore_fail',false)
|
||||
$force_upgrade = hiera('controlm::controlm_agent::force_upgrade',false)
|
||||
|
||||
$software_version = hiera('controlm::controlm_agent::version','9.0.00-2')
|
||||
|
||||
$patch_files = hiera('controlm::controlm_agent::patch_files',['PAKAI.9.0.00.100_Linux-x86_64_INSTALL.BIN','PAKAI.9.0.00.200_Linux-x86_64_INSTALL.BIN'])
|
||||
# array of patch files so
|
||||
# controlm::controlm_agent::patch_files:
|
||||
# - file1
|
||||
# - file2
|
||||
# patch files are not installed separately from main install as timing that was
|
||||
# not working. So if we get new patches probably best to install by hand or see
|
||||
# if you can get a separate script happening.
|
||||
|
||||
# also in hiera you need these, subbing PRD for GNP where needed
|
||||
# isnd_linux::profiles::soe::login_accounts::groups:
|
||||
# - 'ocaus01\ACL-GNP-CTRLM-rwx-SMT-ADMIN':
|
||||
# additional_groups:
|
||||
# - controlm
|
||||
# - 'ocaus01\ACL-GNP-CTRLM-rx-SMT-SCHED':
|
||||
# additional_groups:
|
||||
# - controlm
|
||||
#
|
||||
# tpiam::profiles::sudoers:
|
||||
# ocaus01aclgnpctrlmrwxsmtadmin:
|
||||
# runas_users:
|
||||
# - ctmagent
|
||||
# commands: all_commands
|
||||
# ocaus01aclgnpctrlmrxsmtsched:
|
||||
# runas_users:
|
||||
# - ctmagent
|
||||
# commands: all_commands include controlm::controlm_agent::users
|
||||
|
||||
include controlm::controlm_agent::users
|
||||
include controlm::controlm_agent::packages
|
||||
include controlm::controlm_agent::files
|
||||
include controlm::controlm_agent::firewall
|
||||
include controlm::controlm_agent::install
|
||||
|
||||
}
|
||||
|
||||
|
153
site-modules/controlm/manifests/controlm_agent/files.pp
Normal file
153
site-modules/controlm/manifests/controlm_agent/files.pp
Normal file
@ -0,0 +1,153 @@
|
||||
class controlm::controlm_agent::files inherits controlm::controlm_agent {
|
||||
|
||||
# Directories
|
||||
unless defined(File['/apps']) {
|
||||
file { [ '/apps', ]:
|
||||
ensure => 'directory',
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0755',
|
||||
}
|
||||
}
|
||||
|
||||
file { [ '/apps/bmc',]:
|
||||
ensure => 'directory',
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0755',
|
||||
require => File['/apps'],
|
||||
}
|
||||
file { [ '/apps/bmc/software','/apps/bmc/software/version_9/','/apps/bmc/software/version_9/fixes' ]:
|
||||
ensure => 'directory',
|
||||
owner => 'ctmagent',
|
||||
group => 'controlm',
|
||||
mode => '0755',
|
||||
require => File['/apps/bmc'],
|
||||
}
|
||||
|
||||
# scripts_optus
|
||||
|
||||
file { ['/apps/bmc/ctm/scripts_optus']:
|
||||
ensure => directory,
|
||||
owner => 'ctmagent',
|
||||
group => 'controlm',
|
||||
mode => '0775',
|
||||
require => User['ctmagent'],
|
||||
}
|
||||
|
||||
file { '/apps/bmc/ctm/scripts_optus/sleep.sh':
|
||||
ensure => file,
|
||||
owner => 'ctmagent',
|
||||
group => 'controlm',
|
||||
mode => '0755',
|
||||
source => 'puppet:///modules/controlm/sleep.sh',
|
||||
require => [File['/apps/bmc/ctm/scripts_optus'],User['ctmagent'],],
|
||||
}
|
||||
|
||||
file { '/apps/bmc/ctm/scripts_optus/ctm.sh':
|
||||
ensure => file,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0755',
|
||||
source => 'puppet:///modules/controlm/ctm.sh',
|
||||
require => File['/apps/bmc/ctm/scripts_optus'],
|
||||
}
|
||||
|
||||
case $::os['release']['major']{
|
||||
'6': {
|
||||
file { '/etc/rc.d/init.d/ctm.sh':
|
||||
ensure => link,
|
||||
target => '/apps/bmc/ctm/scripts_optus/ctm.sh',
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
require => File['/apps/bmc/ctm/scripts_optus/ctm.sh'],
|
||||
}
|
||||
}
|
||||
'7': {
|
||||
|
||||
file { '/etc/rc.d/init.d/ctm.sh':
|
||||
ensure => absent,
|
||||
}
|
||||
|
||||
file { '/etc/rc.d/init.d/ctm':
|
||||
ensure => file,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0755',
|
||||
source => 'puppet:///modules/controlm/ctm.sh',
|
||||
notify => Exec['systemctl reload daemon for Control-M agent']
|
||||
}
|
||||
|
||||
exec{'systemctl reload daemon for Control-M agent':
|
||||
path => $::path,
|
||||
command => 'systemctl daemon-reload',
|
||||
refreshonly => true,
|
||||
}
|
||||
|
||||
}
|
||||
default: {fail "Unsupported Major version ${::os['release']['major']} detected"}
|
||||
}
|
||||
|
||||
#ctm/scripts
|
||||
|
||||
# file { '/apps/bmc/ctm/scripts':
|
||||
# ensure => link,
|
||||
# target => '/apps/bmc/software/version_9/ctm/scripts',
|
||||
# owner => 'root',
|
||||
# group => 'root',
|
||||
# require => Package['ctmagent_core_clean'],
|
||||
# }
|
||||
|
||||
# install scripts
|
||||
|
||||
file { '/apps/bmc/ctm/ctm_silentinstall_optus.xml':
|
||||
ensure => file,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0755',
|
||||
content => template('controlm/agent_install.erb'),
|
||||
require => User['ctmagent'],
|
||||
}
|
||||
|
||||
file { '/apps/bmc/ctm/controlm_agent_install.sh':
|
||||
ensure => file,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0755',
|
||||
content => template('controlm/controlm_agent_install.erb'),
|
||||
require => User['ctmagent'],
|
||||
}
|
||||
|
||||
|
||||
# need to check status method and also if we need restart check.
|
||||
# this should be in the install Iguess
|
||||
# service { 'ctm.sh':
|
||||
# ensure => running,
|
||||
# enable => true,
|
||||
# hasstatus => false,
|
||||
# status => '',
|
||||
# start => '',
|
||||
# stop => '',
|
||||
# subscribe => [
|
||||
# ],
|
||||
# require => '/etc/rc.d/init.d/ctm.sh',
|
||||
# }
|
||||
|
||||
# profile scripts
|
||||
file { '/etc/profile.d/controlm.csh':
|
||||
ensure => file,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0755',
|
||||
source => 'puppet:///modules/controlm/controlm.csh',
|
||||
}
|
||||
|
||||
file { '/etc/profile.d/controlm.sh':
|
||||
ensure => file,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0755',
|
||||
source => 'puppet:///modules/controlm/controlm.sh',
|
||||
}
|
||||
|
||||
}
|
16
site-modules/controlm/manifests/controlm_agent/firewall.pp
Normal file
16
site-modules/controlm/manifests/controlm_agent/firewall.pp
Normal file
@ -0,0 +1,16 @@
|
||||
class controlm::controlm_agent::firewall inherits controlm::controlm_agent {
|
||||
|
||||
|
||||
firewall { '200 controlm tracker port hiera controlm_tracker_port':
|
||||
action => 'accept',
|
||||
proto => 'tcp',
|
||||
dport => [$tracker_port],
|
||||
}
|
||||
|
||||
firewall { '210 controlm server to agent hiera controlm_server2agent_port':
|
||||
action => 'accept',
|
||||
proto => 'tcp',
|
||||
dport => [$s2a_port],
|
||||
}
|
||||
|
||||
}
|
57
site-modules/controlm/manifests/controlm_agent/install.pp
Normal file
57
site-modules/controlm/manifests/controlm_agent/install.pp
Normal file
@ -0,0 +1,57 @@
|
||||
class controlm::controlm_agent::install inherits controlm::controlm_agent {
|
||||
|
||||
|
||||
# set up /etc/services
|
||||
|
||||
augeas { 'controlm':
|
||||
context => '/files/etc/services',
|
||||
changes => [
|
||||
"set service-name[port = '${s2a_port}'][protocol = 'udp'] ctmagent",
|
||||
"set service-name[port = '${s2a_port}'][protocol = 'udp']/#comment 'Control-M server2agent'",
|
||||
"set service-name[port = '${s2a_port}'][protocol = 'tcp'] ctmagent",
|
||||
"set service-name[port = '${s2a_port}'][protocol = 'tcp']/#comment 'Control-M server2agent'",
|
||||
"set service-name[port = '${a2s_port}'][protocol = 'udp'] ctmagent",
|
||||
"set service-name[port = '${a2s_port}'][protocol = 'udp']/#comment 'Control-M agent2server'",
|
||||
"set service-name[port = '${a2s_port}'][protocol = 'tcp'] ctmagent",
|
||||
"set service-name[port = '${a2s_port}'][protocol = 'tcp']/#comment 'Control-M agent2server'",
|
||||
],
|
||||
}
|
||||
|
||||
# use shellscript and sudo as running the install direct as user ctmagent gives HOME errors plus we get errors in the log file
|
||||
# also does patches as can't get the patch script running after it for some reason
|
||||
# patch names need to be in hiera see controlm_agent.pp
|
||||
exec { 'controlm_agent_install':
|
||||
command => '/apps/bmc/ctm/controlm_agent_install.sh > /apps/bmc/ctm/controlm_agent_install.log',
|
||||
creates => '/apps/bmc/ctm/controlm_agent_install.hasrun',
|
||||
require => [User['ctmagent'],Package['ctmagent_core_clean'],File['/apps/bmc/ctm/ctm_silentinstall_optus.xml','/apps/bmc/ctm/controlm_agent_install.sh'],Exec['chown_/apps/bmc'],],
|
||||
timeout => 1800,
|
||||
}
|
||||
|
||||
case $::os['release']['major']{
|
||||
'6': {
|
||||
service { 'ctm.sh':
|
||||
ensure => running,
|
||||
enable => true,
|
||||
hasstatus => false,
|
||||
status => '/bin/ps -ef | /bin/grep /apps/bmc/ctm/exe/p_ctm | /bin/grep -v grep',
|
||||
require => [File['/etc/rc.d/init.d/ctm.sh'],Exec['controlm_agent_install'],]
|
||||
}
|
||||
}
|
||||
'7': {
|
||||
|
||||
service { 'ctm.sh':
|
||||
enable => false,
|
||||
}
|
||||
|
||||
service { 'ctm':
|
||||
ensure => running,
|
||||
enable => true,
|
||||
hasstatus => false,
|
||||
status => '/bin/ps -ef | /bin/grep /apps/bmc/ctm/exe/p_ctm | /bin/grep -v grep',
|
||||
require => [File['/etc/rc.d/init.d/ctm'],Exec['controlm_agent_install']]
|
||||
}
|
||||
|
||||
}
|
||||
default: {fail "Unsupported Major version ${::os['release']['major']} detected"}
|
||||
}
|
||||
}
|
16
site-modules/controlm/manifests/controlm_agent/packages.pp
Normal file
16
site-modules/controlm/manifests/controlm_agent/packages.pp
Normal file
@ -0,0 +1,16 @@
|
||||
class controlm::controlm_agent::packages inherits controlm::controlm_agent {
|
||||
|
||||
package { 'ctmagent_core_clean' :
|
||||
ensure => "$software_version",
|
||||
require => User['ctmagent'],
|
||||
}
|
||||
|
||||
# the RPM does permissions, this is a backup
|
||||
exec {'software permissions' :
|
||||
command => '/bin/chown -R ctmagent:controlm /apps/bmc/software/version_9',
|
||||
onlyif => '/usr/bin/test $(/bin/find /apps/bmc/software/version_9/CheckReq -uid 0 | w
|
||||
c -l) -gt 0',
|
||||
require => Package['ctmagent_core_clean'],
|
||||
}
|
||||
|
||||
}
|
38
site-modules/controlm/manifests/controlm_agent/users.pp
Normal file
38
site-modules/controlm/manifests/controlm_agent/users.pp
Normal file
@ -0,0 +1,38 @@
|
||||
class controlm::controlm_agent::users {
|
||||
|
||||
unless defined(Group['controlm']) {
|
||||
group { 'controlm':
|
||||
ensure => present,
|
||||
}
|
||||
}
|
||||
|
||||
user { 'ctmagent':
|
||||
gid => [ 'controlm'],
|
||||
home => '/apps/bmc/ctm',
|
||||
comment => 'ControlM Agent',
|
||||
shell => '/bin/bash',
|
||||
password => '*',
|
||||
managehome => true,
|
||||
require => [Group['controlm'],File['/apps/bmc'],],
|
||||
}
|
||||
# set ownerships for /apps/bmc/ctm as needs sticky on group and install needs ctmagent to own /apps/bmc
|
||||
exec { 'set permissions on /apps/bmc/ctm':
|
||||
command => '/bin/chmod 2775 /apps/bmc/ctm',
|
||||
onlyif => '/usr/bin/test $(/bin/find /apps/bmc/ctm -perm 2775 | wc -l) -eq 0',
|
||||
require => User['ctmagent'],
|
||||
}
|
||||
|
||||
exec { 'chown_/apps/bmc':
|
||||
command => '/bin/chown ctmagent.controlm /apps/bmc',
|
||||
unless => '/usr/bin/test -e /apps/bmc/ctm/controlm_agent_install.hasrun',
|
||||
require => User['ctmagent'],
|
||||
}
|
||||
|
||||
#sudo::rule { 'controlm':
|
||||
# type => 'group',
|
||||
# runas_users => 'root',
|
||||
# commands => [
|
||||
# '/apps/bmc/ctm/scripts_optus/ctm.sh',
|
||||
# ],
|
||||
#}
|
||||
}
|
10
site-modules/controlm/manifests/controlm_agent/z1
Normal file
10
site-modules/controlm/manifests/controlm_agent/z1
Normal file
@ -0,0 +1,10 @@
|
||||
|
||||
file { '/apps/bmc/ctm/ctm_silentinstall_optus.xml':
|
||||
ensure => file,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0755',
|
||||
content => template('controlm/agent_install.erb'),
|
||||
require => User['ctmagent'],
|
||||
}
|
||||
|
13
site-modules/controlm/templates/agent_install.erb
Normal file
13
site-modules/controlm/templates/agent_install.erb
Normal file
@ -0,0 +1,13 @@
|
||||
<AutomatedInstallation langpack="eng">
|
||||
<target.product>Control-M/Agent 9.0.00</target.product>
|
||||
<agent.parameters>
|
||||
<entry key="field.Authorized.Controlm.Server.Host" value="<%= @server_host %>"/>
|
||||
<entry key="ctm_agent.Tracker.Event.Port" value="<%= @tracker_port %>"/>
|
||||
<entry key="field.Agent.To.Server.Port.Number" value="<%= @a2s_port %>"/>
|
||||
<entry key="ctm_agent.Tcp_ip.Timeout" value="<%= @tcp_timeout %>"/>
|
||||
<entry key="field.Server.To.Agent.Port.Number" value="<%= @s2a_port %>"/>
|
||||
<entry key="Ignore.Disabling.Agent.Failure" value="<%= @ignore_fail %>"/>
|
||||
<entry key="ctm_agent.Force.Upgrade" value="<%= @force_upgrade %>"/>
|
||||
<entry key="field.Primary.Controlm.Server.Host" value="<%= @primary_server_host %>"/>
|
||||
</agent.parameters>
|
||||
</AutomatedInstallation>
|
71
site-modules/controlm/templates/controlm_agent_install.erb
Normal file
71
site-modules/controlm/templates/controlm_agent_install.erb
Normal file
@ -0,0 +1,71 @@
|
||||
#!/bin/bash
|
||||
#
|
||||
#Does install and patches if any
|
||||
|
||||
cd /apps/bmc/
|
||||
sudo -u ctmagent /apps/bmc/software/version_9/setup.sh -silent /apps/bmc/ctm/ctm_silentinstall_optus.xml
|
||||
RESULT=$?
|
||||
echo "exit status $RESULT"
|
||||
if [ $RESULT -ne 0 ] ; then exit $RESULT; fi
|
||||
/bin/date > /apps/bmc/ctm/controlm_agent_install.hasrun
|
||||
echo "exit status $RESULT" >> /apps/bmc/ctm/controlm_agent_install.hasrun
|
||||
echo "do not remove this file unless you want to rerun the install" >> /apps/bmc/ctm/controlm_agent_install.hasrun
|
||||
chmod 444 /apps/bmc/ctm/controlm_agent_install.hasrun
|
||||
|
||||
|
||||
<% if @patch_files -%>
|
||||
/bin/date > /apps/bmc/ctm/controlm_agent_patch_install.hasrun
|
||||
# remove any old patches
|
||||
rm -rf /apps/bmc/software/version_9/fixes/*INSTALL.BIN
|
||||
|
||||
. /etc/profile.d/controlm.sh
|
||||
|
||||
<% @patch_files.each do | file | -%>
|
||||
|
||||
echo "===================="
|
||||
PATCH_RESULT=1
|
||||
cd /apps/bmc/software/version_9/fixes
|
||||
wget http://<%= scope.lookupvar('::razor_metadata_repo_server') -%>/files/bcc_source/controlm/<%= file %>
|
||||
chmod 755 /apps/bmc/software/version_9/fixes/<%= file %>
|
||||
sudo -u ctmagent /bin/bash - <<EOF
|
||||
cd /apps/bmc/software/version_9/fixes
|
||||
. /etc/profile.d/controlm.sh
|
||||
/usr/bin/yes y | /apps/bmc/software/version_9/fixes/<%= file %>
|
||||
EOF
|
||||
PATCH_RESULT=$?
|
||||
if [ $PATCH_RESULT -ne 0 ]
|
||||
then
|
||||
echo "patch <%= file -%> bad $PATCH_RESULT" >> controlm_agent_patch_install.hasrun
|
||||
mv /apps/bmc/ctm/controlm_agent_patch_install.hasrun /apps/bmc/ctm/controlm_agent_patch_install.bad
|
||||
exit $RESULT
|
||||
fi
|
||||
|
||||
echo "patch exit status <%= file -%> $PATCH_RESULT"
|
||||
# sleep to see if patches properly install
|
||||
echo "sleeping for 10 "
|
||||
sleep 10
|
||||
<% end -%>
|
||||
<% end -%>
|
||||
|
||||
# set correct hostnames
|
||||
SHORT=`/bin/hostname -s`
|
||||
LONG=`/bin/hostname -f`
|
||||
|
||||
echo "Changing short hostnames in CONFIG.dat"
|
||||
cp -f /apps/bmc/ctm/data/CONFIG.dat /apps/bmc/ctm/data/CONFIG.dat.bak
|
||||
/bin/sed -i "s/$SHORT$/$LONG/" /apps/bmc/ctm/data/CONFIG.dat
|
||||
grep $SHORT /apps/bmc/ctm/data/CONFIG.dat
|
||||
|
||||
|
||||
#change mode
|
||||
/usr/bin/yes y | /apps/bmc/ctm/scripts/set_agent_mode -u ctmagent -o 1
|
||||
|
||||
# stop agent
|
||||
sudo -u ctmagent /bin/bash - <<EOF
|
||||
. /etc/profile.d/controlm.sh
|
||||
cd /apps/bmc/ctm
|
||||
/apps/bmc/ctm/scripts/shut-ag
|
||||
EOF
|
||||
|
||||
/usr/bin/yes y | /apps/bmc/ctm/scripts/set_agent_mode -u ctmagent -o 2
|
||||
|
71
site-modules/controlm/templates/rc.agent_user.erb
Executable file
71
site-modules/controlm/templates/rc.agent_user.erb
Executable file
@ -0,0 +1,71 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# chkconfig: 2345 97 02
|
||||
# description: controlm agent
|
||||
|
||||
# set minimal PATH to make sure basic commands like grep and awk are recognized
|
||||
PATH=/usr/sbin/:/usr/bin:/sbin:$PATH
|
||||
export PATH
|
||||
|
||||
account_name="controlm"
|
||||
install_path="<%= @install_dir %>"
|
||||
|
||||
# set config file name
|
||||
config_file=$install_path/ctm/data/CONFIG.dat
|
||||
|
||||
# Get the agent status
|
||||
AGENT_STATUS_FILE=$install_path/ctm/data/ctm_agent_status.dat
|
||||
agent_status=`cat $AGENT_STATUS_FILE`
|
||||
|
||||
|
||||
#Get input parameter start|stop|<empty> for backward compatibility
|
||||
ARG1=`echo $1 | tr '[A-Z]' '[a-z]'`
|
||||
if [ "$ARG1" = "start" ] || [ "$ARG1" = "stop" ] ; then
|
||||
if [ "$ARG1" = "start" ] ; then
|
||||
STATE_ACTION="start"
|
||||
elif [ "$ARG1" = "stop" ] ; then
|
||||
STATE_ACTION="stop"
|
||||
fi
|
||||
else
|
||||
STATE_ACTION="start"
|
||||
fi
|
||||
|
||||
|
||||
if [ "$agent_status" = "STOPPED" ] ; then # AGENT_STATUS is set to 'STOPPED', exit without starting the Agent
|
||||
echo "Control-M/Agent (account $account_name) status is set to 'STOPPED'. Control-M/Agent will not start."
|
||||
exit 0
|
||||
fi
|
||||
|
||||
# get the value for config parameter AGENT_OWNER to determine which owner should start the agent
|
||||
# in case the parameter is missing or empty, start as root.
|
||||
# This script is executed as root user by the OS during machine startup.
|
||||
# If the agent should run as agent owner, use 'su' to run start-ag
|
||||
agent_owner=`grep AGENT_OWNER $config_file | awk '{print $2}'`
|
||||
|
||||
if [ "$STATE_ACTION" = "start" ] ; then
|
||||
|
||||
if [ "$agent_owner" != "root" ] ; then
|
||||
/bin/su - $agent_owner -c "$install_path/ctm/scripts/start-ag -u $account_name -p ALL"
|
||||
else
|
||||
$install_path/ctm/scripts/start-ag -u $account_name -p ALL
|
||||
fi
|
||||
|
||||
else
|
||||
|
||||
# backup ctm_agent_status.dat to keep origional status
|
||||
TMP_FILE_NAME="ctm_agent_status_dat-`date +'%Y-%m-%d_%H-%M-%S'`.tar"
|
||||
cd $install_path/ctm/data ; tar -cf $TMP_FILE_NAME ctm_agent_status.dat
|
||||
|
||||
if [ "$agent_owner" != "root" ] ; then
|
||||
/bin/su - $agent_owner -c "$install_path/ctm/scripts/shut-ag -u $account_name -p ALL"
|
||||
else
|
||||
$install_path/ctm/scripts/shut-ag -u $account_name -p ALL
|
||||
fi
|
||||
|
||||
# restore ctm_agent_status.dat to origional
|
||||
cd $install_path/ctm/data ; tar -xf $TMP_FILE_NAME ; rm -f $TMP_FILE_NAME
|
||||
|
||||
fi
|
||||
exit 0
|
||||
|
||||
|
0
site-modules/controlm/templates/ztest
Normal file
0
site-modules/controlm/templates/ztest
Normal file
36
site-modules/ggtest/manifests/selva.pp
Normal file
36
site-modules/ggtest/manifests/selva.pp
Normal file
@ -0,0 +1,36 @@
|
||||
# == Class: profile::firewall
|
||||
#
|
||||
# Class to configure the firewall on various platforms
|
||||
#
|
||||
class ggtest::selva (
|
||||
# Class parameters are populated from External(hiera)/Defaults/Fail
|
||||
Boolean $enable = false,
|
||||
String $module = 'firewall',
|
||||
){
|
||||
if $facts['os']['family'] == 'RedHat' {
|
||||
# firewalld - do not use this for new config
|
||||
if $module == 'firewalld' {
|
||||
if $enable {
|
||||
class { 'firewalld': }
|
||||
}
|
||||
else {
|
||||
class { 'firewalld':
|
||||
service_ensure => 'stopped',
|
||||
service_enable => false,
|
||||
}
|
||||
}
|
||||
}
|
||||
else {
|
||||
# Use this for new config
|
||||
if $enable {
|
||||
class { 'profile::firewall::start': }
|
||||
-> class { 'profile::firewall::app_rules': }
|
||||
-> class { 'profile::firewall::finish': }
|
||||
}
|
||||
else {
|
||||
class { 'profile::firewall::stop': }
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
}
|
BIN
site-modules/profile/.DS_Store
vendored
Normal file
BIN
site-modules/profile/.DS_Store
vendored
Normal file
Binary file not shown.
BIN
site-modules/profile/manifests/.DS_Store
vendored
Normal file
BIN
site-modules/profile/manifests/.DS_Store
vendored
Normal file
Binary file not shown.
@ -1,5 +1,5 @@
|
||||
class profile::base {
|
||||
|
||||
#the base profile should include component modules that will be on all nodes
|
||||
|
||||
# require profile::goldload::config
|
||||
contain profile::winlogbeat
|
||||
notify {'This is from profile::base': }
|
||||
}
|
||||
|
@ -1,3 +0,0 @@
|
||||
class profile::example {
|
||||
|
||||
}
|
36
site-modules/profile/manifests/firewall.pp
Normal file
36
site-modules/profile/manifests/firewall.pp
Normal file
@ -0,0 +1,36 @@
|
||||
# == Class: profile::firewall
|
||||
#
|
||||
# Class to configure the firewall on various platforms
|
||||
#
|
||||
class profile::firewall (
|
||||
# Class parameters are populated from External(hiera)/Defaults/Fail
|
||||
Boolean $enable = false,
|
||||
String $module = 'firewall',
|
||||
){
|
||||
if $facts['os']['family'] == 'RedHat' {
|
||||
# firewalld - do not use this for new config
|
||||
if $module == 'firewalld' {
|
||||
if $enable {
|
||||
class { 'firewalld': }
|
||||
}
|
||||
else {
|
||||
class { 'firewalld':
|
||||
service_ensure => 'stopped',
|
||||
service_enable => false,
|
||||
}
|
||||
}
|
||||
}
|
||||
else {
|
||||
# Use this for new config
|
||||
if $enable {
|
||||
class { 'profile::firewall::start': }
|
||||
-> class { 'profile::firewall::app_rules': }
|
||||
-> class { 'profile::firewall::finish': }
|
||||
}
|
||||
else {
|
||||
class { 'profile::firewall::stop': }
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
}
|
37
site-modules/profile/manifests/firewall/app_rules.pp
Normal file
37
site-modules/profile/manifests/firewall/app_rules.pp
Normal file
@ -0,0 +1,37 @@
|
||||
# profile::firewall::app_rules
|
||||
class profile::firewall::app_rules {
|
||||
|
||||
# Custom Application Firewall rules found in Hiera
|
||||
|
||||
['inbound','outbound'].each | $direction | {
|
||||
$firewalls= lookup("profile::firewall::${direction}", Data, 'deep', {})
|
||||
$firewalls.each | $name, $rule | {
|
||||
$label = upcase( $direction )
|
||||
$chain = $direction ? {
|
||||
'inbound' => 'INPUT',
|
||||
'outbound' => 'OUTPUT',
|
||||
default => '',
|
||||
}
|
||||
if has_key( $rule, 'jump') {
|
||||
$default = {}
|
||||
} else {
|
||||
$default = { action => 'accept' }
|
||||
}
|
||||
if $rule['destination'] {
|
||||
if is_array( $rule['destination'] ){
|
||||
$destinations = $rule['destination']
|
||||
} else {
|
||||
$destinations = [ $rule['destination'] ]
|
||||
}
|
||||
$destinations.each | $dest | {
|
||||
$mod_rule = $rule + { 'destination' => $dest }
|
||||
create_resources( firewall, { "${name} ${label} ${dest}" => $mod_rule }, $default + { proto => 'tcp', chain => $chain } )
|
||||
}
|
||||
}
|
||||
else {
|
||||
create_resources( firewall, { "${name} ${label}" => $rule }, $default + { proto => 'tcp', chain => $chain } )
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
}
|
41
site-modules/profile/manifests/firewall/finish.pp
Normal file
41
site-modules/profile/manifests/firewall/finish.pp
Normal file
@ -0,0 +1,41 @@
|
||||
# == Class: profile::firewall::finish
|
||||
#
|
||||
# Post actions for firewall management.
|
||||
#
|
||||
class profile::firewall::finish {
|
||||
|
||||
|
||||
['INPUT','OUTPUT'].each | $chain | {
|
||||
|
||||
#Drop the known noise from hitting the log
|
||||
['255.255.255.255',ip_address(ip_broadcast("${::network}/${::netmask}"))].each | $dest | {
|
||||
firewall { "990 Broadcasts for $dest for ${chain}":
|
||||
destination => $dest,
|
||||
proto => 'all',
|
||||
action => 'drop',
|
||||
chain => $chain,
|
||||
}
|
||||
}
|
||||
|
||||
# Log whatever hasn't been dealt with already
|
||||
firewall { "998 Logging for ${chain}":
|
||||
jump => 'LOG',
|
||||
proto => 'all',
|
||||
chain => $chain,
|
||||
}
|
||||
|
||||
# Drop everything else
|
||||
firewall { "999 drop all for ${chain}":
|
||||
proto => 'all',
|
||||
action => 'drop',
|
||||
chain => $chain,
|
||||
}
|
||||
firewall { "999 drop all for ${chain} for IPv6":
|
||||
proto => 'all',
|
||||
action => 'drop',
|
||||
chain => $chain,
|
||||
provider => 'ip6tables',
|
||||
}
|
||||
}
|
||||
|
||||
}
|
60
site-modules/profile/manifests/firewall/start.pp
Normal file
60
site-modules/profile/manifests/firewall/start.pp
Normal file
@ -0,0 +1,60 @@
|
||||
# == Class: profile::firewall::start
|
||||
#
|
||||
# Pre actions for firewall management.
|
||||
#
|
||||
class profile::firewall::start {
|
||||
|
||||
class { 'firewall': }
|
||||
|
||||
# Purge any unmanaged firewall rules
|
||||
resources { 'firewall':
|
||||
purge => true,
|
||||
}
|
||||
#resources { 'firewallchain':
|
||||
#purge => true,
|
||||
#}
|
||||
|
||||
#Set up the chains (if specified)
|
||||
$chains = lookup('profile::firewall::chains', Data , 'deep', {})
|
||||
create_resources( firewallchain, $chains, { policy => 'drop', before => undef, ensure => 'present' } )
|
||||
|
||||
|
||||
# Default pre rules
|
||||
['INPUT','OUTPUT'].each | $chain | {
|
||||
firewall { "000 accept all icmp ${chain}":
|
||||
proto => 'icmp',
|
||||
action => 'accept',
|
||||
chain => $chain,
|
||||
}
|
||||
if( $chain == 'INPUT' ){
|
||||
firewall { "001 accept all to lo interface ${chain}":
|
||||
proto => 'all',
|
||||
iniface => 'lo',
|
||||
action => 'accept',
|
||||
chain => $chain,
|
||||
}
|
||||
firewall { "002 reject local traffic not on loopback interface ${chain}":
|
||||
iniface => '! lo',
|
||||
proto => 'all',
|
||||
destination => '127.0.0.1/8',
|
||||
action => 'reject',
|
||||
chain => $chain,
|
||||
}
|
||||
}
|
||||
if( $chain == 'OUTPUT' ){
|
||||
firewall { "001 accept all localhost sourced ${chain}":
|
||||
proto => 'all',
|
||||
source => '127.0.0.1/8',
|
||||
action => 'accept',
|
||||
chain => $chain,
|
||||
}
|
||||
}
|
||||
firewall { "003 accept related established rules ${chain}":
|
||||
proto => 'all',
|
||||
state => ['RELATED', 'ESTABLISHED'],
|
||||
action => 'accept',
|
||||
chain => $chain,
|
||||
}
|
||||
}
|
||||
|
||||
}
|
12
site-modules/profile/manifests/firewall/stop.pp
Normal file
12
site-modules/profile/manifests/firewall/stop.pp
Normal file
@ -0,0 +1,12 @@
|
||||
# == Class: profile::firewall::stop
|
||||
#
|
||||
# Turn off all firewall management.
|
||||
#
|
||||
class profile::firewall::stop {
|
||||
|
||||
class { 'firewall':
|
||||
ensure => 'stopped',
|
||||
enable => false,
|
||||
}
|
||||
|
||||
}
|
6
site-modules/profile/manifests/goldload/chocolatey.pp
Normal file
6
site-modules/profile/manifests/goldload/chocolatey.pp
Normal file
@ -0,0 +1,6 @@
|
||||
class profile::goldload::chocolatey {
|
||||
|
||||
notify {'This is from profile::goldload::chocolatey': }
|
||||
|
||||
|
||||
}
|
8
site-modules/profile/manifests/goldload/config.pp
Normal file
8
site-modules/profile/manifests/goldload/config.pp
Normal file
@ -0,0 +1,8 @@
|
||||
class profile::goldload::config {
|
||||
|
||||
|
||||
notify {'This is from profile::goldload::config': }
|
||||
|
||||
contain profile::goldload::software
|
||||
|
||||
}
|
8
site-modules/profile/manifests/goldload/software.pp
Normal file
8
site-modules/profile/manifests/goldload/software.pp
Normal file
@ -0,0 +1,8 @@
|
||||
class profile::goldload::software {
|
||||
|
||||
|
||||
notify {'This is from profile::goldload::software': }
|
||||
|
||||
contain profile::goldload::chocolatey
|
||||
|
||||
}
|
9
site-modules/profile/manifests/tomlrb.pp
Normal file
9
site-modules/profile/manifests/tomlrb.pp
Normal file
@ -0,0 +1,9 @@
|
||||
class profile::tomlrb {
|
||||
package {'toml-rb':
|
||||
ensure => present,
|
||||
provider => 'puppetserver_gem',
|
||||
notify => Service['pe-puppetserver']
|
||||
}
|
||||
|
||||
|
||||
}
|
3
site-modules/profile/manifests/winlogbeat.pp
Normal file
3
site-modules/profile/manifests/winlogbeat.pp
Normal file
@ -0,0 +1,3 @@
|
||||
class profile::winlogbeat {
|
||||
notify {'This is from profile::winlogbeat': }
|
||||
}
|
5
site-modules/role/manifests/callaugeas.pp
Normal file
5
site-modules/role/manifests/callaugeas.pp
Normal file
@ -0,0 +1,5 @@
|
||||
class role::callaugeas {
|
||||
|
||||
include controlm::controlm_agent
|
||||
|
||||
}
|
@ -1,3 +1,10 @@
|
||||
class role::example {
|
||||
|
||||
package { 'hiera-eyaml-server':
|
||||
ensure => installed,
|
||||
name => 'hiera-eyaml',
|
||||
provider => 'puppetserver_gem',
|
||||
# require => File['gemrc'],
|
||||
}
|
||||
|
||||
}
|
||||
|
7
site-modules/role/manifests/goldload_server.pp
Normal file
7
site-modules/role/manifests/goldload_server.pp
Normal file
@ -0,0 +1,7 @@
|
||||
class role::goldload_server{
|
||||
include profile::base
|
||||
# include profile::base::ciphers
|
||||
include profile::goldload::config
|
||||
Class['profile::goldload::config'] -> Class['profile::base']
|
||||
|
||||
}
|
98
site-modules/role/manifests/loadbalancer.pp
Normal file
98
site-modules/role/manifests/loadbalancer.pp
Normal file
@ -0,0 +1,98 @@
|
||||
class role::loadbalancer (
|
||||
Optional[String] $ports1 = '80',
|
||||
Optional[String] $ports2 = undef,
|
||||
Optional[String] $rule1 = 'puppet00',
|
||||
Optional[String] $rule2 = undef,
|
||||
Optional[String] $backendserver_name1 = '',
|
||||
Optional[String] $backendserver_name2 = '',
|
||||
Optional[String] $backendserver_ipaddress1 = undef,
|
||||
Optional[String] $backendserver_ipaddress2 = undef,
|
||||
Optional[String] $connetc_timeout = '60s',
|
||||
) {
|
||||
|
||||
class { 'haproxy':
|
||||
merge_options => true,
|
||||
global_options => {
|
||||
'log' => "${::ipaddress} local0",
|
||||
'chroot' => '/var/lib/haproxy',
|
||||
'pidfile' => '/var/run/haproxy.pid',
|
||||
'maxconn' => '4000',
|
||||
'user' => 'haproxy',
|
||||
'group' => 'haproxy',
|
||||
'daemon' => '',
|
||||
'stats' => 'socket /var/lib/haproxy/stats',
|
||||
},
|
||||
defaults_options => {
|
||||
'log' => 'global',
|
||||
'stats' => 'enable',
|
||||
'option' => [
|
||||
'redispatch',
|
||||
],
|
||||
'retries' => '3',
|
||||
'timeout' => [
|
||||
'http-request 10s',
|
||||
'queue 1m',
|
||||
'connect 300s',
|
||||
'client 600s',
|
||||
'server 600s',
|
||||
'check 1m',
|
||||
],
|
||||
'maxconn' => '8000',
|
||||
},
|
||||
}
|
||||
|
||||
include ::haproxy
|
||||
|
||||
haproxy::listen { $rule1 :
|
||||
collect_exported => false,
|
||||
ipaddress => $::ipaddress,
|
||||
ports => $ports1,
|
||||
}
|
||||
|
||||
haproxy::listen { $rule2 :
|
||||
collect_exported => false,
|
||||
ipaddress => $::ipaddress,
|
||||
ports => $ports2,
|
||||
|
||||
}
|
||||
|
||||
|
||||
haproxy::balancermember { 'member1' :
|
||||
listening_service => $rule1,
|
||||
server_names => $backendserver_name1,
|
||||
ipaddresses => $backendserver_ipaddress1,
|
||||
ports => $ports1,
|
||||
options => 'check',
|
||||
|
||||
}
|
||||
|
||||
haproxy::balancermember { 'member2' :
|
||||
listening_service => $rule1,
|
||||
server_names => $backendserver_name2,
|
||||
ipaddresses => $backendserver_ipaddress2,
|
||||
ports => $ports1,
|
||||
options => 'check',
|
||||
}
|
||||
|
||||
#pending Improvement, possible areas: Array Input with multipal ports
|
||||
|
||||
haproxy::balancermember { 'member3' :
|
||||
listening_service => $rule2,
|
||||
server_names => $backendserver_name1,
|
||||
ipaddresses => $backendserver_ipaddress1,
|
||||
ports => $ports2,
|
||||
options => 'check',
|
||||
|
||||
}
|
||||
|
||||
haproxy::balancermember { 'member4' :
|
||||
listening_service => $rule2,
|
||||
server_names => $backendserver_name2,
|
||||
ipaddresses => $backendserver_ipaddress2,
|
||||
ports => $ports2,
|
||||
options => 'check',
|
||||
}
|
||||
|
||||
|
||||
|
||||
}
|
8
site-modules/sqlserverhenry/manifests/win_sqlserver.pp
Normal file
8
site-modules/sqlserverhenry/manifests/win_sqlserver.pp
Normal file
@ -0,0 +1,8 @@
|
||||
class sqlserverhenry::win_sqlserver {
|
||||
sqlserver_instance{ 'MSSQLSERVER':
|
||||
features => ['SQL'],
|
||||
source => 'C:\\SQLEXPR_x64_ENU',
|
||||
sql_sysadmin_accounts => ['administrator'],
|
||||
}
|
||||
|
||||
}
|
Loading…
Reference in New Issue
Block a user