diff --git a/.DS_Store b/.DS_Store new file mode 100644 index 0000000..4e67415 Binary files /dev/null and b/.DS_Store differ diff --git a/.gitignore b/.gitignore index 52146d6..39781c2 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1,2 @@ modules/ +.onceover diff --git a/Puppetfile b/Puppetfile index 1d6cc66..6136824 100644 --- a/Puppetfile +++ b/Puppetfile @@ -15,3 +15,26 @@ forge 'https://forge.puppet.com' #mod 'apache', # git: 'https://github.com/puppetlabs/puppetlabs-apache', # branch: 'docs_experiment' +# latest + +mod 'puppetlabs/concat','6.1.0' +mod 'puppetlabs/stdlib','6.0.0' +mod 'puppetlabs/translate','2.0.0' +mod 'puppetlabs/haproxy','4.0.0' +mod 'puppetlabs/puppet_agent','2.2.0' +mod 'puppetlabs/apt','7.1.0' +mod 'puppetlabs/facts','0.6.0' +mod 'puppetlabs/inifile','2.4.0' +mod 'danieldreier-autosign','0.2.0' +mod 'puppetlabs-firewall', '2.0.0' +mod 'puppetlabs-satellite_pe_tools', '2.0.0' +mod 'puppetlabs-puppet_metrics_collector', '5.2.0' +mod 'puppet-grafana', '6.1.0' +mod 'puppet-telegraf', '2.1.0' +mod 'puppetlabs-puppet_metrics_dashboard', '2.2.0' +mod 'puppetlabs-puppetserver_gem', '1.1.1' +mod 'herculesteam/augeasproviders_core', '2.5.0' +mod 'herculesteam/augeasproviders_mounttab', '2.0.2' +mod 'herculesteam/augeasproviders_pam', '2.1.0' +mod 'puppetlabs-support_tasks', '1.1.0' +mod 'puppetlabs-sqlserver', '2.6.2' diff --git a/Rakefile b/Rakefile new file mode 100644 index 0000000..d0372d4 --- /dev/null +++ b/Rakefile @@ -0,0 +1 @@ +require 'onceover/rake_tasks' diff --git a/data/common.yaml b/data/common.yaml index 2baa62b..78a581a 100644 --- a/data/common.yaml +++ b/data/common.yaml @@ -1,2 +1,7 @@ --- message: "This node is using common data" +controlm::controlm_agent::agent2server_port: 7005 +controlm::controlm_agent::server2agent_port: 7006 +controlm::controlm_agent::tracker_port: 7035 +controlm::controlm_agent::server_host: ctmgnpappla013 +controlm::controlm_agent::primary_server_host: ctmgnpappla013.optus.com.au diff --git a/data/nodes/LinuxAgent2CM.platform9.puppet.net.yaml b/data/nodes/LinuxAgent2CM.platform9.puppet.net.yaml new file mode 100644 index 0000000..1876462 --- /dev/null +++ b/data/nodes/LinuxAgent2CM.platform9.puppet.net.yaml @@ -0,0 +1,938 @@ +--- + +# Some standard permissions to use +root_0000: { owner: root, group: root, mode: '0000' } +root_0444: { owner: root, group: root, mode: '0444' } +root_0600: { owner: root, group: root, mode: '0600' } +root_0640: { owner: root, group: root, mode: '0640' } +root_0644: { owner: root, group: root, mode: '0644' } +root_0700: { owner: root, group: root, mode: '0700' } +root_4755: { owner: root, group: root, mode: '4755' } +root_2755: { owner: root, group: root, mode: '2755' } +# + +filesystems: + # CIS 1.1.2 L2 Ensure separate partition exists for /tmp + # CIS 1.1.3 L1 Ensure nodev option set on /tmp partition + # CIS 1.1.4 L1 Ensure nosuid option set on /tmp partition + # CIS 1.1.5 L1 Ensure noexec option set on /tmp partition + /tmp: + options: nodev,nosuid,noexec + size: 512M + # CIS 1.1.6 L2 Ensure separate partition exists for /var + /var: + size: 2048M + # CIS 1.1.7 L2 Ensure separate partition exists for /var/tmp + # CIS 1.1.8 L1 Ensure nodev option set on /var/tmp partition + # CIS 1.1.9 L1 Ensure nosuid option set on /var/tmp partition + # CIS 1.1.10 L1 Ensure noexec option set on /var/tmp partition + /var/tmp: + options: nodev,nosuid,noexec + size: 512M + # CIS 1.1.11 L2 Ensure separate partition exists for /var/log + /var/log: + size: 512M + # CIS 1.1.12 L2 Ensure separate partition exists for /var/log/audit + /var/log/audit: + size: 512M + # CIS 1.1.13 L2 Ensure separate partition exists for /home + # CIS 1.1.14 L1 Ensure nodev option set on /home partition + /home: + size: 2048M + options: nodev + # CIS 1.1.15 L1 Ensure nodev option set on /dev/shm partition + # CIS 1.1.16 L1 Ensure nosuid option set on /dev/shm partition + # CIS 1.1.17 L1 Ensure noexec option set on /dev/shm partition + /dev/shm: + options: nodev,nosuid,noexec + fstype: tmpfs + device: tmpfs + + + +# CIS 1.1.18 L1 Ensure nodev option set on removable media partitions +# CIS 1.1.19 L1 Ensure nosuid option set on removable media partitions +# CIS 1.1.20 L1 Ensure noexec option set on removable media partitions + +# CIS 1.1.21 L1 Ensure sticky bit is set on all world-writable directories +# CIS 1.2.1 L1 Ensure package manager repositories are configured +# CIS 1.2.2 L1 Ensure gpgcheck is globally activated +# CIS 1.2.3 L1 Ensure GPG keys are configured +# CIS 1.2.4 L1 Ensure Red Hat Subscription Manager connection is configured +# CIS 1.3.1 L1 Ensure AIDE is installed + +# CIS 1.7.1.2 L1 Ensure local login warning banner is configured properly - banner text +profile::ssh::banner_content: |2+ + + Do not logon unless you have read and agree to the following. + + By continuing to logon you are representing that you are an authorised user + and you accept and agree that: + + 1. use of Australia Post (AP) computers, systems, software and facilities + including email and Internet Browsing is subject to policies and guidelines issued + by Australia Post from time to time; + + 2. the contents of all internal, incoming and outgoing emails are the property of + Australia Post; + + 3. Australia Post may take disciplinary action under the AP Employee Counselling + and Disciplinary Process, and/or legal action against anyone failing to comply + with relevant policy or misusing IT facilities including email and Internet; + + 4. misuse includes use, access or transmission of pornographic photos, animations, + cartoons, and images (including screensavers), sexually explicit, sexist, racist + material or material that offends, embarrasses or degrades a person because of + disability, sex, religion or ethnic background, or unacceptable behaviour or + harrassment as outlined in the Code of Ethics or Harrassment Policy; + + 5. Australia Post may monitor or audit the use of any of its IT facilities and + any information stored or passed through these facilities including email and + Internet browsing details; + + It is your responsibility to read and comply with the Group Technology Use Policy. + Should you have any questions about these conditions or the policies detailed here + please contact your line manager. For all information security related issues + contact the Information Security Office at secureatpost@auspost.com.au + + I agree to these terms and conditions. + +profile::file_ops::files: + # CIS 1.4.1 L1 Ensure permissions on bootloader config are configured - grub.cfg + /boot/grub2/grub.cfg: "%{alias('root_0640')}" + # CIS 1.4.1 L1 Ensure permissions on bootloader config are configured - user.cfg + /boot/grub2/user.cfg: "%{alias('root_0640')}" + # CIS 1.7.1.1 L1 Ensure message of the day is configured properly - banner text + # CIS 1.7.1.4 L1 Ensure permissions on /etc/motd are configured + /etc/motd: + content: '' + mode: '0644' + owner: root + group: root + # CIS 1.7.1.5 L1 Ensure permissions on /etc/issue are configured - already covered by SSH module + #/etc/issue: + #content: "%{hiera('profile::ssh::banner_content')}" + #mode: 644 + #owner: root + #group: root + # CIS 1.7.1.3 L1 Ensure remote login warning banner is configured properly - banner text + # CIS 1.7.1.6 L1 Ensure permissions on /etc/issue.net are configured - already covered by SSH module + #/etc/issue.net: + #content: "%{hiera('profile::ssh::banner_content')}" + #mode: 644 + #owner: root + #group: root + # CIS 3.4.2 L1 Ensure /etc/hosts.allow is configured + # CIS 3.4.4 L1 Ensure permissions on /etc/hosts.allow are configured + /etc/hosts.allow: + content: | + # File managed by Puppet + 'ALL: 10.0.0.0/255.0.0.0' + mode: '0644' + owner: root + group: root + # CIS 3.4.3 L1 Ensure /etc/hosts.deny is configured + # CIS 3.4.5 L1 Ensure permissions on /etc/hosts.deny are configured + /etc/hosts.deny: + content: | + # File managed by Puppet + 'ALL: ALL' + mode: '0644' + owner: root + group: root + /etc/modprobe.d/CIS.conf: + content: | + # File managed by Puppet + # CIS 1.1.1.1 L1 Ensure mounting of cramfs filesystems is disabled - modprobe + install cramfs /bin/true + # CIS 1.1.1.2 L1 Ensure mounting of freevxfs filesystems is disabled - lsmod + install freevxfs /bin/true + # CIS 1.1.1.3 L1 Ensure mounting of jffs2 filesystems is disabled - modprobe + install jffs2 /bin/true + # CIS 1.1.1.4 L1 Ensure mounting of hfs filesystems is disabled - modprobe + install hfs /bin/true + # CIS 1.1.1.5 L1 Ensure mounting of hfsplus filesystems is disabled - lsmod + install hfsplus /bin/true + # CIS 1.1.1.6 L1 Ensure mounting of squashfs filesystems is disabled - modprobe + install squashfs /bin/true + # CIS 1.1.1.7 L1 Ensure mounting of udf filesystems is disabled - lsmod + install udf /bin/true + # CIS 1.1.1.8 L2 Ensure mounting of FAT filesystems is disabled + install vfat /bin/true + + # CIS 3.5.1 L1 Ensure DCCP is disabled + install dccp /bin/true + # CIS 3.5.2 L1 Ensure SCTP is disabled + install sctp /bin/true + # CIS 3.5.3 L1 Ensure RDS is disabled + install rds /bin/true + # CIS 3.5.4 L1 Ensure TIPC is disabled + install tipc /bin/true + mode: '0644' + owner: root + group: root + # CIS 5.1.2 L1 Ensure permissions on /etc/crontab are configured + /etc/crontab: "%{alias('root_0600')}" + # CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - cron.allow + /etc/cron.allow: "%{alias('root_0600')}" + # CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - cron.deny + /etc/cron.deny: + ensure: absent + # CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - at.allow + /etc/at.allow: "%{alias('root_0600')}" + # CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - at.deny + /etc/at.deny: + ensure: absent + /etc/security/pwquality.conf: + content: | + # File managed by Puppet + difok = 5 + # CIS 5.3.1 L1 Ensure password creation requirements are configured - minlen + minlen = 9 + # CIS 5.3.1 L1 Ensure password creation requirements are configured - dcredit + dcredit = -1 + # CIS 5.3.1 L1 Ensure password creation requirements are configured - ucredit + ucredit = -1 + # CIS 5.3.1 L1 Ensure password creation requirements are configured - lcredit + lcredit = -1 + # CIS 5.3.1 L1 Ensure password creation requirements are configured - ocredit + ocredit = -1 + # minclass = 0 + # maxrepeat = 0 + # maxclassrepeat = 0 + # gecoscheck = 0 + # dictpath = + mode: '0644' + owner: root + group: root + # CIS 5.4.4 L1 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.d/*.sh + /etc/profile.d/umask.sh: + content: "umask 0027\n" + /etc/profile.d/umask.csh: + content: "umask 0027\n" + # CIS 5.4.5 L2 Ensure default user shell timeout is 900 seconds or less - /etc/profile + /etc/profile.d/autologout.sh: + content: "export TMOUT=36000\n" + /etc/profile.d/tmout.csh: + content: "TMOUT=36000\n" + # CIS 6.1.2 L1 Ensure permissions on /etc/passwd are configured + /etc/passwd: "%{alias('root_0644')}" + # CIS 6.1.3 L1 Ensure permissions on /etc/shadow are configured + /etc/shadow: "%{alias('root_0000')}" + # CIS 6.1.4 L1 Ensure permissions on /etc/group are configured + /etc/group: "%{alias('root_0644')}" + # CIS 6.1.5 L1 Ensure permissions on /etc/gshadow are configured + /etc/gshadow: "%{alias('root_0000')}" + # CIS 6.1.6 L1 Ensure permissions on /etc/passwd- are configured + /etc/passwd-: "%{alias('root_0644')}" + # CIS 6.1.7 L1 Ensure permissions on /etc/shadow- are configured + /etc/shadow-: "%{alias('root_0000')}" + # CIS 6.1.8 L1 Ensure permissions on /etc/group- are configured + /etc/group-: "%{alias('root_0644')}" + # CIS 6.1.9 L1 Ensure permissions on /etc/gshadow- are configured + /etc/gshadow-: "%{alias('root_0000')}" + # CIS 2.2.1.2 L1 Ensure ntp is configured - restrict -4 - not using NTP + # CIS 2.2.1.2 L1 Ensure ntp is configured - restrict -6 - not using NTP + # CIS 2.2.1.2 L1 Ensure ntp is configured - server - not using NTP + # CIS 2.2.1.3 L1 Ensure chrony is configured - NTP server - set elsewhere in hiera + # CIS 2.2.1.3 L1 Ensure chrony is configured - OPTIONS + /etc/sysconfig/chronyd: + content: | + # File managed by Puppet + OPTIONS='-u chrony' + # CIS 4.1.1.1 L2 Ensure audit log storage size is configured + # CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'space_left_action = email' + # CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'action_mail_acct = root' + # CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'admin_space_left_action = halt' + # CIS 4.1.1.3 L2 Ensure audit logs are not automatically deleted + # CIS 4.1.2 L2 Ensure auditd service is enabled + # CIS 4.1.3 L2 Ensure auditing for processes that start prior to auditd is enabled + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl adjtimex (32-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - adjtimex (32-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl clock_settime (32-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - clock_settime (32-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl /etc/localtime + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - /etc/localtime + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl adjtimex (64-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl clock_settime (64-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - adjtimex (64-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - clock_settime (64-bit) + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/group' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/group' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/passwd' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/passwd' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/gshadow' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/gshadow' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/shadow' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/shadow' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/security/opasswd' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/security/opasswd' + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - sethostname (32-bit) + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl sethostname (32-bit) + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - issue + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl issue + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - issue.net + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl issue.net + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/hosts + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl hosts + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/sysconfig/network + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl network + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/sysconfig/network-scripts + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl network-scripts + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - sethostname (64-bit) + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl sethostname (64-bit) + # CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/selinux/ + # CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/selinux/ + # CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - /usr/share/selinux/ + # CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /usr/share/selinux/ + # CIS 4.1.8 L2 Ensure login and logout events are collected - /var/log/lastlog + # CIS 4.1.8 L2 Ensure login and logout events are collected - auditctl /var/log/lastlog + # CIS 4.1.8 L2 Ensure login and logout events are collected - /var/run/faillock/ + # CIS 4.1.8 L2 Ensure login and logout events are collected - auditctl /var/run/faillock/ + # CIS 4.1.9 L2 Ensure session initiation information is collected - utmp + # CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl utmp + # CIS 4.1.9 L2 Ensure session initiation information is collected - wtmp + # CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl wtmp + # CIS 4.1.9 L2 Ensure session initiation information is collected - btmp + # CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl btmp + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chmod/fchmod/fchmodat + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chmod/fchmod/fchmodat + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chown/fchown/fchownat/lchown + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chown/fchown/fchownat/lchown + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - setxattr/lsetxattr/fsetxattr/removexattr + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl setxattr/lsetxattr/fsetxattr/removexattr + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chmod/fchmod/fchmodat (64-bit) + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chmod/fchmod/fchmodat (64-bit) + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chown/fchown/fchownat/lchown (64-bit) + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chown/fchown/fchownat/lchown (64-bit) + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - xattr (64-bit) + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl xattr (64-bit) + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EACCES + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EPERM + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EACCES (64-bit) + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES (64-bit) + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EPERM (64-bit) + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM (64-bit) + # CIS 4.1.12 L2 Ensure use of privileged commands is collected + # CIS 4.1.13 L2 Ensure successful file system mounts are collected + # CIS 4.1.13 L2 Ensure successful file system mounts are collected - auditctl + # CIS 4.1.13 L2 Ensure successful file system mounts are collected - b64 + # CIS 4.1.13 L2 Ensure successful file system mounts are collected - auditctl (64-bit) + # CIS 4.1.14 L2 Ensure file deletion events by users are collected + # CIS 4.1.14 L2 Ensure file deletion events by users are collected - auditctl + # CIS 4.1.14 L2 Ensure file deletion events by users are collected - b64 + # CIS 4.1.14 L2 Ensure file deletion events by users are collected - auditctl (64-bit) + # CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - sudoers + # CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - auditctl sudoers + # CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - sudoers.d + # CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - auditctl sudoers.d + # CIS 4.1.16 L2 Ensure system administrator actions (sudolog) are collected + # CIS 4.1.16 L2 Ensure system administrator actions (sudolog) are collected - auditctl + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - insmod + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl insmod + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - rmmod + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl rmmod + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - modprobe + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl modprobe + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - init_module/delete_module + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl init_module/delete_module + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - init_module/delete_module + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl init_module/delete_module + # CIS 4.1.18 L2 Ensure the audit configuration is immutable + /etc/audit/auditd.conf: + content: | + # File managed by Puppet + # + # This file controls the configuration of the audit daemon + # + local_events = yes + write_logs = yes + log_file = /var/log/audit/audit.log + log_group = root + log_format = RAW + flush = INCREMENTAL_ASYNC + freq = 50 + max_log_file = 8 + num_logs = 5 + priority_boost = 4 + disp_qos = lossy + dispatcher = /sbin/audispd + name_format = NONE + ##name = mydomain + max_log_file_action = ROTATE + space_left = 75 + space_left_action = SYSLOG + verify_email = yes + action_mail_acct = root + admin_space_left = 50 + admin_space_left_action = SUSPEND + disk_full_action = SUSPEND + disk_error_action = SUSPEND + use_libwrap = yes + ##tcp_listen_port = 60 + tcp_listen_queue = 5 + tcp_max_per_addr = 1 + ##tcp_client_ports = 1024-65535 + tcp_client_max_idle = 0 + enable_krb5 = no + krb5_principal = auditd + ##krb5_key_file = /etc/audit/audit.key + distribute_network = no + + +profile::file_ops::directories: + # CIS 5.1.3 L1 Ensure permissions on /etc/cron.hourly are configured + /etc/cron.hourly: "%{alias('root_0700')}" + # CIS 5.1.4 L1 Ensure permissions on /etc/cron.daily are configured + /etc/cron.daily: "%{alias('root_0700')}" + # CIS 5.1.5 L1 Ensure permissions on /etc/cron.weekly are configured + /etc/cron.weekly: "%{alias('root_0700')}" + # CIS 5.1.6 L1 Ensure permissions on /etc/cron.monthly are configured + /etc/cron.monthly: "%{alias('root_0700')}" + # CIS 5.1.7 L1 Ensure permissions on /etc/cron.d are configured + /etc/cron.d: "%{alias('root_0700')}" + +# CIS 5.3.1 L1 Ensure password creation requirements are configured - password-auth try_first_pass +# CIS 5.3.1 L1 Ensure password creation requirements are configured - system-auth try_first_pass +# CIS 5.3.1 L1 Ensure password creation requirements are configured - password-auth retry=3 +# CIS 5.3.1 L1 Ensure password creation requirements are configured - system-auth retry=3 +central_auth::pam::dfok: 5 +central_auth::pam::minlen: 9 +central_auth::pam::dcredit: -1 +central_auth::pam::ucredit: -1 +central_auth::pam::ocredit: -1 +central_auth::pam::lcredit: -1 + + +# CIS 1.4.2 L1 Ensure bootloader password is set +# CIS 1.4.3 L1 Ensure authentication required for single user mode - rescue.service +# CIS 1.4.3 L1 Ensure authentication required for single user mode - emergency.service + +# CIS 1.5.1 L1 Ensure core dumps are restricted - limits.conf limits.d +security::limits::limits_hash: + "*/hard/core": + value: '0' +# CIS 1.5.1 L1 Ensure core dumps are restricted - sysctl +# CIS 1.5.1 L1 Ensure core dumps are restricted - sysctl.conf sysctl.d +profile::kernel::sysctl: + fs.suid_dumpable: 0 + # CIS 1.5.3 L1 Ensure address space layout randomization (ASLR) is enabled - sysctl + # CIS 1.5.3 L1 Ensure address space layout randomization (ASLR) is enabled - sysctl.conf sysctl.d + kernel.randomize_va_space: 2 + # CIS 3.1.1 L1 Ensure IP forwarding is disabled - sysctl + # CIS 3.1.1 L1 Ensure IP forwarding is disabled - sysctlc.conf sysctl.d + net.ipv4.ip_forward: 0 + # CIS 3.1.2 L1 Ensure packet redirect sending is disabled - 'net.ipv4.conf.all.send_redirects = 0' + # CIS 3.1.2 L1 Ensure packet redirect sending is disabled - 'net.ipv4.conf.default.send_redirects = 0' + net.ipv4.conf.all.send_redirects: 0 + net.ipv4.conf.default.send_redirects: 0 + # CIS 3.2.1 L1 Ensure source routed packets are not accepted - 'net.ipv4.conf.default.accept_source_route = 0' + # CIS 3.2.1 L1 Ensure source routed packets are not accepted - 'net.ipv4.conf.all.accept_source_route = 0' + net.ipv4.conf.all.accept_source_route: 0 + net.ipv4.conf.default.accept_source_route: 0 + # CIS 3.2.2 L1 Ensure ICMP redirects are not accepted - 'net.ipv4.conf.all.accept_redirects = 0' + # CIS 3.2.2 L1 Ensure ICMP redirects are not accepted - 'net.ipv4.conf.default.accept_redirects = 0' + net.ipv4.conf.all.accept_redirects: 0 + net.ipv4.conf.default.accept_redirects: 0 + # CIS 3.2.3 L1 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.default.secure_redirects = 0' + # CIS 3.2.3 L1 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.all.secure_redirects = 0' + net.ipv4.conf.all.secure_redirects: 0 + net.ipv4.conf.default.secure_redirects: 0 + # CIS 3.2.4 L1 Ensure suspicious packets are logged - 'net.ipv4.conf.all.log_martians = 1' + # CIS 3.2.4 L1 Ensure suspicious packets are logged - 'net.ipv4.conf.default.log_martians = 1' + net.ipv4.conf.all.log_martians: 1 + net.ipv4.conf.default.log_martians: 1 + # CIS 3.2.5 L1 Ensure broadcast ICMP requests are ignored - sysctl + # CIS 3.2.5 L1 Ensure broadcast ICMP requests are ignored - sysctl.conf sysctl.d + net.ipv4.icmp_echo_ignore_broadcasts: 1 + # CIS 3.2.6 L1 Ensure bogus ICMP responses are ignored - sysctl + # CIS 3.2.6 L1 Ensure bogus ICMP responses are ignored - sysctl.conf sysctl.d + net.ipv4.icmp_ignore_bogus_error_responses: 1 + # CIS 3.2.7 L1 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.default.rp_filter = 1' + # CIS 3.2.7 L1 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.all.rp_filter = 1' + net.ipv4.conf.all.rp_filter: 1 + net.ipv4.conf.default.rp_filter: 1 + # CIS 3.2.8 L1 Ensure TCP SYN Cookies is enabled - sysctl + # CIS 3.2.8 L1 Ensure TCP SYN Cookies is enabled - sysctl.conf sysctl.d + net.ipv4.tcp_syncookies: 1 + # CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.all.accept_ra = 0' + # CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.default.accept_ra = 0' + # CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - files 'net.ipv6.conf.all.accept_ra = 0' + # CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - files 'net.ipv6.conf.default.accept_ra = 0' + net.ipv6.conf.all.accept_ra: 0 + net.ipv6.conf.default.accept_ra: 0 + # CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - 'net.ipv6.conf.default.accept_redirects = 0' + # CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - 'net.ipv6.conf.all.accept_redirects = 0' + # CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - files 'net.ipv6.conf.default.accept_redirects = 0' + # CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - files 'net.ipv6.conf.all.accept_redirects = 0' + net.ipv6.conf.all.accept_redirects: 0 + net.ipv6.conf.default.accept_redirects: 0 + +# CIS 1.5.2 L1 Ensure XD/NX support is enabled (32 bit only) +# CIS 1.8 L1 Ensure updates, patches, and additional security software are installed + +# CIS 2.2.15 L1 Ensure mail transfer agent is configured for local-only mode +networking::mailclient::inet_interfaces: 'localhost' + +packages::remove: + RedHat: + # CIS 1.1.22 L1 Disable Automounting + - autofs + # CIS 1.5.4 L1 Ensure prelink is disabled + - prelink + # CIS 1.6.1.4 L2 Ensure SETroubleshoot is not installed + - setroubleshoot + # CIS 1.6.1.5 L2 Ensure the MCS Translation Service (mcstrans) is not installed + - mcstrans + # CIS 1.7.2 L1 Ensure GDM login banner is configured - user-db + # CIS 1.7.2 L1 Ensure GDM login banner is configured - system-db + # CIS 1.7.2 L1 Ensure GDM login banner is configured - file-db + # CIS 1.7.2 L1 Ensure GDM login banner is configured - banner message enabled + # CIS 1.7.2 L1 Ensure GDM login banner is configured - banner message text + - gdm + # CIS 2.1.1 L1 Ensure chargen services are not enabled - dgram + # CIS 2.1.1 L1 Ensure chargen services are not enabled - stream + # CIS 2.1.2 L1 Ensure daytime services are not enabled - dgram + # CIS 2.1.2 L1 Ensure daytime services are not enabled - stream + # CIS 2.1.3 L1 Ensure discard services are not enabled - dgram + # CIS 2.1.3 L1 Ensure discard services are not enabled - stream + # CIS 2.1.4 L1 Ensure echo services are not enabled - dgram + # CIS 2.1.4 L1 Ensure echo services are not enabled - stream + # CIS 2.1.5 L1 Ensure time services are not enabled - dgram + # CIS 2.1.5 L1 Ensure time services are not enabled - stream + # CIS 2.1.7 L1 Ensure xinetd is not enabled + - xinetd + # CIS 2.1.6 L1 Ensure tftp server is not enabled + # CIS 2.2.20 L1 Ensure tftp server is not enabled + - tftp-server +# CIS 2.2.2 L1 Ensure X Window System is not installed + # CIS 2.2.3 L1 Ensure Avahi Server is not enabled + - avahi + # CIS 2.2.4 L1 Ensure CUPS is not enabled + - cups + # CIS 2.2.5 L1 Ensure DHCP Server is not enabled + - dhcp + - dnsmasq + # CIS 2.2.6 L1 Ensure LDAP server is not enabled + - openldap-servers +# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - nfs +# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - nfs-server +# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - rpcbind + # CIS 2.2.8 L1 Ensure DNS Server is not enabled + - bind + - pdns + # CIS 2.2.9 L1 Ensure FTP Server is not enabled + - vsftpd + - pure-ftpd + - perl-ftpd + - proftpd + # CIS 2.2.10 L1 Ensure HTTP server is not enabled + - caddy + - httpd + - lighttpd + - nginx + - nginx14-nginx + - nginx16-nginx + - nodejs-ws + - xbean + - rubygem-thin + # CIS 2.2.11 L1 Ensure IMAP and POP3 server is not enabled + - dovecot + - cyrus-imapd + # CIS 2.2.12 L1 Ensure Samba is not enabled + - samba + - samba-dc + # CIS 2.2.13 L1 Ensure HTTP Proxy Server is not enabled + - squid + # CIS 2.2.14 L1 Ensure SNMP Server is not enabled + - net-snmp + # CIS 2.2.16 L1 Ensure NIS Server is not enabled + # CIS 2.3.1 L1 Ensure NIS Client is not installed + - ypserv + - ypbind + # CIS 2.2.17 L1 Ensure rsh server is not enabled - rexec + # CIS 2.2.17 L1 Ensure rsh server is not enabled - rlogin + # CIS 2.2.17 L1 Ensure rsh server is not enabled - rsh + # CIS 2.3.2 L1 Ensure rsh client is not installed + - rsh-server + - rsh + # CIS 2.2.18 L1 Ensure talk server is not enabled + # CIS 2.3.3 L1 Ensure talk client is not installed + - ntalk + - talk + # CIS 2.2.19 L1 Ensure telnet server is not enabled + - telnet-server +profile::services: + # CIS 1.2.5 L2 Disable the rhnsd Daemon + rhnsd: + ensure: stopped + enable: false + # CIS 2.2.21 L1 Ensure rsync service is not enabled + rsyncd: + ensure: stopped + enable: false + # CIS 5.1.1 L1 Ensure cron daemon is enabled + crond: + ensure: running + enable: true + +# CIS 2.3.4 L1 Ensure telnet client is not installed - disputed +# CIS 2.3.5 L1 Ensure LDAP client is not installed - disputed + +packages::add: + RedHat: + # CIS 3.4.1 L1 Ensure TCP Wrappers is installed + - tcp_wrappers + # CIS 1.6.2 L2 Ensure SELinux is installed + - libselinux + +# CIS 3.6.1 L1 Ensure iptables is installed +profile::firewall::enable: true +profile::firewall::chains: + # CIS 3.6.2 L1 Ensure default deny firewall policy - Chain INPUT + INPUT:filter:IPv4: + policy: drop + INPUT:filter:IPv6: + policy: drop + # CIS 3.6.2 L1 Ensure default deny firewall policy - Chain FORWARD + FORWARD:filter:IPv4: + policy: drop + FORWARD:filter:IPv6: + policy: drop + # CIS 3.6.2 L1 Ensure default deny firewall policy - Chain OUTPUT + OUTPUT:filter:IPv4: + policy: drop + OUTPUT:filter:IPv6: + policy: drop +# CIS 3.6.3 L1 Ensure loopback traffic is configured +# Configured in code +# CIS 3.6.4 L1 Ensure outbound and established connections are configured +# Configured in code +# CIS 3.6.5 L1 Ensure firewall rules exist for all open ports +profile::firewall::inbound: + '101 DHCP Server': + sport: 67 + proto: udp + '110 SSH Access': + dport: 22 + '161 NetBackup Server': + dport: [ 1556, 13724 ] +profile::firewall::outbound: + '101 DHCP Client': + sport: 68 + proto: udp + '120 SSH Access': + sport: 22 + '130 Puppet Server Access': + dport: [8140,8142] + destination: 10.5.162.0/24 + '102 Network Time Protocol': + dport: 123 + proto: udp + '103 Name Resolution TCP': + dport: 53 + proto: tcp + '103 Name Resolution UDP': + dport: 53 + proto: udp + '104 AD Authentication TCP': + dport: [ 88, 389, 445, 464, 3268 ] + '104 AD Authentication UDP': + dport: [ 88, 137, 389 ] + proto: udp + '140 RightLink Agent': + # From here: https://docs.rightscale.com/faq/Firewall_Configuration_Ruleset.html + dport: 443 + destination: + - 54.225.248.128/27 + - 54.244.88.96/27 + - 54.86.63.128/26 + - 54.187.254.128/26 + - 54.246.247.16/28 + - 54.248.220.128/28 + - 54.255.255.208/28 + - 52.65.255.224/28 + '141 AWS Instance Data': + dport: 80 + destination: 169.254.169.254/32 + '145 Sumo Logic Monitoring': + # Unfortunately SUMO runs on AWS randomly, so we need to open up access to the whole of AWS EC2 for our region ap-southeast-2 + # https://help.sumologic.com/APIs/General-API-Information/Sumo-Logic-Endpoints-and-Firewall-Security + dport: 443 + destination: + - 13.210.0.0/15 + - 13.236.0.0/14 + - 13.54.0.0/15 + - 15.193.3.0/24 + - 3.104.0.0/14 + - 3.24.0.0/14 + - 52.62.0.0/15 + - 52.64.0.0/17 + - 52.64.128.0/17 + - 52.65.0.0/16 + - 52.94.248.64/28 + - 52.95.241.0/24 + - 52.95.255.16/28 + - 54.153.128.0/17 + - 54.206.0.0/16 + - 54.252.0.0/16 + - 54.253.0.0/16 + - 54.66.0.0/16 + - 54.79.0.0/16 + - 99.77.144.0/24 + # Currently some sumo installations are trying to hit the US AWS site us-east-1, hopefully we can delete these after getting the + # sumo agent to just point to AU + - 100.24.0.0/13 + - 107.20.0.0/14 + - 15.193.6.0/24 + - 162.250.236.0/24 + - 162.250.237.0/24 + - 162.250.238.0/23 + - 174.129.0.0/16 + - 18.204.0.0/14 + - 18.208.0.0/13 + - 18.232.0.0/14 + - 184.72.128.0/17 + - 184.72.64.0/18 + - 184.73.0.0/16 + - 204.236.192.0/18 + - 208.86.88.0/23 + - 216.182.224.0/21 + - 216.182.232.0/22 + - 216.182.238.0/23 + - 23.20.0.0/14 + - 3.208.0.0/12 + - 3.224.0.0/12 + - 3.80.0.0/12 + - 34.192.0.0/12 + - 34.224.0.0/12 + - 35.153.0.0/16 + - 35.168.0.0/13 + - 44.192.0.0/11 + - 50.16.0.0/15 + - 50.19.0.0/16 + - 52.0.0.0/15 + - 52.2.0.0/15 + - 52.20.0.0/14 + - 52.200.0.0/13 + - 52.4.0.0/14 + - 52.44.0.0/15 + - 52.54.0.0/15 + - 52.70.0.0/15 + - 52.72.0.0/15 + - 52.86.0.0/15 + - 52.90.0.0/15 + - 52.94.201.0/26 + - 52.94.248.0/28 + - 52.95.245.0/24 + - 52.95.255.80/28 + - 54.144.0.0/14 + - 54.152.0.0/16 + - 54.156.0.0/14 + - 54.160.0.0/13 + - 54.172.0.0/15 + - 54.174.0.0/15 + - 54.196.0.0/15 + - 54.198.0.0/16 + - 54.204.0.0/15 + - 54.208.0.0/15 + - 54.210.0.0/15 + - 54.221.0.0/16 + - 54.224.0.0/15 + - 54.226.0.0/15 + - 54.234.0.0/15 + - 54.236.0.0/15 + - 54.242.0.0/15 + - 54.80.0.0/13 + - 54.88.0.0/14 + - 54.92.128.0/17 + - 67.202.0.0/18 + - 72.44.32.0/19 + - 75.101.128.0/17 + - 99.77.128.0/24 + - 99.77.129.0/24 + - 99.77.191.0/24 + - 99.77.254.0/24 + '150 Telegraf Monitoring': + dport: 80 + destination: [ 10.212.82.107/32, 10.212.85.6/32 ] + '160 YUM Server': + dport: [ 80, 443 ] + destination: "%{::yum_server}" + '161 NetBackup Server': + dport: [ 1556, 13724 ] + '162 Mail Server': + dport: 25 + destination: "%{hiera('networking::mailclient::relayhost')}" + '163 Log Server': + dport: [ 5514, 6514 ] + destination: + - "%{hiera('profile::nxlog_client::logserver1')}" + - "%{hiera('profile::nxlog_client::logserver2')}" +# CIS 3.7 L1 Ensure wireless interfaces are disabled + + +# CIS 4.2.1.1 L1 Ensure rsyslog Service is enabled +# CIS 4.2.1.3 L1 Ensure rsyslog default file permissions configured +# CIS 4.2.1.4 L1 Ensure rsyslog is configured to send logs to a remote log host +# CIS 4.2.1.5 L1 Ensure remote rsyslog messages are only accepted on designated log hosts. - imtcp.so +# CIS 4.2.1.5 L1 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun 514 +# CIS 4.2.2.1 L1 Ensure syslog-ng service is enabled +# CIS 4.2.2.3 L1 Ensure syslog-ng default file permissions configured +# CIS 4.2.2.4 L1 Ensure syslog-ng is configured to send logs to a remote log host - destination logserver +# CIS 4.2.2.4 L1 Ensure syslog-ng is configured to send logs to a remote log host - log src +# CIS 4.2.2.5 L1 Ensure remote syslog-ng messages are only accepted on designated log hosts +# CIS 4.2.4 L1 Ensure permissions on all logfiles are configured + + +# CIS 5.2.1 L1 Ensure permissions on /etc/ssh/sshd_config are configured +# Set to 600 by SSH server module +profile::ssh::options_hash: +# CIS 5.2.2 L1 Ensure SSH Protocol is set to 2 + Protocol: '2' +# CIS 5.2.3 L1 Ensure SSH LogLevel is set to INFO + LogLevel: INFO +# CIS 5.2.4 L1 Ensure SSH X11 forwarding is disabled + X11Forwarding: no +# CIS 5.2.5 L1 Ensure SSH MaxAuthTries is set to 4 or less + MaxAuthTries: '4' +# CIS 5.2.6 L1 Ensure SSH IgnoreRhosts is enabled + IgnoreRhosts: yes +# CIS 5.2.7 L1 Ensure SSH HostbasedAuthentication is disabled + HostbasedAuthentication: no +# CIS 5.2.8 L1 Ensure SSH root login is disabled + PermitRootLogin: no +# CIS 5.2.9 L1 Ensure SSH PermitEmptyPasswords is disabled + PermitEmptyPasswords: no +# CIS 5.2.10 L1 Ensure SSH PermitUserEnvironment is disabled + PermitUserEnvironment: no +# CIS 5.2.11 L1 Ensure only approved MAC algorithms are used + MACs: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com +# CIS 5.2.12 L1 Ensure SSH Idle Timeout Interval is configured - ClientAliveInterval - setting to an hour to balance productivity + ClientAliveInterval: '3600' +# CIS 5.2.12 L1 Ensure SSH Idle Timeout Interval is configured - ClientAliveCountMax + ClientAliveCountMax: '0' +# CIS 5.2.13 L1 Ensure SSH LoginGraceTime is set to one minute or less + LoginGraceTime: 60 +# CIS 5.2.15 L1 Ensure SSH warning banner is configured + Banner: /etc/issue +# CIS 5.2.14 L1 Ensure SSH access is limited +profile::ssh::allowed_groups: + - gg_linux_admins + +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth required pam_faillock.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth [success=1 default=bad] pam_unix.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth [default=die] pam_faillock.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth sufficient pam_faillock.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth required pam_faillock.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth [success=1 default=bad] pam_unix.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth [default=die] pam_faillock.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth sufficient pam_faillock.so' + +# CIS 5.3.3 L1 Ensure password reuse is limited - system-auth +# CIS 5.3.3 L1 Ensure password reuse is limited - password-auth + +# CIS 5.3.4 L1 Ensure password hashing algorithm is SHA-512 - system-auth +# CIS 5.3.4 L1 Ensure password hashing algorithm is SHA-512 - password-auth +# Set via the central_auth module + +# CIS 5.4.1.1 L1 Ensure password expiration is 365 days or less +# CIS 5.4.1.2 L1 Ensure minimum days between password changes is 7 or more +# CIS 5.4.1.3 L1 Ensure password expiration warning days is 7 or more +# CIS 5.4.1.4 L1 Ensure inactive password lock is 30 days or less +# CIS 5.4.1.5 L1 Ensure all users last password change date is in the past + +# CIS 5.4.2 L1 Ensure system accounts are non-login + +local_users::add::users: + root: + uid: 0 + # CIS 5.4.3 L1 Ensure default group for the root account is GID 0 + gid: 0 + # CIS 5.6 L1 Ensure access to the su command is restricted - wheel group contains root + groups: [ wheel ] + +profile::file_ops::file_lines: + /etc/bashrc: + # CIS 5.4.5 L2 Ensure default user shell timeout is 900 seconds or less - /etc/bashrc - setting to an hour to balance productivity + - line : 'TMOUT=3600' + match : 'TMOUT=' + # CIS 5.4.4 L1 Ensure default user umask is 027 or more restrictive - /etc/bashrc + - line : ' umask 027' + match : ' umask 0\d\d' + multiple : true + # CIS 5.6 L1 Ensure access to the su command is restricted - pam_wheel.so + /etc/pam.d/su: + line : 'auth required pam_wheel.so use_uid' + match : '#auth required pam_wheel.so use_uid' + # CIS 3.3.3 L1 Ensure IPv6 is disabled + /etc/default/grub: + line: GRUB_CMDLINE_LINUX='ipv6.disable=1' + match: GRUB_CMDLINE_LINUX + # CIS 6.2.2 L1 Ensure no legacy '+' entries exist in /etc/passwd + /etc/passwd: + ensure: absent + line: '+' + # CIS 6.2.3 L1 Ensure no legacy '+' entries exist in /etc/shadow + /etc/shadow: + ensure: absent + line: '+' + # CIS 6.2.4 L1 Ensure no legacy '+' entries exist in /etc/group + /etc/group: + ensure: absent + line: '+' + +# CIS 5.5 L1 Ensure root login is restricted to system console - TBD +# CIS 6.1.10 L1 Ensure no world writable files exist +# CIS 6.1.11 L1 Ensure no unowned files or directories exist +# CIS 6.1.12 L1 Ensure no ungrouped files or directories exist +# CIS 6.1.13 L1 Audit SUID executables +# CIS 6.1.14 L1 Audit SGID executables +# CIS 6.2.1 L1 Ensure password fields are not empty + +# CIS 6.2.5 L1 Ensure root is the only UID 0 account +# CIS 6.2.6 L1 Ensure root PATH Integrity +# CIS 6.2.7 L1 Ensure all users' home directories exist +# CIS 6.2.8 L1 Ensure users' home directories permissions are 750 or more restrictive +# CIS 6.2.9 L1 Ensure users own their home directories +# CIS 6.2.10 L1 Ensure users' dot files are not group or world writable +# CIS 6.2.11 L1 Ensure no users have .forward files +# CIS 6.2.12 L1 Ensure no users have .netrc files +# CIS 6.2.13 L1 Ensure users' .netrc Files are not group or world accessible +# CIS 6.2.14 L1 Ensure no users have .rhosts files +# CIS 6.2.15 L1 Ensure all groups in /etc/passwd exist in /etc/group +# CIS 6.2.16 L1 Ensure no duplicate UIDs exist +# CIS 6.2.17 L1 Ensure no duplicate GIDs exist +# CIS 6.2.18 L1 Ensure no duplicate user names exist +# CIS 6.2.19 L1 Ensure no duplicate group names exist + +# CIS 1.6.1.1 L2 Ensure SELinux is not disabled in bootloader configuration - selinux = 0 +# CIS 1.6.1.1 L2 Ensure SELinux is not disabled in bootloader configuration - enforcing = 0 + +profile::file_ops::templates: + # CIS 1.6.1.2 L2 Ensure the SELinux state is enforcing + # CIS 1.6.1.3 L2 Ensure SELinux policy is configured + /etc/selinux/config: + data: + setting: permissive + type: targeted + owner: root + group: root + mode: '0644' + content: | + # This file controls the state of SELinux on the system. + # SELINUX= can take one of these three values: + # enforcing - SELinux security policy is enforced. + # permissive - SELinux prints warnings instead of enforcing. + # disabled - No SELinux policy is loaded. + SELINUX=<%= $setting %> + # SELINUXTYPE= can take one of these two values: + # targeted - Targeted processes are protected, + # mls - Multi Level Security protection. + SELINUXTYPE=<%= $type %> + +# CIS 1.6.1.6 L2 Ensure no unconfined daemons exist + +# CIS 6.1.1 L2 Audit system file permissions diff --git a/data/nodes/compilemaster-01.platform9.puppet.net.yaml b/data/nodes/compilemaster-01.platform9.puppet.net.yaml new file mode 100644 index 0000000..245436b --- /dev/null +++ b/data/nodes/compilemaster-01.platform9.puppet.net.yaml @@ -0,0 +1,6 @@ +--- +puppet_enterprise::master::puppetserver::jruby_max_active_instances: 3 +puppet_enterprise::profile::master::java_args: + Xms: 1536m + Xmx: 1536m +puppet_enterprise::master::puppetserver::reserved_code_cache: 512m diff --git a/data/nodes/compilemaster-02.platform9.puppet.net.yaml b/data/nodes/compilemaster-02.platform9.puppet.net.yaml new file mode 100644 index 0000000..245436b --- /dev/null +++ b/data/nodes/compilemaster-02.platform9.puppet.net.yaml @@ -0,0 +1,6 @@ +--- +puppet_enterprise::master::puppetserver::jruby_max_active_instances: 3 +puppet_enterprise::profile::master::java_args: + Xms: 1536m + Xmx: 1536m +puppet_enterprise::master::puppetserver::reserved_code_cache: 512m diff --git a/data/nodes/example-node.yaml b/data/nodes/example-node.yaml deleted file mode 100644 index ed97d53..0000000 --- a/data/nodes/example-node.yaml +++ /dev/null @@ -1 +0,0 @@ ---- diff --git a/data/nodes/linuxagent1forcmdeployment.platform9.puppet.net.yaml b/data/nodes/linuxagent1forcmdeployment.platform9.puppet.net.yaml new file mode 100644 index 0000000..78e52f9 --- /dev/null +++ b/data/nodes/linuxagent1forcmdeployment.platform9.puppet.net.yaml @@ -0,0 +1,938 @@ +--- + +# Some standard permissions to use +root_0000: { owner: root, group: root, mode: '0000' } +root_0444: { owner: root, group: root, mode: '0444' } +root_0600: { owner: root, group: root, mode: '0600' } +root_0640: { owner: root, group: root, mode: '0640' } +root_0644: { owner: root, group: root, mode: '0644' } +root_0700: { owner: root, group: root, mode: '0700' } +root_4755: { owner: root, group: root, mode: '4755' } +root_2755: { owner: root, group: root, mode: '2755' } + + +filesystems: + # CIS 1.1.2 L2 Ensure separate partition exists for /tmp + # CIS 1.1.3 L1 Ensure nodev option set on /tmp partition + # CIS 1.1.4 L1 Ensure nosuid option set on /tmp partition + # CIS 1.1.5 L1 Ensure noexec option set on /tmp partition + /tmp: + options: nodev,nosuid,noexec + size: 512M + # CIS 1.1.6 L2 Ensure separate partition exists for /var + /var: + size: 2048M + # CIS 1.1.7 L2 Ensure separate partition exists for /var/tmp + # CIS 1.1.8 L1 Ensure nodev option set on /var/tmp partition + # CIS 1.1.9 L1 Ensure nosuid option set on /var/tmp partition + # CIS 1.1.10 L1 Ensure noexec option set on /var/tmp partition + /var/tmp: + options: nodev,nosuid,noexec + size: 512M + # CIS 1.1.11 L2 Ensure separate partition exists for /var/log + /var/log: + size: 512M + # CIS 1.1.12 L2 Ensure separate partition exists for /var/log/audit + /var/log/audit: + size: 512M + # CIS 1.1.13 L2 Ensure separate partition exists for /home + # CIS 1.1.14 L1 Ensure nodev option set on /home partition + /home: + size: 2048M + options: nodev + # CIS 1.1.15 L1 Ensure nodev option set on /dev/shm partition + # CIS 1.1.16 L1 Ensure nosuid option set on /dev/shm partition + # CIS 1.1.17 L1 Ensure noexec option set on /dev/shm partition + /dev/shm: + options: nodev,nosuid,noexec + fstype: tmpfs + device: tmpfs + + + +# CIS 1.1.18 L1 Ensure nodev option set on removable media partitions +# CIS 1.1.19 L1 Ensure nosuid option set on removable media partitions +# CIS 1.1.20 L1 Ensure noexec option set on removable media partitions + +# CIS 1.1.21 L1 Ensure sticky bit is set on all world-writable directories +# CIS 1.2.1 L1 Ensure package manager repositories are configured +# CIS 1.2.2 L1 Ensure gpgcheck is globally activated +# CIS 1.2.3 L1 Ensure GPG keys are configured +# CIS 1.2.4 L1 Ensure Red Hat Subscription Manager connection is configured +# CIS 1.3.1 L1 Ensure AIDE is installed + +# CIS 1.7.1.2 L1 Ensure local login warning banner is configured properly - banner text +profile::ssh::banner_content: |2+ + + Do not logon unless you have read and agree to the following. + + By continuing to logon you are representing that you are an authorised user + and you accept and agree that: + + 1. use of Australia Post (AP) computers, systems, software and facilities + including email and Internet Browsing is subject to policies and guidelines issued + by Australia Post from time to time; + + 2. the contents of all internal, incoming and outgoing emails are the property of + Australia Post; + + 3. Australia Post may take disciplinary action under the AP Employee Counselling + and Disciplinary Process, and/or legal action against anyone failing to comply + with relevant policy or misusing IT facilities including email and Internet; + + 4. misuse includes use, access or transmission of pornographic photos, animations, + cartoons, and images (including screensavers), sexually explicit, sexist, racist + material or material that offends, embarrasses or degrades a person because of + disability, sex, religion or ethnic background, or unacceptable behaviour or + harrassment as outlined in the Code of Ethics or Harrassment Policy; + + 5. Australia Post may monitor or audit the use of any of its IT facilities and + any information stored or passed through these facilities including email and + Internet browsing details; + + It is your responsibility to read and comply with the Group Technology Use Policy. + Should you have any questions about these conditions or the policies detailed here + please contact your line manager. For all information security related issues + contact the Information Security Office at secureatpost@auspost.com.au + + I agree to these terms and conditions. + +profile::file_ops::files: + # CIS 1.4.1 L1 Ensure permissions on bootloader config are configured - grub.cfg + /boot/grub2/grub.cfg: "%{alias('root_0640')}" + # CIS 1.4.1 L1 Ensure permissions on bootloader config are configured - user.cfg + /boot/grub2/user.cfg: "%{alias('root_0640')}" + # CIS 1.7.1.1 L1 Ensure message of the day is configured properly - banner text + # CIS 1.7.1.4 L1 Ensure permissions on /etc/motd are configured + /etc/motd: + content: '' + mode: '0644' + owner: root + group: root + # CIS 1.7.1.5 L1 Ensure permissions on /etc/issue are configured - already covered by SSH module + #/etc/issue: + #content: "%{hiera('profile::ssh::banner_content')}" + #mode: 644 + #owner: root + #group: root + # CIS 1.7.1.3 L1 Ensure remote login warning banner is configured properly - banner text + # CIS 1.7.1.6 L1 Ensure permissions on /etc/issue.net are configured - already covered by SSH module + #/etc/issue.net: + #content: "%{hiera('profile::ssh::banner_content')}" + #mode: 644 + #owner: root + #group: root + # CIS 3.4.2 L1 Ensure /etc/hosts.allow is configured + # CIS 3.4.4 L1 Ensure permissions on /etc/hosts.allow are configured + /etc/hosts.allow: + content: | + # File managed by Puppet + 'ALL: 10.0.0.0/255.0.0.0' + mode: '0644' + owner: root + group: root + # CIS 3.4.3 L1 Ensure /etc/hosts.deny is configured + # CIS 3.4.5 L1 Ensure permissions on /etc/hosts.deny are configured + /etc/hosts.deny: + content: | + # File managed by Puppet + 'ALL: ALL' + mode: '0644' + owner: root + group: root + /etc/modprobe.d/CIS.conf: + content: | + # File managed by Puppet + # CIS 1.1.1.1 L1 Ensure mounting of cramfs filesystems is disabled - modprobe + install cramfs /bin/true + # CIS 1.1.1.2 L1 Ensure mounting of freevxfs filesystems is disabled - lsmod + install freevxfs /bin/true + # CIS 1.1.1.3 L1 Ensure mounting of jffs2 filesystems is disabled - modprobe + install jffs2 /bin/true + # CIS 1.1.1.4 L1 Ensure mounting of hfs filesystems is disabled - modprobe + install hfs /bin/true + # CIS 1.1.1.5 L1 Ensure mounting of hfsplus filesystems is disabled - lsmod + install hfsplus /bin/true + # CIS 1.1.1.6 L1 Ensure mounting of squashfs filesystems is disabled - modprobe + install squashfs /bin/true + # CIS 1.1.1.7 L1 Ensure mounting of udf filesystems is disabled - lsmod + install udf /bin/true + # CIS 1.1.1.8 L2 Ensure mounting of FAT filesystems is disabled + install vfat /bin/true + + # CIS 3.5.1 L1 Ensure DCCP is disabled + install dccp /bin/true + # CIS 3.5.2 L1 Ensure SCTP is disabled + install sctp /bin/true + # CIS 3.5.3 L1 Ensure RDS is disabled + install rds /bin/true + # CIS 3.5.4 L1 Ensure TIPC is disabled + install tipc /bin/true + mode: '0644' + owner: root + group: root + # CIS 5.1.2 L1 Ensure permissions on /etc/crontab are configured + /etc/crontab: "%{alias('root_0600')}" + # CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - cron.allow + /etc/cron.allow: "%{alias('root_0600')}" + # CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - cron.deny + /etc/cron.deny: + ensure: absent + # CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - at.allow + /etc/at.allow: "%{alias('root_0600')}" + # CIS 5.1.8 L1 Ensure at/cron is restricted to authorized users - at.deny + /etc/at.deny: + ensure: absent + /etc/security/pwquality.conf: + content: | + # File managed by Puppet + difok = 5 + # CIS 5.3.1 L1 Ensure password creation requirements are configured - minlen + minlen = 9 + # CIS 5.3.1 L1 Ensure password creation requirements are configured - dcredit + dcredit = -1 + # CIS 5.3.1 L1 Ensure password creation requirements are configured - ucredit + ucredit = -1 + # CIS 5.3.1 L1 Ensure password creation requirements are configured - lcredit + lcredit = -1 + # CIS 5.3.1 L1 Ensure password creation requirements are configured - ocredit + ocredit = -1 + # minclass = 0 + # maxrepeat = 0 + # maxclassrepeat = 0 + # gecoscheck = 0 + # dictpath = + mode: '0644' + owner: root + group: root + # CIS 5.4.4 L1 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.d/*.sh + /etc/profile.d/umask.sh: + content: "umask 0027\n" + /etc/profile.d/umask.csh: + content: "umask 0027\n" + # CIS 5.4.5 L2 Ensure default user shell timeout is 900 seconds or less - /etc/profile + /etc/profile.d/autologout.sh: + content: "export TMOUT=36000\n" + /etc/profile.d/tmout.csh: + content: "TMOUT=36000\n" + # CIS 6.1.2 L1 Ensure permissions on /etc/passwd are configured + /etc/passwd: "%{alias('root_0644')}" + # CIS 6.1.3 L1 Ensure permissions on /etc/shadow are configured + /etc/shadow: "%{alias('root_0000')}" + # CIS 6.1.4 L1 Ensure permissions on /etc/group are configured + /etc/group: "%{alias('root_0644')}" + # CIS 6.1.5 L1 Ensure permissions on /etc/gshadow are configured + /etc/gshadow: "%{alias('root_0000')}" + # CIS 6.1.6 L1 Ensure permissions on /etc/passwd- are configured + /etc/passwd-: "%{alias('root_0644')}" + # CIS 6.1.7 L1 Ensure permissions on /etc/shadow- are configured + /etc/shadow-: "%{alias('root_0000')}" + # CIS 6.1.8 L1 Ensure permissions on /etc/group- are configured + /etc/group-: "%{alias('root_0644')}" + # CIS 6.1.9 L1 Ensure permissions on /etc/gshadow- are configured + /etc/gshadow-: "%{alias('root_0000')}" + # CIS 2.2.1.2 L1 Ensure ntp is configured - restrict -4 - not using NTP + # CIS 2.2.1.2 L1 Ensure ntp is configured - restrict -6 - not using NTP + # CIS 2.2.1.2 L1 Ensure ntp is configured - server - not using NTP + # CIS 2.2.1.3 L1 Ensure chrony is configured - NTP server - set elsewhere in hiera + # CIS 2.2.1.3 L1 Ensure chrony is configured - OPTIONS + /etc/sysconfig/chronyd: + content: | + # File managed by Puppet + OPTIONS='-u chrony' + # CIS 4.1.1.1 L2 Ensure audit log storage size is configured + # CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'space_left_action = email' + # CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'action_mail_acct = root' + # CIS 4.1.1.2 L2 Ensure system is disabled when audit logs are full - 'admin_space_left_action = halt' + # CIS 4.1.1.3 L2 Ensure audit logs are not automatically deleted + # CIS 4.1.2 L2 Ensure auditd service is enabled + # CIS 4.1.3 L2 Ensure auditing for processes that start prior to auditd is enabled + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl adjtimex (32-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - adjtimex (32-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl clock_settime (32-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - clock_settime (32-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl /etc/localtime + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - /etc/localtime + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl adjtimex (64-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - auditctl clock_settime (64-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - adjtimex (64-bit) + # CIS 4.1.4 L2 Ensure events that modify date and time information are collected - clock_settime (64-bit) + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/group' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/group' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/passwd' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/passwd' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/gshadow' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/gshadow' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/shadow' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/shadow' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - '/etc/security/opasswd' + # CIS 4.1.5 L2 Ensure events that modify user/group information are collected - auditctl '/etc/security/opasswd' + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - sethostname (32-bit) + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl sethostname (32-bit) + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - issue + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl issue + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - issue.net + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl issue.net + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/hosts + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl hosts + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/sysconfig/network + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl network + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - /etc/sysconfig/network-scripts + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl network-scripts + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - sethostname (64-bit) + # CIS 4.1.6 L2 Ensure events that modify the system's network environment are collected - auditctl sethostname (64-bit) + # CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/selinux/ + # CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/selinux/ + # CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - /usr/share/selinux/ + # CIS 4.1.7 L2 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /usr/share/selinux/ + # CIS 4.1.8 L2 Ensure login and logout events are collected - /var/log/lastlog + # CIS 4.1.8 L2 Ensure login and logout events are collected - auditctl /var/log/lastlog + # CIS 4.1.8 L2 Ensure login and logout events are collected - /var/run/faillock/ + # CIS 4.1.8 L2 Ensure login and logout events are collected - auditctl /var/run/faillock/ + # CIS 4.1.9 L2 Ensure session initiation information is collected - utmp + # CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl utmp + # CIS 4.1.9 L2 Ensure session initiation information is collected - wtmp + # CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl wtmp + # CIS 4.1.9 L2 Ensure session initiation information is collected - btmp + # CIS 4.1.9 L2 Ensure session initiation information is collected - auditctl btmp + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chmod/fchmod/fchmodat + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chmod/fchmod/fchmodat + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chown/fchown/fchownat/lchown + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chown/fchown/fchownat/lchown + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - setxattr/lsetxattr/fsetxattr/removexattr + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl setxattr/lsetxattr/fsetxattr/removexattr + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chmod/fchmod/fchmodat (64-bit) + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chmod/fchmod/fchmodat (64-bit) + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - chown/fchown/fchownat/lchown (64-bit) + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl chown/fchown/fchownat/lchown (64-bit) + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - xattr (64-bit) + # CIS 4.1.10 L2 Ensure discretionary access control permission modification events are collected - auditctl xattr (64-bit) + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EACCES + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EPERM + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EACCES (64-bit) + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EACCES (64-bit) + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - EPERM (64-bit) + # CIS 4.1.11 L2 Ensure unsuccessful unauthorized file access attempts are collected - auditctl EPERM (64-bit) + # CIS 4.1.12 L2 Ensure use of privileged commands is collected + # CIS 4.1.13 L2 Ensure successful file system mounts are collected + # CIS 4.1.13 L2 Ensure successful file system mounts are collected - auditctl + # CIS 4.1.13 L2 Ensure successful file system mounts are collected - b64 + # CIS 4.1.13 L2 Ensure successful file system mounts are collected - auditctl (64-bit) + # CIS 4.1.14 L2 Ensure file deletion events by users are collected + # CIS 4.1.14 L2 Ensure file deletion events by users are collected - auditctl + # CIS 4.1.14 L2 Ensure file deletion events by users are collected - b64 + # CIS 4.1.14 L2 Ensure file deletion events by users are collected - auditctl (64-bit) + # CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - sudoers + # CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - auditctl sudoers + # CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - sudoers.d + # CIS 4.1.15 L2 Ensure changes to system administration scope (sudoers) is collected - auditctl sudoers.d + # CIS 4.1.16 L2 Ensure system administrator actions (sudolog) are collected + # CIS 4.1.16 L2 Ensure system administrator actions (sudolog) are collected - auditctl + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - insmod + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl insmod + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - rmmod + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl rmmod + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - modprobe + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl modprobe + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - init_module/delete_module + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl init_module/delete_module + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - init_module/delete_module + # CIS 4.1.17 L2 Ensure kernel module loading and unloading is collected - auditctl init_module/delete_module + # CIS 4.1.18 L2 Ensure the audit configuration is immutable + /etc/audit/auditd.conf: + content: | + # File managed by Puppet + # + # This file controls the configuration of the audit daemon + # + local_events = yes + write_logs = yes + log_file = /var/log/audit/audit.log + log_group = root + log_format = RAW + flush = INCREMENTAL_ASYNC + freq = 50 + max_log_file = 8 + num_logs = 5 + priority_boost = 4 + disp_qos = lossy + dispatcher = /sbin/audispd + name_format = NONE + ##name = mydomain + max_log_file_action = ROTATE + space_left = 75 + space_left_action = SYSLOG + verify_email = yes + action_mail_acct = root + admin_space_left = 50 + admin_space_left_action = SUSPEND + disk_full_action = SUSPEND + disk_error_action = SUSPEND + use_libwrap = yes + ##tcp_listen_port = 60 + tcp_listen_queue = 5 + tcp_max_per_addr = 1 + ##tcp_client_ports = 1024-65535 + tcp_client_max_idle = 0 + enable_krb5 = no + krb5_principal = auditd + ##krb5_key_file = /etc/audit/audit.key + distribute_network = no + + +profile::file_ops::directories: + # CIS 5.1.3 L1 Ensure permissions on /etc/cron.hourly are configured + /etc/cron.hourly: "%{alias('root_0700')}" + # CIS 5.1.4 L1 Ensure permissions on /etc/cron.daily are configured + /etc/cron.daily: "%{alias('root_0700')}" + # CIS 5.1.5 L1 Ensure permissions on /etc/cron.weekly are configured + /etc/cron.weekly: "%{alias('root_0700')}" + # CIS 5.1.6 L1 Ensure permissions on /etc/cron.monthly are configured + /etc/cron.monthly: "%{alias('root_0700')}" + # CIS 5.1.7 L1 Ensure permissions on /etc/cron.d are configured + /etc/cron.d: "%{alias('root_0700')}" + +# CIS 5.3.1 L1 Ensure password creation requirements are configured - password-auth try_first_pass +# CIS 5.3.1 L1 Ensure password creation requirements are configured - system-auth try_first_pass +# CIS 5.3.1 L1 Ensure password creation requirements are configured - password-auth retry=3 +# CIS 5.3.1 L1 Ensure password creation requirements are configured - system-auth retry=3 +central_auth::pam::dfok: 5 +central_auth::pam::minlen: 9 +central_auth::pam::dcredit: -1 +central_auth::pam::ucredit: -1 +central_auth::pam::ocredit: -1 +central_auth::pam::lcredit: -1 + + +# CIS 1.4.2 L1 Ensure bootloader password is set +# CIS 1.4.3 L1 Ensure authentication required for single user mode - rescue.service +# CIS 1.4.3 L1 Ensure authentication required for single user mode - emergency.service + +# CIS 1.5.1 L1 Ensure core dumps are restricted - limits.conf limits.d +security::limits::limits_hash: + "*/hard/core": + value: '0' +# CIS 1.5.1 L1 Ensure core dumps are restricted - sysctl +# CIS 1.5.1 L1 Ensure core dumps are restricted - sysctl.conf sysctl.d +profile::kernel::sysctl: + fs.suid_dumpable: 0 + # CIS 1.5.3 L1 Ensure address space layout randomization (ASLR) is enabled - sysctl + # CIS 1.5.3 L1 Ensure address space layout randomization (ASLR) is enabled - sysctl.conf sysctl.d + kernel.randomize_va_space: 2 + # CIS 3.1.1 L1 Ensure IP forwarding is disabled - sysctl + # CIS 3.1.1 L1 Ensure IP forwarding is disabled - sysctlc.conf sysctl.d + net.ipv4.ip_forward: 0 + # CIS 3.1.2 L1 Ensure packet redirect sending is disabled - 'net.ipv4.conf.all.send_redirects = 0' + # CIS 3.1.2 L1 Ensure packet redirect sending is disabled - 'net.ipv4.conf.default.send_redirects = 0' + net.ipv4.conf.all.send_redirects: 0 + net.ipv4.conf.default.send_redirects: 0 + # CIS 3.2.1 L1 Ensure source routed packets are not accepted - 'net.ipv4.conf.default.accept_source_route = 0' + # CIS 3.2.1 L1 Ensure source routed packets are not accepted - 'net.ipv4.conf.all.accept_source_route = 0' + net.ipv4.conf.all.accept_source_route: 0 + net.ipv4.conf.default.accept_source_route: 0 + # CIS 3.2.2 L1 Ensure ICMP redirects are not accepted - 'net.ipv4.conf.all.accept_redirects = 0' + # CIS 3.2.2 L1 Ensure ICMP redirects are not accepted - 'net.ipv4.conf.default.accept_redirects = 0' + net.ipv4.conf.all.accept_redirects: 0 + net.ipv4.conf.default.accept_redirects: 0 + # CIS 3.2.3 L1 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.default.secure_redirects = 0' + # CIS 3.2.3 L1 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.all.secure_redirects = 0' + net.ipv4.conf.all.secure_redirects: 0 + net.ipv4.conf.default.secure_redirects: 0 + # CIS 3.2.4 L1 Ensure suspicious packets are logged - 'net.ipv4.conf.all.log_martians = 1' + # CIS 3.2.4 L1 Ensure suspicious packets are logged - 'net.ipv4.conf.default.log_martians = 1' + net.ipv4.conf.all.log_martians: 1 + net.ipv4.conf.default.log_martians: 1 + # CIS 3.2.5 L1 Ensure broadcast ICMP requests are ignored - sysctl + # CIS 3.2.5 L1 Ensure broadcast ICMP requests are ignored - sysctl.conf sysctl.d + net.ipv4.icmp_echo_ignore_broadcasts: 1 + # CIS 3.2.6 L1 Ensure bogus ICMP responses are ignored - sysctl + # CIS 3.2.6 L1 Ensure bogus ICMP responses are ignored - sysctl.conf sysctl.d + net.ipv4.icmp_ignore_bogus_error_responses: 1 + # CIS 3.2.7 L1 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.default.rp_filter = 1' + # CIS 3.2.7 L1 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.all.rp_filter = 1' + net.ipv4.conf.all.rp_filter: 1 + net.ipv4.conf.default.rp_filter: 1 + # CIS 3.2.8 L1 Ensure TCP SYN Cookies is enabled - sysctl + # CIS 3.2.8 L1 Ensure TCP SYN Cookies is enabled - sysctl.conf sysctl.d + net.ipv4.tcp_syncookies: 1 + # CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.all.accept_ra = 0' + # CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.default.accept_ra = 0' + # CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - files 'net.ipv6.conf.all.accept_ra = 0' + # CIS 3.3.1 L1 Ensure IPv6 router advertisements are not accepted - files 'net.ipv6.conf.default.accept_ra = 0' + net.ipv6.conf.all.accept_ra: 0 + net.ipv6.conf.default.accept_ra: 0 + # CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - 'net.ipv6.conf.default.accept_redirects = 0' + # CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - 'net.ipv6.conf.all.accept_redirects = 0' + # CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - files 'net.ipv6.conf.default.accept_redirects = 0' + # CIS 3.3.2 L1 Ensure IPv6 redirects are not accepted - files 'net.ipv6.conf.all.accept_redirects = 0' + net.ipv6.conf.all.accept_redirects: 0 + net.ipv6.conf.default.accept_redirects: 0 + +# CIS 1.5.2 L1 Ensure XD/NX support is enabled (32 bit only) +# CIS 1.8 L1 Ensure updates, patches, and additional security software are installed + +# CIS 2.2.15 L1 Ensure mail transfer agent is configured for local-only mode +networking::mailclient::inet_interfaces: 'localhost' + +packages::remove: + RedHat: + # CIS 1.1.22 L1 Disable Automounting + - autofs + # CIS 1.5.4 L1 Ensure prelink is disabled + - prelink + # CIS 1.6.1.4 L2 Ensure SETroubleshoot is not installed + - setroubleshoot + # CIS 1.6.1.5 L2 Ensure the MCS Translation Service (mcstrans) is not installed + - mcstrans + # CIS 1.7.2 L1 Ensure GDM login banner is configured - user-db + # CIS 1.7.2 L1 Ensure GDM login banner is configured - system-db + # CIS 1.7.2 L1 Ensure GDM login banner is configured - file-db + # CIS 1.7.2 L1 Ensure GDM login banner is configured - banner message enabled + # CIS 1.7.2 L1 Ensure GDM login banner is configured - banner message text + - gdm + # CIS 2.1.1 L1 Ensure chargen services are not enabled - dgram + # CIS 2.1.1 L1 Ensure chargen services are not enabled - stream + # CIS 2.1.2 L1 Ensure daytime services are not enabled - dgram + # CIS 2.1.2 L1 Ensure daytime services are not enabled - stream + # CIS 2.1.3 L1 Ensure discard services are not enabled - dgram + # CIS 2.1.3 L1 Ensure discard services are not enabled - stream + # CIS 2.1.4 L1 Ensure echo services are not enabled - dgram + # CIS 2.1.4 L1 Ensure echo services are not enabled - stream + # CIS 2.1.5 L1 Ensure time services are not enabled - dgram + # CIS 2.1.5 L1 Ensure time services are not enabled - stream + # CIS 2.1.7 L1 Ensure xinetd is not enabled + - xinetd + # CIS 2.1.6 L1 Ensure tftp server is not enabled + # CIS 2.2.20 L1 Ensure tftp server is not enabled + - tftp-server +# CIS 2.2.2 L1 Ensure X Window System is not installed + # CIS 2.2.3 L1 Ensure Avahi Server is not enabled + - avahi + # CIS 2.2.4 L1 Ensure CUPS is not enabled + - cups + # CIS 2.2.5 L1 Ensure DHCP Server is not enabled + - dhcp + - dnsmasq + # CIS 2.2.6 L1 Ensure LDAP server is not enabled + - openldap-servers +# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - nfs +# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - nfs-server +# CIS 2.2.7 L1 Ensure NFS and RPC are not enabled - rpcbind + # CIS 2.2.8 L1 Ensure DNS Server is not enabled + - bind + - pdns + # CIS 2.2.9 L1 Ensure FTP Server is not enabled + - vsftpd + - pure-ftpd + - perl-ftpd + - proftpd + # CIS 2.2.10 L1 Ensure HTTP server is not enabled + - caddy + - httpd + - lighttpd + - nginx + - nginx14-nginx + - nginx16-nginx + - nodejs-ws + - xbean + - rubygem-thin + # CIS 2.2.11 L1 Ensure IMAP and POP3 server is not enabled + - dovecot + - cyrus-imapd + # CIS 2.2.12 L1 Ensure Samba is not enabled + - samba + - samba-dc + # CIS 2.2.13 L1 Ensure HTTP Proxy Server is not enabled + - squid + # CIS 2.2.14 L1 Ensure SNMP Server is not enabled + - net-snmp + # CIS 2.2.16 L1 Ensure NIS Server is not enabled + # CIS 2.3.1 L1 Ensure NIS Client is not installed + - ypserv + - ypbind + # CIS 2.2.17 L1 Ensure rsh server is not enabled - rexec + # CIS 2.2.17 L1 Ensure rsh server is not enabled - rlogin + # CIS 2.2.17 L1 Ensure rsh server is not enabled - rsh + # CIS 2.3.2 L1 Ensure rsh client is not installed + - rsh-server + - rsh + # CIS 2.2.18 L1 Ensure talk server is not enabled + # CIS 2.3.3 L1 Ensure talk client is not installed + - ntalk + - talk + # CIS 2.2.19 L1 Ensure telnet server is not enabled + - telnet-server +profile::services: + # CIS 1.2.5 L2 Disable the rhnsd Daemon + rhnsd: + ensure: stopped + enable: false + # CIS 2.2.21 L1 Ensure rsync service is not enabled + rsyncd: + ensure: stopped + enable: false + # CIS 5.1.1 L1 Ensure cron daemon is enabled + crond: + ensure: running + enable: true + +# CIS 2.3.4 L1 Ensure telnet client is not installed - disputed +# CIS 2.3.5 L1 Ensure LDAP client is not installed - disputed + +packages::add: + RedHat: + # CIS 3.4.1 L1 Ensure TCP Wrappers is installed + - tcp_wrappers + # CIS 1.6.2 L2 Ensure SELinux is installed + - libselinux + +# CIS 3.6.1 L1 Ensure iptables is installed +profile::firewall::enable: true +profile::firewall::chains: + # CIS 3.6.2 L1 Ensure default deny firewall policy - Chain INPUT + INPUT:filter:IPv4: + policy: drop + INPUT:filter:IPv6: + policy: drop + # CIS 3.6.2 L1 Ensure default deny firewall policy - Chain FORWARD + FORWARD:filter:IPv4: + policy: drop + FORWARD:filter:IPv6: + policy: drop + # CIS 3.6.2 L1 Ensure default deny firewall policy - Chain OUTPUT + OUTPUT:filter:IPv4: + policy: drop + OUTPUT:filter:IPv6: + policy: drop +# CIS 3.6.3 L1 Ensure loopback traffic is configured +# Configured in code +# CIS 3.6.4 L1 Ensure outbound and established connections are configured +# Configured in code +# CIS 3.6.5 L1 Ensure firewall rules exist for all open ports +profile::firewall::inbound: + '101 DHCP Server': + sport: 67 + proto: udp + '110 SSH Access': + dport: 22 + '161 NetBackup Server': + dport: [ 1556, 13724 ] +profile::firewall::outbound: + '101 DHCP Client': + sport: 68 + proto: udp + '120 SSH Access': + sport: 22 + '130 Puppet Server Access': + dport: [8140,8142] + destination: 10.5.162.0/24 + '102 Network Time Protocol': + dport: 123 + proto: udp + '103 Name Resolution TCP': + dport: 53 + proto: tcp + '103 Name Resolution UDP': + dport: 53 + proto: udp + '104 AD Authentication TCP': + dport: [ 88, 389, 445, 464, 3268 ] + '104 AD Authentication UDP': + dport: [ 88, 137, 389 ] + proto: udp + '140 RightLink Agent': + # From here: https://docs.rightscale.com/faq/Firewall_Configuration_Ruleset.html + dport: 443 + destination: + - 54.225.248.128/27 + - 54.244.88.96/27 + - 54.86.63.128/26 + - 54.187.254.128/26 + - 54.246.247.16/28 + - 54.248.220.128/28 + - 54.255.255.208/28 + - 52.65.255.224/28 + '141 AWS Instance Data': + dport: 80 + destination: 169.254.169.254/32 + '145 Sumo Logic Monitoring': + # Unfortunately SUMO runs on AWS randomly, so we need to open up access to the whole of AWS EC2 for our region ap-southeast-2 + # https://help.sumologic.com/APIs/General-API-Information/Sumo-Logic-Endpoints-and-Firewall-Security + dport: 443 + destination: + - 13.210.0.0/15 + - 13.236.0.0/14 + - 13.54.0.0/15 + - 15.193.3.0/24 + - 3.104.0.0/14 + - 3.24.0.0/14 + - 52.62.0.0/15 + - 52.64.0.0/17 + - 52.64.128.0/17 + - 52.65.0.0/16 + - 52.94.248.64/28 + - 52.95.241.0/24 + - 52.95.255.16/28 + - 54.153.128.0/17 + - 54.206.0.0/16 + - 54.252.0.0/16 + - 54.253.0.0/16 + - 54.66.0.0/16 + - 54.79.0.0/16 + - 99.77.144.0/24 + # Currently some sumo installations are trying to hit the US AWS site us-east-1, hopefully we can delete these after getting the + # sumo agent to just point to AU + - 100.24.0.0/13 + - 107.20.0.0/14 + - 15.193.6.0/24 + - 162.250.236.0/24 + - 162.250.237.0/24 + - 162.250.238.0/23 + - 174.129.0.0/16 + - 18.204.0.0/14 + - 18.208.0.0/13 + - 18.232.0.0/14 + - 184.72.128.0/17 + - 184.72.64.0/18 + - 184.73.0.0/16 + - 204.236.192.0/18 + - 208.86.88.0/23 + - 216.182.224.0/21 + - 216.182.232.0/22 + - 216.182.238.0/23 + - 23.20.0.0/14 + - 3.208.0.0/12 + - 3.224.0.0/12 + - 3.80.0.0/12 + - 34.192.0.0/12 + - 34.224.0.0/12 + - 35.153.0.0/16 + - 35.168.0.0/13 + - 44.192.0.0/11 + - 50.16.0.0/15 + - 50.19.0.0/16 + - 52.0.0.0/15 + - 52.2.0.0/15 + - 52.20.0.0/14 + - 52.200.0.0/13 + - 52.4.0.0/14 + - 52.44.0.0/15 + - 52.54.0.0/15 + - 52.70.0.0/15 + - 52.72.0.0/15 + - 52.86.0.0/15 + - 52.90.0.0/15 + - 52.94.201.0/26 + - 52.94.248.0/28 + - 52.95.245.0/24 + - 52.95.255.80/28 + - 54.144.0.0/14 + - 54.152.0.0/16 + - 54.156.0.0/14 + - 54.160.0.0/13 + - 54.172.0.0/15 + - 54.174.0.0/15 + - 54.196.0.0/15 + - 54.198.0.0/16 + - 54.204.0.0/15 + - 54.208.0.0/15 + - 54.210.0.0/15 + - 54.221.0.0/16 + - 54.224.0.0/15 + - 54.226.0.0/15 + - 54.234.0.0/15 + - 54.236.0.0/15 + - 54.242.0.0/15 + - 54.80.0.0/13 + - 54.88.0.0/14 + - 54.92.128.0/17 + - 67.202.0.0/18 + - 72.44.32.0/19 + - 75.101.128.0/17 + - 99.77.128.0/24 + - 99.77.129.0/24 + - 99.77.191.0/24 + - 99.77.254.0/24 + '150 Telegraf Monitoring': + dport: 80 + destination: [ 10.212.82.107/32, 10.212.85.6/32 ] + '160 YUM Server': + dport: [ 80, 443 ] + destination: "%{::yum_server}" + '161 NetBackup Server': + dport: [ 1556, 13724 ] + '162 Mail Server': + dport: 25 + destination: "%{hiera('networking::mailclient::relayhost')}" + '163 Log Server': + dport: [ 5514, 6514 ] + destination: + - "%{hiera('profile::nxlog_client::logserver1')}" + - "%{hiera('profile::nxlog_client::logserver2')}" +# CIS 3.7 L1 Ensure wireless interfaces are disabled + + +# CIS 4.2.1.1 L1 Ensure rsyslog Service is enabled +# CIS 4.2.1.3 L1 Ensure rsyslog default file permissions configured +# CIS 4.2.1.4 L1 Ensure rsyslog is configured to send logs to a remote log host +# CIS 4.2.1.5 L1 Ensure remote rsyslog messages are only accepted on designated log hosts. - imtcp.so +# CIS 4.2.1.5 L1 Ensure remote rsyslog messages are only accepted on designated log hosts. - InputTCPServerRun 514 +# CIS 4.2.2.1 L1 Ensure syslog-ng service is enabled +# CIS 4.2.2.3 L1 Ensure syslog-ng default file permissions configured +# CIS 4.2.2.4 L1 Ensure syslog-ng is configured to send logs to a remote log host - destination logserver +# CIS 4.2.2.4 L1 Ensure syslog-ng is configured to send logs to a remote log host - log src +# CIS 4.2.2.5 L1 Ensure remote syslog-ng messages are only accepted on designated log hosts +# CIS 4.2.4 L1 Ensure permissions on all logfiles are configured + + +# CIS 5.2.1 L1 Ensure permissions on /etc/ssh/sshd_config are configured +# Set to 600 by SSH server module +profile::ssh::options_hash: +# CIS 5.2.2 L1 Ensure SSH Protocol is set to 2 + Protocol: '2' +# CIS 5.2.3 L1 Ensure SSH LogLevel is set to INFO + LogLevel: INFO +# CIS 5.2.4 L1 Ensure SSH X11 forwarding is disabled + X11Forwarding: no +# CIS 5.2.5 L1 Ensure SSH MaxAuthTries is set to 4 or less + MaxAuthTries: '4' +# CIS 5.2.6 L1 Ensure SSH IgnoreRhosts is enabled + IgnoreRhosts: yes +# CIS 5.2.7 L1 Ensure SSH HostbasedAuthentication is disabled + HostbasedAuthentication: no +# CIS 5.2.8 L1 Ensure SSH root login is disabled + PermitRootLogin: no +# CIS 5.2.9 L1 Ensure SSH PermitEmptyPasswords is disabled + PermitEmptyPasswords: no +# CIS 5.2.10 L1 Ensure SSH PermitUserEnvironment is disabled + PermitUserEnvironment: no +# CIS 5.2.11 L1 Ensure only approved MAC algorithms are used + MACs: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com +# CIS 5.2.12 L1 Ensure SSH Idle Timeout Interval is configured - ClientAliveInterval - setting to an hour to balance productivity + ClientAliveInterval: '3600' +# CIS 5.2.12 L1 Ensure SSH Idle Timeout Interval is configured - ClientAliveCountMax + ClientAliveCountMax: '0' +# CIS 5.2.13 L1 Ensure SSH LoginGraceTime is set to one minute or less + LoginGraceTime: 60 +# CIS 5.2.15 L1 Ensure SSH warning banner is configured + Banner: /etc/issue +# CIS 5.2.14 L1 Ensure SSH access is limited +profile::ssh::allowed_groups: + - gg_linux_admins + +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth required pam_faillock.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth [success=1 default=bad] pam_unix.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth [default=die] pam_faillock.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - system-auth 'auth sufficient pam_faillock.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth required pam_faillock.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth [success=1 default=bad] pam_unix.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth [default=die] pam_faillock.so' +# CIS 5.3.2 L1 Ensure lockout for failed password attempts is configured - password-auth 'auth sufficient pam_faillock.so' + +# CIS 5.3.3 L1 Ensure password reuse is limited - system-auth +# CIS 5.3.3 L1 Ensure password reuse is limited - password-auth + +# CIS 5.3.4 L1 Ensure password hashing algorithm is SHA-512 - system-auth +# CIS 5.3.4 L1 Ensure password hashing algorithm is SHA-512 - password-auth +# Set via the central_auth module + +# CIS 5.4.1.1 L1 Ensure password expiration is 365 days or less +# CIS 5.4.1.2 L1 Ensure minimum days between password changes is 7 or more +# CIS 5.4.1.3 L1 Ensure password expiration warning days is 7 or more +# CIS 5.4.1.4 L1 Ensure inactive password lock is 30 days or less +# CIS 5.4.1.5 L1 Ensure all users last password change date is in the past + +# CIS 5.4.2 L1 Ensure system accounts are non-login + +local_users::add::users: + root: + uid: 0 + # CIS 5.4.3 L1 Ensure default group for the root account is GID 0 + gid: 0 + # CIS 5.6 L1 Ensure access to the su command is restricted - wheel group contains root + groups: [ wheel ] + +profile::file_ops::file_lines: + /etc/bashrc: + # CIS 5.4.5 L2 Ensure default user shell timeout is 900 seconds or less - /etc/bashrc - setting to an hour to balance productivity + - line : 'TMOUT=3600' + match : 'TMOUT=' + # CIS 5.4.4 L1 Ensure default user umask is 027 or more restrictive - /etc/bashrc + - line : ' umask 027' + match : ' umask 0\d\d' + multiple : true + # CIS 5.6 L1 Ensure access to the su command is restricted - pam_wheel.so + /etc/pam.d/su: + line : 'auth required pam_wheel.so use_uid' + match : '#auth required pam_wheel.so use_uid' + # CIS 3.3.3 L1 Ensure IPv6 is disabled + /etc/default/grub: + line: GRUB_CMDLINE_LINUX='ipv6.disable=1' + match: GRUB_CMDLINE_LINUX + # CIS 6.2.2 L1 Ensure no legacy '+' entries exist in /etc/passwd + /etc/passwd: + ensure: absent + line: '+' + # CIS 6.2.3 L1 Ensure no legacy '+' entries exist in /etc/shadow + /etc/shadow: + ensure: absent + line: '+' + # CIS 6.2.4 L1 Ensure no legacy '+' entries exist in /etc/group + /etc/group: + ensure: absent + line: '+' + +# CIS 5.5 L1 Ensure root login is restricted to system console - TBD +# CIS 6.1.10 L1 Ensure no world writable files exist +# CIS 6.1.11 L1 Ensure no unowned files or directories exist +# CIS 6.1.12 L1 Ensure no ungrouped files or directories exist +# CIS 6.1.13 L1 Audit SUID executables +# CIS 6.1.14 L1 Audit SGID executables +# CIS 6.2.1 L1 Ensure password fields are not empty + +# CIS 6.2.5 L1 Ensure root is the only UID 0 account +# CIS 6.2.6 L1 Ensure root PATH Integrity +# CIS 6.2.7 L1 Ensure all users' home directories exist +# CIS 6.2.8 L1 Ensure users' home directories permissions are 750 or more restrictive +# CIS 6.2.9 L1 Ensure users own their home directories +# CIS 6.2.10 L1 Ensure users' dot files are not group or world writable +# CIS 6.2.11 L1 Ensure no users have .forward files +# CIS 6.2.12 L1 Ensure no users have .netrc files +# CIS 6.2.13 L1 Ensure users' .netrc Files are not group or world accessible +# CIS 6.2.14 L1 Ensure no users have .rhosts files +# CIS 6.2.15 L1 Ensure all groups in /etc/passwd exist in /etc/group +# CIS 6.2.16 L1 Ensure no duplicate UIDs exist +# CIS 6.2.17 L1 Ensure no duplicate GIDs exist +# CIS 6.2.18 L1 Ensure no duplicate user names exist +# CIS 6.2.19 L1 Ensure no duplicate group names exist + +# CIS 1.6.1.1 L2 Ensure SELinux is not disabled in bootloader configuration - selinux = 0 +# CIS 1.6.1.1 L2 Ensure SELinux is not disabled in bootloader configuration - enforcing = 0 + +profile::file_ops::templates: + # CIS 1.6.1.2 L2 Ensure the SELinux state is enforcing + # CIS 1.6.1.3 L2 Ensure SELinux policy is configured + /etc/selinux/config: + data: + setting: permissive + type: targeted + owner: root + group: root + mode: '0644' + content: | + # This file controls the state of SELinux on the system. + # SELINUX= can take one of these three values: + # enforcing - SELinux security policy is enforced. + # permissive - SELinux prints warnings instead of enforcing. + # disabled - No SELinux policy is loaded. + SELINUX=<%= $setting %> + # SELINUXTYPE= can take one of these two values: + # targeted - Targeted processes are protected, + # mls - Multi Level Security protection. + SELINUXTYPE=<%= $type %> + +# CIS 1.6.1.6 L2 Ensure no unconfined daemons exist + +# CIS 6.1.1 L2 Audit system file permissions diff --git a/data/nodes/pe201811ha-master.platform9.puppet.net.yaml b/data/nodes/pe201811ha-master.platform9.puppet.net.yaml new file mode 100644 index 0000000..9ec1ecd --- /dev/null +++ b/data/nodes/pe201811ha-master.platform9.puppet.net.yaml @@ -0,0 +1,28 @@ +puppet_enterprise::master::puppetserver::jruby_max_active_instances: 1 +puppet_enterprise::master::puppetserver:reserved_code_cache: '96m' +puppet_enterprise::profile::master::java_args: + Xmx: '384m' + Xms: '128m' + 'XX:MaxPermSize': '=96m' + 'XX:PermSize': '=64m' + 'XX:+UseG1GC': '' +puppet_enterprise::profile::puppetdb::java_args: + Xmx: '128m' + Xms: '64m' + 'XX:MaxPermSize': '=96m' + 'XX:PermSize': '=64m' + 'XX:+UseG1GC': '' +puppet_enterprise::profile::console::java_args: + Xmx: '64m' + Xms: '64m' + 'XX:MaxPermSize': '=96m' + 'XX:PermSize': '=64m' + 'XX:+UseG1GC': '' +puppet_enterprise::profile::console::delayed_job_workers: 1 +#shared_buffers takes affect during install but is not managed after +puppet_enterprise::profile::database::shared_buffers: '4MB' +#2015.3.2 and above +puppet_enterprise::profile::orchestrator::java_args: + Xmx: '64m' + Xms: '64m' + 'XX:+UseG1GC': '' diff --git a/data/nodes/pe201811ha-replica.platform9.puppet.net.yaml b/data/nodes/pe201811ha-replica.platform9.puppet.net.yaml new file mode 100644 index 0000000..9ec1ecd --- /dev/null +++ b/data/nodes/pe201811ha-replica.platform9.puppet.net.yaml @@ -0,0 +1,28 @@ +puppet_enterprise::master::puppetserver::jruby_max_active_instances: 1 +puppet_enterprise::master::puppetserver:reserved_code_cache: '96m' +puppet_enterprise::profile::master::java_args: + Xmx: '384m' + Xms: '128m' + 'XX:MaxPermSize': '=96m' + 'XX:PermSize': '=64m' + 'XX:+UseG1GC': '' +puppet_enterprise::profile::puppetdb::java_args: + Xmx: '128m' + Xms: '64m' + 'XX:MaxPermSize': '=96m' + 'XX:PermSize': '=64m' + 'XX:+UseG1GC': '' +puppet_enterprise::profile::console::java_args: + Xmx: '64m' + Xms: '64m' + 'XX:MaxPermSize': '=96m' + 'XX:PermSize': '=64m' + 'XX:+UseG1GC': '' +puppet_enterprise::profile::console::delayed_job_workers: 1 +#shared_buffers takes affect during install but is not managed after +puppet_enterprise::profile::database::shared_buffers: '4MB' +#2015.3.2 and above +puppet_enterprise::profile::orchestrator::java_args: + Xmx: '64m' + Xms: '64m' + 'XX:+UseG1GC': '' diff --git a/data/nodes/puppetmom.platform9.puppet.net.yaml b/data/nodes/puppetmom.platform9.puppet.net.yaml new file mode 100644 index 0000000..61398e6 --- /dev/null +++ b/data/nodes/puppetmom.platform9.puppet.net.yaml @@ -0,0 +1,17 @@ +--- +puppet_enterprise::profile::database::shared_buffers: 3715MB +puppet_enterprise::puppetdb::command_processing_threads: 4 +puppet_enterprise::profile::puppetdb::java_args: + Xms: 2229m + Xmx: 2229m +puppet_enterprise::master::puppetserver::jruby_max_active_instances: 2 +puppet_enterprise::profile::master::java_args: + Xms: 1536m + Xmx: 1536m +puppet_enterprise::master::puppetserver::reserved_code_cache: 512m +puppet_enterprise::profile::console::java_args: + Xms: 768m + Xmx: 768m +puppet_enterprise::profile::orchestrator::java_args: + Xms: 768m + Xmx: 768m diff --git a/loadbalancer-improved.pp b/loadbalancer-improved.pp new file mode 100644 index 0000000..79e9632 --- /dev/null +++ b/loadbalancer-improved.pp @@ -0,0 +1,102 @@ +class role::loadbalancer ( + Optional[String] $ports1 = '80', + Optional[String] $ports2 = undef, + Optional[String] $rule1 = 'puppet00', + Optional[String] $rule2 = undef, + Optional[String] $backendserver_name1 = '', + Optional[String] $backendserver_name2 = '', + Optional[String] $backendserver_ipaddress1 = undef, + Optional[String] $backendserver_ipaddress2 = undef, + Optional[String] $connetc_timeout = '60s', + ) { + + class { 'haproxy': + merge_options => true, + global_options => { + 'log' => "${::ipaddress} local0", + 'chroot' => '/var/lib/haproxy', + 'pidfile' => '/var/run/haproxy.pid', + 'maxconn' => '4000', + 'user' => 'haproxy', + 'group' => 'haproxy', + 'daemon' => '', + 'stats' => 'socket /var/lib/haproxy/stats', + }, + defaults_options => { + 'log' => 'global', + 'stats' => 'enable', + 'option' => [ + 'redispatch', + ], + 'retries' => '3', + 'timeout' => [ + 'http-request 10s', + 'queue 1m', + 'connect 300s', + 'client 600s', + 'server 600s', + 'check 1m', + ], + 'maxconn' => '8000', + }, + } + + include ::haproxy + + haproxy::listen { $rule1 : + collect_exported => false, + ipaddress => $::ipaddress, + ports => $ports1, + } + + if $rule2 != undef + { + haproxy::listen { $rule2 : + collect_exported => false, + ipaddress => $::ipaddress, + ports => $ports2, + } + + haproxy::balancermember { 'member3' : + listening_service => $rule2, + server_names => $backendserver_name1, + ipaddresses => $backendserver_ipaddress1, + ports => $ports2, + options => 'check', + + } + + haproxy::balancermember { 'member4' : + listening_service => $rule2, + server_names => $backendserver_name2, + ipaddresses => $backendserver_ipaddress2, + ports => $ports2, + options => 'check', + } + + } + + + + + haproxy::balancermember { 'member1' : + listening_service => $rule1, + server_names => $backendserver_name1, + ipaddresses => $backendserver_ipaddress1, + ports => $ports1, + options => 'check', + + } + + haproxy::balancermember { 'member2' : + listening_service => $rule1, + server_names => $backendserver_name2, + ipaddresses => $backendserver_ipaddress2, + ports => $ports1, + options => 'check', + } + +#pending Improvement, possible areas: Array Input with multipal ports + + +} diff --git a/onceover-example.yaml b/onceover-example.yaml new file mode 100644 index 0000000..bb71230 --- /dev/null +++ b/onceover-example.yaml @@ -0,0 +1,93 @@ +# Classes to be tested +classes: + - role::database_server + - role::webserver + - role::goldload_server + - role::loadbalancer + - role::example + - role::callaugeas + +# Nodes to tests classes on, this refers to a 'factset' or 'nodeset' +# depending on whether you are running 'spec' or 'acceptance' tests +nodes: + - AIX-7.1-powerpc + - SLES-12.1-64 + - Debian-6.0.10-32 + - CentOS-6.6-64 + - Ubuntu-12.04-32 + - Amazon-2018.03 + - Ubuntu-12.04-64 + - CentOS-6.6-32 + - Debian-6.0.10-64 + - AIX-6.1-powerpc + - Windows_Server-2012r2-64 + - RHEL-7.4 + - Debian-7.8-32 + - windows-10-64 + - Windows_Server-2008r2-64 + - SLES-11.3-64 + - Debian-7.8-64 + - solaris-10_u9-sparc-64 + - solaris-11.2-sparc-64 + - Ubuntu-14.04-32 + - CentOS-5.11-64 + - CentOS-5.11-32 + - RHEL-6.7 + - CentOS-7.0-64 + - Ubuntu-14.04-64 + +# You can group classes here to save typing +class_groups: + general_class: + - role::database_server + - role::webserver + - role::goldload_server + - role::example + +# You can group nodes here to save typing +# We have created a 'non_windows_nodes' group because we can't +# give you Windows vagrant boxes to test with because licensing, +# we can give you fact sets though so go crazy with spec testing! +node_groups: + windows_nodes: + - Windows_Server-2012r2-64 + - windows-10-64 + - Windows_Server-2008r2-64 + non_windows_nodes: + include: 'all_nodes' + exclude: 'windows_nodes' + callaugeas_nodes: + - RHEL-7.4 + - RHEL-6.7 + haproxy_nodes: + - SLES-12.1-64 + - Debian-6.0.10-32 + - CentOS-6.6-64 + - Ubuntu-12.04-32 + - Amazon-2018.03 + - Ubuntu-12.04-64 + - CentOS-6.6-32 + - Debian-6.0.10-64 + - RHEL-7.4 + - Debian-7.8-32 + - SLES-11.3-64 + - Debian-7.8-64 + - Ubuntu-14.04-32 + - CentOS-5.11-64 + - CentOS-5.11-32 + - RHEL-6.7 + - CentOS-7.0-64 + - Ubuntu-14.04-64 + +test_matrix: + - all_nodes: + classes: 'general_class' + tests: 'spec' + - callaugeas_nodes: + classes: 'role::callaugeas' + tests: 'spec' + - haproxy_nodes: + classes: 'role::loadbalancer' + tests: 'spec' + + diff --git a/site-modules/.DS_Store b/site-modules/.DS_Store new file mode 100644 index 0000000..77db6da Binary files /dev/null and b/site-modules/.DS_Store differ diff --git a/site-modules/controlm/.DS_Store b/site-modules/controlm/.DS_Store new file mode 100644 index 0000000..8d96ecc Binary files /dev/null and b/site-modules/controlm/.DS_Store differ diff --git a/site-modules/controlm/README.md b/site-modules/controlm/README.md new file mode 100644 index 0000000..5e5c7b0 --- /dev/null +++ b/site-modules/controlm/README.md @@ -0,0 +1,96 @@ +This installs the Optus standard controlm. + +All hiera is managed in the approproate pp file under manifests and the various child .pp files use inherit to see the variables. + +# CONTROLM AGENT +All hiera has defaults. You will probably only need to set servers if anything. + +## Software and patches +The install script installs the main software and the patches as I couldn't get the patch script to run properly after the main install script. Patches are defaulted to the current ones or set in heira + controlm::controlm_agent::patch_files: + - file1 + - file2 + + +## Servers +if the client is in a different domain to the server (eg client is nix.au.singtelgroup.net and server is optus.com.au) then need FQDN as below, else can use short form in both +``` + controlm::controlm_agent::primary_server_host: ctmgnpappla012.optus.com.au + controlm::controlm_agent::server_host: ctmgnpappla012 +``` +Note that you need to be able to contact the host[s] on the server2agent port listed in controlm_agent.pp for the install to work. + +All DEV (DEV,PPT, SIT, GNP etc) must use ctmgnpappla012 as the control-m server, all PRD non BCC Agents must use ctmprdappla003. + + +## Admins +You need accounts for the admins and schedulers as below, subbing PRD for GNP in prd: +``` + isnd_linux::profiles::soe::login_accounts::groups: + - 'ocaus01\ACL-GNP-CTRLM-rwx-SMT-ADMIN': + additional_groups: + - controlm + - 'ocaus01\ACL-GNP-CTRLM-rx-SMT-SCHED': + additional_groups: + - controlm + + tpiam::profiles::sudoers: + ocaus01aclgnpctrlmrwxsmtadmin: + runas_users: + - ctmagent + commands: all_commands + ocaus01aclgnpctrlmrxsmtsched: + runas_users: + - ctmagent + commands: all_commands include controlm::controlm_agent::users + +``` +## To reinstall +``` + userdel -r ctmagent + yum remove ctmagent_core_clean + rm -rf /apps/bmc +``` +# ctm.sh fails +If puppet complains about ctm.sh, be sure everything is running as root properly. The install should do this, but exec is never reliable +``` +[root@bdpprdedgla001 scripts_optus]# pwd +/apps/bmc/ctm/scripts_optus +[root@bdpprdedgla001 scripts_optus]# ./ctm.sh stop +Stopping Control-M Agent +Killing Control-M/Agent Listener pid:23639 +2018-01-09 11:06:33 Listener process stopped +Killing Control-M/Agent Tracker pid:23693 +2018-01-09 11:06:34 Tracker process stopped +``` +it might complain, so if it does, do as it says: +``` +[root@bdpprdedgla002 scripts_optus]# ./ctm.sh stop +Stopping Control-M Agent +The agent is currently running as 'ctmagent' +You need to login as 'ctmagent' and run this command again +``` +so su - ctmagent, run the stop command and then as root +``` +[root@bdpprdedgla001 scripts_optus]# ./ctm.sh mode_full + Sudo mode is disabled + +/apps/bmc/ctm/exe/vault/su_bmc ownership set to ctmagent +/apps/bmc/ctm/exe/vault/su_bmc setuid bit was reset +/apps/bmc/ctm/sysout permissions set to 755 without sticky bit +/apps/bmc/ctm/sysout setgid bit was reset +/apps/bmc/ctm/non-root deleted + + Non-root mode was disabled. + +[root@bdpprdedgla001 scripts_optus]# ./ctm.sh start + + +Starting the agent as 'root' user + +Control-M/Agent Listener started. pid: 10838 +Control-M/Agent Tracker started. pid: 10892 + +Control-M/Agent started successfully. +Control-M Agent Started +``` diff --git a/site-modules/controlm/files/controlm.csh b/site-modules/controlm/files/controlm.csh new file mode 100644 index 0000000..5e7baf4 --- /dev/null +++ b/site-modules/controlm/files/controlm.csh @@ -0,0 +1,4 @@ +setenv PATH ${PATH}:/apps/bmc/ctm/exe:/apps/bmc/ctm/scripts:/apps/bmc/ctm/scripts_optus +setenv CONTROLM /apps/bmc/ctm +setenv LD_LIBRARY_PATH /apps/bmc/ctm/exe + diff --git a/site-modules/controlm/files/controlm.sh b/site-modules/controlm/files/controlm.sh new file mode 100644 index 0000000..6d71a8a --- /dev/null +++ b/site-modules/controlm/files/controlm.sh @@ -0,0 +1,7 @@ +CONTROLM=/apps/bmc/ctm +export CONTROLM +PATH=${PATH}:/apps/bmc/ctm/exe:/apps/bmc/ctm/scripts:/apps/bmc/ctm/scripts_optus +export PATH +LD_LIBRARY_PATH=/apps/bmc/ctm/exe +export LD_LIBRARY_PATH + diff --git a/site-modules/controlm/files/controlm_agent_install.sh b/site-modules/controlm/files/controlm_agent_install.sh new file mode 100644 index 0000000..98c5f28 --- /dev/null +++ b/site-modules/controlm/files/controlm_agent_install.sh @@ -0,0 +1,11 @@ +#!/bin/bash + cd /apps/bmc/ + sudo -u ctmagent /apps/bmc/software/version_9/setup.sh -silent /apps/bmc/ctm/ctm_silentinstall_optus.xml + RESULT=$? + echo "exit status $RESULT" + /bin/date > /apps/bmc/ctm/controlm_agent_install.hasrun + echo "exit status $RESULT" >> /apps/bmc/ctm/controlm_agent_install.hasrun + echo "do not remove this file unless you want to rerun the install" >> /apps/bmc/ctm/controlm_agent_install.hasrun + chmod 444 /apps/bmc/ctm/controlm_agent_install.hasrun + exit $RESULT + diff --git a/site-modules/controlm/files/ctm.sh b/site-modules/controlm/files/ctm.sh new file mode 100644 index 0000000..7f8dd3c --- /dev/null +++ b/site-modules/controlm/files/ctm.sh @@ -0,0 +1,49 @@ +#!/bin/bash +# Startup Script for Control-M Agent Daemons +# Creation Date: 2016-09-09 +# Created By: David Stephenson +# Version: 1.0 + +# chkconfig: 2345 99 05 +# description: Controlm agent + + +CTM_Dir=/apps/bmc/ctm +CTM_OWNER=ctmagent +CTM_GROUP=controlm + +chown $CTM_OWNER:$CTM_GROUP $CTM_Dir/proclog/*.log + +case "$1" in +'start') + cd $CTM_Dir/scripts + ./start-ag -u $CTM_OWNER -p ALL -s + if [ "$?" = 0 ] ; then + touch /var/lock/subsys/ctm + echo "Control-M Agent Started" + fi + ;; +'stop') + cd $CTM_Dir/scripts + echo "Stopping Control-M Agent" + ./shut-ag -u $CTM_OWNER -p ALL + RETVAL=$? + echo + [ $RETVAL -eq 0 ] && rm -f /var/lock/subsys/ctm; + ;; +'mode_user') + cd $CTM_Dir/scripts + ./set_agent_mode -u $CTM_OWNER -o 1 + ;; +'mode_full') + cd $CTM_Dir/scripts + ./set_agent_mode -u $CTM_OWNER -o 2 + ;; +*) + echo "Usage: //ctm.sh { start | stop }" + echo "or, if using sudo...." + echo "Usage: sudo -u root ./ctm.sh { start | stop | mode_user | mode_full }" + ;; +esac +exit 0 + diff --git a/site-modules/controlm/files/setup_patch.sh b/site-modules/controlm/files/setup_patch.sh new file mode 100755 index 0000000..f572214 --- /dev/null +++ b/site-modules/controlm/files/setup_patch.sh @@ -0,0 +1,39 @@ +#!/bin/sh + +# Description: +# This setup.sh find and run the install-bin that is compatible to the installing environment + +# Find this script's directory +utl_dir=`dirname $0` + +# set the INSTALL_BINs directory +bin_dir=$utl_dir + +# get all the INSTALL_BINs +install_bin_list=`ls $bin_dir | grep INSTALL.BIN` + +#get shell to be used to run "BIN" files + __machine=`uname` +shellInterpriter="/bin/ksh" +if [ $__machine = "Linux" ] ; then + shellInterpriter="/bin/sh" +fi + + +# loop on the install_bin_list and find the first one that is compatible with the environment +for install_bin in $install_bin_list +do + ${shellInterpriter} $bin_dir/$install_bin -m + if [ $? -eq 0 ];then + # Current install_bin is compatible with the environment was found, run it to install the FP + $bin_dir/$install_bin $@ + exit $? + fi +done + +echo ERROR: There is no available installation file for this platform: `uname -a` +echo Installation files were found for the following platforms: +echo ${install_bin_list}| tr " " "\n" | cut -f 2 -d_ | cut -f 1 -d. + +exit 1 + diff --git a/site-modules/controlm/files/sleep.sh b/site-modules/controlm/files/sleep.sh new file mode 100644 index 0000000..9d5fad7 --- /dev/null +++ b/site-modules/controlm/files/sleep.sh @@ -0,0 +1,48 @@ +#!/bin/bash +# Sleep Script for Control-M +# Use to Test Control-M Scheduling +# Creation Date: 2016-09-09 +# Created By: David Stephenson +# Version: 1.0 +exec 2> /dev/null +echo "********************************" +echo "** CONTROL-M Environment **" +echo "********************************" +echo PATH := $PATH +echo LD_LIBRARY_PATH:= $LD_LIBRARY_PATH +echo CONTROLM := $CONTROLM +echo "" +echo "********************************" +echo "** Arguments passed to script **" +echo "********************************" +echo Number of ARGS: = $# +echo ARGS := $* +echo "" +echo "********************************" +echo "** Script Run times **" +echo "********************************" +echo START := $(date) + +# Default RC to 0 +RC=0 + +# Search ARGS for RC=xxx If found Return an Error Code +while (( "$#" )); do + arg=$(echo $1 | awk '{ print $1 }') + if [ "$arg" -eq "$arg" ] 2>/dev/null; then + echo SLEEP := $arg SECONDS + sleep $1 > /dev/null + fi + echo $arg | grep -qi "rc=" + if [ "$?" -eq "0" ]; then + RC=$(echo $arg | grep -i "rc=" | awk -F= '{ print $2 }') + echo "RETURN CODE ARGUMENT: 'RC=$RC' FOUND. RETURN CODE '$RC' SENT TO CONTROL_M" + fi + shift +done + +echo END := $(date) +echo "" + +exit $RC + diff --git a/site-modules/controlm/files/ztest b/site-modules/controlm/files/ztest new file mode 100644 index 0000000..e69de29 diff --git a/site-modules/controlm/manifests/.DS_Store b/site-modules/controlm/manifests/.DS_Store new file mode 100644 index 0000000..133ed36 Binary files /dev/null and b/site-modules/controlm/manifests/.DS_Store differ diff --git a/site-modules/controlm/manifests/controlm_agent.pp b/site-modules/controlm/manifests/controlm_agent.pp new file mode 100644 index 0000000..378fbe6 --- /dev/null +++ b/site-modules/controlm/manifests/controlm_agent.pp @@ -0,0 +1,56 @@ +class controlm::controlm_agent { + + #used for the automated install file and firewall. + + #MUST HAVE THESE TWO IN HIERA, use fqdn for primary if host in diff domain. + #controlm::controlm_agent::primary_server_host: ctmgnpappla012.optus.com.au + #controlm::controlm_agent::server_host: ctmgnpappla012 + $server_host = hiera('controlm::controlm_agent::server_host','ctmgnpappla012') + $primary_server_host = hiera('controlm::controlm_agent::primary_server_host','ctmgnpappla012.optus.com.au') + + $tracker_port = hiera('controlm::controlm_agent::tracker_port','7035') + $a2s_port = hiera('controlm::controlm_agent::agent2server_port','7005') + $s2a_port = hiera('controlm::controlm_agent::server2agent_port','7006') + $tcp_timeout = hiera('controlm::controlm_agent::tcp_timeout','60') + $ignore_fail = hiera('controlm::controlm_agent::ignore_fail',false) + $force_upgrade = hiera('controlm::controlm_agent::force_upgrade',false) + + $software_version = hiera('controlm::controlm_agent::version','9.0.00-2') + + $patch_files = hiera('controlm::controlm_agent::patch_files',['PAKAI.9.0.00.100_Linux-x86_64_INSTALL.BIN','PAKAI.9.0.00.200_Linux-x86_64_INSTALL.BIN']) + # array of patch files so + # controlm::controlm_agent::patch_files: + # - file1 + # - file2 + # patch files are not installed separately from main install as timing that was + # not working. So if we get new patches probably best to install by hand or see + # if you can get a separate script happening. + +# also in hiera you need these, subbing PRD for GNP where needed +# isnd_linux::profiles::soe::login_accounts::groups: +# - 'ocaus01\ACL-GNP-CTRLM-rwx-SMT-ADMIN': +# additional_groups: +# - controlm +# - 'ocaus01\ACL-GNP-CTRLM-rx-SMT-SCHED': +# additional_groups: +# - controlm +# +# tpiam::profiles::sudoers: +# ocaus01aclgnpctrlmrwxsmtadmin: +# runas_users: +# - ctmagent +# commands: all_commands +# ocaus01aclgnpctrlmrxsmtsched: +# runas_users: +# - ctmagent +# commands: all_commands include controlm::controlm_agent::users + + include controlm::controlm_agent::users + include controlm::controlm_agent::packages + include controlm::controlm_agent::files + include controlm::controlm_agent::firewall + include controlm::controlm_agent::install + +} + + diff --git a/site-modules/controlm/manifests/controlm_agent/files.pp b/site-modules/controlm/manifests/controlm_agent/files.pp new file mode 100644 index 0000000..5d43a92 --- /dev/null +++ b/site-modules/controlm/manifests/controlm_agent/files.pp @@ -0,0 +1,153 @@ +class controlm::controlm_agent::files inherits controlm::controlm_agent { + +# Directories + unless defined(File['/apps']) { + file { [ '/apps', ]: + ensure => 'directory', + owner => 'root', + group => 'root', + mode => '0755', + } + } + + file { [ '/apps/bmc',]: + ensure => 'directory', + owner => 'root', + group => 'root', + mode => '0755', + require => File['/apps'], + } + file { [ '/apps/bmc/software','/apps/bmc/software/version_9/','/apps/bmc/software/version_9/fixes' ]: + ensure => 'directory', + owner => 'ctmagent', + group => 'controlm', + mode => '0755', + require => File['/apps/bmc'], + } + +# scripts_optus + + file { ['/apps/bmc/ctm/scripts_optus']: + ensure => directory, + owner => 'ctmagent', + group => 'controlm', + mode => '0775', + require => User['ctmagent'], + } + + file { '/apps/bmc/ctm/scripts_optus/sleep.sh': + ensure => file, + owner => 'ctmagent', + group => 'controlm', + mode => '0755', + source => 'puppet:///modules/controlm/sleep.sh', + require => [File['/apps/bmc/ctm/scripts_optus'],User['ctmagent'],], + } + + file { '/apps/bmc/ctm/scripts_optus/ctm.sh': + ensure => file, + owner => 'root', + group => 'root', + mode => '0755', + source => 'puppet:///modules/controlm/ctm.sh', + require => File['/apps/bmc/ctm/scripts_optus'], + } + + case $::os['release']['major']{ + '6': { + file { '/etc/rc.d/init.d/ctm.sh': + ensure => link, + target => '/apps/bmc/ctm/scripts_optus/ctm.sh', + owner => 'root', + group => 'root', + require => File['/apps/bmc/ctm/scripts_optus/ctm.sh'], + } + } + '7': { + + file { '/etc/rc.d/init.d/ctm.sh': + ensure => absent, + } + + file { '/etc/rc.d/init.d/ctm': + ensure => file, + owner => 'root', + group => 'root', + mode => '0755', + source => 'puppet:///modules/controlm/ctm.sh', + notify => Exec['systemctl reload daemon for Control-M agent'] + } + + exec{'systemctl reload daemon for Control-M agent': + path => $::path, + command => 'systemctl daemon-reload', + refreshonly => true, + } + + } + default: {fail "Unsupported Major version ${::os['release']['major']} detected"} + } + +#ctm/scripts + +# file { '/apps/bmc/ctm/scripts': +# ensure => link, +# target => '/apps/bmc/software/version_9/ctm/scripts', +# owner => 'root', +# group => 'root', +# require => Package['ctmagent_core_clean'], +# } + +# install scripts + + file { '/apps/bmc/ctm/ctm_silentinstall_optus.xml': + ensure => file, + owner => 'root', + group => 'root', + mode => '0755', + content => template('controlm/agent_install.erb'), + require => User['ctmagent'], + } + + file { '/apps/bmc/ctm/controlm_agent_install.sh': + ensure => file, + owner => 'root', + group => 'root', + mode => '0755', + content => template('controlm/controlm_agent_install.erb'), + require => User['ctmagent'], + } + + +# need to check status method and also if we need restart check. +# this should be in the install Iguess +# service { 'ctm.sh': +# ensure => running, +# enable => true, +# hasstatus => false, +# status => '', +# start => '', +# stop => '', +# subscribe => [ +# ], +# require => '/etc/rc.d/init.d/ctm.sh', +# } + +# profile scripts + file { '/etc/profile.d/controlm.csh': + ensure => file, + owner => 'root', + group => 'root', + mode => '0755', + source => 'puppet:///modules/controlm/controlm.csh', + } + + file { '/etc/profile.d/controlm.sh': + ensure => file, + owner => 'root', + group => 'root', + mode => '0755', + source => 'puppet:///modules/controlm/controlm.sh', + } + +} diff --git a/site-modules/controlm/manifests/controlm_agent/firewall.pp b/site-modules/controlm/manifests/controlm_agent/firewall.pp new file mode 100644 index 0000000..cddccd2 --- /dev/null +++ b/site-modules/controlm/manifests/controlm_agent/firewall.pp @@ -0,0 +1,16 @@ +class controlm::controlm_agent::firewall inherits controlm::controlm_agent { + + + firewall { '200 controlm tracker port hiera controlm_tracker_port': + action => 'accept', + proto => 'tcp', + dport => [$tracker_port], + } + + firewall { '210 controlm server to agent hiera controlm_server2agent_port': + action => 'accept', + proto => 'tcp', + dport => [$s2a_port], + } + +} diff --git a/site-modules/controlm/manifests/controlm_agent/install.pp b/site-modules/controlm/manifests/controlm_agent/install.pp new file mode 100644 index 0000000..bf954ca --- /dev/null +++ b/site-modules/controlm/manifests/controlm_agent/install.pp @@ -0,0 +1,57 @@ +class controlm::controlm_agent::install inherits controlm::controlm_agent { + + +# set up /etc/services + +augeas { 'controlm': +context => '/files/etc/services', +changes => [ + "set service-name[port = '${s2a_port}'][protocol = 'udp'] ctmagent", + "set service-name[port = '${s2a_port}'][protocol = 'udp']/#comment 'Control-M server2agent'", + "set service-name[port = '${s2a_port}'][protocol = 'tcp'] ctmagent", + "set service-name[port = '${s2a_port}'][protocol = 'tcp']/#comment 'Control-M server2agent'", + "set service-name[port = '${a2s_port}'][protocol = 'udp'] ctmagent", + "set service-name[port = '${a2s_port}'][protocol = 'udp']/#comment 'Control-M agent2server'", + "set service-name[port = '${a2s_port}'][protocol = 'tcp'] ctmagent", + "set service-name[port = '${a2s_port}'][protocol = 'tcp']/#comment 'Control-M agent2server'", + ], +} + + # use shellscript and sudo as running the install direct as user ctmagent gives HOME errors plus we get errors in the log file + # also does patches as can't get the patch script running after it for some reason + # patch names need to be in hiera see controlm_agent.pp + exec { 'controlm_agent_install': + command => '/apps/bmc/ctm/controlm_agent_install.sh > /apps/bmc/ctm/controlm_agent_install.log', + creates => '/apps/bmc/ctm/controlm_agent_install.hasrun', + require => [User['ctmagent'],Package['ctmagent_core_clean'],File['/apps/bmc/ctm/ctm_silentinstall_optus.xml','/apps/bmc/ctm/controlm_agent_install.sh'],Exec['chown_/apps/bmc'],], + timeout => 1800, + } + + case $::os['release']['major']{ + '6': { + service { 'ctm.sh': + ensure => running, + enable => true, + hasstatus => false, + status => '/bin/ps -ef | /bin/grep /apps/bmc/ctm/exe/p_ctm | /bin/grep -v grep', + require => [File['/etc/rc.d/init.d/ctm.sh'],Exec['controlm_agent_install'],] + } + } + '7': { + + service { 'ctm.sh': + enable => false, + } + + service { 'ctm': + ensure => running, + enable => true, + hasstatus => false, + status => '/bin/ps -ef | /bin/grep /apps/bmc/ctm/exe/p_ctm | /bin/grep -v grep', + require => [File['/etc/rc.d/init.d/ctm'],Exec['controlm_agent_install']] + } + + } + default: {fail "Unsupported Major version ${::os['release']['major']} detected"} + } +} diff --git a/site-modules/controlm/manifests/controlm_agent/packages.pp b/site-modules/controlm/manifests/controlm_agent/packages.pp new file mode 100644 index 0000000..c907b8c --- /dev/null +++ b/site-modules/controlm/manifests/controlm_agent/packages.pp @@ -0,0 +1,16 @@ +class controlm::controlm_agent::packages inherits controlm::controlm_agent { + + package { 'ctmagent_core_clean' : + ensure => "$software_version", + require => User['ctmagent'], + } + + # the RPM does permissions, this is a backup + exec {'software permissions' : + command => '/bin/chown -R ctmagent:controlm /apps/bmc/software/version_9', + onlyif => '/usr/bin/test $(/bin/find /apps/bmc/software/version_9/CheckReq -uid 0 | w +c -l) -gt 0', + require => Package['ctmagent_core_clean'], + } + +} diff --git a/site-modules/controlm/manifests/controlm_agent/users.pp b/site-modules/controlm/manifests/controlm_agent/users.pp new file mode 100644 index 0000000..4ce7351 --- /dev/null +++ b/site-modules/controlm/manifests/controlm_agent/users.pp @@ -0,0 +1,38 @@ +class controlm::controlm_agent::users { + + unless defined(Group['controlm']) { + group { 'controlm': + ensure => present, + } + } + + user { 'ctmagent': + gid => [ 'controlm'], + home => '/apps/bmc/ctm', + comment => 'ControlM Agent', + shell => '/bin/bash', + password => '*', + managehome => true, + require => [Group['controlm'],File['/apps/bmc'],], + } + # set ownerships for /apps/bmc/ctm as needs sticky on group and install needs ctmagent to own /apps/bmc + exec { 'set permissions on /apps/bmc/ctm': + command => '/bin/chmod 2775 /apps/bmc/ctm', + onlyif => '/usr/bin/test $(/bin/find /apps/bmc/ctm -perm 2775 | wc -l) -eq 0', + require => User['ctmagent'], + } + + exec { 'chown_/apps/bmc': + command => '/bin/chown ctmagent.controlm /apps/bmc', + unless => '/usr/bin/test -e /apps/bmc/ctm/controlm_agent_install.hasrun', + require => User['ctmagent'], + } + + #sudo::rule { 'controlm': + # type => 'group', + # runas_users => 'root', + # commands => [ + # '/apps/bmc/ctm/scripts_optus/ctm.sh', + # ], + #} +} diff --git a/site-modules/controlm/manifests/controlm_agent/z1 b/site-modules/controlm/manifests/controlm_agent/z1 new file mode 100644 index 0000000..0e64886 --- /dev/null +++ b/site-modules/controlm/manifests/controlm_agent/z1 @@ -0,0 +1,10 @@ + + file { '/apps/bmc/ctm/ctm_silentinstall_optus.xml': + ensure => file, + owner => 'root', + group => 'root', + mode => '0755', + content => template('controlm/agent_install.erb'), + require => User['ctmagent'], + } + diff --git a/site-modules/controlm/templates/agent_install.erb b/site-modules/controlm/templates/agent_install.erb new file mode 100644 index 0000000..b263ccd --- /dev/null +++ b/site-modules/controlm/templates/agent_install.erb @@ -0,0 +1,13 @@ + + Control-M/Agent 9.0.00 + + + + + + + + + + + diff --git a/site-modules/controlm/templates/controlm_agent_install.erb b/site-modules/controlm/templates/controlm_agent_install.erb new file mode 100644 index 0000000..52bf793 --- /dev/null +++ b/site-modules/controlm/templates/controlm_agent_install.erb @@ -0,0 +1,71 @@ +#!/bin/bash +# +#Does install and patches if any + +cd /apps/bmc/ +sudo -u ctmagent /apps/bmc/software/version_9/setup.sh -silent /apps/bmc/ctm/ctm_silentinstall_optus.xml +RESULT=$? +echo "exit status $RESULT" +if [ $RESULT -ne 0 ] ; then exit $RESULT; fi +/bin/date > /apps/bmc/ctm/controlm_agent_install.hasrun +echo "exit status $RESULT" >> /apps/bmc/ctm/controlm_agent_install.hasrun +echo "do not remove this file unless you want to rerun the install" >> /apps/bmc/ctm/controlm_agent_install.hasrun +chmod 444 /apps/bmc/ctm/controlm_agent_install.hasrun + + +<% if @patch_files -%> +/bin/date > /apps/bmc/ctm/controlm_agent_patch_install.hasrun +# remove any old patches +rm -rf /apps/bmc/software/version_9/fixes/*INSTALL.BIN + +. /etc/profile.d/controlm.sh + +<% @patch_files.each do | file | -%> + +echo "====================" +PATCH_RESULT=1 +cd /apps/bmc/software/version_9/fixes +wget http://<%= scope.lookupvar('::razor_metadata_repo_server') -%>/files/bcc_source/controlm/<%= file %> +chmod 755 /apps/bmc/software/version_9/fixes/<%= file %> +sudo -u ctmagent /bin/bash - < +EOF +PATCH_RESULT=$? + if [ $PATCH_RESULT -ne 0 ] + then + echo "patch <%= file -%> bad $PATCH_RESULT" >> controlm_agent_patch_install.hasrun + mv /apps/bmc/ctm/controlm_agent_patch_install.hasrun /apps/bmc/ctm/controlm_agent_patch_install.bad + exit $RESULT + fi + +echo "patch exit status <%= file -%> $PATCH_RESULT" +# sleep to see if patches properly install +echo "sleeping for 10 " +sleep 10 +<% end -%> +<% end -%> + +# set correct hostnames +SHORT=`/bin/hostname -s` +LONG=`/bin/hostname -f` + +echo "Changing short hostnames in CONFIG.dat" +cp -f /apps/bmc/ctm/data/CONFIG.dat /apps/bmc/ctm/data/CONFIG.dat.bak +/bin/sed -i "s/$SHORT$/$LONG/" /apps/bmc/ctm/data/CONFIG.dat +grep $SHORT /apps/bmc/ctm/data/CONFIG.dat + + +#change mode +/usr/bin/yes y | /apps/bmc/ctm/scripts/set_agent_mode -u ctmagent -o 1 + +# stop agent +sudo -u ctmagent /bin/bash - < for backward compatibility +ARG1=`echo $1 | tr '[A-Z]' '[a-z]'` +if [ "$ARG1" = "start" ] || [ "$ARG1" = "stop" ] ; then + if [ "$ARG1" = "start" ] ; then + STATE_ACTION="start" + elif [ "$ARG1" = "stop" ] ; then + STATE_ACTION="stop" + fi +else + STATE_ACTION="start" +fi + + + if [ "$agent_status" = "STOPPED" ] ; then # AGENT_STATUS is set to 'STOPPED', exit without starting the Agent + echo "Control-M/Agent (account $account_name) status is set to 'STOPPED'. Control-M/Agent will not start." + exit 0 + fi + + # get the value for config parameter AGENT_OWNER to determine which owner should start the agent + # in case the parameter is missing or empty, start as root. + # This script is executed as root user by the OS during machine startup. + # If the agent should run as agent owner, use 'su' to run start-ag + agent_owner=`grep AGENT_OWNER $config_file | awk '{print $2}'` + +if [ "$STATE_ACTION" = "start" ] ; then + + if [ "$agent_owner" != "root" ] ; then + /bin/su - $agent_owner -c "$install_path/ctm/scripts/start-ag -u $account_name -p ALL" + else + $install_path/ctm/scripts/start-ag -u $account_name -p ALL + fi + +else + + # backup ctm_agent_status.dat to keep origional status + TMP_FILE_NAME="ctm_agent_status_dat-`date +'%Y-%m-%d_%H-%M-%S'`.tar" + cd $install_path/ctm/data ; tar -cf $TMP_FILE_NAME ctm_agent_status.dat + + if [ "$agent_owner" != "root" ] ; then + /bin/su - $agent_owner -c "$install_path/ctm/scripts/shut-ag -u $account_name -p ALL" + else + $install_path/ctm/scripts/shut-ag -u $account_name -p ALL + fi + + # restore ctm_agent_status.dat to origional + cd $install_path/ctm/data ; tar -xf $TMP_FILE_NAME ; rm -f $TMP_FILE_NAME + +fi +exit 0 + + diff --git a/site-modules/controlm/templates/ztest b/site-modules/controlm/templates/ztest new file mode 100644 index 0000000..e69de29 diff --git a/site-modules/ggtest/manifests/selva.pp b/site-modules/ggtest/manifests/selva.pp new file mode 100644 index 0000000..e1af6a4 --- /dev/null +++ b/site-modules/ggtest/manifests/selva.pp @@ -0,0 +1,36 @@ +# == Class: profile::firewall +# +# Class to configure the firewall on various platforms +# +class ggtest::selva ( + # Class parameters are populated from External(hiera)/Defaults/Fail + Boolean $enable = false, + String $module = 'firewall', +){ + if $facts['os']['family'] == 'RedHat' { + # firewalld - do not use this for new config + if $module == 'firewalld' { + if $enable { + class { 'firewalld': } + } + else { + class { 'firewalld': + service_ensure => 'stopped', + service_enable => false, + } + } + } + else { + # Use this for new config + if $enable { + class { 'profile::firewall::start': } + -> class { 'profile::firewall::app_rules': } + -> class { 'profile::firewall::finish': } + } + else { + class { 'profile::firewall::stop': } + } + } + } + +} diff --git a/site-modules/profile/.DS_Store b/site-modules/profile/.DS_Store new file mode 100644 index 0000000..2c8d294 Binary files /dev/null and b/site-modules/profile/.DS_Store differ diff --git a/site-modules/profile/manifests/.DS_Store b/site-modules/profile/manifests/.DS_Store new file mode 100644 index 0000000..d16078c Binary files /dev/null and b/site-modules/profile/manifests/.DS_Store differ diff --git a/site-modules/profile/manifests/base.pp b/site-modules/profile/manifests/base.pp index ae85e65..509dd1c 100644 --- a/site-modules/profile/manifests/base.pp +++ b/site-modules/profile/manifests/base.pp @@ -1,5 +1,5 @@ class profile::base { - - #the base profile should include component modules that will be on all nodes - +# require profile::goldload::config + contain profile::winlogbeat + notify {'This is from profile::base': } } diff --git a/site-modules/profile/manifests/example.pp b/site-modules/profile/manifests/example.pp deleted file mode 100644 index 0b48c3a..0000000 --- a/site-modules/profile/manifests/example.pp +++ /dev/null @@ -1,3 +0,0 @@ -class profile::example { - -} diff --git a/site-modules/profile/manifests/firewall.pp b/site-modules/profile/manifests/firewall.pp new file mode 100644 index 0000000..99c580b --- /dev/null +++ b/site-modules/profile/manifests/firewall.pp @@ -0,0 +1,36 @@ +# == Class: profile::firewall +# +# Class to configure the firewall on various platforms +# +class profile::firewall ( + # Class parameters are populated from External(hiera)/Defaults/Fail + Boolean $enable = false, + String $module = 'firewall', +){ + if $facts['os']['family'] == 'RedHat' { + # firewalld - do not use this for new config + if $module == 'firewalld' { + if $enable { + class { 'firewalld': } + } + else { + class { 'firewalld': + service_ensure => 'stopped', + service_enable => false, + } + } + } + else { + # Use this for new config + if $enable { + class { 'profile::firewall::start': } + -> class { 'profile::firewall::app_rules': } + -> class { 'profile::firewall::finish': } + } + else { + class { 'profile::firewall::stop': } + } + } + } + +} diff --git a/site-modules/profile/manifests/firewall/app_rules.pp b/site-modules/profile/manifests/firewall/app_rules.pp new file mode 100644 index 0000000..1ad8a3e --- /dev/null +++ b/site-modules/profile/manifests/firewall/app_rules.pp @@ -0,0 +1,37 @@ +# profile::firewall::app_rules +class profile::firewall::app_rules { + + # Custom Application Firewall rules found in Hiera + + ['inbound','outbound'].each | $direction | { + $firewalls= lookup("profile::firewall::${direction}", Data, 'deep', {}) + $firewalls.each | $name, $rule | { + $label = upcase( $direction ) + $chain = $direction ? { + 'inbound' => 'INPUT', + 'outbound' => 'OUTPUT', + default => '', + } + if has_key( $rule, 'jump') { + $default = {} + } else { + $default = { action => 'accept' } + } + if $rule['destination'] { + if is_array( $rule['destination'] ){ + $destinations = $rule['destination'] + } else { + $destinations = [ $rule['destination'] ] + } + $destinations.each | $dest | { + $mod_rule = $rule + { 'destination' => $dest } + create_resources( firewall, { "${name} ${label} ${dest}" => $mod_rule }, $default + { proto => 'tcp', chain => $chain } ) + } + } + else { + create_resources( firewall, { "${name} ${label}" => $rule }, $default + { proto => 'tcp', chain => $chain } ) + } + } + } + +} diff --git a/site-modules/profile/manifests/firewall/finish.pp b/site-modules/profile/manifests/firewall/finish.pp new file mode 100644 index 0000000..658911a --- /dev/null +++ b/site-modules/profile/manifests/firewall/finish.pp @@ -0,0 +1,41 @@ +# == Class: profile::firewall::finish +# +# Post actions for firewall management. +# +class profile::firewall::finish { + + + ['INPUT','OUTPUT'].each | $chain | { + + #Drop the known noise from hitting the log + ['255.255.255.255',ip_address(ip_broadcast("${::network}/${::netmask}"))].each | $dest | { + firewall { "990 Broadcasts for $dest for ${chain}": + destination => $dest, + proto => 'all', + action => 'drop', + chain => $chain, + } + } + + # Log whatever hasn't been dealt with already + firewall { "998 Logging for ${chain}": + jump => 'LOG', + proto => 'all', + chain => $chain, + } + + # Drop everything else + firewall { "999 drop all for ${chain}": + proto => 'all', + action => 'drop', + chain => $chain, + } + firewall { "999 drop all for ${chain} for IPv6": + proto => 'all', + action => 'drop', + chain => $chain, + provider => 'ip6tables', + } + } + +} diff --git a/site-modules/profile/manifests/firewall/start.pp b/site-modules/profile/manifests/firewall/start.pp new file mode 100644 index 0000000..e18aaa1 --- /dev/null +++ b/site-modules/profile/manifests/firewall/start.pp @@ -0,0 +1,60 @@ +# == Class: profile::firewall::start +# +# Pre actions for firewall management. +# +class profile::firewall::start { + + class { 'firewall': } + + # Purge any unmanaged firewall rules + resources { 'firewall': + purge => true, + } + #resources { 'firewallchain': + #purge => true, + #} + + #Set up the chains (if specified) + $chains = lookup('profile::firewall::chains', Data , 'deep', {}) + create_resources( firewallchain, $chains, { policy => 'drop', before => undef, ensure => 'present' } ) + + + # Default pre rules + ['INPUT','OUTPUT'].each | $chain | { + firewall { "000 accept all icmp ${chain}": + proto => 'icmp', + action => 'accept', + chain => $chain, + } + if( $chain == 'INPUT' ){ + firewall { "001 accept all to lo interface ${chain}": + proto => 'all', + iniface => 'lo', + action => 'accept', + chain => $chain, + } + firewall { "002 reject local traffic not on loopback interface ${chain}": + iniface => '! lo', + proto => 'all', + destination => '127.0.0.1/8', + action => 'reject', + chain => $chain, + } + } + if( $chain == 'OUTPUT' ){ + firewall { "001 accept all localhost sourced ${chain}": + proto => 'all', + source => '127.0.0.1/8', + action => 'accept', + chain => $chain, + } + } + firewall { "003 accept related established rules ${chain}": + proto => 'all', + state => ['RELATED', 'ESTABLISHED'], + action => 'accept', + chain => $chain, + } + } + +} diff --git a/site-modules/profile/manifests/firewall/stop.pp b/site-modules/profile/manifests/firewall/stop.pp new file mode 100644 index 0000000..b4f0055 --- /dev/null +++ b/site-modules/profile/manifests/firewall/stop.pp @@ -0,0 +1,12 @@ +# == Class: profile::firewall::stop +# +# Turn off all firewall management. +# +class profile::firewall::stop { + + class { 'firewall': + ensure => 'stopped', + enable => false, + } + +} diff --git a/site-modules/profile/manifests/goldload/chocolatey.pp b/site-modules/profile/manifests/goldload/chocolatey.pp new file mode 100644 index 0000000..51f5b1c --- /dev/null +++ b/site-modules/profile/manifests/goldload/chocolatey.pp @@ -0,0 +1,6 @@ +class profile::goldload::chocolatey { + + notify {'This is from profile::goldload::chocolatey': } + + +} diff --git a/site-modules/profile/manifests/goldload/config.pp b/site-modules/profile/manifests/goldload/config.pp new file mode 100644 index 0000000..49a7c3c --- /dev/null +++ b/site-modules/profile/manifests/goldload/config.pp @@ -0,0 +1,8 @@ +class profile::goldload::config { + + + notify {'This is from profile::goldload::config': } + + contain profile::goldload::software + +} diff --git a/site-modules/profile/manifests/goldload/software.pp b/site-modules/profile/manifests/goldload/software.pp new file mode 100644 index 0000000..3ddd0d7 --- /dev/null +++ b/site-modules/profile/manifests/goldload/software.pp @@ -0,0 +1,8 @@ +class profile::goldload::software { + + + notify {'This is from profile::goldload::software': } + + contain profile::goldload::chocolatey + +} diff --git a/site-modules/profile/manifests/tomlrb.pp b/site-modules/profile/manifests/tomlrb.pp new file mode 100644 index 0000000..10acb34 --- /dev/null +++ b/site-modules/profile/manifests/tomlrb.pp @@ -0,0 +1,9 @@ +class profile::tomlrb { + package {'toml-rb': + ensure => present, + provider => 'puppetserver_gem', + notify => Service['pe-puppetserver'] + } + + +} diff --git a/site-modules/profile/manifests/winlogbeat.pp b/site-modules/profile/manifests/winlogbeat.pp new file mode 100644 index 0000000..bea19aa --- /dev/null +++ b/site-modules/profile/manifests/winlogbeat.pp @@ -0,0 +1,3 @@ +class profile::winlogbeat { + notify {'This is from profile::winlogbeat': } +} diff --git a/site-modules/role/manifests/callaugeas.pp b/site-modules/role/manifests/callaugeas.pp new file mode 100644 index 0000000..3429116 --- /dev/null +++ b/site-modules/role/manifests/callaugeas.pp @@ -0,0 +1,5 @@ +class role::callaugeas { + + include controlm::controlm_agent + +} diff --git a/site-modules/role/manifests/example.pp b/site-modules/role/manifests/example.pp index 2c1d2d7..d5e74a0 100644 --- a/site-modules/role/manifests/example.pp +++ b/site-modules/role/manifests/example.pp @@ -1,3 +1,10 @@ class role::example { + package { 'hiera-eyaml-server': + ensure => installed, + name => 'hiera-eyaml', + provider => 'puppetserver_gem', +# require => File['gemrc'], +} + } diff --git a/site-modules/role/manifests/goldload_server.pp b/site-modules/role/manifests/goldload_server.pp new file mode 100644 index 0000000..edef605 --- /dev/null +++ b/site-modules/role/manifests/goldload_server.pp @@ -0,0 +1,7 @@ +class role::goldload_server{ + include profile::base +# include profile::base::ciphers + include profile::goldload::config + Class['profile::goldload::config'] -> Class['profile::base'] + +} diff --git a/site-modules/role/manifests/loadbalancer.pp b/site-modules/role/manifests/loadbalancer.pp new file mode 100644 index 0000000..86dbd2b --- /dev/null +++ b/site-modules/role/manifests/loadbalancer.pp @@ -0,0 +1,98 @@ +class role::loadbalancer ( + Optional[String] $ports1 = '80', + Optional[String] $ports2 = undef, + Optional[String] $rule1 = 'puppet00', + Optional[String] $rule2 = undef, + Optional[String] $backendserver_name1 = '', + Optional[String] $backendserver_name2 = '', + Optional[String] $backendserver_ipaddress1 = undef, + Optional[String] $backendserver_ipaddress2 = undef, + Optional[String] $connetc_timeout = '60s', + ) { + + class { 'haproxy': + merge_options => true, + global_options => { + 'log' => "${::ipaddress} local0", + 'chroot' => '/var/lib/haproxy', + 'pidfile' => '/var/run/haproxy.pid', + 'maxconn' => '4000', + 'user' => 'haproxy', + 'group' => 'haproxy', + 'daemon' => '', + 'stats' => 'socket /var/lib/haproxy/stats', + }, + defaults_options => { + 'log' => 'global', + 'stats' => 'enable', + 'option' => [ + 'redispatch', + ], + 'retries' => '3', + 'timeout' => [ + 'http-request 10s', + 'queue 1m', + 'connect 300s', + 'client 600s', + 'server 600s', + 'check 1m', + ], + 'maxconn' => '8000', + }, + } + + include ::haproxy + + haproxy::listen { $rule1 : + collect_exported => false, + ipaddress => $::ipaddress, + ports => $ports1, + } + + haproxy::listen { $rule2 : + collect_exported => false, + ipaddress => $::ipaddress, + ports => $ports2, + + } + + + haproxy::balancermember { 'member1' : + listening_service => $rule1, + server_names => $backendserver_name1, + ipaddresses => $backendserver_ipaddress1, + ports => $ports1, + options => 'check', + + } + + haproxy::balancermember { 'member2' : + listening_service => $rule1, + server_names => $backendserver_name2, + ipaddresses => $backendserver_ipaddress2, + ports => $ports1, + options => 'check', + } + +#pending Improvement, possible areas: Array Input with multipal ports + +haproxy::balancermember { 'member3' : + listening_service => $rule2, + server_names => $backendserver_name1, + ipaddresses => $backendserver_ipaddress1, + ports => $ports2, + options => 'check', + +} + +haproxy::balancermember { 'member4' : + listening_service => $rule2, + server_names => $backendserver_name2, + ipaddresses => $backendserver_ipaddress2, + ports => $ports2, + options => 'check', +} + + + +} diff --git a/site-modules/sqlserverhenry/manifests/win_sqlserver.pp b/site-modules/sqlserverhenry/manifests/win_sqlserver.pp new file mode 100644 index 0000000..554a0f2 --- /dev/null +++ b/site-modules/sqlserverhenry/manifests/win_sqlserver.pp @@ -0,0 +1,8 @@ +class sqlserverhenry::win_sqlserver { + sqlserver_instance{ 'MSSQLSERVER': + features => ['SQL'], + source => 'C:\\SQLEXPR_x64_ENU', + sql_sysadmin_accounts => ['administrator'], + } + +}