|
32 | 32 | redis_secrets = new_resource.redis_secrets |
33 | 33 | redis_password = redis_secrets['pass'] unless redis_secrets.empty? |
34 | 34 | s3_malware_secrets = new_resource.s3_malware_secrets |
| 35 | + cdomain = new_resource.cdomain |
35 | 36 |
|
36 | 37 | memcached_servers = node['redborder']['memcached']['hosts'] |
37 | 38 |
|
|
1206 | 1207 | cookbook 'logstash' |
1207 | 1208 | variables(apikey: node['redborder']['manager']['loaders']['virustotal_api_key'], |
1208 | 1209 | access_key_id: s3_malware_secrets['s3_malware_access_key_id'], |
1209 | | - secret_access_key: s3_malware_secrets['s3_malware_secret_key_id']) |
| 1210 | + secret_access_key: s3_malware_secrets['s3_malware_secret_key_id'], |
| 1211 | + cdomain: cdomain) |
1210 | 1212 | notifies :restart, 'service[logstash]', :delayed unless node['redborder']['leader_configuring'] |
1211 | 1213 | end |
1212 | 1214 | elsif ::File.exist?("#{pipelines_dir}/malware/10_virustotal.conf") |
|
1228 | 1230 | cookbook 'logstash' |
1229 | 1231 | variables(apikey: node['redborder']['loaders']['metadefender_api_key'], |
1230 | 1232 | access_key_id: s3_malware_secrets['s3_malware_access_key_id'], |
1231 | | - secret_access_key: s3_malware_secrets['s3_malware_secret_key_id']) |
| 1233 | + secret_access_key: s3_malware_secrets['s3_malware_secret_key_id'], |
| 1234 | + cdomain: cdomain) |
1232 | 1235 | notifies :restart, 'service[logstash]', :delayed unless node['redborder']['leader_configuring'] |
1233 | 1236 | end |
1234 | 1237 | elsif ::File.exist?("#{pipelines_dir}/malware/20_metadefender.conf") |
|
1246 | 1249 | ignore_failure true |
1247 | 1250 | cookbook 'logstash' |
1248 | 1251 | variables(access_key_id: s3_malware_secrets['s3_malware_access_key_id'], |
1249 | | - secret_access_key: s3_malware_secrets['s3_malware_secret_key_id']) |
| 1252 | + secret_access_key: s3_malware_secrets['s3_malware_secret_key_id'], |
| 1253 | + cdomain: cdomain) |
1250 | 1254 | notifies :restart, 'service[logstash]', :delayed unless node['redborder']['leader_configuring'] |
1251 | 1255 | end |
1252 | 1256 |
|
|
1259 | 1263 | ignore_failure true |
1260 | 1264 | cookbook 'logstash' |
1261 | 1265 | variables(access_key_id: s3_malware_secrets['s3_malware_access_key_id'], |
1262 | | - secret_access_key: s3_malware_secrets['s3_malware_secret_key_id']) |
| 1266 | + secret_access_key: s3_malware_secrets['s3_malware_secret_key_id'], |
| 1267 | + cdomain: cdomain) |
1263 | 1268 | notifies :restart, 'service[logstash]', :delayed unless node['redborder']['leader_configuring'] |
1264 | 1269 | end |
1265 | 1270 |
|
|
1272 | 1277 | # mode '0644 |
1273 | 1278 | # ignore_failure true |
1274 | 1279 | # cookbook 'logstash'' |
1275 | | - # variables(:access_key_id => s3_malware_secrets["s3_malware_access_key_id"], |
1276 | | - # :secret_access_key => s3_malware_secrets["s3_malware_secret_key_id"]) |
| 1280 | + # variables(access_key_id: s3_malware_secrets["s3_malware_access_key_id"], |
| 1281 | + # secret_access_key: s3_malware_secrets["s3_malware_secret_key_id"], |
| 1282 | + # cdomain: cdomain) |
1277 | 1283 | # notifies :restart, 'service[logstash]', :delayed unless node['redborder']['leader_configuring'] |
1278 | 1284 | # end |
1279 | 1285 |
|
|
0 commit comments