
Right now all roles assume that kibana has been deployed using the stack and `kibana` group is defined in Ansible. However if one need just to use journalbeat or filebeat roles to push data to external Kibana - it's barely possible. Defining `kibana` group is risky as open doors for installKibana playbook execution. This patch adds variable kibana_target along with more role-specific variables that allow to adjust thi behaviour and manually supply Kibana endpoint to be configured. Change-Id: Id2a42ae9c6146dcc9e86b15fee36372b95461d20
53 lines
2.3 KiB
YAML
53 lines
2.3 KiB
YAML
---
|
|
# Copyright 2018, Vexxhost, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
auditbeat_service_state: restarted
|
|
|
|
auditbeat_ilm_policy_name: "auditbeat-{{ beat_version }}"
|
|
auditbeat_ilm_policy_template: "auditbeat-{{ beat_version }}"
|
|
auditbeat_ilm_policy_filename: "auditbeat-ilm-policy.json"
|
|
auditbeat_ilm_policy_file_location: "/etc/auditbeat"
|
|
|
|
# Manually define Kibana targets.
|
|
# Default: hosts from Ansible `kibana` group will be used
|
|
auditbeat_kibana_target: "{{ kibana_target | default('') }}"
|
|
|
|
ilm_policy_name: "{{ auditbeat_ilm_policy_name | default('') }}"
|
|
ilm_policy: "{{ (auditbeat_ilm_policy | default(default_ilm_policy)) | default({}) }}"
|
|
ilm_policy_template: "{{ auditbeat_ilm_policy_template | default('') }}"
|
|
ilm_policy_filename: "{{ (auditbeat_ilm_policy_filename | default(default_ilm_policy_filename)) | default('') }}"
|
|
ilm_policy_file_location: "{{ (auditbeat_ilm_policy_file_location | default(default_ilm_policy_file_location)) | default('') }}"
|
|
|
|
# beat processors. Empty dictionary sets `add_host_metadata: ~`
|
|
processors: {}
|
|
|
|
# Logging level
|
|
# Available log levels are error, warning, info, debug
|
|
auditbeat_log_level: "{{ elastic_beat_log_level | default('info') }}"
|
|
|
|
# Override flag to ignore the system socket dataset. This can be resource-intensive,
|
|
# particularly when auditbeat is deployed to a container host, and largely overlaps
|
|
# with Packetbeat data
|
|
auditbeat_ignore_socket_data: false
|
|
|
|
# Override flag to force Beats to set up index templates. If this is not
|
|
# set, templates are only pushed when the user is either upgrading the
|
|
# beat version or deploying for the first time in the presence of kibana nodes
|
|
elk_beat_setup: false
|
|
|
|
# Authentication credentials for monitoring when using ELK security features
|
|
# beats_system_username: ""
|
|
# beats_system_password: ""
|