committing changes in /etc made by "-bash"
Package changes:
This commit is contained in:
13
.etckeeper
13
.etckeeper
@@ -49,6 +49,7 @@ mkdir -p './mail/spamassassin/sa-update-keys/private-keys-v1.d'
|
|||||||
mkdir -p './modulefiles'
|
mkdir -p './modulefiles'
|
||||||
mkdir -p './modules-load.d'
|
mkdir -p './modules-load.d'
|
||||||
mkdir -p './named'
|
mkdir -p './named'
|
||||||
|
mkdir -p './newrelic-infra/integrations.d'
|
||||||
mkdir -p './nginx/conf.d/ganool/nginx/modules'
|
mkdir -p './nginx/conf.d/ganool/nginx/modules'
|
||||||
mkdir -p './nginx/conf.d/ganool/nginx/ngx1/nginx/modules'
|
mkdir -p './nginx/conf.d/ganool/nginx/ngx1/nginx/modules'
|
||||||
mkdir -p './nginx/html/.well-known/acme-challenge'
|
mkdir -p './nginx/html/.well-known/acme-challenge'
|
||||||
@@ -3222,14 +3223,8 @@ maybe chmod 0644 'networks'
|
|||||||
maybe chmod 0755 'newrelic-infra'
|
maybe chmod 0755 'newrelic-infra'
|
||||||
maybe chmod 0644 'newrelic-infra.yml'
|
maybe chmod 0644 'newrelic-infra.yml'
|
||||||
maybe chmod 0755 'newrelic-infra/integrations.d'
|
maybe chmod 0755 'newrelic-infra/integrations.d'
|
||||||
maybe chmod 0644 'newrelic-infra/integrations.d/docker-config.yml'
|
|
||||||
maybe chmod 0755 'newrelic-infra/logging.d'
|
maybe chmod 0755 'newrelic-infra/logging.d'
|
||||||
maybe chmod 0644 'newrelic-infra/logging.d/file.yml.example'
|
|
||||||
maybe chmod 0644 'newrelic-infra/logging.d/fluentbit.yml.example'
|
|
||||||
maybe chmod 0644 'newrelic-infra/logging.d/postfix.yml'
|
maybe chmod 0644 'newrelic-infra/logging.d/postfix.yml'
|
||||||
maybe chmod 0644 'newrelic-infra/logging.d/syslog.yml.example'
|
|
||||||
maybe chmod 0644 'newrelic-infra/logging.d/systemd.yml.example'
|
|
||||||
maybe chmod 0644 'newrelic-infra/logging.d/tcp.yml.example'
|
|
||||||
maybe chmod 0644 'nfs.conf'
|
maybe chmod 0644 'nfs.conf'
|
||||||
maybe chmod 0644 'nfsmount.conf'
|
maybe chmod 0644 'nfsmount.conf'
|
||||||
maybe chmod 0700 'nftables'
|
maybe chmod 0700 'nftables'
|
||||||
@@ -4044,7 +4039,6 @@ maybe chmod 0644 'pki/nssdb/key3.db'
|
|||||||
maybe chmod 0644 'pki/nssdb/key4.db'
|
maybe chmod 0644 'pki/nssdb/key4.db'
|
||||||
maybe chmod 0644 'pki/nssdb/pkcs11.txt'
|
maybe chmod 0644 'pki/nssdb/pkcs11.txt'
|
||||||
maybe chmod 0644 'pki/nssdb/secmod.db'
|
maybe chmod 0644 'pki/nssdb/secmod.db'
|
||||||
maybe chmod 0644 'pki/openssl10.cnf'
|
|
||||||
maybe chown 'pesign' 'pki/pesign'
|
maybe chown 'pesign' 'pki/pesign'
|
||||||
maybe chgrp 'pesign' 'pki/pesign'
|
maybe chgrp 'pesign' 'pki/pesign'
|
||||||
maybe chmod 0770 'pki/pesign'
|
maybe chmod 0770 'pki/pesign'
|
||||||
@@ -4910,7 +4904,6 @@ maybe chmod 0755 'systemd/system/mariadb.service.d'
|
|||||||
maybe chmod 0644 'systemd/system/mariadb.service.d/migrated-from-my.cnf-settings.conf'
|
maybe chmod 0644 'systemd/system/mariadb.service.d/migrated-from-my.cnf-settings.conf'
|
||||||
maybe chmod 0755 'systemd/system/multi-user.target.wants'
|
maybe chmod 0755 'systemd/system/multi-user.target.wants'
|
||||||
maybe chmod 0755 'systemd/system/network-online.target.wants'
|
maybe chmod 0755 'systemd/system/network-online.target.wants'
|
||||||
maybe chmod 0644 'systemd/system/newrelic-infra.service'
|
|
||||||
maybe chmod 0755 'systemd/system/nfs-blkmap.service.requires'
|
maybe chmod 0755 'systemd/system/nfs-blkmap.service.requires'
|
||||||
maybe chmod 0755 'systemd/system/nfs-idmapd.service.requires'
|
maybe chmod 0755 'systemd/system/nfs-idmapd.service.requires'
|
||||||
maybe chmod 0755 'systemd/system/nfs-mountd.service.requires'
|
maybe chmod 0755 'systemd/system/nfs-mountd.service.requires'
|
||||||
@@ -4936,10 +4929,6 @@ maybe chmod 0644 'systemd/user.conf'
|
|||||||
maybe chmod 0755 'systemd/user/sockets.target.wants'
|
maybe chmod 0755 'systemd/user/sockets.target.wants'
|
||||||
maybe chgrp 'tss' 'tcsd.conf'
|
maybe chgrp 'tss' 'tcsd.conf'
|
||||||
maybe chmod 0640 'tcsd.conf'
|
maybe chmod 0640 'tcsd.conf'
|
||||||
maybe chmod 0755 'td-agent-bit'
|
|
||||||
maybe chmod 0644 'td-agent-bit/parsers.conf'
|
|
||||||
maybe chmod 0644 'td-agent-bit/plugins.conf'
|
|
||||||
maybe chmod 0644 'td-agent-bit/td-agent-bit.conf'
|
|
||||||
maybe chmod 0755 'terminfo'
|
maybe chmod 0755 'terminfo'
|
||||||
maybe chmod 0755 'tmpfiles.d'
|
maybe chmod 0755 'tmpfiles.d'
|
||||||
maybe chmod 0644 'tmpfiles.d/clamav.conf'
|
maybe chmod 0644 'tmpfiles.d/clamav.conf'
|
||||||
|
|||||||
@@ -1,12 +0,0 @@
|
|||||||
integrations:
|
|
||||||
- name: nri-docker
|
|
||||||
when:
|
|
||||||
feature: docker_enabled
|
|
||||||
file_exists: /var/run/docker.sock
|
|
||||||
interval: 15s
|
|
||||||
- name: nri-docker
|
|
||||||
when:
|
|
||||||
feature: docker_enabled
|
|
||||||
env_exists:
|
|
||||||
FARGATE: "true"
|
|
||||||
interval: 15s
|
|
||||||
@@ -1,42 +0,0 @@
|
|||||||
###############################################################################
|
|
||||||
# Log forwarder configuration file example #
|
|
||||||
# Source: file #
|
|
||||||
# Available customization parameters: attributes, max_line_kb, pattern #
|
|
||||||
###############################################################################
|
|
||||||
logs:
|
|
||||||
# Basic tailing of a single file
|
|
||||||
- name: basic-file
|
|
||||||
file: /var/log/logFile.log
|
|
||||||
|
|
||||||
# File with spaces in its path. No need to use quotes.
|
|
||||||
- name: file-with-spaces-in-path
|
|
||||||
file: /var/log/folder with spaces/logFile.log
|
|
||||||
|
|
||||||
# Specify a list of custom attributes, as key-value pairs, to be included
|
|
||||||
# in each log record
|
|
||||||
- name: file-with-attributes
|
|
||||||
file: /var/log/logFile.log
|
|
||||||
attributes:
|
|
||||||
application: tomcat
|
|
||||||
department: sales
|
|
||||||
maintainer: example@mailprovider.com
|
|
||||||
|
|
||||||
# Use wildcards to refer to multiple files having a common extension or
|
|
||||||
# prefix. Newly generated files will be automatically detected every 60
|
|
||||||
# seconds.
|
|
||||||
#
|
|
||||||
# WARNING: avoid using wildcards that include the file extension, since
|
|
||||||
# it'll cause logs to be forwarded repeatedly if log rotation is enabled.
|
|
||||||
- name: log-files-in-folder
|
|
||||||
file: /var/log/logF*.log
|
|
||||||
|
|
||||||
# Lines longer than 128 KB will be automatically skipped. Use 'max_line_kb'
|
|
||||||
# to increase this limit.
|
|
||||||
- name: log-file-with-long-lines
|
|
||||||
file: /var/log/logFile.log
|
|
||||||
max_line_kb: 256
|
|
||||||
|
|
||||||
# Use 'pattern' to filter records using a regular expression
|
|
||||||
- name: only-records-with-warn-and-error
|
|
||||||
file: /var/log/logFile.log
|
|
||||||
pattern: WARN|ERROR
|
|
||||||
@@ -1,21 +0,0 @@
|
|||||||
###############################################################################
|
|
||||||
# Log forwarder configuration file example #
|
|
||||||
# Source: fluentbit #
|
|
||||||
# Available customization parameters: <none> #
|
|
||||||
###############################################################################
|
|
||||||
logs:
|
|
||||||
# Use an external configuration file in the Fluentbit native format. You can
|
|
||||||
# also define your own 'parsers.conf' file if your native Fluentbit
|
|
||||||
# configuration file defines custom parsers for your log records.
|
|
||||||
#
|
|
||||||
# WARNING: do not define an output using the 'newrelic' plugin in external
|
|
||||||
# configuration files, as you'd potentially end up with duplicated log
|
|
||||||
# records in New Relic. The New Relic agent already sets an output plugin
|
|
||||||
# for you.
|
|
||||||
#
|
|
||||||
# NOTE: 'rfc3164', 'rfc3164-local' and 'rfc5424' are reserved parser names
|
|
||||||
# and must not be used in your custom parsers.conf
|
|
||||||
- name: external-fluentbit-config-and-parsers-file
|
|
||||||
fluentbit:
|
|
||||||
config_file: /home/user/Configs/fluent-bit.conf
|
|
||||||
parsers_file: /home/user/Configs/parsers.conf
|
|
||||||
@@ -1,80 +0,0 @@
|
|||||||
###############################################################################
|
|
||||||
# Log forwarder configuration file example #
|
|
||||||
# Source: syslog #
|
|
||||||
# Available customization parameters: attributes, max_line_kb #
|
|
||||||
###############################################################################
|
|
||||||
logs:
|
|
||||||
# Syslog RFC3164 via TCP IP socket
|
|
||||||
- name: syslog-tcp-rfc3164
|
|
||||||
syslog:
|
|
||||||
uri: tcp://127.0.0.1:5140
|
|
||||||
parser: rfc3164
|
|
||||||
|
|
||||||
# Syslog RFC5424 via TCP IP socket
|
|
||||||
- name: syslog-tcp-rfc5424
|
|
||||||
syslog:
|
|
||||||
uri: tcp://127.0.0.1:5141
|
|
||||||
parser: rfc5424
|
|
||||||
|
|
||||||
# Syslog RFC3164 via UDP IP socket
|
|
||||||
- name: syslog-udp-rfc3164
|
|
||||||
syslog:
|
|
||||||
uri: udp://127.0.0.1:6140
|
|
||||||
parser: rfc3164
|
|
||||||
|
|
||||||
# Syslog RFC5424 via UDP IP socket
|
|
||||||
- name: syslog-udp-rfc5424
|
|
||||||
syslog:
|
|
||||||
uri: udp://127.0.0.1:6141
|
|
||||||
parser: rfc5424
|
|
||||||
|
|
||||||
# General WARNINGS on Syslog via Unix (domain) sockets:
|
|
||||||
# - Default socket permissions are changed to 0644 by Fluentbit, so only
|
|
||||||
# processes running as root (if the agent runs as root) or nri-agent (if
|
|
||||||
# the agent runs as nri-agent) will be able to write to the logs. You can
|
|
||||||
# use 0666 to allow processes run by other users to write into the socket,
|
|
||||||
# at your own risk.
|
|
||||||
# - Sockets must either exist and be readable by the user executing the
|
|
||||||
# Infrastructure Agent, or defined in a folder where such user can create a
|
|
||||||
# new socket file.
|
|
||||||
|
|
||||||
# Syslog RFC3164 via TCP Unix (domain) socket
|
|
||||||
- name: syslog-unix-tcp-rfc3164
|
|
||||||
syslog:
|
|
||||||
uri: unix_tcp:///home/user/Sockets/unix-tcp-socket-rfc3164
|
|
||||||
parser: rfc3164
|
|
||||||
# unix_permissions: 0666
|
|
||||||
|
|
||||||
# Syslog RFC5424 via TCP Unix (domain) socket
|
|
||||||
- name: syslog-unix-tcp-rfc5424
|
|
||||||
syslog:
|
|
||||||
uri: unix_tcp:///home/user/Sockets/unix-tcp-socket-rfc5424
|
|
||||||
parser: rfc5424
|
|
||||||
# unix_permissions: 0666
|
|
||||||
|
|
||||||
# Syslog RFC3164 via UDP Unix (domain) socket
|
|
||||||
- name: syslog-unix-udp-rfc3164
|
|
||||||
syslog:
|
|
||||||
uri: unix_udp:///home/user/Sockets/unix-udp-socket-rfc3164
|
|
||||||
parser: rfc3164
|
|
||||||
# unix_permissions: 0666
|
|
||||||
|
|
||||||
# Syslog RFC5424 via UDP Unix (domain) socket
|
|
||||||
- name: syslog-unix-udp-test-rfc5424
|
|
||||||
syslog:
|
|
||||||
uri: unix_udp:///home/user/Sockets/unix-udp-socket-rfc5424
|
|
||||||
parser: rfc5424
|
|
||||||
# unix_permissions: 0666
|
|
||||||
|
|
||||||
# You can optionally include the 'attributes' and 'max_line_kb parameters'
|
|
||||||
# (refer to file.yml.example or to the official documentation for more
|
|
||||||
# details)
|
|
||||||
- name: customized-syslog-tcp-rfc5424
|
|
||||||
syslog:
|
|
||||||
uri: tcp://127.0.0.1:5142
|
|
||||||
parser: rfc5424
|
|
||||||
attributes:
|
|
||||||
application: tomcat
|
|
||||||
department: sales
|
|
||||||
maintainer: example@mailprovider.com
|
|
||||||
max_line_kb: 256
|
|
||||||
@@ -1,22 +0,0 @@
|
|||||||
###############################################################################
|
|
||||||
# Log forwarder configuration file example #
|
|
||||||
# Source: systemd #
|
|
||||||
# Available customization parameters: attributes, max_line_kb, pattern #
|
|
||||||
###############################################################################
|
|
||||||
logs:
|
|
||||||
# Systemd 'cupsd' service
|
|
||||||
# WARNING: Infrastructure Agent must run as *root* to use this source
|
|
||||||
- name: systemd-cups
|
|
||||||
systemd: cupsd
|
|
||||||
|
|
||||||
# You can optionally include the 'attributes', 'max_line_kb' and 'pattern'
|
|
||||||
# parameters (refer to file.yml.example or to the official documentation for
|
|
||||||
# more details)
|
|
||||||
- name: customized-systemd-cupsd
|
|
||||||
systemd: cupsd
|
|
||||||
attributes:
|
|
||||||
application: tomcat
|
|
||||||
department: sales
|
|
||||||
maintainer: example@mailprovider.com
|
|
||||||
max_line_kb: 256
|
|
||||||
pattern: WARN|ERROR
|
|
||||||
@@ -1,31 +0,0 @@
|
|||||||
###############################################################################
|
|
||||||
# Log forwarder configuration file example #
|
|
||||||
# Source: tcp #
|
|
||||||
# Available customization parameters: attributes, max_line_kb #
|
|
||||||
###############################################################################
|
|
||||||
logs:
|
|
||||||
# TCP log ingestion with no specific format. Records separated by line breaks.
|
|
||||||
- name: tcp-with-no-format
|
|
||||||
tcp:
|
|
||||||
uri: tcp://127.0.0.1:5170
|
|
||||||
format: none
|
|
||||||
separator: \n
|
|
||||||
|
|
||||||
# TCP log ingestion in JSON format.
|
|
||||||
- name: tcp-json
|
|
||||||
tcp:
|
|
||||||
uri: tcp://127.0.0.1:5171
|
|
||||||
format: json
|
|
||||||
|
|
||||||
# You can optionally include the 'attributes' and 'max_line_kb' parameters
|
|
||||||
# (refer to file.yml.example or to the official documentation for more
|
|
||||||
# details)
|
|
||||||
- name: customized-tcp-json
|
|
||||||
tcp:
|
|
||||||
uri: tcp://127.0.0.1:5172
|
|
||||||
format: json
|
|
||||||
attributes:
|
|
||||||
application: tomcat
|
|
||||||
department: sales
|
|
||||||
maintainer: example@mailprovider.com
|
|
||||||
max_line_kb: 256
|
|
||||||
@@ -1,352 +0,0 @@
|
|||||||
#
|
|
||||||
# OpenSSL example configuration file.
|
|
||||||
# This is mostly being used for generation of certificate requests.
|
|
||||||
#
|
|
||||||
|
|
||||||
# This definition stops the following lines choking if HOME isn't
|
|
||||||
# defined.
|
|
||||||
HOME = .
|
|
||||||
RANDFILE = $ENV::HOME/.rnd
|
|
||||||
|
|
||||||
# Extra OBJECT IDENTIFIER info:
|
|
||||||
#oid_file = $ENV::HOME/.oid
|
|
||||||
oid_section = new_oids
|
|
||||||
|
|
||||||
# To use this configuration file with the "-extfile" option of the
|
|
||||||
# "openssl x509" utility, name here the section containing the
|
|
||||||
# X.509v3 extensions to use:
|
|
||||||
# extensions =
|
|
||||||
# (Alternatively, use a configuration file that has only
|
|
||||||
# X.509v3 extensions in its main [= default] section.)
|
|
||||||
|
|
||||||
[ new_oids ]
|
|
||||||
|
|
||||||
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
|
||||||
# Add a simple OID like this:
|
|
||||||
# testoid1=1.2.3.4
|
|
||||||
# Or use config file substitution like this:
|
|
||||||
# testoid2=${testoid1}.5.6
|
|
||||||
|
|
||||||
# Policies used by the TSA examples.
|
|
||||||
tsa_policy1 = 1.2.3.4.1
|
|
||||||
tsa_policy2 = 1.2.3.4.5.6
|
|
||||||
tsa_policy3 = 1.2.3.4.5.7
|
|
||||||
|
|
||||||
####################################################################
|
|
||||||
[ ca ]
|
|
||||||
default_ca = CA_default # The default ca section
|
|
||||||
|
|
||||||
####################################################################
|
|
||||||
[ CA_default ]
|
|
||||||
|
|
||||||
dir = /etc/pki/CA # Where everything is kept
|
|
||||||
certs = $dir/certs # Where the issued certs are kept
|
|
||||||
crl_dir = $dir/crl # Where the issued crl are kept
|
|
||||||
database = $dir/index.txt # database index file.
|
|
||||||
#unique_subject = no # Set to 'no' to allow creation of
|
|
||||||
# several ctificates with same subject.
|
|
||||||
new_certs_dir = $dir/newcerts # default place for new certs.
|
|
||||||
|
|
||||||
certificate = $dir/cacert.pem # The CA certificate
|
|
||||||
serial = $dir/serial # The current serial number
|
|
||||||
crlnumber = $dir/crlnumber # the current crl number
|
|
||||||
# must be commented out to leave a V1 CRL
|
|
||||||
crl = $dir/crl.pem # The current CRL
|
|
||||||
private_key = $dir/private/cakey.pem# The private key
|
|
||||||
RANDFILE = $dir/private/.rand # private random number file
|
|
||||||
|
|
||||||
x509_extensions = usr_cert # The extentions to add to the cert
|
|
||||||
|
|
||||||
# Comment out the following two lines for the "traditional"
|
|
||||||
# (and highly broken) format.
|
|
||||||
name_opt = ca_default # Subject Name options
|
|
||||||
cert_opt = ca_default # Certificate field options
|
|
||||||
|
|
||||||
# Extension copying option: use with caution.
|
|
||||||
# copy_extensions = copy
|
|
||||||
|
|
||||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
|
||||||
# so this is commented out by default to leave a V1 CRL.
|
|
||||||
# crlnumber must also be commented out to leave a V1 CRL.
|
|
||||||
# crl_extensions = crl_ext
|
|
||||||
|
|
||||||
default_days = 365 # how long to certify for
|
|
||||||
default_crl_days= 30 # how long before next CRL
|
|
||||||
default_md = sha256 # use SHA-256 by default
|
|
||||||
preserve = no # keep passed DN ordering
|
|
||||||
|
|
||||||
# A few difference way of specifying how similar the request should look
|
|
||||||
# For type CA, the listed attributes must be the same, and the optional
|
|
||||||
# and supplied fields are just that :-)
|
|
||||||
policy = policy_match
|
|
||||||
|
|
||||||
# For the CA policy
|
|
||||||
[ policy_match ]
|
|
||||||
countryName = match
|
|
||||||
stateOrProvinceName = match
|
|
||||||
organizationName = match
|
|
||||||
organizationalUnitName = optional
|
|
||||||
commonName = supplied
|
|
||||||
emailAddress = optional
|
|
||||||
|
|
||||||
# For the 'anything' policy
|
|
||||||
# At this point in time, you must list all acceptable 'object'
|
|
||||||
# types.
|
|
||||||
[ policy_anything ]
|
|
||||||
countryName = optional
|
|
||||||
stateOrProvinceName = optional
|
|
||||||
localityName = optional
|
|
||||||
organizationName = optional
|
|
||||||
organizationalUnitName = optional
|
|
||||||
commonName = supplied
|
|
||||||
emailAddress = optional
|
|
||||||
|
|
||||||
####################################################################
|
|
||||||
[ req ]
|
|
||||||
default_bits = 2048
|
|
||||||
default_md = sha256
|
|
||||||
default_keyfile = privkey.pem
|
|
||||||
distinguished_name = req_distinguished_name
|
|
||||||
attributes = req_attributes
|
|
||||||
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
|
||||||
|
|
||||||
# Passwords for private keys if not present they will be prompted for
|
|
||||||
# input_password = secret
|
|
||||||
# output_password = secret
|
|
||||||
|
|
||||||
# This sets a mask for permitted string types. There are several options.
|
|
||||||
# default: PrintableString, T61String, BMPString.
|
|
||||||
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
|
|
||||||
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
|
||||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
|
||||||
# MASK:XXXX a literal mask value.
|
|
||||||
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
|
|
||||||
string_mask = utf8only
|
|
||||||
|
|
||||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
|
||||||
|
|
||||||
[ req_distinguished_name ]
|
|
||||||
countryName = Country Name (2 letter code)
|
|
||||||
countryName_default = XX
|
|
||||||
countryName_min = 2
|
|
||||||
countryName_max = 2
|
|
||||||
|
|
||||||
stateOrProvinceName = State or Province Name (full name)
|
|
||||||
#stateOrProvinceName_default = Default Province
|
|
||||||
|
|
||||||
localityName = Locality Name (eg, city)
|
|
||||||
localityName_default = Default City
|
|
||||||
|
|
||||||
0.organizationName = Organization Name (eg, company)
|
|
||||||
0.organizationName_default = Default Company Ltd
|
|
||||||
|
|
||||||
# we can do this but it is not needed normally :-)
|
|
||||||
#1.organizationName = Second Organization Name (eg, company)
|
|
||||||
#1.organizationName_default = World Wide Web Pty Ltd
|
|
||||||
|
|
||||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
|
||||||
#organizationalUnitName_default =
|
|
||||||
|
|
||||||
commonName = Common Name (eg, your name or your server\'s hostname)
|
|
||||||
commonName_max = 64
|
|
||||||
|
|
||||||
emailAddress = Email Address
|
|
||||||
emailAddress_max = 64
|
|
||||||
|
|
||||||
# SET-ex3 = SET extension number 3
|
|
||||||
|
|
||||||
[ req_attributes ]
|
|
||||||
challengePassword = A challenge password
|
|
||||||
challengePassword_min = 4
|
|
||||||
challengePassword_max = 20
|
|
||||||
|
|
||||||
unstructuredName = An optional company name
|
|
||||||
|
|
||||||
[ usr_cert ]
|
|
||||||
|
|
||||||
# These extensions are added when 'ca' signs a request.
|
|
||||||
|
|
||||||
# This goes against PKIX guidelines but some CAs do it and some software
|
|
||||||
# requires this to avoid interpreting an end user certificate as a CA.
|
|
||||||
|
|
||||||
basicConstraints=CA:FALSE
|
|
||||||
|
|
||||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
|
||||||
# the certificate can be used for anything *except* object signing.
|
|
||||||
|
|
||||||
# This is OK for an SSL server.
|
|
||||||
# nsCertType = server
|
|
||||||
|
|
||||||
# For an object signing certificate this would be used.
|
|
||||||
# nsCertType = objsign
|
|
||||||
|
|
||||||
# For normal client use this is typical
|
|
||||||
# nsCertType = client, email
|
|
||||||
|
|
||||||
# and for everything including object signing:
|
|
||||||
# nsCertType = client, email, objsign
|
|
||||||
|
|
||||||
# This is typical in keyUsage for a client certificate.
|
|
||||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|
||||||
|
|
||||||
# This will be displayed in Netscape's comment listbox.
|
|
||||||
nsComment = "OpenSSL Generated Certificate"
|
|
||||||
|
|
||||||
# PKIX recommendations harmless if included in all certificates.
|
|
||||||
subjectKeyIdentifier=hash
|
|
||||||
authorityKeyIdentifier=keyid,issuer
|
|
||||||
|
|
||||||
# This stuff is for subjectAltName and issuerAltname.
|
|
||||||
# Import the email address.
|
|
||||||
# subjectAltName=email:copy
|
|
||||||
# An alternative to produce certificates that aren't
|
|
||||||
# deprecated according to PKIX.
|
|
||||||
# subjectAltName=email:move
|
|
||||||
|
|
||||||
# Copy subject details
|
|
||||||
# issuerAltName=issuer:copy
|
|
||||||
|
|
||||||
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
|
||||||
#nsBaseUrl
|
|
||||||
#nsRevocationUrl
|
|
||||||
#nsRenewalUrl
|
|
||||||
#nsCaPolicyUrl
|
|
||||||
#nsSslServerName
|
|
||||||
|
|
||||||
# This is required for TSA certificates.
|
|
||||||
# extendedKeyUsage = critical,timeStamping
|
|
||||||
|
|
||||||
[ v3_req ]
|
|
||||||
|
|
||||||
# Extensions to add to a certificate request
|
|
||||||
|
|
||||||
basicConstraints = CA:FALSE
|
|
||||||
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|
||||||
|
|
||||||
[ v3_ca ]
|
|
||||||
|
|
||||||
|
|
||||||
# Extensions for a typical CA
|
|
||||||
|
|
||||||
|
|
||||||
# PKIX recommendation.
|
|
||||||
|
|
||||||
subjectKeyIdentifier=hash
|
|
||||||
|
|
||||||
authorityKeyIdentifier=keyid:always,issuer
|
|
||||||
|
|
||||||
# This is what PKIX recommends but some broken software chokes on critical
|
|
||||||
# extensions.
|
|
||||||
#basicConstraints = critical,CA:true
|
|
||||||
# So we do this instead.
|
|
||||||
basicConstraints = CA:true
|
|
||||||
|
|
||||||
# Key usage: this is typical for a CA certificate. However since it will
|
|
||||||
# prevent it being used as an test self-signed certificate it is best
|
|
||||||
# left out by default.
|
|
||||||
# keyUsage = cRLSign, keyCertSign
|
|
||||||
|
|
||||||
# Some might want this also
|
|
||||||
# nsCertType = sslCA, emailCA
|
|
||||||
|
|
||||||
# Include email address in subject alt name: another PKIX recommendation
|
|
||||||
# subjectAltName=email:copy
|
|
||||||
# Copy issuer details
|
|
||||||
# issuerAltName=issuer:copy
|
|
||||||
|
|
||||||
# DER hex encoding of an extension: beware experts only!
|
|
||||||
# obj=DER:02:03
|
|
||||||
# Where 'obj' is a standard or added object
|
|
||||||
# You can even override a supported extension:
|
|
||||||
# basicConstraints= critical, DER:30:03:01:01:FF
|
|
||||||
|
|
||||||
[ crl_ext ]
|
|
||||||
|
|
||||||
# CRL extensions.
|
|
||||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
|
||||||
|
|
||||||
# issuerAltName=issuer:copy
|
|
||||||
authorityKeyIdentifier=keyid:always
|
|
||||||
|
|
||||||
[ proxy_cert_ext ]
|
|
||||||
# These extensions should be added when creating a proxy certificate
|
|
||||||
|
|
||||||
# This goes against PKIX guidelines but some CAs do it and some software
|
|
||||||
# requires this to avoid interpreting an end user certificate as a CA.
|
|
||||||
|
|
||||||
basicConstraints=CA:FALSE
|
|
||||||
|
|
||||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
|
||||||
# the certificate can be used for anything *except* object signing.
|
|
||||||
|
|
||||||
# This is OK for an SSL server.
|
|
||||||
# nsCertType = server
|
|
||||||
|
|
||||||
# For an object signing certificate this would be used.
|
|
||||||
# nsCertType = objsign
|
|
||||||
|
|
||||||
# For normal client use this is typical
|
|
||||||
# nsCertType = client, email
|
|
||||||
|
|
||||||
# and for everything including object signing:
|
|
||||||
# nsCertType = client, email, objsign
|
|
||||||
|
|
||||||
# This is typical in keyUsage for a client certificate.
|
|
||||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|
||||||
|
|
||||||
# This will be displayed in Netscape's comment listbox.
|
|
||||||
nsComment = "OpenSSL Generated Certificate"
|
|
||||||
|
|
||||||
# PKIX recommendations harmless if included in all certificates.
|
|
||||||
subjectKeyIdentifier=hash
|
|
||||||
authorityKeyIdentifier=keyid,issuer
|
|
||||||
|
|
||||||
# This stuff is for subjectAltName and issuerAltname.
|
|
||||||
# Import the email address.
|
|
||||||
# subjectAltName=email:copy
|
|
||||||
# An alternative to produce certificates that aren't
|
|
||||||
# deprecated according to PKIX.
|
|
||||||
# subjectAltName=email:move
|
|
||||||
|
|
||||||
# Copy subject details
|
|
||||||
# issuerAltName=issuer:copy
|
|
||||||
|
|
||||||
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
|
||||||
#nsBaseUrl
|
|
||||||
#nsRevocationUrl
|
|
||||||
#nsRenewalUrl
|
|
||||||
#nsCaPolicyUrl
|
|
||||||
#nsSslServerName
|
|
||||||
|
|
||||||
# This really needs to be in place for it to be a proxy certificate.
|
|
||||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
|
||||||
|
|
||||||
####################################################################
|
|
||||||
[ tsa ]
|
|
||||||
|
|
||||||
default_tsa = tsa_config1 # the default TSA section
|
|
||||||
|
|
||||||
[ tsa_config1 ]
|
|
||||||
|
|
||||||
# These are used by the TSA reply generation only.
|
|
||||||
dir = ./demoCA # TSA root directory
|
|
||||||
serial = $dir/tsaserial # The current serial number (mandatory)
|
|
||||||
crypto_device = builtin # OpenSSL engine to use for signing
|
|
||||||
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
|
||||||
# (optional)
|
|
||||||
certs = $dir/cacert.pem # Certificate chain to include in reply
|
|
||||||
# (optional)
|
|
||||||
signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
|
|
||||||
|
|
||||||
default_policy = tsa_policy1 # Policy if request did not specify it
|
|
||||||
# (optional)
|
|
||||||
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
|
||||||
digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory)
|
|
||||||
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
|
||||||
clock_precision_digits = 0 # number of digits after dot. (optional)
|
|
||||||
ordering = yes # Is ordering defined for timestamps?
|
|
||||||
# (optional, default: no)
|
|
||||||
tsa_name = yes # Must the TSA name be included in the reply?
|
|
||||||
# (optional, default: no)
|
|
||||||
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
|
||||||
# (optional, default: no)
|
|
||||||
@@ -1,19 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=New Relic Infrastructure Agent
|
|
||||||
After=dbus.service syslog.target network.target
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
RuntimeDirectory=newrelic-infra
|
|
||||||
Type=simple
|
|
||||||
ExecStart=/usr/bin/newrelic-infra-service
|
|
||||||
MemoryLimit=1G
|
|
||||||
# MemoryMax is only supported in systemd > 230 and replaces MemoryLimit. Some cloud dists do not have that version
|
|
||||||
# MemoryMax=1G
|
|
||||||
Restart=always
|
|
||||||
RestartSec=20
|
|
||||||
StartLimitInterval=0
|
|
||||||
StartLimitBurst=5
|
|
||||||
PIDFile=/var/run/newrelic-infra/newrelic-infra.pid
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
||||||
@@ -1,116 +0,0 @@
|
|||||||
[PARSER]
|
|
||||||
Name apache
|
|
||||||
Format regex
|
|
||||||
Regex ^(?<host>[^ ]*) [^ ]* (?<user>[^ ]*) \[(?<time>[^\]]*)\] "(?<method>\S+)(?: +(?<path>[^\"]*?)(?: +\S*)?)?" (?<code>[^ ]*) (?<size>[^ ]*)(?: "(?<referer>[^\"]*)" "(?<agent>[^\"]*)")?$
|
|
||||||
Time_Key time
|
|
||||||
Time_Format %d/%b/%Y:%H:%M:%S %z
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
Name apache2
|
|
||||||
Format regex
|
|
||||||
Regex ^(?<host>[^ ]*) [^ ]* (?<user>[^ ]*) \[(?<time>[^\]]*)\] "(?<method>\S+)(?: +(?<path>[^ ]*) +\S*)?" (?<code>[^ ]*) (?<size>[^ ]*)(?: "(?<referer>[^\"]*)" "(?<agent>.*)")?$
|
|
||||||
Time_Key time
|
|
||||||
Time_Format %d/%b/%Y:%H:%M:%S %z
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
Name apache_error
|
|
||||||
Format regex
|
|
||||||
Regex ^\[[^ ]* (?<time>[^\]]*)\] \[(?<level>[^\]]*)\](?: \[pid (?<pid>[^\]]*)\])?( \[client (?<client>[^\]]*)\])? (?<message>.*)$
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
Name nginx
|
|
||||||
Format regex
|
|
||||||
Regex ^(?<remote>[^ ]*) (?<host>[^ ]*) (?<user>[^ ]*) \[(?<time>[^\]]*)\] "(?<method>\S+)(?: +(?<path>[^\"]*?)(?: +\S*)?)?" (?<code>[^ ]*) (?<size>[^ ]*)(?: "(?<referer>[^\"]*)" "(?<agent>[^\"]*)")
|
|
||||||
Time_Key time
|
|
||||||
Time_Format %d/%b/%Y:%H:%M:%S %z
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
# https://rubular.com/r/IhIbCAIs7ImOkc
|
|
||||||
Name k8s-nginx-ingress
|
|
||||||
Format regex
|
|
||||||
Regex ^(?<host>[^ ]*) - (?<user>[^ ]*) \[(?<time>[^\]]*)\] "(?<method>\S+)(?: +(?<path>[^\"]*?)(?: +\S*)?)?" (?<code>[^ ]*) (?<size>[^ ]*) "(?<referer>[^\"]*)" "(?<agent>[^\"]*)" (?<request_length>[^ ]*) (?<request_time>[^ ]*) \[(?<proxy_upstream_name>[^ ]*)\] (\[(?<proxy_alternative_upstream_name>[^ ]*)\] )?(?<upstream_addr>[^ ]*) (?<upstream_response_length>[^ ]*) (?<upstream_response_time>[^ ]*) (?<upstream_status>[^ ]*) (?<reg_id>[^ ]*).*$
|
|
||||||
Time_Key time
|
|
||||||
Time_Format %d/%b/%Y:%H:%M:%S %z
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
Name json
|
|
||||||
Format json
|
|
||||||
Time_Key time
|
|
||||||
Time_Format %d/%b/%Y:%H:%M:%S %z
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
Name docker
|
|
||||||
Format json
|
|
||||||
Time_Key time
|
|
||||||
Time_Format %Y-%m-%dT%H:%M:%S.%L
|
|
||||||
Time_Keep On
|
|
||||||
# --
|
|
||||||
# Since Fluent Bit v1.2, if you are parsing Docker logs and using
|
|
||||||
# the Kubernetes filter, it's not longer required to decode the
|
|
||||||
# 'log' key.
|
|
||||||
#
|
|
||||||
# Command | Decoder | Field | Optional Action
|
|
||||||
# =============|==================|=================
|
|
||||||
#Decode_Field_As json log
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
Name docker-daemon
|
|
||||||
Format regex
|
|
||||||
Regex time="(?<time>[^ ]*)" level=(?<level>[^ ]*) msg="(?<msg>[^ ].*)"
|
|
||||||
Time_Key time
|
|
||||||
Time_Format %Y-%m-%dT%H:%M:%S.%L
|
|
||||||
Time_Keep On
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
Name syslog-rfc5424
|
|
||||||
Format regex
|
|
||||||
Regex ^\<(?<pri>[0-9]{1,5})\>1 (?<time>[^ ]+) (?<host>[^ ]+) (?<ident>[^ ]+) (?<pid>[-0-9]+) (?<msgid>[^ ]+) (?<extradata>(\[(.*?)\]|-)) (?<message>.+)$
|
|
||||||
Time_Key time
|
|
||||||
Time_Format %Y-%m-%dT%H:%M:%S.%L%z
|
|
||||||
Time_Keep On
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
Name syslog-rfc3164-local
|
|
||||||
Format regex
|
|
||||||
Regex ^\<(?<pri>[0-9]+)\>(?<time>[^ ]* {1,2}[^ ]* [^ ]*) (?<ident>[a-zA-Z0-9_\/\.\-]*)(?:\[(?<pid>[0-9]+)\])?(?:[^\:]*\:)? *(?<message>.*)$
|
|
||||||
Time_Key time
|
|
||||||
Time_Format %b %d %H:%M:%S
|
|
||||||
Time_Keep On
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
Name syslog-rfc3164
|
|
||||||
Format regex
|
|
||||||
Regex /^\<(?<pri>[0-9]+)\>(?<time>[^ ]* {1,2}[^ ]* [^ ]*) (?<host>[^ ]*) (?<ident>[a-zA-Z0-9_\/\.\-]*)(?:\[(?<pid>[0-9]+)\])?(?:[^\:]*\:)? *(?<message>.*)$/
|
|
||||||
Time_Key time
|
|
||||||
Time_Format %b %d %H:%M:%S
|
|
||||||
Time_Keep On
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
Name mongodb
|
|
||||||
Format regex
|
|
||||||
Regex ^(?<time>[^ ]*)\s+(?<severity>\w)\s+(?<component>[^ ]+)\s+\[(?<context>[^\]]+)]\s+(?<message>.*?) *(?<ms>(\d+))?(:?ms)?$
|
|
||||||
Time_Format %Y-%m-%dT%H:%M:%S.%L
|
|
||||||
Time_Keep On
|
|
||||||
Time_Key time
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
# https://rubular.com/r/3fVxCrE5iFiZim
|
|
||||||
Name envoy
|
|
||||||
Format regex
|
|
||||||
Regex ^\[(?<start_time>[^\]]*)\] "(?<method>\S+)(?: +(?<path>[^\"]*?)(?: +\S*)?)? (?<protocol>\S+)" (?<code>[^ ]*) (?<response_flags>[^ ]*) (?<bytes_received>[^ ]*) (?<bytes_sent>[^ ]*) (?<duration>[^ ]*) (?<x_envoy_upstream_service_time>[^ ]*) "(?<x_forwarded_for>[^ ]*)" "(?<user_agent>[^\"]*)" "(?<request_id>[^\"]*)" "(?<authority>[^ ]*)" "(?<upstream_host>[^ ]*)"
|
|
||||||
Time_Format %Y-%m-%dT%H:%M:%S.%L%z
|
|
||||||
Time_Keep On
|
|
||||||
Time_Key start_time
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
# http://rubular.com/r/tjUt3Awgg4
|
|
||||||
Name cri
|
|
||||||
Format regex
|
|
||||||
Regex ^(?<time>[^ ]+) (?<stream>stdout|stderr) (?<logtag>[^ ]*) (?<message>.*)$
|
|
||||||
Time_Key time
|
|
||||||
Time_Format %Y-%m-%dT%H:%M:%S.%L%z
|
|
||||||
|
|
||||||
[PARSER]
|
|
||||||
Name kube-custom
|
|
||||||
Format regex
|
|
||||||
Regex (?<tag>[^.]+)?\.?(?<pod_name>[a-z0-9](?:[-a-z0-9]*[a-z0-9])?(?:\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*)_(?<namespace_name>[^_]+)_(?<container_name>.+)-(?<docker_id>[a-z0-9]{64})\.log$
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
[PLUGINS]
|
|
||||||
# Path /path/to/out_gstdout.so
|
|
||||||
@@ -1,93 +0,0 @@
|
|||||||
[SERVICE]
|
|
||||||
# Flush
|
|
||||||
# =====
|
|
||||||
# set an interval of seconds before to flush records to a destination
|
|
||||||
flush 5
|
|
||||||
|
|
||||||
# Daemon
|
|
||||||
# ======
|
|
||||||
# instruct Fluent Bit to run in foreground or background mode.
|
|
||||||
daemon Off
|
|
||||||
|
|
||||||
# Log_Level
|
|
||||||
# =========
|
|
||||||
# Set the verbosity level of the service, values can be:
|
|
||||||
#
|
|
||||||
# - error
|
|
||||||
# - warning
|
|
||||||
# - info
|
|
||||||
# - debug
|
|
||||||
# - trace
|
|
||||||
#
|
|
||||||
# by default 'info' is set, that means it includes 'error' and 'warning'.
|
|
||||||
log_level info
|
|
||||||
|
|
||||||
# Parsers File
|
|
||||||
# ============
|
|
||||||
# specify an optional 'Parsers' configuration file
|
|
||||||
parsers_file parsers.conf
|
|
||||||
|
|
||||||
# Plugins File
|
|
||||||
# ============
|
|
||||||
# specify an optional 'Plugins' configuration file to load external plugins.
|
|
||||||
plugins_file plugins.conf
|
|
||||||
|
|
||||||
# HTTP Server
|
|
||||||
# ===========
|
|
||||||
# Enable/Disable the built-in HTTP Server for metrics
|
|
||||||
http_server Off
|
|
||||||
http_listen 0.0.0.0
|
|
||||||
http_port 2020
|
|
||||||
|
|
||||||
# Storage
|
|
||||||
# =======
|
|
||||||
# Fluent Bit can use memory and filesystem buffering based mechanisms
|
|
||||||
#
|
|
||||||
# - https://docs.fluentbit.io/manual/administration/buffering-and-storage
|
|
||||||
#
|
|
||||||
# storage metrics
|
|
||||||
# ---------------
|
|
||||||
# publish storage pipeline metrics in '/api/v1/storage'. The metrics are
|
|
||||||
# exported only if the 'http_server' option is enabled.
|
|
||||||
#
|
|
||||||
storage.metrics on
|
|
||||||
|
|
||||||
# storage.path
|
|
||||||
# ------------
|
|
||||||
# absolute file system path to store filesystem data buffers (chunks).
|
|
||||||
#
|
|
||||||
# storage.path /tmp/storage
|
|
||||||
|
|
||||||
# storage.sync
|
|
||||||
# ------------
|
|
||||||
# configure the synchronization mode used to store the data into the
|
|
||||||
# filesystem. It can take the values normal or full.
|
|
||||||
#
|
|
||||||
# storage.sync normal
|
|
||||||
|
|
||||||
# storage.checksum
|
|
||||||
# ----------------
|
|
||||||
# enable the data integrity check when writing and reading data from the
|
|
||||||
# filesystem. The storage layer uses the CRC32 algorithm.
|
|
||||||
#
|
|
||||||
# storage.checksum off
|
|
||||||
|
|
||||||
# storage.backlog.mem_limit
|
|
||||||
# -------------------------
|
|
||||||
# if storage.path is set, Fluent Bit will look for data chunks that were
|
|
||||||
# not delivered and are still in the storage layer, these are called
|
|
||||||
# backlog data. This option configure a hint of maximum value of memory
|
|
||||||
# to use when processing these records.
|
|
||||||
#
|
|
||||||
# storage.backlog.mem_limit 5M
|
|
||||||
|
|
||||||
[INPUT]
|
|
||||||
name cpu
|
|
||||||
tag cpu.local
|
|
||||||
|
|
||||||
# Read interval (sec) Default: 1
|
|
||||||
interval_sec 1
|
|
||||||
|
|
||||||
[OUTPUT]
|
|
||||||
name stdout
|
|
||||||
match *
|
|
||||||
Reference in New Issue
Block a user