Conversation
…compile/load via nix role; guarded SELinux mode changes
…ize and double the /home partition size.
… into cbaxley-563-redhat-9-1
Resolved conflicts: - Kept all offline_mode logic in ansible tasks (YOUR working code) - Accepted workflow trigger changes from develop (push instead of PR) - Merged install.sh: kept offline mode flags/logic + accepted improved ansible installation prompts - Merged .gitignore: kept both SELinux and offline resources
9f85f8e to
3abf7dc
Compare
Only functional changes (when conditions) should be in the diff, not cosmetic task name changes.
- Removed scripts/uninstall_lme.sh (development-only script) - Reset scripts/wipe_lme.sh to match develop (no offline changes needed)
Keep only new container: lme-fleet-distribution.container Revert memory limit changes to elasticsearch and kibana containers
Collaborator
|
We are going to have to add the tests for redhat in here. A merge with development would add them. |
cbaxley
reviewed
Oct 23, 2025
scripts/prepare_offline.sh
Outdated
| fi | ||
|
|
||
| # Set default versions if not found in env file | ||
| STACK_VERSION=${STACK_VERSION:-"8.18.0"} |
cbaxley
approved these changes
Nov 12, 2025
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🗣 Description
💭 Motivation and context
📷 Screenshots (DELETE IF UNAPPLICABLE)
🧪 Testing
Redhat:
Build two machines using the exporter.txt in this format. Use r1 and r2
Source the exporter.txt file and login to azure:
source exporter.txt az loginBuild the machines using a larger disk.
On the build machine (r1):
sudo dnf -y install git git clone https://github.com/cisagov/LME.git cd LME/ git checkout offline-installation-full sudo ./scripts/expand_disk_for_offline.sh ./scripts/prepare_offline.shYou will now have a tar file in your home directory that you are going to copy to r2
Change exporter.txt resource group to r2.
Source the exporter.txt file and build r2:
source exporter.txtBuild the r2 machine using a larger disk.
Note the ip and password. You will need it for when you are copying the build and such from r1 to r2
Now you want to copy the expand_disk_for_offline.sh to r2 (The target machine) from r1 (The build machine):
On the build machine:
scp /home/lme-user/LME/scripts/expand_disk_for_offline.sh r2ipaddress:~Then you need to ssh into r2 and run the expand_disk_for_offline.sh as root:
# On r2 sudo /home/lme-user/expand_disk_for_offline.shNow go back to r1 and scp the offline tarball to r2:
Now go back to r2 and move the tarball to a larger volume and untar it:
Now you need to set up the outbound traffic on r2
Go into the azure web interface and find the r2 NSG1 and open it.
Click on the left Settings->Outbound Security Rules
Click the plus to add a new rule and add two rules, one at a time.
Instructions for Creating SSH Access Rule
This will create a rule allowing SSH traffic (port 22) from any source to any destination using any protocol.
Now you need to block all of the other traffic.
Instructions for Creating Deny All Traffic Rule
To create the network security rule shown in the image, follow these steps in this exact order:
This will create a rule denying all traffic from any source to any destination using any protocol. Note that this is a blocking rule with a priority of 1015, which means it will be processed after rules with lower priority numbers.
Now ssh back into r2 and run ping until the packets stop getting out.
Once the traffic stops flowing hit ctrl-c to stop the ping.
Now you can run the install in offline mode.
Running the tests
You can either run the tests on your local machine pointing the .env file to the server, or you can install the python environment on r2 and run the tests on it.
In either case, you will have to go back to the azure web gui and remove (click the trash can) the deny rule to test, because you either have to get to it from your local machine or you have to install the pip requirements from the web for the tests.
✅ Pre-approval checklist
the title reflects this in a clear human readable format
✅ Pre-merge Checklist
✅ Post-merge Checklist