From f95971e415c4350b5496b1934a5b75bfa987ff7c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?V=C3=A1clav=20Barto=C5=A1?= <bartos@cesnet.cz>
Date: Fri, 11 Dec 2020 17:18:43 +0100
Subject: [PATCH] All occurences of "dsoclab" or "dsl" renamed to "soctools"

dsoclab-* -> soctools-*
dsldev -> soctoolsmain
dslproxy -> soctoolsproxy
---
 README.md                                     |  2 +-
 buildca.yml                                   |  2 +-
 buildimages.yml                               |  2 +-
 group_vars/all/main.yml                       | 18 ++++++------
 inventories/cassandra                         |  2 +-
 inventories/cortex                            |  2 +-
 inventories/elasticsearch                     |  4 +--
 inventories/filebeat                          | 28 +++++++++----------
 inventories/haproxy                           |  2 +-
 inventories/keycloak                          |  2 +-
 inventories/kibana                            |  2 +-
 inventories/misp                              |  2 +-
 inventories/mysql                             |  2 +-
 inventories/nifi                              |  6 ++--
 inventories/soctools                          |  2 +-
 inventories/thehive                           |  2 +-
 roles/build/tasks/main.yml                    |  2 +-
 roles/build/templates/cortex/application.conf |  2 +-
 roles/ca/tasks/main.yml                       |  2 +-
 roles/cortex/templates/application.conf.j2    |  2 +-
 .../templates/initkeycloakrealm.sh.j2         |  6 ++--
 roles/misp/tasks/config.yml                   |  6 ++--
 roles/misp/templates/misp.conf.j2             | 10 +++----
 roles/nifi/templates/flow.xml.j2              |  2 +-
 roles/nifi/templates/nifi.properties.j2       |  8 +++---
 roles/odfees/tasks/main.yml                   |  2 +-
 .../templates/config/elasticsearch.yml.j2     |  2 +-
 .../templates/securityconfig/config.yml.j2    |  2 +-
 roles/odfekibana/tasks/main.yml               |  8 +++---
 roles/odfekibana/templates/kibana.yml.j2      |  6 ++--
 soctools_server.yml                           |  2 +-
 startsoctools.yml                             |  2 +-
 stopsoctools.yml                              |  2 +-
 utils/flow2template.py                        |  2 +-
 34 files changed, 74 insertions(+), 74 deletions(-)

diff --git a/README.md b/README.md
index cb026f8..ac1dfb4 100644
--- a/README.md
+++ b/README.md
@@ -19,7 +19,7 @@ Temporary solution: Upload your ssh key to gitlab.geant.org
 `cd soctools`
 
 Install soctools:
-Edit group_vars/all/main.yml and change 'dslproxy' so that it point to the FQDN of the server.  
+Edit group_vars/all/main.yml and change 'soctoolsproxy' so that it point to the FQDN of the server.  
 `vi group_vars/all/main.yml`  
 The first entry in the soctools_users variable is the user with full admin privileges in NiFi and Kibana.
 
diff --git a/buildca.yml b/buildca.yml
index b718286..37ef902 100644
--- a/buildca.yml
+++ b/buildca.yml
@@ -1,7 +1,7 @@
 ---
 
 - name: Build certification authority
-  hosts: dsldev
+  hosts: soctoolsmain
   roles:
     - ca
 
diff --git a/buildimages.yml b/buildimages.yml
index d30f905..8a93583 100644
--- a/buildimages.yml
+++ b/buildimages.yml
@@ -1,7 +1,7 @@
 ---
 
 - name: Build docker images
-  hosts: dsldev
+  hosts: soctoolsmain
   roles:
     - build
 
diff --git a/group_vars/all/main.yml b/group_vars/all/main.yml
index 28c551b..840fe83 100644
--- a/group_vars/all/main.yml
+++ b/group_vars/all/main.yml
@@ -1,6 +1,6 @@
 ---
 
-dslproxy: "<CHANGE_ME:hostname>"
+soctoolsproxy: "<CHANGE_ME:hostname>"
 
 # TheHive Button plugin
 THEHIVE_URL: "https://hive.gn4-3-wp8-soc.sunet.se/"
@@ -14,14 +14,14 @@ repo: gn43-dsl
 version: 7
 suffix: a20201004
 
-haproxy_name: "dsoclab-haproxy"
+haproxy_name: "soctools-haproxy"
 haproxy_version: "2.2"
 haproxy_img: "{{repo}}/haproxy:{{version}}{{suffix}}"
 HAPROXY_PROCESSES: "2"
 HAPROXY_STATS_PASS: "eiph2Eepaizicheelah3tei+bae3ohgh"
 
 FILEBEAT_VERSION: "7.9.3"
-FILEBEAT_OUTPUT_HOST: "{{dslproxy}}"
+FILEBEAT_OUTPUT_HOST: "{{soctoolsproxy}}"
 FILEBEAT_OUTPUT_PORT: "6000"
 FILEBEAT_CERT: "/opt/filebeat/filebeat.crt"
 FILEBEAT_KEY: "/opt/filebeat/filebeat.key"
@@ -30,27 +30,27 @@ temp_root: "/tmp/centosbuild"
 
 openjdk_img: "{{repo}}/openjdk:{{version}}{{suffix}}"
 
-zookeeper_name: "dsoclab-zookeeper"
+zookeeper_name: "soctools-zookeeper"
 zookeeper_img: "{{repo}}/zookeeper:{{version}}{{suffix}}"
 
-misp_name: "dsoclab-misp"
+misp_name: "soctools-misp"
 misp_img: "{{repo}}/misp:{{version}}{{suffix}}"
 
 nifi_img: "{{repo}}/nifi:{{version}}{{suffix}}"
 
-mysql_name: "dsoclab-mysql"
+mysql_name: "soctools-mysql"
 mysql_img: "{{repo}}/mysql:{{version}}{{suffix}}"
 mysql_dbrootpass: "Pass006"
 
-cassandra_name: "dsoclab-cassandra"
+cassandra_name: "soctools-cassandra"
 cassandra_img: "{{repo}}/cassandra:{{version}}{{suffix}}"
 
-thehive_name: "dsoclab-thehive"
+thehive_name: "soctools-thehive"
 thehive_img: "{{repo}}/thehive:{{version}}{{suffix}}"
 # GENERATED WITH cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 64 | head -n 1
 thehive_secret_key: "LcnI9eKLo33711BmCnzf6UM1y05pdmj3dlADL81PxuffWqhobRoiiGFftjNPKpmM"
 
-cortex_name: "dsoclab-cortex"
+cortex_name: "soctools-cortex"
 cortex_img: "{{repo}}/cortex:{{version}}{{suffix}}"
 cortex_elasticsearch_mem: "256m"
 # GENERATED WITH cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 64 | head -n 1
diff --git a/inventories/cassandra b/inventories/cassandra
index 82e7f1e..65a4f34 100644
--- a/inventories/cassandra
+++ b/inventories/cassandra
@@ -1,2 +1,2 @@
 [cassandra]
-dsoclab-cassandra ansible_connection=docker
+soctools-cassandra ansible_connection=docker
diff --git a/inventories/cortex b/inventories/cortex
index aeedc48..6a64e81 100644
--- a/inventories/cortex
+++ b/inventories/cortex
@@ -1,2 +1,2 @@
 [cortex]
-dsoclab-cortex ansible_connection=docker
+soctools-cortex ansible_connection=docker
diff --git a/inventories/elasticsearch b/inventories/elasticsearch
index 5f4b7de..73901fb 100644
--- a/inventories/elasticsearch
+++ b/inventories/elasticsearch
@@ -1,3 +1,3 @@
 [odfeescontainers]
-dsoclab-odfe-1 ansible_connection=docker
-dsoclab-odfe-2 ansible_connection=docker
+soctools-odfe-1 ansible_connection=docker
+soctools-odfe-2 ansible_connection=docker
diff --git a/inventories/filebeat b/inventories/filebeat
index 067871d..d0fd1a2 100644
--- a/inventories/filebeat
+++ b/inventories/filebeat
@@ -1,15 +1,15 @@
 [filebeat]
-dsoclab-nifi-1 ansible_connection=docker FILEBEAT_FILES='["/opt/nifi/nifi-current/logs/nifi-app.log","/opt/nifi/nifi-current/logs/nifi-bootstrap.log","/opt/nifi/nifi-current/logs/nifi-user.log"]' FILEBEAT_LOG_TYPE="nifi" FILEBEAT_LOG_FORMAT="text"
-dsoclab-nifi-2 ansible_connection=docker FILEBEAT_FILES='["/opt/nifi/nifi-current/logs/nifi-app.log","/opt/nifi/nifi-current/logs/nifi-bootstrap.log","/opt/nifi/nifi-current/logs/nifi-user.log"]' FILEBEAT_LOG_TYPE="nifi" FILEBEAT_LOG_FORMAT="text"
-dsoclab-nifi-3 ansible_connection=docker FILEBEAT_FILES='["/opt/nifi/nifi-current/logs/nifi-app.log","/opt/nifi/nifi-current/logs/nifi-bootstrap.log","/opt/nifi/nifi-current/logs/nifi-user.log"]' FILEBEAT_LOG_TYPE="nifi" FILEBEAT_LOG_FORMAT="text"
-dsoclab-misp ansible_connection=docker FILEBEAT_FILES='["/var/opt/rh/rh-php72/log/php-fpm/*.log","/var/opt/rh/rh-redis32/log/redis/redis.log","/var/log/httpd/*log","/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="misp" FILEBEAT_LOG_FORMAT="text"
-#dsoclab-odfe-1 ansible_connection=docker FILEBEAT_FILES='["/usr/share/elasticsearch/logs/dsoclab-cluster_server.json"]' FILEBEAT_LOG_TYPE="odfe1" FILEBEAT_LOG_FORMAT="json"
-#dsoclab-odfe-2 ansible_connection=docker FILEBEAT_FILES='["/usr/share/elasticsearch/logs/dsoclab-cluster_server.json"]' FILEBEAT_LOG_TYPE="odfe2" FILEBEAT_LOG_FORMAT="json"
-dsoclab-kibana ansible_connection=docker FILEBEAT_FILES='["/usr/share/kibana/kblog"]' FILEBEAT_LOG_TYPE="kibana" FILEBEAT_LOG_FORMAT="text"
-dsoclab-keycloak ansible_connection=docker FILEBEAT_FILES='["/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="keycloak" FILEBEAT_LOG_FORMAT="text"
-dsoclab-mysql ansible_connection=docker FILEBEAT_FILES='["/var/opt/rh/rh-mariadb103/log/mariadb/mariadb.log"]' FILEBEAT_LOG_TYPE="mysql" FILEBEAT_LOG_FORMAT="text"
-dsoclab-haproxy ansible_connection=docker FILEBEAT_SYSLOG_PORT=9000 FILEBEAT_LOG_TYPE="haproxy" FILEBEAT_LOG_FORMAT="text"
-dsoclab-zookeeper ansible_connection=docker FILEBEAT_FILES='["/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="zookeeper" FILEBEAT_LOG_FORMAT="text"
-dsoclab-cortex ansible_connection=docker FILEBEAT_FILES='["/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="cortex" FILEBEAT_LOG_FORMAT="text"
-dsoclab-thehive ansible_connection=docker FILEBEAT_FILES='["/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="thehive" FILEBEAT_LOG_FORMAT="text"
-dsoclab-cassandra ansible_connection=docker FILEBEAT_FILES='["/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="cassandra" FILEBEAT_LOG_FORMAT="text"
+soctools-nifi-1 ansible_connection=docker FILEBEAT_FILES='["/opt/nifi/nifi-current/logs/nifi-app.log","/opt/nifi/nifi-current/logs/nifi-bootstrap.log","/opt/nifi/nifi-current/logs/nifi-user.log"]' FILEBEAT_LOG_TYPE="nifi" FILEBEAT_LOG_FORMAT="text"
+soctools-nifi-2 ansible_connection=docker FILEBEAT_FILES='["/opt/nifi/nifi-current/logs/nifi-app.log","/opt/nifi/nifi-current/logs/nifi-bootstrap.log","/opt/nifi/nifi-current/logs/nifi-user.log"]' FILEBEAT_LOG_TYPE="nifi" FILEBEAT_LOG_FORMAT="text"
+soctools-nifi-3 ansible_connection=docker FILEBEAT_FILES='["/opt/nifi/nifi-current/logs/nifi-app.log","/opt/nifi/nifi-current/logs/nifi-bootstrap.log","/opt/nifi/nifi-current/logs/nifi-user.log"]' FILEBEAT_LOG_TYPE="nifi" FILEBEAT_LOG_FORMAT="text"
+soctools-misp ansible_connection=docker FILEBEAT_FILES='["/var/opt/rh/rh-php72/log/php-fpm/*.log","/var/opt/rh/rh-redis32/log/redis/redis.log","/var/log/httpd/*log","/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="misp" FILEBEAT_LOG_FORMAT="text"
+#soctools-odfe-1 ansible_connection=docker FILEBEAT_FILES='["/usr/share/elasticsearch/logs/soctools-cluster_server.json"]' FILEBEAT_LOG_TYPE="odfe1" FILEBEAT_LOG_FORMAT="json"
+#soctools-odfe-2 ansible_connection=docker FILEBEAT_FILES='["/usr/share/elasticsearch/logs/soctools-cluster_server.json"]' FILEBEAT_LOG_TYPE="odfe2" FILEBEAT_LOG_FORMAT="json"
+soctools-kibana ansible_connection=docker FILEBEAT_FILES='["/usr/share/kibana/kblog"]' FILEBEAT_LOG_TYPE="kibana" FILEBEAT_LOG_FORMAT="text"
+soctools-keycloak ansible_connection=docker FILEBEAT_FILES='["/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="keycloak" FILEBEAT_LOG_FORMAT="text"
+soctools-mysql ansible_connection=docker FILEBEAT_FILES='["/var/opt/rh/rh-mariadb103/log/mariadb/mariadb.log"]' FILEBEAT_LOG_TYPE="mysql" FILEBEAT_LOG_FORMAT="text"
+soctools-haproxy ansible_connection=docker FILEBEAT_SYSLOG_PORT=9000 FILEBEAT_LOG_TYPE="haproxy" FILEBEAT_LOG_FORMAT="text"
+soctools-zookeeper ansible_connection=docker FILEBEAT_FILES='["/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="zookeeper" FILEBEAT_LOG_FORMAT="text"
+soctools-cortex ansible_connection=docker FILEBEAT_FILES='["/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="cortex" FILEBEAT_LOG_FORMAT="text"
+soctools-thehive ansible_connection=docker FILEBEAT_FILES='["/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="thehive" FILEBEAT_LOG_FORMAT="text"
+soctools-cassandra ansible_connection=docker FILEBEAT_FILES='["/var/log/supervisor/*.log"]' FILEBEAT_LOG_TYPE="cassandra" FILEBEAT_LOG_FORMAT="text"
diff --git a/inventories/haproxy b/inventories/haproxy
index b8ea6a7..7ded04a 100644
--- a/inventories/haproxy
+++ b/inventories/haproxy
@@ -1,2 +1,2 @@
 [haproxy]
-dsoclab-haproxy ansible_connection=docker
\ No newline at end of file
+soctools-haproxy ansible_connection=docker
\ No newline at end of file
diff --git a/inventories/keycloak b/inventories/keycloak
index c2746ec..b998e8f 100644
--- a/inventories/keycloak
+++ b/inventories/keycloak
@@ -1,2 +1,2 @@
 [keycloakcontainers]
-dsoclab-keycloak ansible_connection=docker
+soctools-keycloak ansible_connection=docker
diff --git a/inventories/kibana b/inventories/kibana
index 557280d..1f00ac6 100644
--- a/inventories/kibana
+++ b/inventories/kibana
@@ -1,2 +1,2 @@
 [odfekibanacontainers]
-dsoclab-kibana ansible_connection=docker
+soctools-kibana ansible_connection=docker
diff --git a/inventories/misp b/inventories/misp
index 331506d..445ec1e 100644
--- a/inventories/misp
+++ b/inventories/misp
@@ -1,2 +1,2 @@
 [mispcontainers]
-dsoclab-misp ansible_connection=docker
+soctools-misp ansible_connection=docker
diff --git a/inventories/mysql b/inventories/mysql
index f9dcc24..6d0b306 100644
--- a/inventories/mysql
+++ b/inventories/mysql
@@ -1,2 +1,2 @@
 [mysql]
-dsoclab-mysql ansible_connection=docker
\ No newline at end of file
+soctools-mysql ansible_connection=docker
\ No newline at end of file
diff --git a/inventories/nifi b/inventories/nifi
index e2c7ff1..d434490 100644
--- a/inventories/nifi
+++ b/inventories/nifi
@@ -1,4 +1,4 @@
 [nificontainers]
-dsoclab-nifi-1 ansible_connection=docker
-dsoclab-nifi-2 ansible_connection=docker
-dsoclab-nifi-3 ansible_connection=docker
+soctools-nifi-1 ansible_connection=docker
+soctools-nifi-2 ansible_connection=docker
+soctools-nifi-3 ansible_connection=docker
diff --git a/inventories/soctools b/inventories/soctools
index 71a2d97..46ea675 100644
--- a/inventories/soctools
+++ b/inventories/soctools
@@ -1,2 +1,2 @@
-[dsldev]
+[soctoolsmain]
 localhost ansible_connection=local
diff --git a/inventories/thehive b/inventories/thehive
index e19556d..6fd7b99 100644
--- a/inventories/thehive
+++ b/inventories/thehive
@@ -1,2 +1,2 @@
 [thehive]
-dsoclab-thehive ansible_connection=docker
+soctools-thehive ansible_connection=docker
diff --git a/roles/build/tasks/main.yml b/roles/build/tasks/main.yml
index 223766f..e08a9cf 100644
--- a/roles/build/tasks/main.yml
+++ b/roles/build/tasks/main.yml
@@ -2,7 +2,7 @@
 
 - assert:
     that:
-      - "'CHANGE_ME' not in dslproxy"
+      - "'CHANGE_ME' not in soctoolsproxy"
     fail_msg: "Review *all* settings in group_vars/all/main.yml"
 
 - include: centos.yml
diff --git a/roles/build/templates/cortex/application.conf b/roles/build/templates/cortex/application.conf
index 0e28b4d..afe42a6 100644
--- a/roles/build/templates/cortex/application.conf
+++ b/roles/build/templates/cortex/application.conf
@@ -17,7 +17,7 @@ search {
   index = cortex3
   # ElasticSearch instance address.
   # For cluster, join address:port with ',': "http://ip1:9200,ip2:9200,ip3:9200"
-  uri = "http://dsoclab-elastic:9200"
+  uri = "http://soctools-elastic:9200"
 
   ## Advanced configuration
   # Scroll keepalive.
diff --git a/roles/ca/tasks/main.yml b/roles/ca/tasks/main.yml
index ded1deb..8d982c5 100644
--- a/roles/ca/tasks/main.yml
+++ b/roles/ca/tasks/main.yml
@@ -57,7 +57,7 @@
 - name: Generate host certificates
   command: > 
     roles/ca/files/easyrsa/easyrsa 
-    --subject-alt-name="DNS:{{item}},DNS:{{dslproxy}}"
+    --subject-alt-name="DNS:{{item}},DNS:{{soctoolsproxy}}"
     build-serverClient-full {{item}} nopass
   with_items:
     - "{{ groups['nificontainers'] }}"
diff --git a/roles/cortex/templates/application.conf.j2 b/roles/cortex/templates/application.conf.j2
index 35323e0..56ef22f 100644
--- a/roles/cortex/templates/application.conf.j2
+++ b/roles/cortex/templates/application.conf.j2
@@ -38,7 +38,7 @@ search {
 ## 
 ##   ## SSL configuration
 ##   search.keyStore {
-##     path = "/etc/cortex/dsoclab-cortex.p12"
+##     path = "/etc/cortex/soctools-cortex.p12"
 ##     type = "PKCS12" # or PKCS12
 ##     password = "{{kspass}}"
 ##   }
diff --git a/roles/keycloak/templates/initkeycloakrealm.sh.j2 b/roles/keycloak/templates/initkeycloakrealm.sh.j2
index 481942e..f4cfc9e 100644
--- a/roles/keycloak/templates/initkeycloakrealm.sh.j2
+++ b/roles/keycloak/templates/initkeycloakrealm.sh.j2
@@ -21,14 +21,14 @@ kcadm.sh create realms/{{openid_realm}}/users -b '{"enabled":true,"attributes":{
 kcadm.sh set-password -r {{openid_realm}} --username {{user.username}} --new-password {{user.password}}
 {% endfor %}
 
-NIFICLIENT=$(kcadm.sh create realms/{{openid_realm}}/clients -i -b '{"enabled":true, "clientId":"dsoclab-nifi","protocol":"openid-connect","clientAuthenticatorType": "client-secret","redirectUris": ["https://{{dslproxy}}:9443/*" ],"webOrigins": [], "publicClient": false }')
+NIFICLIENT=$(kcadm.sh create realms/{{openid_realm}}/clients -i -b '{"enabled":true, "clientId":"soctools-nifi","protocol":"openid-connect","clientAuthenticatorType": "client-secret","redirectUris": ["https://{{soctoolsproxy}}:9443/*" ],"webOrigins": [], "publicClient": false }')
 kcadm.sh create realms/{{openid_realm}}/clients/${NIFICLIENT}/protocol-mappers/models -b '{"protocol":"openid-connect","config":{"id.token.claim":"true","access.token.claim":"true","userinfo.token.claim":"true","multivalued":"","aggregate.attrs":"","user.attribute":"DN","claim.name":"DN","jsonType.label":"String"},"name":"SendDN","protocolMapper":"oidc-usermodel-attribute-mapper"}'
 kcadm.sh get realms/{{openid_realm}}/clients/${NIFICLIENT}/client-secret --fields value > /opt/jboss/keycloak/nifisecret
 
-KIBANACLIENT=$(kcadm.sh create realms/{{openid_realm}}/clients -i -b '{"enabled":true, "clientId":"dsoclab-kibana","protocol":"openid-connect","clientAuthenticatorType": "client-secret","rootUrl": "https://{{dslproxy}}:5601","adminUrl": "","redirectUris": ["https://{{dslproxy}}:5601", "https://{{dslproxy}}:5601/auth/openid/login", "https://{{dslproxy}}:5601/app/kibana" ],"webOrigins": [], "publicClient": false }')
+KIBANACLIENT=$(kcadm.sh create realms/{{openid_realm}}/clients -i -b '{"enabled":true, "clientId":"soctools-kibana","protocol":"openid-connect","clientAuthenticatorType": "client-secret","rootUrl": "https://{{soctoolsproxy}}:5601","adminUrl": "","redirectUris": ["https://{{soctoolsproxy}}:5601", "https://{{soctoolsproxy}}:5601/auth/openid/login", "https://{{soctoolsproxy}}:5601/app/kibana" ],"webOrigins": [], "publicClient": false }')
 kcadm.sh get realms/{{openid_realm}}/clients/${KIBANACLIENT}/client-secret --fields value > /opt/jboss/keycloak/kibanasecret
 
-MISPCLIENT=$(kcadm.sh create realms/{{openid_realm}}/clients -i -b '{"enabled":true, "clientId":"dsoclab-misp","protocol":"openid-connect","clientAuthenticatorType": "client-secret","rootUrl": "https://{{dslproxy}}:6443","adminUrl": "","redirectUris": ["https://{{dslproxy}}:6443/users/login/keycloak"],"webOrigins": [], "publicClient": false }')
+MISPCLIENT=$(kcadm.sh create realms/{{openid_realm}}/clients -i -b '{"enabled":true, "clientId":"soctools-misp","protocol":"openid-connect","clientAuthenticatorType": "client-secret","rootUrl": "https://{{soctoolsproxy}}:6443","adminUrl": "","redirectUris": ["https://{{soctoolsproxy}}:6443/users/login/keycloak"],"webOrigins": [], "publicClient": false }')
 kcadm.sh get realms/{{openid_realm}}/clients/${MISPCLIENT}/client-secret --fields value > /opt/jboss/keycloak/mispsecret
 
 kcadm.sh config truststore --delete
diff --git a/roles/misp/tasks/config.yml b/roles/misp/tasks/config.yml
index 8ff0252..52bfaac 100644
--- a/roles/misp/tasks/config.yml
+++ b/roles/misp/tasks/config.yml
@@ -9,7 +9,7 @@
     - {"var":"Plugin.CustomAuth_enable","value":"true"}
     - {"var":"Plugin.CustomAuth_header","value":"X_REMOTE_USER"}
     - {"var":"Plugin.CustomAuth_disable_logout","value":"true"}
-    - {"var":"MISP.external_baseurl","value":"https://{{dslproxy}}:6443"}
+    - {"var":"MISP.external_baseurl","value":"https://{{soctoolsproxy}}:6443"}
     - {"var":"MISP.live","value":"true"}
 
 - name: Init default user
@@ -35,7 +35,7 @@
 
 - name: add users
   uri:
-   url: "https://{{dslproxy}}:6443/admin/users/add/1"
+   url: "https://{{soctoolsproxy}}:6443/admin/users/add/1"
    method: POST
    body_format: json
    headers:
@@ -49,7 +49,7 @@
 
 - name: Enable feed
   uri:
-   url: "https://{{dslproxy}}:6443/feeds/edit/1"
+   url: "https://{{soctoolsproxy}}:6443/feeds/edit/1"
    method: POST
    body_format: json
    headers:
diff --git a/roles/misp/templates/misp.conf.j2 b/roles/misp/templates/misp.conf.j2
index 4e3189c..a1fa137 100644
--- a/roles/misp/templates/misp.conf.j2
+++ b/roles/misp/templates/misp.conf.j2
@@ -1,7 +1,7 @@
 Listen 6443 https
 <VirtualHost *:6443>
-ServerAdmin admin@{{dslproxy}}
-ServerName {{dslproxy}}
+ServerAdmin admin@{{soctoolsproxy}}
+ServerName {{soctoolsproxy}}
 DocumentRoot /var/www/MISP/app/webroot
 <Directory /var/www/MISP/app/webroot>
 Options -Indexes
@@ -15,9 +15,9 @@ ProxyPassMatch ^/(.*\.php(/.*)?)$ fcgi://127.0.0.1:9000/var/www/MISP/app/webroot
 SetEnvIf Authorization "(.*)" HTTP_AUTHORIZATION=$1
 
 OIDCCryptoPassphrase {{misp_crypto_pass}}
-OIDCProviderMetadataURL https://{{dslproxy}}:12443/auth/realms/{{openid_realm}}/.well-known/openid-configuration
-OIDCRedirectURI https://{{dslproxy}}:6443/users/login/keycloak
-OIDCClientID dsoclab-misp
+OIDCProviderMetadataURL https://{{soctoolsproxy}}:12443/auth/realms/{{openid_realm}}/.well-known/openid-configuration
+OIDCRedirectURI https://{{soctoolsproxy}}:6443/users/login/keycloak
+OIDCClientID soctools-misp
 OIDCScope "openid profile"
 OIDCClientSecret {{mispsecret.value}}
 OIDCRemoteUserClaim email
diff --git a/roles/nifi/templates/flow.xml.j2 b/roles/nifi/templates/flow.xml.j2
index 8070e40..8fbd37f 100644
--- a/roles/nifi/templates/flow.xml.j2
+++ b/roles/nifi/templates/flow.xml.j2
@@ -10679,7 +10679,7 @@
     <variable name="misp_ip_first_interval" value="60d" />
     <variable name="elastic_username" value="{{ elastic_username }}" />
     <variable name="misp_url" value="{{ misp_url }}" />
-    <variable name="elastic_url" value="https://{{ dslproxy }}:9200" />
+    <variable name="elastic_url" value="https://{{ soctoolsproxy }}:9200" />
     <variable name="elastic_password" value="{{ odfees_adminpass }}" />
   </rootGroup>
   <controllerServices />
diff --git a/roles/nifi/templates/nifi.properties.j2 b/roles/nifi/templates/nifi.properties.j2
index e9db2e8..6efbc1e 100644
--- a/roles/nifi/templates/nifi.properties.j2
+++ b/roles/nifi/templates/nifi.properties.j2
@@ -143,7 +143,7 @@ nifi.web.jetty.working.directory=./work/jetty
 nifi.web.jetty.threads=200
 nifi.web.max.header.size=16 KB
 nifi.web.proxy.context.path=/nifi
-nifi.web.proxy.host={{ dslproxy }}:9443
+nifi.web.proxy.host={{ soctoolsproxy }}:9443
 
 # security properties #
 nifi.sensitive.props.key=
@@ -165,10 +165,10 @@ nifi.security.ocsp.responder.url=
 nifi.security.ocsp.responder.certificate=
 
 # OpenId Connect SSO Properties #
-nifi.security.user.oidc.discovery.url=https://{{dslproxy}}:12443/auth/realms/{{openid_realm}}/.well-known/openid-configuration
+nifi.security.user.oidc.discovery.url=https://{{soctoolsproxy}}:12443/auth/realms/{{openid_realm}}/.well-known/openid-configuration
 nifi.security.user.oidc.connect.timeout=5 secs
 nifi.security.user.oidc.read.timeout=5 secs
-nifi.security.user.oidc.client.id=dsoclab-nifi
+nifi.security.user.oidc.client.id=soctools-nifi
 nifi.security.user.oidc.client.secret={{nifisecret.value}}
 nifi.security.user.oidc.preferred.jwsalgorithm=
 nifi.security.user.oidc.additional.scopes={{openid_scope}}
@@ -226,7 +226,7 @@ nifi.cluster.load.balance.max.thread.count=8
 nifi.cluster.load.balance.comms.timeout=30 sec
 
 # zookeeper properties, used for cluster management #
-nifi.zookeeper.connect.string=dsoclab-zookeeper:2181
+nifi.zookeeper.connect.string=soctools-zookeeper:2181
 nifi.zookeeper.connect.timeout=60 secs
 nifi.zookeeper.session.timeout=60 secs
 nifi.zookeeper.root.node=/nifi
diff --git a/roles/odfees/tasks/main.yml b/roles/odfees/tasks/main.yml
index ae6ae65..2153928 100644
--- a/roles/odfees/tasks/main.yml
+++ b/roles/odfees/tasks/main.yml
@@ -106,7 +106,7 @@
     - start
 
 - name: Configure OpenDistro security
-  command: "bash ./plugins/opendistro_security/tools/securityadmin.sh -h {{groups['odfeescontainers'][0]}} -cd /usr/share/elasticsearch/plugins/opendistro_security/securityconfig/ -ks '/usr/share/elasticsearch/config/{{soctools_users[0].CN}}.p12' -kspass {{soctools_users[0].password}} -ts /usr/share/elasticsearch/config/cacerts.jks -tspass {{tspass}} -cn dsoclab-cluster"
+  command: "bash ./plugins/opendistro_security/tools/securityadmin.sh -h {{groups['odfeescontainers'][0]}} -cd /usr/share/elasticsearch/plugins/opendistro_security/securityconfig/ -ks '/usr/share/elasticsearch/config/{{soctools_users[0].CN}}.p12' -kspass {{soctools_users[0].password}} -ts /usr/share/elasticsearch/config/cacerts.jks -tspass {{tspass}} -cn soctools-cluster"
   when: "'{{groups['odfeescontainers'][0]}}' in inventory_hostname"
   tags:
     - start
diff --git a/roles/odfees/templates/config/elasticsearch.yml.j2 b/roles/odfees/templates/config/elasticsearch.yml.j2
index ef61cd3..2983888 100644
--- a/roles/odfees/templates/config/elasticsearch.yml.j2
+++ b/roles/odfees/templates/config/elasticsearch.yml.j2
@@ -1,4 +1,4 @@
-cluster.name: "dsoclab-cluster"
+cluster.name: "soctools-cluster"
 #network.host: 0.0.0.0
 network.host: {{ inventory_hostname }}
 discovery.seed_hosts:
diff --git a/roles/odfees/templates/securityconfig/config.yml.j2 b/roles/odfees/templates/securityconfig/config.yml.j2
index 26e77a4..4936867 100644
--- a/roles/odfees/templates/securityconfig/config.yml.j2
+++ b/roles/odfees/templates/securityconfig/config.yml.j2
@@ -116,7 +116,7 @@ config:
           config:
             subject_key: {{openid_subjkey}} 
             roles_key: roles
-            openid_connect_url: https://{{dslproxy}}:12443/auth/realms/{{openid_realm}}/.well-known/openid-configuration
+            openid_connect_url: https://{{soctoolsproxy}}:12443/auth/realms/{{openid_realm}}/.well-known/openid-configuration
             enable_ssl: true
             verify_hostnames: false
             pemtrustedcas_filepath: "/usr/share/elasticsearch/config/{{ca_cn}}.crt"
diff --git a/roles/odfekibana/tasks/main.yml b/roles/odfekibana/tasks/main.yml
index de89a77..8d37381 100644
--- a/roles/odfekibana/tasks/main.yml
+++ b/roles/odfekibana/tasks/main.yml
@@ -119,7 +119,7 @@
 
 - name: Check Kibana health
   remote_user: kibana
-  shell: 'curl -k -b /tmp/cookie.txt -c /tmp/cookie.txt -X "GET" "https://{{dslproxy}}:5601/api/status" \
+  shell: 'curl -k -b /tmp/cookie.txt -c /tmp/cookie.txt -X "GET" "https://{{soctoolsproxy}}:5601/api/status" \
               | egrep status....overall....state...green'
   register: result
   until: result.rc == 0
@@ -138,7 +138,7 @@
 #    - start
 #
 #- name: change tenant to global
-#  shell: 'curl -X "POST" "https://{{dslproxy}}:5601/api/v1/multitenancy/tenant" \
+#  shell: 'curl -X "POST" "https://{{soctoolsproxy}}:5601/api/v1/multitenancy/tenant" \
 #         -b /tmp/cookie.txt -c /tmp/cookie.txt \
 #         -k --user admin:{{ odfees_adminpass }} \
 #         -H "kbn-xsrf: reporting" -H "Content-Type: application/json" \
@@ -156,7 +156,7 @@
 
 - name: Import graphs to kibana
   remote_user: kibana
-  shell: 'curl -X "POST" "https://{{dslproxy}}:5601/api/saved_objects/_import?overwrite=true" \
+  shell: 'curl -X "POST" "https://{{soctoolsproxy}}:5601/api/saved_objects/_import?overwrite=true" \
           -b /tmp/cookie.txt -c /tmp/cookie.txt \
           -k --user admin:{{ odfees_adminpass }} \
           -H "kbn-xsrf: reporting" -H "Content-Type: multipart/form-data" \
@@ -174,7 +174,7 @@
 
 - name: Grant admin permissions to users
   remote_user: kibana
-  shell: 'curl -X "POST" "https://{{dslproxy}}:5601/api/v1/configuration/rolesmapping/all_access" \
+  shell: 'curl -X "POST" "https://{{soctoolsproxy}}:5601/api/v1/configuration/rolesmapping/all_access" \
           -b /tmp/cookie.txt -c /tmp/cookie.txt \
           -k --user admin:{{ odfees_adminpass }} \
           -H "kbn-xsrf: reporting" -H "Content-Type: application/json" \
diff --git a/roles/odfekibana/templates/kibana.yml.j2 b/roles/odfekibana/templates/kibana.yml.j2
index 55210f5..a94de65 100644
--- a/roles/odfekibana/templates/kibana.yml.j2
+++ b/roles/odfekibana/templates/kibana.yml.j2
@@ -39,11 +39,11 @@ opendistro_security.readonly_mode.roles: ["kibana_read_only"]
 #telemetry.enabled: false
 
 opendistro_security.auth.type: "openid"
-opendistro_security.openid.connect_url: "https://{{dslproxy}}:12443/auth/realms/{{openid_realm}}/.well-known/openid-configuration"
-opendistro_security.openid.client_id: "dsoclab-kibana"
+opendistro_security.openid.connect_url: "https://{{soctoolsproxy}}:12443/auth/realms/{{openid_realm}}/.well-known/openid-configuration"
+opendistro_security.openid.client_id: "soctools-kibana"
 opendistro_security.openid.client_secret: "{{kibanasecret.value}}"
 opendistro_security.openid.root_ca: "/usr/share/kibana/config/{{ca_cn}}.crt"
-opendistro_security.openid.base_redirect_url: "https://{{dslproxy}}:5601"
+opendistro_security.openid.base_redirect_url: "https://{{soctoolsproxy}}:5601"
 
 opendistro_security.cookie.secure: true
 opendistro_security.cookie.password: "{{odfekibana_cookie}}"
diff --git a/soctools_server.yml b/soctools_server.yml
index 23716c5..382d998 100644
--- a/soctools_server.yml
+++ b/soctools_server.yml
@@ -1,5 +1,5 @@
 ---
-- hosts: dsldev
+- hosts: soctoolsmain
   become: true
   roles:
     - soctools-server
diff --git a/startsoctools.yml b/startsoctools.yml
index f2fd9c9..929573b 100644
--- a/startsoctools.yml
+++ b/startsoctools.yml
@@ -1,7 +1,7 @@
 ---
 
 - name: Start docker containers 
-  hosts: dsldev
+  hosts: soctoolsmain
   roles:
     - docker
 
diff --git a/stopsoctools.yml b/stopsoctools.yml
index 045c3f0..5bd1217 100644
--- a/stopsoctools.yml
+++ b/stopsoctools.yml
@@ -6,7 +6,7 @@
     - nifi
 
 - name: Stop all containers
-  hosts: dsldev
+  hosts: soctoolsmain
   roles:
     - docker
 
diff --git a/utils/flow2template.py b/utils/flow2template.py
index 570a1ef..e00930a 100755
--- a/utils/flow2template.py
+++ b/utils/flow2template.py
@@ -19,7 +19,7 @@ for v in et.findall(".//variable"):
     elif a['name']=="maxmind_key":
         a['value']="{{ maxmind_key }}"
     elif a['name']=="elastic_url":
-        a['value']="https://{{ dslproxy }}:9200"
+        a['value']="https://{{ soctoolsproxy }}:9200"
     elif a['name']=="elastic_username":
         a['value']="{{ elastic_username }}"
     elif a['name']=="elastic_password":
-- 
GitLab