diff --git a/global/overlay/etc/puppet/modules/soc/manifests/rsyslog.pp b/global/overlay/etc/puppet/modules/soc/manifests/rsyslog.pp index 1d81fa2..a9c86a1 100644 --- a/global/overlay/etc/puppet/modules/soc/manifests/rsyslog.pp +++ b/global/overlay/etc/puppet/modules/soc/manifests/rsyslog.pp @@ -20,7 +20,7 @@ class soc::rsyslog( file { '/etc/rsyslog.conf': ensure => file, mode => '0644', - content => template('sunet/rsyslog/rsyslog.conf.erb'), + content => template('soc/rsyslog/rsyslog.conf.erb'), require => Package['rsyslog'], notify => Service['rsyslog'] } @@ -33,7 +33,7 @@ class soc::rsyslog( file { '/etc/rsyslog.d/50-default.conf': ensure => file, mode => '0644', - content => template("sunet/rsyslog/${default_template}"), + content => template("soc/rsyslog/${default_template}"), require => Package['rsyslog'], notify => Service['rsyslog'] } @@ -43,7 +43,7 @@ class soc::rsyslog( file { '/etc/rsyslog.d/60-remote.conf': ensure => file, mode => '0644', - content => template('sunet/rsyslog/rsyslog-remote.conf.erb'), + content => template('soc/rsyslog/rsyslog-remote.conf.erb'), require => Package['rsyslog'], } @@ -91,7 +91,7 @@ class soc::rsyslog( file { '/etc/rsyslog.d/50-local.conf': ensure => file, mode => '0644', - content => template('sunet/rsyslog/rsyslog-local.conf.erb'), + content => template('soc/rsyslog/rsyslog-local.conf.erb'), require => Package['rsyslog'], notify => Service['rsyslog'] } @@ -103,14 +103,14 @@ class soc::rsyslog( file { '/etc/logrotate.d/rsyslog': ensure => file, mode => '0644', - content => template('sunet/rsyslog/rsyslog.logrotate.erb'), + content => template('soc/rsyslog/rsyslog.logrotate.erb'), } } if ($single_log_file == true and $facts['fail2ban_is_enabled'] == 'yes') { file { '/etc/fail2ban/jail.d/sshd-rsyslog-single-logfile.conf': ensure => file, mode => '0644', - content => template('sunet/rsyslog/fail2ban-ssh-syslog.conf.erb'), + content => template('soc/rsyslog/fail2ban-ssh-syslog.conf.erb'), notify => Service['fail2ban'], }