Giter VIP home page Giter VIP logo

wazuh-chef's Introduction

Wazuh

Slack Email Documentation Documentation Coverity Twitter YouTube

Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments.

Wazuh solution consists of an endpoint security agent, deployed to the monitored systems, and a management server, which collects and analyzes data gathered by the agents. Besides, Wazuh has been fully integrated with the Elastic Stack, providing a search engine and data visualization tool that allows users to navigate through their security alerts.

Wazuh capabilities

A brief presentation of some of the more common use cases of the Wazuh solution.

Intrusion detection

Wazuh agents scan the monitored systems looking for malware, rootkits and suspicious anomalies. They can detect hidden files, cloaked processes or unregistered network listeners, as well as inconsistencies in system call responses.

In addition to agent capabilities, the server component uses a signature-based approach to intrusion detection, using its regular expression engine to analyze collected log data and look for indicators of compromise.

Log data analysis

Wazuh agents read operating system and application logs, and securely forward them to a central manager for rule-based analysis and storage. When no agent is deployed, the server can also receive data via syslog from network devices or applications.

The Wazuh rules help make you aware of application or system errors, misconfigurations, attempted and/or successful malicious activities, policy violations and a variety of other security and operational issues.

File integrity monitoring

Wazuh monitors the file system, identifying changes in content, permissions, ownership, and attributes of files that you need to keep an eye on. In addition, it natively identifies users and applications used to create or modify files.

File integrity monitoring capabilities can be used in combination with threat intelligence to identify threats or compromised hosts. In addition, several regulatory compliance standards, such as PCI DSS, require it.

Vulnerability detection

Wazuh agents pull software inventory data and send this information to the server, where it is correlated with continuously updated CVE (Common Vulnerabilities and Exposure) databases, in order to identify well-known vulnerable software.

Automated vulnerability assessment helps you find the weak spots in your critical assets and take corrective action before attackers exploit them to sabotage your business or steal confidential data.

Configuration assessment

Wazuh monitors system and application configuration settings to ensure they are compliant with your security policies, standards and/or hardening guides. Agents perform periodic scans to detect applications that are known to be vulnerable, unpatched, or insecurely configured.

Additionally, configuration checks can be customized, tailoring them to properly align with your organization. Alerts include recommendations for better configuration, references and mapping with regulatory compliance.

Incident response

Wazuh provides out-of-the-box active responses to perform various countermeasures to address active threats, such as blocking access to a system from the threat source when certain criteria are met.

In addition, Wazuh can be used to remotely run commands or system queries, identifying indicators of compromise (IOCs) and helping perform other live forensics or incident response tasks.

Regulatory compliance

Wazuh provides some of the necessary security controls to become compliant with industry standards and regulations. These features, combined with its scalability and multi-platform support help organizations meet technical compliance requirements.

Wazuh is widely used by payment processing companies and financial institutions to meet PCI DSS (Payment Card Industry Data Security Standard) requirements. Its web user interface provides reports and dashboards that can help with this and other regulations (e.g. GPG13 or GDPR).

Cloud security

Wazuh helps monitoring cloud infrastructure at an API level, using integration modules that are able to pull security data from well known cloud providers, such as Amazon AWS, Azure or Google Cloud. In addition, Wazuh provides rules to assess the configuration of your cloud environment, easily spotting weaknesses.

In addition, Wazuh light-weight and multi-platform agents are commonly used to monitor cloud environments at the instance level.

Containers security

Wazuh provides security visibility into your Docker hosts and containers, monitoring their behavior and detecting threats, vulnerabilities and anomalies. The Wazuh agent has native integration with the Docker engine allowing users to monitor images, volumes, network settings, and running containers.

Wazuh continuously collects and analyzes detailed runtime information. For example, alerting for containers running in privileged mode, vulnerable applications, a shell running in a container, changes to persistent volumes or images, and other possible threats.

WUI

The Wazuh WUI provides a powerful user interface for data visualization and analysis. This interface can also be used to manage Wazuh configuration and to monitor its status.

Modules overview

Modules overview

Security events

Overview

Integrity monitoring

Overview

Vulnerability detection

Overview

Regulatory compliance

Overview

Agents overview

Overview

Agent summary

Overview

Orchestration

Here you can find all the automation tools maintained by the Wazuh team.

Branches

  • master branch contains the latest code, be aware of possible bugs on this branch.
  • stable branch on correspond to the last Wazuh stable version.

Software and libraries used

Software Version Author License
bzip2 1.0.8 Julian Seward BSD License
cJSON 1.7.12 Dave Gamble MIT License
cPython 3.10.13 Guido van Rossum Python Software Foundation License version 2
cURL 8.5.0 Daniel Stenberg MIT License
Flatbuffers 23.5.26 Google Inc. Apache 2.0 License
GoogleTest 1.11.0 Google Inc. 3-Clause "New" BSD License
jemalloc 5.2.1 Jason Evans 2-Clause "Simplified" BSD License
Lua 5.3.6 PUC-Rio MIT License
libarchive 3.7.2 Tim Kientzle 3-Clause "New" BSD License
libdb 18.1.40 Oracle Corporation Affero GPL v3
libffi 3.2.1 Anthony Green MIT License
libpcre2 10.42.0 Philip Hazel BSD License
libplist 2.2.0 Aaron Burghardt et al. GNU Lesser General Public License version 2.1
libYAML 0.1.7 Kirill Simonov MIT License
liblzma 5.4.2 Lasse Collin, Jia Tan et al. GNU Public License version 3
Linux Audit userspace 2.8.4 Rik Faith LGPL (copyleft)
msgpack 3.1.1 Sadayuki Furuhashi Boost Software License version 1.0
nlohmann 3.7.3 Niels Lohmann MIT License
OpenSSL 3.0.12 OpenSSL Software Foundation Apache 2.0 License
pacman 5.2.2 Judd Vinet GNU Public License version 2 (copyleft)
popt 1.16 Jeff Johnson & Erik Troan MIT License
procps 2.8.3 Brian Edmonds et al. LGPL (copyleft)
RocksDB 8.3.2 Facebook Inc. Apache 2.0 License
rpm 4.18.2 Marc Ewing & Erik Troan GNU Public License version 2 (copyleft)
sqlite 3.45.0 D. Richard Hipp Public Domain (no restrictions)
zlib 1.3.1 Jean-loup Gailly & Mark Adler zlib/libpng License

Documentation

Get involved

Become part of the Wazuh's community to learn from other users, participate in discussions, talk to our developers and contribute to the project.

If you want to contribute to our project please don’t hesitate to make pull-requests, submit issues or send commits, we will review all your questions.

You can also join our Slack community channel and mailing list by sending an email to [email protected], to ask questions and participate in discussions.

Stay up to date on news, releases, engineering articles and more.

Authors

Wazuh Copyright (C) 2015-2023 Wazuh Inc. (License GPLv2)

Based on the OSSEC project started by Daniel Cid.

wazuh-chef's People

Contributors

alberpilot avatar axl89 avatar havidarou avatar jm404 avatar manuasir avatar mcarmona99 avatar pyama86 avatar rshad avatar sitorbj avatar snaow avatar teddytpc1 avatar vcerenu avatar zenidd avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

wazuh-chef's Issues

Change Nginx server configuration

Hi all!

We detected that in some Centos distributions, the actual Nginx recipe nginx.rb is failing due to some non-usual Nginx default configuration. Normally, in the main configuration file of Nginx /etc/nginx/nginx.conf there should be an include statement which loads the sites defined in the path /etc/nginx/sites-enabled/* but as we detected, this statement did not exist.

To solve this issue we simply need to instead of writing the template into /etc/nginx/sites-available/default we write it as a total separated configuration file in /etc/nginx/conf.d/kibana.conf

Tasks to Do

  • Change the template file's path
  • Verify the changes.

Kr,

Rshad

Elasticsearch and Kibana having RAM problems when installing.

Hi team,

I noticed that during Kibana installation, sometimes kills Elasticsearch process because of RAM problems derived from the optimize bundles process.

Tasks:

  • Fix jvm.options RAM assignation and add a parameter to control it.

  • Remove NODE_OPTIONS='--max-old-space-size=4096' parameter from Kibana installation curl.

Best Regards!

Jose

Chef issue with vulnerability-detector adds only one feed

With below configuration, the expected number of feeds are two, but actually it adds only the latest one i.e ubuntu-16

default['ossec']['conf']['server']['wodle'] = [
{ '@name' => 'vulnerability-detector', 'content!' => {
'disabled' => 'no',
'interval' => '1m',
'run_on_start' => 'yes',
'feed' => { '@name' => 'ubuntu-14' , 'content!' =>
{
'disabled' => 'no',
'update_interval' => '1h',
}
},
'feed' => { '@name' => 'ubuntu-16' , 'content!' =>
{
'disabled' => 'no',
'update_interval' => '1h',
}
},
}
},
]

Configure default Elastic Stack attributes and verify them

Hi all,

Some of the attributes of Elastic Stack initialize to an invalid value like:

default['wazuh-elastic']['elasticsearch_ip'] = '<YOUR_ELASTICSEARCH_IP>'

This has been done to prevent unknown misconfigurations when deploying since declaring this attribute and related ones to 127.0.0.1 would set up the stack properly but the user could ignore that configuration.

In an actual way, we ensure the user consciously set his desired IP/domain for every component.

Community, we need you!

It`s important to us to determine which default case is better in your opinion, do you prefer to configure after setup with default parameters or preconfigure variables and then run the setup?

Let us know by commenting below!

Verify variables before run

Regardless of the option, we choose in the previous scenario, it's required to add verification of those parameters.

In order to avoid said problems some, the pre-check of the variables must be done

Tasks

  • Implement pre-run verification of the attributes (not null, variable type, etc...)

  • Test changes

  • Update README.md

Best regards!

Jose

Chef currently doesn't support Centos/RHEL 7 installation.

Hi team!

The current code of Chef doesn't properly manage the compatibility with other Centos/RHEL 7. It uses apt packages and offers no support to other os families. Repositories, installation, and configuration need to be properly updated and tested to support Centos/RHEL 7.

Tasks:

  • Implement node['platform_family'] when cases to support centos installations.

  • Test changes

  • Update README's

Best Regards,

Jose

Add Filebeat module to the installation tasks

Hi all!

Wazuh is now able to deal with a new Filebeat module which can be found here.

To do so, we have to run the following commands:

curl -s https://packages-dev.wazuh.com/3.x/filebeat/wazuh-filebeat-0.1.tar.gz | tar -xvz -C /usr/share/filebeat/module
mkdir -p /usr/share/filebeat/module/wazuh
chmod 755 -R /usr/share/filebeat/module/wazuh

Taking into account the proper way to do it with Chef

Kind regards,

Rshad

Syntax JSON error in cookbooks/wazuh_manager/README.md

Please, fix syntax JSON errors in cookbooks/wazuh_manager/README.md:

  {
    "name": "wazuh_manager_master",
    "description": "Wazuh Manager master node",
    "json_class": "Chef::Role",
    "default_attributes": {

    },
    "override_attributes": {
      "ossec": {
        "cluster_disabled": "no",
        "conf": {
          "server": {
            "cluster": {
              "node_name": "node01",
              "node_type": "master",
              "disabled": "no",
              "nodes": {
                "node": ["172.16.10.10", "172.16.10.11"]
              "key": "596f6b328c8ca831a03f7c7ca8203e8b"
            }
          }
        }
    },
    "chef_type": "role",
    "run_list": [
      "recipe[wazuh::manager]"
    ],
    "env_run_lists": {

    }
  }
  {
    "name": "wazuh_manager_client",
    "description": "Wazuh Manager client node",
    "json_class": "Chef::Role",
    "default_attributes": {

    },
    "override_attributes": {
      "ossec": {
        "cluster_disabled": "no",
        "conf": {
          "server": {
            "cluster": {
              "node_name": "node02",
              "node_type": "client",
              "disabled": "no",
              "nodes": {
                "node": ["172.16.10.10", "172.16.10.11"]
              "key": "596f6b328c8ca831a03f7c7ca8203e8b"
            }
          }
        }
    },
    "chef_type": "role",
    "run_list": [
      "recipe[wazuh::manager]"
    ],
    "env_run_lists": {

    }
  }

Thanks! BR, Eugene

Adapt Chef to fit Amazon OpsWorks standard.

Hi team,

According to chef standards, all cookbooks are nested under the cookbooks/ folder in branches 3.9.2_6.8.0 and 3.9.1_7.1.1.

But this configuration doesn't fit the required schema by Source Control Manager of Amazon Opsworks (https://docs.aws.amazon.com/opsworks/latest/userguide/workingcookbook-installingcustom-repo.html)

In order to fix this for AWS compatibility some changes must be done:

  • Get cookbooks out of cookbooks directory and remove it.
  • Adapt Berksfile and metadata.rb
  • Test such changes on Amazon Linux 1 and 2
  • Update README.md
  • Update CHANGELOG.md

Best regards,

Jose

Release 3.9.4_6.8.2

Wazuh version: 3.9.4
Elastic version: 6.8.2

  • Adapt to new versions (3.9.4 - 7.2.0)
  • Update changelog
  • Tests
  • Tag: v3.9.4_7.2.0
  • Draft release

Release 3.9.3_6.8.1

Wazuh version: 3.9.3
Elastic version: 6.8.1

  • Adapt to new versions (3.9.3 - 6.8.1)
  • Update changelog
  • Tests
  • Tag: v3.9.3_6.8.1
  • Draft release

Adapt default attributes to add v.3.9.0 features

Hi team!

As defined in #17 , current default attributes don't implement the new features added in 3.9.0.
The implementation of new default attributes is required in order to generate an updated ossec.conf file to give support to the new functionalities.

Tasks

  • Evaluate and list all differences between old ossec.conf (generated with gyoku) and the ossec.conf file of v.3.9

  • Implement new fields as default attributes.

  • Test the new features added.

Regards!

Jose

Release 3.9.2_7.1.1

Wazuh version: 3.9.2
Elastic version: 7.1.1

  • Adapt to new versions (3.9.2 - 7.1.1)
  • Update changelog
  • Tests
  • Tag: v3.9.2
  • Draft release

Add http/s missing dependencies in wazuh-elastic cookbook

Hi all!

When adding Elasticsearch testing suite to Kitchen testing suites, and specifically when trying to update the packages repository: apt-get update we got the following error:

“ERROR: The method driver /usr/lib/apt/methods/https could not be found.”

To solve this issue, we need to first install the packages:

  • apt-transport-https
  • ca-certificates
apt-get install apt-transport-https ca-certificates

Tasks to Do:

  • Add the corresponding tasks in the cookbook to install the mentioned packages.
  • Test the packages.

Kr,

Rshad

Wazuh Chef release v3.12.3_7.6.2

Wazuh version: 3.12.3
Elastic version: 7.6.2

Tasks

  • Adapt to new versions (3.12.3 - 7.6.2)

  • Update changelog

  • Check templates and update them if needed

  • Tests

  • Tag: v3.12.3_7.6.2

  • Update documentation references

  • Draft release

Divide Agent, Manager and API cookbooks.

As stated in #17, the wazuh cookbook will be split into specific cookbooks for the agent and manager. This issue details the steps needed aswell as the process status in order to give advanced detail about this part of refactoring.

Tasks

  • Split agent-specific and manager-specific attributes.
  • Divide specific recipes and fix names.
  • Fix dependencies
  • Separate spec recipes.
  • Test Agent and Manager deploy after splitting into two cookbooks.

Wazuh Release 3.11.0_7.5.1

Wazuh version: 3.11.0
Elastic version: 7.5.1

Tasks

  • Adapt to new versions (3.11.0_7.5.1)
  • Update changelog
  • Tests
  • Tag: v3.11.0_7.5.1
  • Draft release

Release v3.9.0

Wazuh version: 3.9.0
Elastic version: 6.6.1

  • Adapt to new versions (3.9.0 - 6.7.2)
  • Update changelog
  • Tests
  • Tag: v3.9.0
  • Draft release

Release 3.9.3_7.2.0

Wazuh version: 3.9.3
Elastic version: 7.2.0

  • Adapt to new versions (3.9.3 - 7.2.0)
  • Update changelog
  • Tests
  • Tag: v3.9.3_7.2.0
  • Draft release

Wazuh Release 3.12.0_7.6.1

Wazuh version: 3.12.0
Elastic version: 7.6.1

Tasks

  • Adapt to new versions (3.12.0 - 7.6.1)

  • Update changelog

  • Check templates and update them if needed

  • Tests

  • Tag: v3.12.0_7.6.1

  • Draft release

Wazuh Chef release v3.12.2_7.6.2

Wazuh version: 3.12.2
Elastic version: 7.6.2

Tasks

  • Adapt to new versions (3.12.2 - 7.6.2)

  • Update changelog

  • Check templates and update them if needed

  • Tests

  • Tag: v3.12.2_7.6.2

  • Draft release

chef chco

chocolatey_package 'ossec.wazuh.agent' do
notifies # see description
options String
package_name String, Array # defaults to 'name' if not specified
source String
subscribes # see description
timeout String, Integer
version String, Array
returns Integer, Array of Integers
action Symbol # defaults to :install if not specified
end

need to update choco repo , as well one could add to cookbook to replace stings in config file.
ie ip address.. anyrate , could batch build deploys..
https://github.com/m-dwyer/packer-malware
https://github.com/GoSecure/malboxes
could also add to malboxes to get the sig into the SIEM ...

aswell , also salt , puppet ansible , etc cookbooks can likewise use choco as backend..

https://chocolatey.org/packages/ossec.wazuh.agent/3.5.0.1

Wazuh Cluster implementation is customizable and hasn't been tested.

Hi team,

Despite the fact that Filebeat is installed by default, the installation of Wazuh with the Cluster configuration has not been tested.

Also, some parameters would make the installation much more customizable like the hosts field in filebeat.yml.

Tasks

  • Implement required parameters to customize the Wazuh Cluster

  • Test configuration

  • Update READMEs to document changes and new attributes.

Regards!

Jose

Release 3.9.5_7.2.0

Wazuh version: 3.9.5
Elastic version: 7.2.0

  • Adapt to new versions (3.9.5 - 7.2.0)
  • Update changelog
  • Tests
  • Tag: v3.9.5_7.2.0
  • Draft release

Update chef recipes

Hello team,

I've noticed recipes for Chef are not properly updated.
In many cases they are missing parameters and options like, for example, the ability to add an agent group at registration time.

Regards.

404 error when downloading the Oracle Java JDK

Right now the chef recipes will fail when is needed to download the Oracle JDK:

screenshot_8

Like could be seen at the above screenshot the file that is used to install Oracle JDK is missing from the provided url.

Wazuh Release 3.11.1_7.5.1

Wazuh version: 3.11.1
Elastic version: 7.5.1

Tasks

  • Adapt to new versions (3.11.1 - 7.5.1)

  • Check templates and update them if needed

  • Tests

  • Update changelog

  • Tag: v3.11.1_7.5.1

  • Update documentation references

  • Draft release

Add ability to install and configure Agent but don't register it.

Hi team,

The ability to install Agents but don't register it is quite useful and requested by the community (see wazuh/wazuh-puppet#106).

Adding that feature would give flexibility to the Agent installation and would ease the installation on cloud environments for example.

Tasks
  • Modify code to allow user configure if he wants to register the agent or not

  • Test changes with and without the flag enabled

  • Update README.md

Best regards

Jose

Upgrade NodeJS to v10 (v8 is EOL)

Description

Starting on 1/1/2020 NodeJS v8 is End Of Life and lost support.

An upgraded is mandatory to ensure up to date security and support. Our Docker images are already shipping with v10.

Tasks

  • Upgrade NodeJS to v10
  • Test a complete deployment

Nginx SSL proxy is not included in the installation process.

Hi team!

According to https://documentation.wazuh.com/3.x/installation-guide/optional-configurations/kibana_ssl.html Nginx can be configured to secure the communications with Kibana.

The current installation process does not support it. An approach could be to include a template and declare attributes to customize the Nginx configuration.

Tasks to Do

  • Add the corresponding Recipe.
  • Add the required dependencies.
  • Parameter[ize] the recipe the most possible.
  • Test the changes on different OS/platforms
    • Debian based distributions.
    • RPM-based distributions.

Best regards!

Jose

Upload to supermarket?

Im going to upload this to the supermarket. if anyone ever wants to take over ownership on the supermarket, email me.

Implement Kitchen tests for installation verification.

Hi team,

It's possible to test the integration and configuration of Wazuh Installation by using Kitchen for Chef. Kitchen provides a driver-plugin architecture to run cookbooks against different platforms.

This implementation would provide a much easier way to test future changes and updates.

Tasks:

  • Design and create tests.
  • Run tests against different platforms and verify results.
  • Update Readme.md

Best Regards,

Jose

Wazuh Release 3.11.4_7.6.1

Wazuh version: 3.11.4
Elastic version: 7.6.1

Tasks

  • Adapt to new versions (3.11.3 - 7.6.1)

  • Check templates and update them if needed

  • Tests

  • Update changelog

  • Tag: v3.11.4_7.6.1

  • Draft release

Rootkit files path of Agent is misconfigured

Hi team,

In the Wazuh Agent, the path of rootkit_files and rootkit_trojans is misconfigured.

default['ossec']['conf']['rootcheck']['rootkit_files'] = "#{node['ossec']['dir']}/etc/rootcheck/rootkit_files.txt"
default['ossec']['conf']['rootcheck']['rootkit_trojans'] = "#{node['ossec']['dir']}/etc/rootcheck/rootkit_trojans.txt"

It should be #{node['ossec']['dir']}/etc/shared/rootkit_files.txt and #{node['ossec']['dir']}/etc/shared/rootkit_trojans.txt respectively.

Tasks
  • Reconfigure default agent attributes

  • Run installation and check logs for errors

Best regards

Jose

Release 3.9.4_7.2.0

Wazuh version: 3.9.4
Elastic version: 7.2.0

  • Adapt to new versions (3.9.4 - 7.2.0)
  • Update changelog
  • Tests
  • Tag: v3.9.4_7.2.0
  • Draft release

Repository Refactor.

Whole repository will be refactored in order to follow standard chef-repo structure.

The wazuh cookbooks (Agent, Manager, API) will be split into wazuh_agent (Agent) and wazuh_manager (Manager, API) in order to differentiate roles, attributes, tests, templates and other files.

Tasks:

  • Create new folders and restructure.

  • Divide Agent and Manager cookbooks.

    • Attributes
    • Recipes
    • Templates
    • Berksfile
    • Metadata
  • Adapt default attributes to add v.3.9.0 features

  • Adapt Filebeat to v.3.9.0

  • Adapt ElasticStack to v.3.9.0

  • Rewrite README.md

    • Rewrite Agent README.md
    • Rewrite Manager README.md
    • Rewrite General README.md
    • Rewrite Filebeat README.md
    • Rewrite ElasticStack README.md

Release 3.10.2_7.3.2

Wazuh version: 3.10.2
Elastic version: 7.3.2

  • Adapt to new versions (3.10.2 - 7.3.2)
  • Update changelog
  • Tests
  • Tag: v3.10.2_7.3.2
  • Draft release

New API configuration behavior on 3.11

Description

Starting with v3.11 the Wazuh plugin for Kibana has a new behavior when upgrading.

Documented here: wazuh/wazuh-dashboard-plugins#1465

The former config.yml got renamed to wazuh.yml, which brought some internal changes as well, the API settings will no longer be stored in the Elastic index named .wazuh, these settings got migrated to wazuh.yml.

The new behavior is like this:

  • The first time booting 3.11 Wazuh plugin detects if there's an .wazuh index and moves it to wazuh.yml, this info gets deleted from Elastic.

  • On the following restart cycles there will be no .wazuh index

Proposed workflow

Following a declarative approach we propose to always delete the .wazuh index if exists and write API settings to wazuh.yml. In the case the user updated the password, then the cookbook will override it in both the API and Kibana settings.

Tasks

  • Implement required changes to make Chef delete the .wazuh index

  • Add required variables to configure the API credentials in the wazuh.yml file

  • Create template to render the wazuh.yml file

Tests

The following scenarios should be tested:

  • New deployment
  • Upgrading from 3.10 to 3.11 (no other changes)
  • Upgrading from 3.10 to 3.11 (changing API settings)

Old Wazuh Kibana plugin is not removed in upgrades

When deploying a newer version of Wazuh, there are no checks to verify if an older Wazuh Kibana Plugin exists, this may lead to newer Kibana versions using old plugin versions which leads to the following error:

Dec 31 10:52:38 node-manager-1 kibana[17154]: FATAL  TypeError: Cannot read property 'version' of undefined

Tasks

  • Implement required changes to uninstall old Wazuh Kibana Plugin

Tests

  • Test Kibana upgrade and verify the plugin is properly removed

  • Test Kibana clean installation

Best regards,

Jose

Wazuh Release 3.13.0_7.7.1

Wazuh version: 3.13.0
Elastic version: 7.7.1

Tasks

  • Adapt to new versions (3.13.0 - 7.7.1)

  • Update changelog

  • Check templates and update them if needed

  • Tests

  • Tag: v3.13.0_7.7.1

  • Update documentation references

  • Draft release

Default installation for Wazuh with no custom configuration

Hi all!

The current installation of Wazuh made using wazuh-chef is not a clean-default one. In other words, it does not install a default ossec.conf but a customized one.

For example, when installing wazuh-manager we use parameterized recipes attributes as arguments for the following task:

## Generate Ossec.conf
file "#{node['ossec']['dir']}/etc/ossec.conf" do
owner 'root'
group 'ossec'
mode '0440'
manage_symlink_source true
notifies :restart, 'service[wazuh]'
content lazy {
all_conf = node['ossec']['conf'].to_hash
Chef::OSSEC::Helpers.ossec_to_xml('ossec_config' => all_conf)
}
end

The same case for wazuh-agent.

As it's parameterized, we set the values for the corresponding variables but we do not take into account the changes made in the default installed ossec.conf as it will always be overwritten.

To Do

  • Adapt to the latest installation, the ossec.conf template of:
    • wazuh-manager
      • RHEL
        • Centos7
      • Debian

    • wazuh-agent
      • RHEL
        • Centos7
      • Debian

  • Verify changes.

  • Note: This description may be modified in the future.

Kr,

Rshad

Wazuh Release 3.11.3_7.5.2

Wazuh version: 3.11.3
Elastic version: 7.5.2

Tasks

  • Adapt to new versions (3.11.3 - 7.5.2)

  • Check templates and update them if needed

  • Tests

  • Update changelog

  • Tag: v3.11.3_7.5.2

  • Generate and publish module on Puppet Forge

  • Draft release

Wazuh Release 3.11.2_7.5.1

Wazuh version: 3.11.2
Elastic version: 7.5.1

Tasks

  • Adapt to new versions (3.11.2 - 7.5.1)

  • Check templates and update them if needed

  • Tests

  • Update changelog

  • Tag: v3.11.2_7.5.1

  • Generate and publish module on Puppet Forge

  • Draft release

Wazuh Chef release v3.12.1_7.6.2

Wazuh version: 3.12.1
Elastic version: 7.6.2

Tasks

  • Adapt to new versions (3.12.1 - 7.6.2)

  • Update changelog

  • Check templates and update them if needed

  • Tests

  • Tag: v3.12.1_7.6.2

  • Draft release

Release 3.9.2_6.8.0

Wazuh version: 3.9.2
Elastic version: 6.8.0

  • Adapt to new versions (3.9.2 - 6.8.0)
  • Update changelog
  • Tests
  • Tag: v3.9.2_6.8.0
  • Draft release

Update Chef to Elastic 7.1.0

Wazuh version: 3.9.1
Elastic version: 7.1.0

  • Adapt to new versions (3.9.1 - 7.1.0)
  • Update changelog
  • Tests
  • Tag: v3.9.1
  • Draft release

Use `verify-agent-conf`

This is more just informational for @jm404 since I just stumbled across it myself:
As of chef 12.5.1, you can use verify in the template resource as follows:

include_recipe 'wazuh::manager'

template "#{dir}/etc/shared/default/agent.conf" do
  source 'manager_agent.conf.erb'
  owner 'ossec'
  group 'ossec'
  mode '0644'
  verify '/var/ossec/bin/verify-agent-conf -f %{path}'
end

Chef doesn't generate Agent.conf files

Hi team,

The current code doesn't allow the user to generate the Agent.conf that is required in a centralized configuration.

Tasks:

  • Implement the generation of Agent.conf with Gyoku

  • Add configuration of wazuh_command.remote_commands=1 for Wazuh Agent.

  • Implement some form of verification of Agent.conf file

  • Test changes

  • Update README.md

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.