@@ -17,8 +17,8 @@ The short version
17
17
#. Deploy the Wazuh agents: ``kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-agent.yml ``
18
18
19
19
20
- Wazuh Manager
21
- =============
20
+ Wazuh Manager Host
21
+ ==================
22
22
23
23
Provision using infra-vms
24
24
-------------------------
@@ -57,7 +57,9 @@ Define VM sizing in ``etc/kayobe/inventory/group_vars/wazuh-manager/infra-vms``:
57
57
infra_vm_data_capacity: "200G"
58
58
59
59
60
- Optional: define LVM volumes ``etc/kayobe/inventory/group_vars/wazuh-manager/lvm ``:
60
+ Optional: define LVM volumes in ``etc/kayobe/inventory/group_vars/wazuh-manager/lvm ``.
61
+ ``/var/ossec `` often requires greater storage space, and ``/var/lib/wazuh-indexer ``
62
+ may be beneficial too.
61
63
62
64
.. code-block :: console
63
65
@@ -73,7 +75,7 @@ Optional: define LVM volumes ``etc/kayobe/inventory/group_vars/wazuh-manager/lvm
73
75
size: "100%VG"
74
76
filesystem: "ext4"
75
77
mount: true
76
- mntp: “ /var/lib/elasticsearch”
78
+ mntp: " /var/ossec"
77
79
create: true
78
80
79
81
@@ -249,7 +251,7 @@ It will be used by wazuh secrets playbook to generate wazuh secrets vault file.
249
251
.. code-block :: console
250
252
251
253
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-secrets.yml
252
- ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/inventory/group_vars/ wazuh/wazuh-manager/wazuh- secrets
254
+ ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/wazuh- secrets.yml
253
255
254
256
255
257
TLS (optional)
@@ -288,6 +290,21 @@ Example OpenSSL rune to convert to PKCS#8:
288
290
289
291
TODO: document how to use a local certificate. Do we need to override all certificates?
290
292
293
+ Custom SCA Policies (optional)
294
+ ------------------------------
295
+
296
+ Wazuh ships with a large selection of Security Configuration Assessment
297
+ rulesets. However, you may find you want to add more. This can be achieved via
298
+ `custom policies <https://documentation.wazuh.com/current/user-manual/capabilities/sec-config-assessment/how-to-configure.html >`_.
299
+
300
+ SKC supports this automatically, just add the policy file from this PR to
301
+ ``{{ kayobe_env_config_path }}/wazuh/custom_sca_policies ``.
302
+
303
+ Currently, Wazuh does not ship with a CIS benchmark for Rocky 9. You can find
304
+ the in-development policy here: https://github.com/wazuh/wazuh/pull/17810 To
305
+ include this in your deployment, simply copy it to
306
+ ``{{ kayobe_env_config_path }}/wazuh/custom_sca_policies/cis_rocky_linux_9.yml ``.
307
+
291
308
Deploy
292
309
------
293
310
@@ -303,7 +320,7 @@ Encrypt the keys (and remember to commit to git):
303
320
``ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/ansible/wazuh/certificates/certs/*.key ``
304
321
305
322
Verification
306
- ==============
323
+ ------------
307
324
308
325
The Wazuh portal should be accessible on port 443 of the Wazuh
309
326
manager’s IPs (using HTTPS, with the root CA cert in ``etc/kayobe/ansible/wazuh/certificates/wazuh-certificates/root-ca.pem ``).
@@ -315,11 +332,9 @@ Troubleshooting
315
332
316
333
Logs are in ``/var/log/wazuh-indexer/wazuh.log ``. There are also logs in the journal.
317
334
318
- ============
319
335
Wazuh agents
320
336
============
321
337
322
-
323
338
Wazuh agent playbook is located in ``etc/kayobe/ansible/wazuh-agent.yml ``.
324
339
325
340
Wazuh agent variables file is located in ``etc/kayobe/inventory/group_vars/wazuh-agent/wazuh-agent ``.
@@ -333,13 +348,13 @@ Deploy the Wazuh agents:
333
348
``kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-agent.yml ``
334
349
335
350
Verification
336
- =============
351
+ ------------
337
352
338
353
The Wazuh agents should register with the Wazuh manager. This can be verified via the agents page in Wazuh Portal.
339
354
Check CIS benchmark output in agent section.
340
355
341
- Additional resources:
342
- =====================
356
+ Additional resources
357
+ --------------------
343
358
344
359
For times when you need to upgrade wazuh with elasticsearch to version with opensearch or you just need to deinstall all wazuh components:
345
360
Wazuh purge script: https://github.com/stackhpc/wazuh-server-purge
0 commit comments