Merge pull request #174 from dj-wasabi/add-molecule-wazuh-agent

Added molecule test for the Wazuh Agent
This commit is contained in:
Manuel J. Bernal 2019-04-29 15:58:20 +02:00 committed by GitHub
commit 2d3ca9a455
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
58 changed files with 564 additions and 294 deletions

View File

@ -5,3 +5,4 @@ before_script:
- pipenv install --dev --system - pipenv install --dev --system
script: script:
- pipenv run test - pipenv run test
- pipenv run agent

View File

@ -15,3 +15,4 @@ python_version = "2.7"
[scripts] [scripts]
test ="molecule test" test ="molecule test"
agent ="molecule test -s wazuh-agent"

View File

@ -53,6 +53,7 @@ These playbooks install and configure Wazuh agent, manager and Elastic Stack.
pip install pipenv pip install pipenv
sudo pipenv install sudo pipenv install
pipenv run test pipenv run test
pipenv run agent
``` ```
## Contribute ## Contribute

View File

@ -5,13 +5,13 @@ driver:
name: docker name: docker
lint: lint:
name: yamllint name: yamllint
enabled: false # fix in seperate PR enabled: false
platforms: platforms:
- name: bionic - name: bionic
image: ubuntu:bionic image: ubuntu:bionic
- name: xenial - name: xenial
image: solita/ubuntu-systemd:xenial image: solita/ubuntu-systemd:xenial
privileged: True privileged: true
command: /sbin/init command: /sbin/init
- name: trusty - name: trusty
image: ubuntu:trusty image: ubuntu:trusty
@ -19,14 +19,14 @@ platforms:
image: centos:6 image: centos:6
- name: centos7 - name: centos7
image: milcom/centos7-systemd image: milcom/centos7-systemd
privileged: True privileged: true
provisioner: provisioner:
name: ansible name: ansible
env: env:
ANSIBLE_ROLES_PATH: ../../roles ANSIBLE_ROLES_PATH: ../../roles
lint: lint:
name: ansible-lint name: ansible-lint
enabled: true # fix in seperate PR enabled: true
scenario: scenario:
name: default name: default
test_sequence: test_sequence:

View File

@ -4,7 +4,6 @@
roles: roles:
- role: wazuh/ansible-wazuh-manager - role: wazuh/ansible-wazuh-manager
# - {role: wazuh/ansible-filebeat} #, filebeat_output_logstash_hosts: 'your elastic stack server IP' # - {role: wazuh/ansible-filebeat} #, filebeat_output_logstash_hosts: 'your elastic stack server IP'
# Elasticsearch requires too much memory to test multiple containers concurrently - To Fix # Elasticsearch requires too much memory to test multiple containers concurrently - To Fix
# - {role: elastic-stack/ansible-elasticsearch, elasticsearch_network_host: 'localhost'} # - {role: elastic-stack/ansible-elasticsearch, elasticsearch_network_host: 'localhost'}

View File

@ -1,7 +1,7 @@
--- ---
- name: Prepare - name: Prepare
hosts: all hosts: all
gather_facts: True gather_facts: true
tasks: tasks:
- name: "Install Python packages for Trusty to solve trust issues" - name: "Install Python packages for Trusty to solve trust issues"

View File

@ -0,0 +1,14 @@
# Molecule managed
{% if item.registry is defined %}
FROM {{ item.registry.url }}/{{ item.image }}
{% else %}
FROM {{ item.image }}
{% endif %}
RUN if [ $(command -v apt-get) ]; then apt-get update && apt-get install -y python sudo bash ca-certificates && apt-get clean; \
elif [ $(command -v dnf) ]; then dnf makecache && dnf --assumeyes install python sudo python-devel python*-dnf bash && dnf clean all; \
elif [ $(command -v yum) ]; then yum makecache fast && yum install -y python sudo yum-plugin-ovl bash && sed -i 's/plugins=0/plugins=1/g' /etc/yum.conf && yum clean all; \
elif [ $(command -v zypper) ]; then zypper refresh && zypper install -y python sudo bash python-xml && zypper clean -a; \
elif [ $(command -v apk) ]; then apk update && apk add --no-cache python sudo bash ca-certificates; \
elif [ $(command -v xbps-install) ]; then xbps-install -Syu && xbps-install -y python sudo bash ca-certificates && xbps-remove -O; fi

View File

@ -0,0 +1,22 @@
*******
Docker driver installation guide
*******
Requirements
============
* Docker Engine
Install
=======
Please refer to the `Virtual environment`_ documentation for installation best
practices. If not using a virtual environment, please consider passing the
widely recommended `'--user' flag`_ when invoking ``pip``.
.. _Virtual environment: https://virtualenv.pypa.io/en/latest/
.. _'--user' flag: https://packaging.python.org/tutorials/installing-packages/#installing-to-the-user-site
.. code-block:: bash
$ pip install 'molecule[docker]'

View File

@ -0,0 +1,82 @@
---
dependency:
name: galaxy
driver:
name: docker
lint:
name: yamllint
platforms:
- name: wazuh_server_centos7
image: milcom/centos7-systemd
networks:
- name: wazuh
privileged: true
groups:
- manager
- name: wazuh_agent_bionic
image: ubuntu:bionic
networks:
- name: wazuh
groups:
- agent
- name: wazuh_agent_xenial
image: solita/ubuntu-systemd:xenial
privileged: true
command: /sbin/init
networks:
- name: wazuh
groups:
- agent
- name: wazuh_agent_trusty
image: ubuntu:trusty
networks:
- name: wazuh
groups:
- agent
- name: wazuh_agent_centos6
image: centos:6
networks:
- name: wazuh
groups:
- agent
- name: wazuh_agent_centos7
image: milcom/centos7-systemd
privileged: true
networks:
- name: wazuh
groups:
- agent
provisioner:
name: ansible
playbooks:
docker:
create: ../default/create.yml
destroy: ../default/destroy.yml
env:
ANSIBLE_ROLES_PATH: ../../roles
inventory:
group_vars:
agent:
api_pass: password
wazuh_managers:
- address: "{{ wazuh_manager_ip }}"
port: 1514
protocol: tcp
api_port: 55000
api_proto: 'http'
api_user: null
wazuh_agent_authd:
enable: true
port: 1515
ssl_agent_ca: null
ssl_agent_cert: null
ssl_agent_key: null
ssl_auto_negotiate: 'no'
lint:
name: ansible-lint
enabled: true
verifier:
name: testinfra
lint:
name: flake8

View File

@ -0,0 +1,20 @@
---
- name: Converge
hosts: agent
pre_tasks:
- name: "Get ip Wazuh Manager"
shell: |
set -o pipefail
grep $(hostname) /etc/hosts | awk '{print $1}' | sort | head -n 2 | tail -n 1
register: wazuh_manager_ip_stdout
changed_when: false
delegate_to: wazuh_server_centos7
args:
executable: /bin/bash
- name: "Set fact for ip address"
set_fact:
wazuh_manager_ip: "{{ wazuh_manager_ip_stdout.stdout }}"
roles:
- role: wazuh/ansible-wazuh-agent

View File

@ -0,0 +1,43 @@
---
- name: Prepare
hosts: manager
gather_facts: true
tasks:
- name: "Install dependencies"
package:
name:
- curl
- net-tools
state: latest
register: wazuh_manager_dependencies_packages_installed
until: wazuh_manager_dependencies_packages_installed is succeeded
roles:
- role: wazuh/ansible-wazuh-manager
- name: Prepare
hosts: agent
gather_facts: true
tasks:
- name: "Install Python packages for Trusty to solve trust issues"
package:
name:
- python-setuptools
- python-pip
state: latest
register: wazuh_manager_trusty_packages_installed
until: wazuh_manager_trusty_packages_installed is succeeded
when:
- ansible_distribution == "Ubuntu"
- ansible_distribution_major_version | int == 14
- name: "Install dependencies"
package:
name:
- curl
- net-tools
state: latest
register: wazuh_agent_dependencies_packages_installed
until: wazuh_agent_dependencies_packages_installed is succeeded

View File

@ -0,0 +1,23 @@
import os
import pytest
import testinfra.utils.ansible_runner
testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner(
os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('agent')
def test_ossec_package_installed(Package):
ossec = Package('wazuh-agent')
assert ossec.is_installed
@pytest.mark.parametrize("wazuh_service, wazuh_owner", (
("ossec-agentd", "ossec"),
("ossec-execd", "root"),
("ossec-syscheckd", "root"),
("wazuh-modulesd", "root"),
))
def test_wazuh_processes_running(host, wazuh_service, wazuh_owner):
master = host.process.get(user=wazuh_owner, comm=wazuh_service)
assert master.args == "/var/ossec/bin/" + wazuh_service

View File

@ -0,0 +1,15 @@
import os
import testinfra.utils.ansible_runner
testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner(
os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('manager')
def test_agents_registered_on_manager(host):
cmd = host.run("/var/ossec/bin/manage_agents -l")
assert 'wazuh_agent_bionic' in cmd.stdout
assert 'wazuh_agent_xenial' in cmd.stdout
assert 'wazuh_agent_trusty' in cmd.stdout
assert 'wazuh_agent_centos6' in cmd.stdout
assert 'wazuh_agent_centos7' in cmd.stdout

View File

@ -1,3 +1,4 @@
---
- hosts: <your wazuh agents hosts> - hosts: <your wazuh agents hosts>
roles: roles:
- /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-agent - /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-agent

View File

@ -1,3 +1,4 @@
---
- hosts: <your elasticsearch host> - hosts: <your elasticsearch host>
roles: roles:
- {role: /etc/ansible/roles/wazuh-ansible/roles/elastic-stack/ansible-elasticsearch, elasticsearch_network_host: 'your elasticsearch IP'} - {role: /etc/ansible/roles/wazuh-ansible/roles/elastic-stack/ansible-elasticsearch, elasticsearch_network_host: 'your elasticsearch IP'}

View File

@ -1,3 +1,4 @@
---
- hosts: <your wazuh server host> - hosts: <your wazuh server host>
roles: roles:
- role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-manager - role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-manager

View File

@ -1,3 +1,4 @@
---
- hosts: <your single server host> - hosts: <your single server host>
roles: roles:
- {role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-manager} - {role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-manager}

View File

@ -1,3 +1,4 @@
---
- hosts: <your kibana host> - hosts: <your kibana host>
roles: roles:
- {role: /etc/ansible/roles/wazuh-ansible/roles/elastic-stack/ansible-kibana, elasticsearch_network_host: 'your elasticsearch IP'} - {role: /etc/ansible/roles/wazuh-ansible/roles/elastic-stack/ansible-kibana, elasticsearch_network_host: 'your elasticsearch IP'}

View File

@ -1,3 +1,4 @@
---
- hosts: <your logstash host> - hosts: <your logstash host>
roles: roles:
- {role: /etc/ansible/roles/wazuh-ansible/roles/elastic-stack/ansible-logstash, elasticsearch_network_host: ["localhost"]} - {role: /etc/ansible/roles/wazuh-ansible/roles/elastic-stack/ansible-logstash, elasticsearch_network_host: ["localhost"]}

View File

@ -1,3 +1,4 @@
---
- hosts: <your wazuh server host> - hosts: <your wazuh server host>
roles: roles:
- role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-manager - role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-manager

View File

@ -7,4 +7,4 @@ elasticsearch_jvm_xms: null
elastic_stack_version: 6.7.1 elastic_stack_version: 6.7.1
elasticsearch_shards: 5 elasticsearch_shards: 5
elasticsearch_replicas: 1 elasticsearch_replicas: 1
elasticsearch_install_java: yes elasticsearch_install_java: true

View File

@ -10,7 +10,7 @@
apt_repository: apt_repository:
repo: 'ppa:webupd8team/java' repo: 'ppa:webupd8team/java'
codename: 'xenial' codename: 'xenial'
update_cache: yes update_cache: true
- name: Debian/Ubuntu | Accept Oracle Java 8 license - name: Debian/Ubuntu | Accept Oracle Java 8 license
debconf: debconf:
@ -36,7 +36,7 @@
repo: 'deb https://artifacts.elastic.co/packages/6.x/apt stable main' repo: 'deb https://artifacts.elastic.co/packages/6.x/apt stable main'
state: present state: present
filename: 'elastic_repo' filename: 'elastic_repo'
update_cache: yes update_cache: true
- name: Debian/Ubuntu | Install Elasticsarch - name: Debian/Ubuntu | Install Elasticsarch
apt: apt:

View File

@ -20,7 +20,7 @@
description: Elastic repository for 6.x packages description: Elastic repository for 6.x packages
baseurl: https://artifacts.elastic.co/packages/6.x/yum baseurl: https://artifacts.elastic.co/packages/6.x/yum
gpgkey: https://artifacts.elastic.co/GPG-KEY-elasticsearch gpgkey: https://artifacts.elastic.co/GPG-KEY-elasticsearch
gpgcheck: yes gpgcheck: true
- name: RedHat/CentOS/Fedora | Install Elasticsarch - name: RedHat/CentOS/Fedora | Install Elasticsarch
package: name=elasticsearch-{{ elastic_stack_version }} state=present package: name=elasticsearch-{{ elastic_stack_version }} state=present

View File

@ -68,19 +68,20 @@
notify: restart elasticsearch notify: restart elasticsearch
tags: configure tags: configure
# fix in new PR (ignore_errors)
- name: Reload systemd - name: Reload systemd
systemd: daemon_reload=yes systemd: daemon_reload=true
ignore_errors: yes #fix in new PR ignore_errors: true
when: when:
- not (ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA") - not (ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA")
- not (ansible_distribution == "Ubuntu" and ansible_distribution_version is version('15.04', '<')) - not (ansible_distribution == "Ubuntu" and ansible_distribution_version is version('15.04', '<'))
- not (ansible_distribution == "Debian" and ansible_distribution_version is version('8', '<')) - not (ansible_distribution == "Debian" and ansible_distribution_version is version('8', '<'))
- name: Ensure Elasticsearch started and enabled - name: Ensure Elasticsearch started and enabled
ignore_errors: yes ignore_errors: true
service: service:
name: elasticsearch name: elasticsearch
enabled: yes enabled: true
state: started state: started
- name: Make sure Elasticsearch is running before proceeding - name: Make sure Elasticsearch is running before proceeding

View File

@ -5,4 +5,3 @@ kibana_server_host: "0.0.0.0"
kibana_server_port: "5601" kibana_server_port: "5601"
elastic_stack_version: 6.7.1 elastic_stack_version: 6.7.1
wazuh_version: 3.8.2 wazuh_version: 3.8.2

View File

@ -14,7 +14,7 @@
repo: 'deb https://artifacts.elastic.co/packages/6.x/apt stable main' repo: 'deb https://artifacts.elastic.co/packages/6.x/apt stable main'
state: present state: present
filename: 'elastic_repo' filename: 'elastic_repo'
update_cache: yes update_cache: true
- name: Debian/Ubuntu | Install Kibana - name: Debian/Ubuntu | Install Kibana
apt: apt:

View File

@ -5,7 +5,7 @@
description: Elastic repository for 6.x packages description: Elastic repository for 6.x packages
baseurl: https://artifacts.elastic.co/packages/6.x/yum baseurl: https://artifacts.elastic.co/packages/6.x/yum
gpgkey: https://artifacts.elastic.co/GPG-KEY-elasticsearch gpgkey: https://artifacts.elastic.co/GPG-KEY-elasticsearch
gpgcheck: yes gpgcheck: true
- name: RedHat/CentOS/Fedora | Install Kibana - name: RedHat/CentOS/Fedora | Install Kibana
package: name=kibana-{{ elastic_stack_version }} state=present package: name=kibana-{{ elastic_stack_version }} state=present

View File

@ -8,12 +8,11 @@
- name: Make sure Elasticsearch is running before proceeding. - name: Make sure Elasticsearch is running before proceeding.
wait_for: host={{ elasticsearch_network_host }} port={{ elasticsearch_http_port }} delay=3 timeout=300 wait_for: host={{ elasticsearch_network_host }} port={{ elasticsearch_http_port }} delay=3 timeout=300
tags: configure tags: configure
ignore_errors: yes # fix ignore_errors: true
wait_for: 50
- name: Reload systemd - name: Reload systemd
systemd: daemon_reload=yes systemd: daemon_reload=true
ignore_errors: yes ignore_errors: true
when: when:
- not (ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA") - not (ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA")
- not (ansible_distribution == "Ubuntu" and ansible_distribution_version is version('15.04', '<')) - not (ansible_distribution == "Ubuntu" and ansible_distribution_version is version('15.04', '<'))
@ -34,7 +33,7 @@
args: args:
removes: /usr/share/kibana/plugins/wazuh/package.json removes: /usr/share/kibana/plugins/wazuh/package.json
register: wazuh_app_verify register: wazuh_app_verify
changed_when: False changed_when: false
tags: install tags: install
- name: Removing old Wazuh-APP - name: Removing old Wazuh-APP
@ -59,7 +58,7 @@
- name: Ensure Kibana started and enabled - name: Ensure Kibana started and enabled
service: service:
name: kibana name: kibana
enabled: yes enabled: true
state: started state: started
- import_tasks: RMRedHat.yml - import_tasks: RMRedHat.yml

View File

@ -16,4 +16,4 @@ logstash_ssl_dir: /etc/pki/logstash
logstash_ssl_certificate_file: "" logstash_ssl_certificate_file: ""
logstash_ssl_key_file: "" logstash_ssl_key_file: ""
logstash_install_java: yes logstash_install_java: true

View File

@ -40,7 +40,7 @@
apt: apt:
name: "logstash=1:{{ elastic_stack_version }}-1" name: "logstash=1:{{ elastic_stack_version }}-1"
state: present state: present
update_cache: yes update_cache: true
tags: install tags: install
- name: Debian/Ubuntu | Checking if wazuh-manager is installed - name: Debian/Ubuntu | Checking if wazuh-manager is installed
@ -48,13 +48,13 @@
register: wazuh_manager_check_deb register: wazuh_manager_check_deb
when: logstash_input_beats == false when: logstash_input_beats == false
args: args:
warn: no warn: false
- name: Debian/Ubuntu | Add user logstash to group ossec - name: Debian/Ubuntu | Add user logstash to group ossec
user: user:
name: logstash name: logstash
groups: ossec groups: ossec
append: yes append: true
when: when:
- logstash_input_beats == false - logstash_input_beats == false
- wazuh_manager_check_deb.rc == 0 - wazuh_manager_check_deb.rc == 0

View File

@ -20,7 +20,7 @@
description: Elastic repository for 6.x packages description: Elastic repository for 6.x packages
baseurl: https://artifacts.elastic.co/packages/6.x/yum baseurl: https://artifacts.elastic.co/packages/6.x/yum
gpgkey: https://artifacts.elastic.co/GPG-KEY-elasticsearch gpgkey: https://artifacts.elastic.co/GPG-KEY-elasticsearch
gpgcheck: yes gpgcheck: true
- name: RedHat/CentOS/Fedora | Install Logstash - name: RedHat/CentOS/Fedora | Install Logstash
package: name=logstash-{{ elastic_stack_version }} state=present package: name=logstash-{{ elastic_stack_version }} state=present
@ -32,13 +32,13 @@
register: wazuh_manager_check_rpm register: wazuh_manager_check_rpm
when: logstash_input_beats == false when: logstash_input_beats == false
args: args:
warn: no warn: false
- name: RedHat/CentOS/Fedora | Add user logstash to group ossec - name: RedHat/CentOS/Fedora | Add user logstash to group ossec
user: user:
name: logstash name: logstash
groups: ossec groups: ossec
append: yes append: true
when: when:
- logstash_input_beats == false - logstash_input_beats == false
- wazuh_manager_check_rpm.rc == 0 - wazuh_manager_check_rpm.rc == 0

View File

@ -10,7 +10,7 @@
- name: Reload systemd - name: Reload systemd
systemd: daemon_reload=yes systemd: daemon_reload=yes
ignore_errors: yes ignore_errors: true
when: when:
- not (ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA") - not (ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA")
- not (ansible_distribution == "Ubuntu" and ansible_distribution_version is version('15.04', '<')) - not (ansible_distribution == "Ubuntu" and ansible_distribution_version is version('15.04', '<'))
@ -23,13 +23,13 @@
- name: Ensure Logstash started and enabled - name: Ensure Logstash started and enabled
service: service:
name: logstash name: logstash
enabled: yes enabled: true
state: started state: started
- name: Amazon Linux start Logstash - name: Amazon Linux start Logstash
service: service:
name: logstash name: logstash
enabled: yes enabled: true
state: started state: started
when: ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA" when: ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA"

View File

@ -14,4 +14,4 @@
apt_repository: apt_repository:
repo: 'deb https://artifacts.elastic.co/packages/6.x/apt stable main' repo: 'deb https://artifacts.elastic.co/packages/6.x/apt stable main'
state: present state: present
update_cache: yes update_cache: true

View File

@ -5,4 +5,4 @@
description: Elastic repository for 6.x packages description: Elastic repository for 6.x packages
baseurl: https://artifacts.elastic.co/packages/6.x/yum baseurl: https://artifacts.elastic.co/packages/6.x/yum
gpgkey: https://artifacts.elastic.co/GPG-KEY-elasticsearch gpgkey: https://artifacts.elastic.co/GPG-KEY-elasticsearch
gpgcheck: yes gpgcheck: true

View File

@ -15,7 +15,7 @@
- name: Reload systemd - name: Reload systemd
systemd: daemon_reload=yes systemd: daemon_reload=yes
ignore_errors: yes ignore_errors: true
when: when:
- not (ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA") - not (ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA")
- not (ansible_distribution == "Ubuntu" and ansible_distribution_version is version('15.04', '<')) - not (ansible_distribution == "Ubuntu" and ansible_distribution_version is version('15.04', '<'))
@ -25,7 +25,7 @@
service: service:
name: filebeat name: filebeat
state: started state: started
enabled: yes enabled: true
- import_tasks: "RMRedHat.yml" - import_tasks: "RMRedHat.yml"
when: ansible_os_family == "RedHat" when: ansible_os_family == "RedHat"

View File

@ -49,7 +49,6 @@ wazuh_agent_config:
skip_nfs: 'yes' skip_nfs: 'yes'
ignore: ignore:
- /etc/mtab - /etc/mtab
#- /etc/mnttab
- /etc/hosts.deny - /etc/hosts.deny
- /etc/mail/statistics - /etc/mail/statistics
- /etc/random-seed - /etc/random-seed

View File

@ -18,6 +18,6 @@ galaxy_info:
- name: Fedora - name: Fedora
versions: versions:
- all - all
categories: galaxy_tags:
- monitoring - monitoring
dependencies: [] dependencies: []

View File

@ -1,32 +1,48 @@
--- ---
- name: Debian/Ubuntu | Install apt-transport-https and ca-certificates - name: Debian/Ubuntu | Install apt-transport-https and ca-certificates
apt: apt:
name: ['apt-transport-https', 'ca-certificates'] name:
- apt-transport-https
- ca-certificates
state: present state: present
register: wazuh_agent_ca_package_install
until: wazuh_agent_ca_package_install is succeeded
- name: Debian/Ubuntu | Installing repository key - name: Debian/Ubuntu | Installing Wazuh repository key (Ubuntu 14)
become: true
shell: |
set -o pipefail
curl -s https://packages.wazuh.com/key/GPG-KEY-WAZUH | apt-key add -
args:
warn: false
executable: /bin/bash
changed_when: false
when:
- ansible_distribution == "Ubuntu"
- ansible_distribution_major_version | int == 14
- name: Debian/Ubuntu | Installing Wazuh repository key
apt_key: url=https://packages.wazuh.com/key/GPG-KEY-WAZUH apt_key: url=https://packages.wazuh.com/key/GPG-KEY-WAZUH
when:
- not (ansible_distribution == "Ubuntu" and ansible_distribution_major_version | int == 14)
- name: Debian/Ubuntu | Add Wazuh repositories - name: Debian/Ubuntu | Add Wazuh repositories
apt_repository: apt_repository:
repo: 'deb https://packages.wazuh.com/3.x/apt/ stable main' repo: 'deb https://packages.wazuh.com/3.x/apt/ stable main'
state: present state: present
update_cache: yes update_cache: true
- name: Debian/Ubuntu | Set Distribution CIS filename for debian - name: Debian/Ubuntu | Set Distribution CIS filename for debian
set_fact: set_fact:
cis_distribution_filename: cis_debian_linux_rcl.txt cis_distribution_filename: cis_debian_linux_rcl.txt
when: ansible_os_family == "Debian" when: ansible_os_family == "Debian"
- when: - block:
- wazuh_agent_config.cis_cat.disable == 'no'
- wazuh_agent_config.cis_cat.install_java == 'yes'
block:
- name: Debian/Ubuntu | Setting webupd8 repository - name: Debian/Ubuntu | Setting webupd8 repository
apt_repository: apt_repository:
repo: 'ppa:webupd8team/java' repo: 'ppa:webupd8team/java'
codename: 'xenial' codename: 'xenial'
update_cache: yes update_cache: true
- name: Debian/Ubuntu | Accept Oracle Java 8 license - name: Debian/Ubuntu | Accept Oracle Java 8 license
debconf: debconf:
@ -40,21 +56,28 @@
name: oracle-java8-installer name: oracle-java8-installer
state: present state: present
cache_valid_time: 3600 cache_valid_time: 3600
when:
- wazuh_agent_config.cis_cat.disable == 'no'
- wazuh_agent_config.cis_cat.install_java == 'yes'
tags: tags:
- init - init
- name: Debian/Ubuntu | Install OpenScap - name: Debian/Ubuntu | Install OpenScap
apt: apt:
name: ['libopenscap8', 'xsltproc'] name:
- libopenscap8
- xsltproc
state: present state: present
when: wazuh_agent_config.openscap.disable == 'no' when: wazuh_agent_config.openscap.disable == 'no'
tags: tags:
- init - init
register: wazuh_agent_OpenScap_package_install
until: wazuh_agent_OpenScap_package_install is succeeded
- name: Debian/Ubuntu | Get OpenScap installed version - name: Debian/Ubuntu | Get OpenScap installed version
shell: "dpkg-query --showformat='${Version}' --show libopenscap8" shell: "dpkg-query --showformat='${Version}' --show libopenscap8"
register: openscap_version register: openscap_version
changed_when: true changed_when: false
when: wazuh_agent_config.openscap.disable == 'no' when: wazuh_agent_config.openscap.disable == 'no'
tags: tags:
- config - config
@ -62,7 +85,7 @@
- name: Debian/Ubuntu | Check OpenScap version - name: Debian/Ubuntu | Check OpenScap version
shell: "dpkg --compare-versions '{{ openscap_version.stdout }}' '>=' '1.2'; echo $?" shell: "dpkg --compare-versions '{{ openscap_version.stdout }}' '>=' '1.2'; echo $?"
register: openscap_version_valid register: openscap_version_valid
changed_when: true changed_when: false
when: wazuh_agent_config.openscap.disable == 'no' when: wazuh_agent_config.openscap.disable == 'no'
tags: tags:
- config - config

View File

@ -53,16 +53,16 @@
vars: vars:
agent_name: "{% if single_agent_name is defined %}{{ single_agent_name }}{% else %}{{ ansible_hostname }}{% endif %}" agent_name: "{% if single_agent_name is defined %}{{ single_agent_name }}{% else %}{{ ansible_hostname }}{% endif %}"
when: when:
- check_keys.stat.exists == false or check_keys.stat.size == 0 - not check_keys.stat.exists or check_keys.stat.size == 0
- wazuh_managers.0.address is not none - wazuh_managers.0.address is not none
- name: Linux | Verify agent registration - name: Linux | Verify agent registration
shell: echo {{ agent_auth_output }} | grep "Valid key created" shell: echo {{ agent_auth_output }} | grep "Valid key created"
when: when:
- check_keys.stat.exists == false or check_keys.stat.size == 0 - not check_keys.stat.exists or check_keys.stat.size == 0
- wazuh_managers.0.address is not none - wazuh_managers.0.address is not none
when: wazuh_agent_authd.enable == true when: wazuh_agent_authd.enable
tags: tags:
- config - config
- authd - authd
@ -76,9 +76,9 @@
- name: Linux | Create the agent key via rest-API - name: Linux | Create the agent key via rest-API
uri: uri:
url: "{{ wazuh_managers.0.api_proto }}://{{ wazuh_managers.0.address }}:{{ wazuh_managers.0.api_port }}/agents/" url: "{{ wazuh_managers.0.api_proto }}://{{ wazuh_managers.0.address }}:{{ wazuh_managers.0.api_port }}/agents/"
validate_certs: no validate_certs: false
method: POST method: POST
body: {"name":"{{ agent_name }}"} body: '{"name":"{{ agent_name }}"}'
body_format: json body_format: json
status_code: 200 status_code: 200
headers: headers:
@ -86,29 +86,30 @@
user: "{{ wazuh_managers.0.api_user }}" user: "{{ wazuh_managers.0.api_user }}"
password: "{{ api_pass }}" password: "{{ api_pass }}"
register: newagent_api register: newagent_api
changed_when: newagent_api.json.error == 0 # changed_when: newagent_api.json.error == 0
vars: vars:
agent_name: "{% if single_agent_name is defined %}{{ single_agent_name }}{% else %}{{ inventory_hostname }}{% endif %}" agent_name: "{% if single_agent_name is defined %}{{ single_agent_name }}{% else %}{{ inventory_hostname }}{% endif %}"
when: when:
- check_keys.stat.exists == false or check_keys.stat.size == 0 - not check_keys.stat.exists or check_keys.stat.size == 0
- wazuh_managers.0.address is not none - wazuh_managers.0.address is not none
become: no become: false
ignore_errors: true
- name: Linux | Retieve new agent data via rest-API - name: Linux | Retieve new agent data via rest-API
uri: uri:
url: "{{ wazuh_managers.0.api_proto }}://{{ wazuh_managers.0.address }}:{{ wazuh_managers.0.api_port }}/agents/{{ newagent_api.json.data.id }}" url: "{{ wazuh_managers.0.api_proto }}://{{ wazuh_managers.0.address }}:{{ wazuh_managers.0.api_port }}/agents/{{ newagent_api.json.data.id }}"
validate_certs: no validate_certs: false
method: GET method: GET
return_content: yes return_content: true
user: "{{ wazuh_managers.0.api_user }}" user: "{{ wazuh_managers.0.api_user }}"
password: "{{ api_pass }}" password: "{{ api_pass }}"
when: when:
- check_keys.stat.exists == false or check_keys.stat.size == 0 - not check_keys.stat.exists or check_keys.stat.size == 0
- wazuh_managers.0.address is not none - wazuh_managers.0.address is not none
- newagent_api.json.error == 0 - newagent_api.json.error == 0
register: newagentdata_api register: newagentdata_api
delegate_to: localhost delegate_to: localhost
become: no become: false
- name: Linux | Register agent (via rest-API) - name: Linux | Register agent (via rest-API)
command: /var/ossec/bin/manage_agents command: /var/ossec/bin/manage_agents
@ -121,12 +122,13 @@
OSSEC_ACTION_CONFIRMED: y OSSEC_ACTION_CONFIRMED: y
register: manage_agents_output register: manage_agents_output
when: when:
- check_keys.stat.exists == false or check_keys.stat.size == 0 - not check_keys.stat.exists or check_keys.stat.size == 0
- wazuh_managers.0.address is not none - wazuh_managers.0.address is not none
- newagent_api.changed - newagent_api.changed
notify: restart wazuh-agent notify: restart wazuh-agent
when: wazuh_agent_authd.enable == false when:
- not wazuh_agent_authd.enable
tags: tags:
- config - config
- api - api
@ -139,7 +141,7 @@
poll: 0 poll: 0
when: when:
- wazuh_agent_config.vuls.disable != 'yes' - wazuh_agent_config.vuls.disable != 'yes'
- ansible_distribution == 'Redhat' or ansible_distribution == 'CentOS' or ansible_distribution == 'Ubuntu' or ansible_distribution == 'Debian' or ansible_distribution == 'Oracle' - ansible_distribution in ['Redhat', 'CentOS', 'Ubuntu', 'Debian', 'Oracle']
tags: tags:
- init - init
@ -168,7 +170,7 @@
- name: Linux | Ensure Wazuh Agent service is started and enabled - name: Linux | Ensure Wazuh Agent service is started and enabled
service: service:
name: wazuh-agent name: wazuh-agent
enabled: yes enabled: true
state: started state: started
- import_tasks: "RMRedHat.yml" - import_tasks: "RMRedHat.yml"

View File

@ -3,3 +3,4 @@
apt_repository: apt_repository:
repo: deb https://packages.wazuh.com/apt {{ ansible_distribution_release }} main repo: deb https://packages.wazuh.com/apt {{ ansible_distribution_release }} main
state: absent state: absent
changed_when: false

View File

@ -3,3 +3,4 @@
yum_repository: yum_repository:
name: wazuh_repo name: wazuh_repo
state: absent state: absent
changed_when: false

View File

@ -5,7 +5,8 @@
description: Wazuh repository description: Wazuh repository
baseurl: https://packages.wazuh.com/3.x/yum/ baseurl: https://packages.wazuh.com/3.x/yum/
gpgkey: https://packages.wazuh.com/key/GPG-KEY-WAZUH gpgkey: https://packages.wazuh.com/key/GPG-KEY-WAZUH
gpgcheck: yes gpgcheck: true
changed_when: false
when: when:
- ansible_distribution_major_version|int > 5 - ansible_distribution_major_version|int > 5
@ -15,7 +16,8 @@
description: Wazuh repository description: Wazuh repository
baseurl: https://packages.wazuh.com/3.x/yum/5/ baseurl: https://packages.wazuh.com/3.x/yum/5/
gpgkey: https://packages.wazuh.com/key/GPG-KEY-WAZUH-5 gpgkey: https://packages.wazuh.com/key/GPG-KEY-WAZUH-5
gpgcheck: yes gpgcheck: true
changed_when: false
when: when:
- ansible_distribution_major_version|int == 5 - ansible_distribution_major_version|int == 5
@ -25,7 +27,8 @@
description: Wazuh repository description: Wazuh repository
baseurl: https://packages.wazuh.com/3.x/yum/ baseurl: https://packages.wazuh.com/3.x/yum/
gpgkey: https://packages.wazuh.com/key/GPG-KEY-WAZUH gpgkey: https://packages.wazuh.com/key/GPG-KEY-WAZUH
gpgcheck: yes gpgcheck: true
changed_when: false
when: when:
- ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA" - ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA"
@ -35,6 +38,7 @@
dest: /tmp/jre-8-linux-x64.rpm dest: /tmp/jre-8-linux-x64.rpm
headers: 'Cookie:oraclelicense=accept-securebackup-cookie' headers: 'Cookie:oraclelicense=accept-securebackup-cookie'
register: oracle_java_task_rpm_download register: oracle_java_task_rpm_download
until: oracle_java_task_rpm_download is succeeded
when: when:
- wazuh_agent_config.cis_cat.disable == 'no' - wazuh_agent_config.cis_cat.disable == 'no'
- wazuh_agent_config.cis_cat.install_java == 'yes' - wazuh_agent_config.cis_cat.install_java == 'yes'
@ -43,6 +47,8 @@
- name: RedHat/CentOS/Fedora | Install Oracle Java RPM - name: RedHat/CentOS/Fedora | Install Oracle Java RPM
package: name=/tmp/jre-8-linux-x64.rpm state=present package: name=/tmp/jre-8-linux-x64.rpm state=present
register: wazuh_agent_java_package_install
until: wazuh_agent_java_package_install is succeeded
when: when:
- wazuh_agent_config.cis_cat.disable == 'no' - wazuh_agent_config.cis_cat.disable == 'no'
- wazuh_agent_config.cis_cat.install_java == 'yes' - wazuh_agent_config.cis_cat.install_java == 'yes'
@ -63,10 +69,21 @@
- name: Set Distribution CIS filename for RHEL7 - name: Set Distribution CIS filename for RHEL7
set_fact: set_fact:
cis_distribution_filename: cis_rhel7_linux_rcl.txt cis_distribution_filename: cis_rhel7_linux_rcl.txt
when: (ansible_os_family == "RedHat" and ansible_distribution_major_version == "7") or (ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA") when:
- ansible_os_family == "RedHat"
- ansible_distribution_major_version == "7"
- name: Set Distribution CIS filename for RHEL7 (Amazon)
set_fact:
cis_distribution_filename: cis_rhel7_linux_rcl.txt
when:
- ansible_distribution == "Amazon"
- ansible_distribution_major_version == "NA"
- name: RedHat/CentOS/RedHat | Install openscap - name: RedHat/CentOS/RedHat | Install openscap
package: name=openscap-scanner state=present package: name=openscap-scanner state=present
register: wazuh_agent_openscap_package_install
until: wazuh_agent_openscap_package_install is succeeded
when: wazuh_agent_config.openscap.disable == 'no' when: wazuh_agent_config.openscap.disable == 'no'
tags: tags:
- init - init

View File

@ -4,15 +4,19 @@
path: C:\Program Files (x86) path: C:\Program Files (x86)
register: check_path register: check_path
- name: "Set Win Path"
set_fact:
wazuh_agent_win_path: "{% wazuh_winagent_config.install_dir_x86 if check_path.stat.exists else wazuh_winagent_config.install_dir %}"
- name: Windows | Get current installed version - name: Windows | Get current installed version
win_shell: "{% if check_path.stat.exists == true %}{{ wazuh_winagent_config.install_dir_x86 }}{% else %} win_shell: "{% if check_path.stat.exists %}{{ wazuh_winagent_config.install_dir_x86 }}{% else %}
{{ wazuh_winagent_config.install_dir }}{% endif %}ossec-agent.exe -h" {{ wazuh_winagent_config.install_dir }}{% endif %}ossec-agent.exe -h"
args: args:
removes: "{% if check_path.stat.exists == true %}{{ wazuh_winagent_config.install_dir_x86 }}{% else %} removes: "{% if check_path.stat.exists %}{{ wazuh_winagent_config.install_dir_x86 }}{% else %}
{{ wazuh_winagent_config.install_dir }}{% endif %}ossec-agent.exe" {{ wazuh_winagent_config.install_dir }}{% endif %}ossec-agent.exe"
register: agent_version register: agent_version
failed_when: False failed_when: false
changed_when: False changed_when: false
- name: Windows | Check Wazuh agent version installed - name: Windows | Check Wazuh agent version installed
set_fact: correct_version=true set_fact: correct_version=true
@ -30,7 +34,7 @@
- name: Windows | Verify the downloaded Wazuh agent installer - name: Windows | Verify the downloaded Wazuh agent installer
win_stat: win_stat:
path: C:\wazuh-agent-installer.msi path: C:\wazuh-agent-installer.msi
get_checksum: yes get_checksum: true
checksum_algorithm: md5 checksum_algorithm: md5
register: installer_md5 register: installer_md5
when: when:
@ -45,7 +49,7 @@
- correct_version is not defined - correct_version is not defined
- name: Windows | Check if client.keys exists - name: Windows | Check if client.keys exists
win_stat: path="{% if check_path.stat.exists == true %}{{ wazuh_winagent_config.install_dir_x86 }}{% else %}{{ wazuh_winagent_config.install_dir }}{% endif %}client.keys" win_stat: path="{{ wazuh_agent_win_path }}"
register: check_windows_key register: check_windows_key
notify: restart wazuh-agent windows notify: restart wazuh-agent windows
tags: tags:
@ -58,18 +62,18 @@
- name: Windows | Register agent - name: Windows | Register agent
win_shell: > win_shell: >
{% if check_path.stat.exists == true %}{{ wazuh_winagent_config.auth_path_x86 }}{% else %} {% if check_path.stat.exists %}{{ wazuh_winagent_config.auth_path_x86 }}{% else %}
{{ wazuh_winagent_config.auth_path }}{% endif %} {{ wazuh_winagent_config.auth_path }}{% endif %}
-m {{ wazuh_managers.0.address }} -m {{ wazuh_managers.0.address }}
-p {{ wazuh_agent_authd.port }} -p {{ wazuh_agent_authd.port }}
{% if authd_pass is defined %} -P {{ authd_pass }}{% endif %} {% if authd_pass is defined %} -P {{ authd_pass }}{% endif %}
args: args:
chdir: "{% if check_path.stat.exists == true %}{{ wazuh_winagent_config.install_dir_x86 }}{% else %}{{ wazuh_winagent_config.install_dir }}{% endif %}" chdir: "{{ wazuh_agent_win_path }}"
register: agent_auth_output register: agent_auth_output
notify: restart wazuh-agent windows notify: restart wazuh-agent windows
when: when:
- wazuh_agent_authd.enable == true - wazuh_agent_authd.enable
- check_windows_key.stat.exists == false or check_windows_key.stat.size == 0 - not check_windows_key.stat.exists or check_windows_key.stat.size == 0
- wazuh_managers.0.address is not none - wazuh_managers.0.address is not none
tags: tags:
- config - config
@ -77,7 +81,7 @@
- name: Windows | Installing agent configuration (ossec.conf) - name: Windows | Installing agent configuration (ossec.conf)
win_template: win_template:
src: var-ossec-etc-ossec-agent.conf.j2 src: var-ossec-etc-ossec-agent.conf.j2
dest: "{% if check_path.stat.exists == true %}{{ wazuh_winagent_config.install_dir_x86 }}{% else %}{{ wazuh_winagent_config.install_dir }}{% endif %}ossec.conf" dest: "{{ wazuh_agent_win_path }}ossec.conf"
notify: restart wazuh-agent windows notify: restart wazuh-agent windows
tags: tags:
- config - config
@ -85,7 +89,7 @@
- name: Windows | Installing local_internal_options.conf - name: Windows | Installing local_internal_options.conf
win_template: win_template:
src: var-ossec-etc-local-internal-options.conf.j2 src: var-ossec-etc-local-internal-options.conf.j2
dest: "{% if check_path.stat.exists == true %}{{ wazuh_winagent_config.install_dir_x86 }}{% else %}{{ wazuh_winagent_config.install_dir }}{% endif %}local_internal_options.conf" dest: "{{ wazuh_agent_win_path }}local_internal_options.conf"
notify: restart wazuh-agent windows notify: restart wazuh-agent windows
tags: tags:
- config - config

View File

@ -254,7 +254,7 @@
{% endif %} {% endif %}
<log_path>{% if ansible_os_family == "Windows" %}{{ wazuh_agent_config.osquery.log_path_win }}{% else %}{{ wazuh_agent_config.osquery.log_path }}{% endif %}</log_path> <log_path>{% if ansible_os_family == "Windows" %}{{ wazuh_agent_config.osquery.log_path_win }}{% else %}{{ wazuh_agent_config.osquery.log_path }}{% endif %}</log_path>
<config_path>{% if ansible_os_family == "Windows" %}{{ wazuh_agent_config.osquery.config_path_win }}{% else %}{{ wazuh_agent_config.osquery.config_path }}{% endif %}</config_path> <config_path>{% if ansible_os_family == "Windows" %}{{ wazuh_agent_config.osquery.config_path_win }}{% else %}{{ wazuh_agent_config.osquery.config_path }}{% endif %}</config_path>
<add_labels>{{ wazuh_agent_config.osquery.ad_labels }}</add_labels> <add_labels>{{ wazuh_agent_config.osquery.add_labels }}</add_labels>
</wodle> </wodle>
<!-- System inventory --> <!-- System inventory -->

View File

@ -282,10 +282,6 @@ wazuh_agent_configs:
- /etc/svc/volatile - /etc/svc/volatile
no_diff: no_diff:
- /etc/ssl/private.key - /etc/ssl/private.key
# Example
#directories:
#- dirs: /etc,/usr/bin,/usr/sbin
# checks: 'check_all="yes"'
rootcheck: rootcheck:
frequency: 43200 frequency: 43200
cis_distribution_filename: null cis_distribution_filename: null

View File

@ -11,14 +11,14 @@
until: wazuh_manager_https_packages_installed is succeeded until: wazuh_manager_https_packages_installed is succeeded
- name: Debian/Ubuntu | Installing Wazuh repository key (Ubuntu 14) - name: Debian/Ubuntu | Installing Wazuh repository key (Ubuntu 14)
become: yes become: true
shell: | shell: |
set -o pipefail set -o pipefail
curl -s https://packages.wazuh.com/key/GPG-KEY-WAZUH | apt-key add - curl -s https://packages.wazuh.com/key/GPG-KEY-WAZUH | apt-key add -
args: args:
warn: False warn: false
executable: /bin/bash executable: /bin/bash
changed_when: False changed_when: false
when: when:
- ansible_distribution == "Ubuntu" - ansible_distribution == "Ubuntu"
- ansible_distribution_major_version | int == 14 - ansible_distribution_major_version | int == 14
@ -32,18 +32,18 @@
apt_repository: apt_repository:
repo: 'deb https://packages.wazuh.com/3.x/apt/ stable main' repo: 'deb https://packages.wazuh.com/3.x/apt/ stable main'
state: present state: present
update_cache: yes update_cache: true
changed_when: False changed_when: false
- name: Debian/Ubuntu | Installing NodeJS repository key (Ubuntu 14) - name: Debian/Ubuntu | Installing NodeJS repository key (Ubuntu 14)
become: yes become: true
shell: | shell: |
set -o pipefail set -o pipefail
curl -s https://deb.nodesource.com/gpgkey/nodesource.gpg.key | apt-key add - curl -s https://deb.nodesource.com/gpgkey/nodesource.gpg.key | apt-key add -
args: args:
warn: False warn: false
executable: /bin/bash executable: /bin/bash
changed_when: False changed_when: false
when: when:
- ansible_distribution == "Ubuntu" - ansible_distribution == "Ubuntu"
- ansible_distribution_major_version | int == 14 - ansible_distribution_major_version | int == 14
@ -57,22 +57,19 @@
apt_repository: apt_repository:
repo: "deb https://deb.nodesource.com/node_6.x {{ ansible_distribution_release }} main" repo: "deb https://deb.nodesource.com/node_6.x {{ ansible_distribution_release }} main"
state: present state: present
update_cache: yes update_cache: true
changed_when: False changed_when: false
- name: Debian/Ubuntu | Set Distribution CIS filename for Debian/Ubuntu - name: Debian/Ubuntu | Set Distribution CIS filename for Debian/Ubuntu
set_fact: set_fact:
cis_distribution_filename: cis_debian_linux_rcl.txt cis_distribution_filename: cis_debian_linux_rcl.txt
- when: - block:
- wazuh_manager_config.cis_cat.disable == 'no'
- wazuh_manager_config.cis_cat.install_java == 'yes'
block:
- name: Debian/Ubuntu | Setting webupd8 repository - name: Debian/Ubuntu | Setting webupd8 repository
apt_repository: apt_repository:
repo: 'ppa:webupd8team/java' repo: 'ppa:webupd8team/java'
codename: 'xenial' codename: 'xenial'
update_cache: yes update_cache: true
- name: Debian/Ubuntu | Accept Oracle Java 8 license - name: Debian/Ubuntu | Accept Oracle Java 8 license
debconf: debconf:
@ -88,6 +85,9 @@
cache_valid_time: 3600 cache_valid_time: 3600
register: wazuh_manager_oracle_java_8_installed register: wazuh_manager_oracle_java_8_installed
until: wazuh_manager_oracle_java_8_installed is succeeded until: wazuh_manager_oracle_java_8_installed is succeeded
when:
- wazuh_manager_config.cis_cat.disable == 'no'
- wazuh_manager_config.cis_cat.install_java == 'yes'
tags: tags:
- init - init
@ -109,7 +109,7 @@
shell: "dpkg-query --showformat='${Version}' --show libopenscap8" shell: "dpkg-query --showformat='${Version}' --show libopenscap8"
when: wazuh_manager_config.openscap.disable == 'no' when: wazuh_manager_config.openscap.disable == 'no'
register: openscap_version register: openscap_version
changed_when: False changed_when: false
tags: tags:
- config - config
@ -117,6 +117,6 @@
shell: "dpkg --compare-versions '{{ openscap_version.stdout }}' '>=' '1.2'; echo $?" shell: "dpkg --compare-versions '{{ openscap_version.stdout }}' '>=' '1.2'; echo $?"
when: wazuh_manager_config.openscap.disable == 'no' when: wazuh_manager_config.openscap.disable == 'no'
register: openscap_version_valid register: openscap_version_valid
changed_when: False changed_when: false
tags: tags:
- config - config

View File

@ -3,10 +3,10 @@
apt_repository: apt_repository:
repo: deb https://packages.wazuh.com/apt {{ ansible_distribution_release }} main repo: deb https://packages.wazuh.com/apt {{ ansible_distribution_release }} main
state: absent state: absent
changed_when: False changed_when: false
- name: Debian/Ubuntu | Remove Nodejs repository. - name: Debian/Ubuntu | Remove Nodejs repository.
apt_repository: apt_repository:
repo: deb https://deb.nodesource.com/node_6.x {{ ansible_distribution_release }} main repo: deb https://deb.nodesource.com/node_6.x {{ ansible_distribution_release }} main
state: absent state: absent
changed_when: False changed_when: false

View File

@ -3,10 +3,10 @@
yum_repository: yum_repository:
name: NodeJS name: NodeJS
state: absent state: absent
changed_when: False changed_when: false
- name: RedHat/CentOS/Fedora | Remove Wazuh repository (and clean up left-over metadata) - name: RedHat/CentOS/Fedora | Remove Wazuh repository (and clean up left-over metadata)
yum_repository: yum_repository:
name: wazuh_repo name: wazuh_repo
state: absent state: absent
changed_when: False changed_when: false

View File

@ -5,8 +5,8 @@
description: NodeJS-$releasever description: NodeJS-$releasever
baseurl: https://rpm.nodesource.com/pub_6.x/el/{{ ansible_distribution_major_version }}/x86_64 baseurl: https://rpm.nodesource.com/pub_6.x/el/{{ ansible_distribution_major_version }}/x86_64
gpgkey: https://rpm.nodesource.com/pub/el/NODESOURCE-GPG-SIGNING-KEY-EL gpgkey: https://rpm.nodesource.com/pub/el/NODESOURCE-GPG-SIGNING-KEY-EL
gpgcheck: yes gpgcheck: true
changed_when: False changed_when: false
when: when:
- ansible_distribution_major_version|int > 5 - ansible_distribution_major_version|int > 5
@ -16,7 +16,7 @@
description: NodeJS-$releasever description: NodeJS-$releasever
baseurl: https://rpm.nodesource.com/pub_6.x/fc/$releasever/x86_64 baseurl: https://rpm.nodesource.com/pub_6.x/fc/$releasever/x86_64
gpgkey: https://rpm.nodesource.com/pub/el/NODESOURCE-GPG-SIGNING-KEY-EL gpgkey: https://rpm.nodesource.com/pub/el/NODESOURCE-GPG-SIGNING-KEY-EL
gpgcheck: yes gpgcheck: true
when: ansible_distribution == 'Fedora' when: ansible_distribution == 'Fedora'
- name: AmazonLinux | Get Nodejs - name: AmazonLinux | Get Nodejs
@ -24,7 +24,7 @@
set -o pipefail set -o pipefail
curl --silent --location https://rpm.nodesource.com/setup_8.x | bash - curl --silent --location https://rpm.nodesource.com/setup_8.x | bash -
args: args:
warn: no warn: false
executable: /bin/bash executable: /bin/bash
when: when:
- ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA" - ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA"
@ -44,8 +44,8 @@
description: Wazuh repository description: Wazuh repository
baseurl: https://packages.wazuh.com/3.x/yum/ baseurl: https://packages.wazuh.com/3.x/yum/
gpgkey: https://packages.wazuh.com/key/GPG-KEY-WAZUH gpgkey: https://packages.wazuh.com/key/GPG-KEY-WAZUH
gpgcheck: yes gpgcheck: true
changed_when: False changed_when: false
when: when:
- (ansible_distribution_major_version|int > 5) or (ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA") - (ansible_distribution_major_version|int > 5) or (ansible_distribution == "Amazon" and ansible_distribution_major_version == "NA")
@ -55,7 +55,7 @@
description: Wazuh repository description: Wazuh repository
baseurl: https://packages.wazuh.com/3.x/yum/5/ baseurl: https://packages.wazuh.com/3.x/yum/5/
gpgkey: https://packages.wazuh.com/key/GPG-KEY-WAZUH gpgkey: https://packages.wazuh.com/key/GPG-KEY-WAZUH
gpgcheck: yes gpgcheck: true
when: when:
- ansible_distribution_major_version|int == 5 - ansible_distribution_major_version|int == 5

View File

@ -208,8 +208,8 @@
args: args:
removes: /var/ossec/bin/.process_list removes: /var/ossec/bin/.process_list
executable: /bin/bash executable: /bin/bash
changed_when: False changed_when: false
check_mode: no check_mode: false
register: csyslog_enabled register: csyslog_enabled
tags: tags:
- config - config
@ -230,8 +230,8 @@
args: args:
removes: /var/ossec/bin/.process_list removes: /var/ossec/bin/.process_list
executable: /bin/bash executable: /bin/bash
changed_when: False changed_when: false
check_mode: no check_mode: false
register: agentlessd_enabled register: agentlessd_enabled
tags: tags:
- config - config
@ -349,7 +349,7 @@
- name: Ensure Wazuh Manager, wazuh API service is started and enabled - name: Ensure Wazuh Manager, wazuh API service is started and enabled
service: service:
name: "{{ item }}" name: "{{ item }}"
enabled: yes enabled: true
state: started state: started
with_items: with_items:
- wazuh-manager - wazuh-manager
@ -364,7 +364,7 @@
- name: Ensure Wazuh Manager is started and enabled (EL5) - name: Ensure Wazuh Manager is started and enabled (EL5)
service: service:
name: wazuh-manager name: wazuh-manager
enabled: yes enabled: true
state: started state: started
tags: tags:
- config - config