Merge pull request #542 from wazuh/feature-harcode-path-var
Feature harcode path var
This commit is contained in:
commit
ce1ba70751
@ -30,7 +30,7 @@ wazuh_agent_sources_installation:
|
|||||||
user_agent_server_ip: "YOUR_MANAGER_IP"
|
user_agent_server_ip: "YOUR_MANAGER_IP"
|
||||||
user_agent_server_name: null
|
user_agent_server_name: null
|
||||||
user_agent_config_profile: null
|
user_agent_config_profile: null
|
||||||
user_ca_store: "/var/ossec/wpk_root.pem"
|
user_ca_store: "{{ wazuh_dir }}/wpk_root.pem"
|
||||||
|
|
||||||
wazuh_agent_yum_lock_timeout: 30
|
wazuh_agent_yum_lock_timeout: 30
|
||||||
|
|
||||||
@ -58,6 +58,8 @@ wazuh_winagent_config:
|
|||||||
wazuh_winagent_config_url: https://packages.wazuh.com/4.x/windows/wazuh-agent-4.0.4-1.msi
|
wazuh_winagent_config_url: https://packages.wazuh.com/4.x/windows/wazuh-agent-4.0.4-1.msi
|
||||||
wazuh_winagent_package_name: wazuh-agent-4.0.4-1.msi
|
wazuh_winagent_package_name: wazuh-agent-4.0.4-1.msi
|
||||||
|
|
||||||
|
wazuh_dir: "/var/ossec"
|
||||||
|
|
||||||
wazuh_agent_repo:
|
wazuh_agent_repo:
|
||||||
apt: 'deb https://packages.wazuh.com/4.x/apt/ stable main'
|
apt: 'deb https://packages.wazuh.com/4.x/apt/ stable main'
|
||||||
yum: 'https://packages.wazuh.com/4.x/yum/'
|
yum: 'https://packages.wazuh.com/4.x/yum/'
|
||||||
@ -107,7 +109,7 @@ wazuh_agent_enrollment:
|
|||||||
server_ca_path: ''
|
server_ca_path: ''
|
||||||
agent_certificate_path: ''
|
agent_certificate_path: ''
|
||||||
agent_key_path: ''
|
agent_key_path: ''
|
||||||
authorization_pass_path: /var/ossec/etc/authd.pass
|
authorization_pass_path: "{{ wazuh_dir }}/etc/authd.pass"
|
||||||
auto_method: 'no'
|
auto_method: 'no'
|
||||||
delay_after_enrollment: 20
|
delay_after_enrollment: 20
|
||||||
use_source_ip: 'no'
|
use_source_ip: 'no'
|
||||||
@ -324,7 +326,7 @@ wazuh_agent_localfiles:
|
|||||||
location: '/var/log/audit/audit.log'
|
location: '/var/log/audit/audit.log'
|
||||||
linux:
|
linux:
|
||||||
- format: 'syslog'
|
- format: 'syslog'
|
||||||
location: '/var/ossec/logs/active-responses.log'
|
location: "{{ wazuh_dir }}/logs/active-responses.log"
|
||||||
- format: 'full_command'
|
- format: 'full_command'
|
||||||
command: 'last -n 20'
|
command: 'last -n 20'
|
||||||
frequency: '360'
|
frequency: '360'
|
||||||
@ -356,7 +358,7 @@ wazuh_agent_labels:
|
|||||||
## Active response
|
## Active response
|
||||||
wazuh_agent_active_response:
|
wazuh_agent_active_response:
|
||||||
ar_disabled: 'no'
|
ar_disabled: 'no'
|
||||||
ca_store: '/var/ossec/etc/wpk_root.pem'
|
ca_store: "{{ wazuh_dir }}/etc/wpk_root.pem"
|
||||||
ca_store_win: 'wpk_root.pem'
|
ca_store_win: 'wpk_root.pem'
|
||||||
ca_verification: 'yes'
|
ca_verification: 'yes'
|
||||||
|
|
||||||
|
|||||||
@ -40,7 +40,7 @@
|
|||||||
|
|
||||||
- name: Linux | Check if client.keys exists
|
- name: Linux | Check if client.keys exists
|
||||||
stat:
|
stat:
|
||||||
path: /var/ossec/etc/client.keys
|
path: "{{ wazuh_dir }}/etc/client.keys"
|
||||||
register: client_keys_file
|
register: client_keys_file
|
||||||
tags:
|
tags:
|
||||||
- config
|
- config
|
||||||
@ -51,7 +51,7 @@
|
|||||||
- name: Copy CA root certificate to verify authd
|
- name: Copy CA root certificate to verify authd
|
||||||
copy:
|
copy:
|
||||||
src: "{{ wazuh_agent_authd.ssl_agent_ca }}"
|
src: "{{ wazuh_agent_authd.ssl_agent_ca }}"
|
||||||
dest: "/var/ossec/etc/{{ wazuh_agent_authd.ssl_agent_ca | basename }}"
|
dest: "{{ wazuh_dir }}/etc/{{ wazuh_agent_authd.ssl_agent_ca | basename }}"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
when:
|
when:
|
||||||
- wazuh_agent_authd.ssl_agent_ca is not none
|
- wazuh_agent_authd.ssl_agent_ca is not none
|
||||||
@ -59,7 +59,7 @@
|
|||||||
- name: Copy TLS/SSL certificate for agent verification
|
- name: Copy TLS/SSL certificate for agent verification
|
||||||
copy:
|
copy:
|
||||||
src: "{{ item }}"
|
src: "{{ item }}"
|
||||||
dest: "/var/ossec/etc/{{ item | basename }}"
|
dest: "{{ wazuh_dir }}/etc/{{ item | basename }}"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ wazuh_agent_authd.ssl_agent_cert }}"
|
- "{{ wazuh_agent_authd.ssl_agent_cert }}"
|
||||||
@ -70,7 +70,7 @@
|
|||||||
|
|
||||||
- name: Linux | Register agent (via authd)
|
- name: Linux | Register agent (via authd)
|
||||||
shell: >
|
shell: >
|
||||||
/var/ossec/bin/agent-auth
|
{{ wazuh_dir }}/bin/agent-auth
|
||||||
{% if wazuh_agent_authd.agent_name is defined and wazuh_agent_authd.agent_name != None %}
|
{% if wazuh_agent_authd.agent_name is defined and wazuh_agent_authd.agent_name != None %}
|
||||||
-A {{ wazuh_agent_authd.agent_name }}
|
-A {{ wazuh_agent_authd.agent_name }}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
@ -79,13 +79,13 @@
|
|||||||
{% if wazuh_agent_nat %} -I "any" {% endif %}
|
{% if wazuh_agent_nat %} -I "any" {% endif %}
|
||||||
{% if authd_pass | length > 0 %} -P {{ authd_pass }} {% endif %}
|
{% if authd_pass | length > 0 %} -P {{ authd_pass }} {% endif %}
|
||||||
{% if wazuh_agent_authd.ssl_agent_ca is defined and wazuh_agent_authd.ssl_agent_ca != None %}
|
{% if wazuh_agent_authd.ssl_agent_ca is defined and wazuh_agent_authd.ssl_agent_ca != None %}
|
||||||
-v "/var/ossec/etc/{{ wazuh_agent_authd.ssl_agent_ca | basename }}"
|
-v "{{ wazuh_dir }}/etc/{{ wazuh_agent_authd.ssl_agent_ca | basename }}"
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if wazuh_agent_authd.ssl_agent_cert is defined and wazuh_agent_authd.ssl_agent_cert != None %}
|
{% if wazuh_agent_authd.ssl_agent_cert is defined and wazuh_agent_authd.ssl_agent_cert != None %}
|
||||||
-x "/var/ossec/etc/{{ wazuh_agent_authd.ssl_agent_cert | basename }}"
|
-x "{{ wazuh_dir }}/etc/{{ wazuh_agent_authd.ssl_agent_cert | basename }}"
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if wazuh_agent_authd.ssl_agent_key is defined and wazuh_agent_authd.ssl_agent_key != None %}
|
{% if wazuh_agent_authd.ssl_agent_key is defined and wazuh_agent_authd.ssl_agent_key != None %}
|
||||||
-k "/var/ossec/etc/{{ wazuh_agent_authd.ssl_agent_key | basename }}"
|
-k "{{ wazuh_dir }}/etc/{{ wazuh_agent_authd.ssl_agent_key | basename }}"
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if wazuh_agent_authd.ssl_auto_negotiate == 'yes' %} -a {% endif %}
|
{% if wazuh_agent_authd.ssl_auto_negotiate == 'yes' %} -a {% endif %}
|
||||||
{% if wazuh_agent_authd.groups is defined and wazuh_agent_authd.groups | length > 0 %}
|
{% if wazuh_agent_authd.groups is defined and wazuh_agent_authd.groups | length > 0 %}
|
||||||
@ -193,7 +193,7 @@
|
|||||||
- api
|
- api
|
||||||
|
|
||||||
- name: Linux | Import Key (via rest-API)
|
- name: Linux | Import Key (via rest-API)
|
||||||
command: /var/ossec/bin/manage_agents
|
command: "{{ wazuh_dir }}/bin/manage_agents"
|
||||||
environment:
|
environment:
|
||||||
OSSEC_ACTION: i
|
OSSEC_ACTION: i
|
||||||
OSSEC_AGENT_NAME: '{{ agent_name }}'
|
OSSEC_AGENT_NAME: '{{ agent_name }}'
|
||||||
@ -221,7 +221,7 @@
|
|||||||
- name: Linux | Installing agent configuration (ossec.conf)
|
- name: Linux | Installing agent configuration (ossec.conf)
|
||||||
template:
|
template:
|
||||||
src: var-ossec-etc-ossec-agent.conf.j2
|
src: var-ossec-etc-ossec-agent.conf.j2
|
||||||
dest: /var/ossec/etc/ossec.conf
|
dest: "{{ wazuh_dir }}/etc/ossec.conf"
|
||||||
owner: root
|
owner: root
|
||||||
group: ossec
|
group: ossec
|
||||||
mode: 0644
|
mode: 0644
|
||||||
@ -233,7 +233,7 @@
|
|||||||
- name: Linux | Installing local_internal_options.conf
|
- name: Linux | Installing local_internal_options.conf
|
||||||
template:
|
template:
|
||||||
src: var-ossec-etc-local-internal-options.conf.j2
|
src: var-ossec-etc-local-internal-options.conf.j2
|
||||||
dest: /var/ossec/etc/local_internal_options.conf
|
dest: "{{ wazuh_dir }}/etc/local_internal_options.conf"
|
||||||
owner: root
|
owner: root
|
||||||
group: ossec
|
group: ossec
|
||||||
mode: 0640
|
mode: 0640
|
||||||
@ -245,7 +245,7 @@
|
|||||||
- name: Create auto-enrollment password file
|
- name: Create auto-enrollment password file
|
||||||
template:
|
template:
|
||||||
src: authd_pass.j2
|
src: authd_pass.j2
|
||||||
dest: "/var/ossec/etc/authd.pass"
|
dest: "{{ wazuh_dir }}/etc/authd.pass"
|
||||||
owner: ossec
|
owner: ossec
|
||||||
group: ossec
|
group: ossec
|
||||||
mode: 0640
|
mode: 0640
|
||||||
|
|||||||
@ -103,8 +103,8 @@
|
|||||||
<!-- Frequency that rootcheck is executed - every 12 hours -->
|
<!-- Frequency that rootcheck is executed - every 12 hours -->
|
||||||
<frequency>{{ wazuh_agent_config.rootcheck.frequency }}</frequency>
|
<frequency>{{ wazuh_agent_config.rootcheck.frequency }}</frequency>
|
||||||
|
|
||||||
<rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files>
|
<rootkit_files>{{ wazuh_dir }}/etc/shared/rootkit_files.txt</rootkit_files>
|
||||||
<rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans>
|
<rootkit_trojans>{{ wazuh_dir }}/etc/shared/rootkit_trojans.txt</rootkit_trojans>
|
||||||
<skip_nfs>yes</skip_nfs>
|
<skip_nfs>yes</skip_nfs>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if ansible_os_family == "Windows" %}
|
{% if ansible_os_family == "Windows" %}
|
||||||
|
|||||||
@ -35,6 +35,7 @@ wazuh_manager_sources_installation:
|
|||||||
user_ca_store: null
|
user_ca_store: null
|
||||||
threads: "2"
|
threads: "2"
|
||||||
|
|
||||||
|
wazuh_dir: "/var/ossec"
|
||||||
wazuh_manager_repo:
|
wazuh_manager_repo:
|
||||||
apt: 'deb https://packages.wazuh.com/4.x/apt/ stable main'
|
apt: 'deb https://packages.wazuh.com/4.x/apt/ stable main'
|
||||||
yum: 'https://packages.wazuh.com/4.x/yum/'
|
yum: 'https://packages.wazuh.com/4.x/yum/'
|
||||||
@ -297,7 +298,7 @@ wazuh_manager_localfiles:
|
|||||||
command: 'last -n 20'
|
command: 'last -n 20'
|
||||||
frequency: '360'
|
frequency: '360'
|
||||||
- format: 'syslog'
|
- format: 'syslog'
|
||||||
location: '/var/ossec/logs/active-responses.log'
|
location: "{{ wazuh_dir }}/logs/active-responses.log"
|
||||||
debian:
|
debian:
|
||||||
- format: 'syslog'
|
- format: 'syslog'
|
||||||
location: '/var/log/auth.log'
|
location: '/var/log/auth.log'
|
||||||
@ -500,7 +501,7 @@ wazuh_manager_config_defaults:
|
|||||||
# - format: 'apache'
|
# - format: 'apache'
|
||||||
# location: '/var/log/httpd/access_log'
|
# location: '/var/log/httpd/access_log'
|
||||||
# - format: 'apache'
|
# - format: 'apache'
|
||||||
# location: '/var/ossec/logs/active-responses.log'
|
# location: "{{ wazuh_dir }}/logs/active-responses.log"
|
||||||
# - type: os
|
# - type: os
|
||||||
# type_value: Windows
|
# type_value: Windows
|
||||||
# syscheck:
|
# syscheck:
|
||||||
|
|||||||
@ -117,7 +117,7 @@
|
|||||||
replace:
|
replace:
|
||||||
path: /etc/init.d/wazuh-manager
|
path: /etc/init.d/wazuh-manager
|
||||||
regexp: 'echo -n "Starting Wazuh-manager: "'
|
regexp: 'echo -n "Starting Wazuh-manager: "'
|
||||||
replace: 'echo -n "Starting Wazuh-manager (EL6): "; source /opt/rh/python27/enable; export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/var/ossec/framework/lib'
|
replace: "echo -n \"Starting Wazuh-manager (EL6): \"; source /opt/rh/python27/enable; export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:{{ wazuh_dir }}/framework/lib"
|
||||||
when:
|
when:
|
||||||
- ansible_distribution in ['CentOS', 'RedHat', 'Amazon'] and ansible_distribution_major_version|int == 6
|
- ansible_distribution in ['CentOS', 'RedHat', 'Amazon'] and ansible_distribution_major_version|int == 6
|
||||||
- wazuh_manager_config.cluster.disable != 'yes'
|
- wazuh_manager_config.cluster.disable != 'yes'
|
||||||
|
|||||||
@ -2,7 +2,7 @@
|
|||||||
# Wazuh Manager
|
# Wazuh Manager
|
||||||
- name: Check if Wazuh Manager is already installed
|
- name: Check if Wazuh Manager is already installed
|
||||||
stat:
|
stat:
|
||||||
path: /var/ossec/bin/ossec-control
|
path: "{{ wazuh_dir }}/bin/ossec-control"
|
||||||
register: wazuh_ossec_control
|
register: wazuh_ossec_control
|
||||||
|
|
||||||
- name: Installing Wazuh Manager from sources
|
- name: Installing Wazuh Manager from sources
|
||||||
|
|||||||
@ -33,7 +33,7 @@
|
|||||||
command: "openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:1825 -keyout sslmanager.key -out sslmanager.cert -subj /CN={{ wazuh_manager_fqdn }}/"
|
command: "openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:1825 -keyout sslmanager.key -out sslmanager.cert -subj /CN={{ wazuh_manager_fqdn }}/"
|
||||||
args:
|
args:
|
||||||
creates: sslmanager.cert
|
creates: sslmanager.cert
|
||||||
chdir: /var/ossec/etc/
|
chdir: "{{ wazuh_dir }}/etc/"
|
||||||
tags:
|
tags:
|
||||||
- config
|
- config
|
||||||
when: wazuh_manager_config.authd.ssl_agent_ca is not none
|
when: wazuh_manager_config.authd.ssl_agent_ca is not none
|
||||||
@ -41,7 +41,7 @@
|
|||||||
- name: Copy CA, SSL key and cert for authd
|
- name: Copy CA, SSL key and cert for authd
|
||||||
copy:
|
copy:
|
||||||
src: "{{ item }}"
|
src: "{{ item }}"
|
||||||
dest: "/var/ossec/etc/{{ item }}"
|
dest: "{{ wazuh_dir }}/etc/{{ item }}"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ wazuh_manager_config.authd.ssl_agent_ca }}"
|
- "{{ wazuh_manager_config.authd.ssl_agent_ca }}"
|
||||||
@ -80,7 +80,7 @@
|
|||||||
|
|
||||||
- name: Installing the local_rules.xml (default local_rules.xml)
|
- name: Installing the local_rules.xml (default local_rules.xml)
|
||||||
template: src=var-ossec-rules-local_rules.xml.j2
|
template: src=var-ossec-rules-local_rules.xml.j2
|
||||||
dest=/var/ossec/etc/rules/local_rules.xml
|
dest="{{ wazuh_dir }}/etc/rules/local_rules.xml"
|
||||||
owner=ossec
|
owner=ossec
|
||||||
group=ossec
|
group=ossec
|
||||||
mode=0640
|
mode=0640
|
||||||
@ -92,7 +92,7 @@
|
|||||||
|
|
||||||
- name: Adding local rules files
|
- name: Adding local rules files
|
||||||
copy: src="{{ wazuh_manager_config.ruleset.rules_path }}"
|
copy: src="{{ wazuh_manager_config.ruleset.rules_path }}"
|
||||||
dest=/var/ossec/etc/rules/
|
dest="{{ wazuh_dir }}/etc/rules/"
|
||||||
owner=ossec
|
owner=ossec
|
||||||
group=ossec
|
group=ossec
|
||||||
mode=0640
|
mode=0640
|
||||||
@ -104,7 +104,7 @@
|
|||||||
|
|
||||||
- name: Installing the local_decoder.xml
|
- name: Installing the local_decoder.xml
|
||||||
template: src=var-ossec-rules-local_decoder.xml.j2
|
template: src=var-ossec-rules-local_decoder.xml.j2
|
||||||
dest=/var/ossec/etc/decoders/local_decoder.xml
|
dest="{{ wazuh_dir }}/etc/decoders/local_decoder.xml"
|
||||||
owner=ossec
|
owner=ossec
|
||||||
group=ossec
|
group=ossec
|
||||||
mode=0640
|
mode=0640
|
||||||
@ -116,7 +116,7 @@
|
|||||||
|
|
||||||
- name: Adding local decoders files
|
- name: Adding local decoders files
|
||||||
copy: src="{{ wazuh_manager_config.ruleset.decoders_path }}"
|
copy: src="{{ wazuh_manager_config.ruleset.decoders_path }}"
|
||||||
dest=/var/ossec/etc/decoders/
|
dest="{{ wazuh_dir }}/etc/decoders/"
|
||||||
owner=ossec
|
owner=ossec
|
||||||
group=ossec
|
group=ossec
|
||||||
mode=0640
|
mode=0640
|
||||||
@ -129,11 +129,11 @@
|
|||||||
- name: Configure the shared-agent.conf
|
- name: Configure the shared-agent.conf
|
||||||
template:
|
template:
|
||||||
src: var-ossec-etc-shared-agent.conf.j2
|
src: var-ossec-etc-shared-agent.conf.j2
|
||||||
dest: /var/ossec/etc/shared/default/agent.conf
|
dest: "{{ wazuh_dir }}/etc/shared/default/agent.conf"
|
||||||
owner: ossec
|
owner: ossec
|
||||||
group: ossec
|
group: ossec
|
||||||
mode: 0640
|
mode: 0640
|
||||||
validate: '/var/ossec/bin/verify-agent-conf -f %s'
|
validate: "{{ wazuh_dir }}/bin/verify-agent-conf -f %s"
|
||||||
notify: restart wazuh-manager
|
notify: restart wazuh-manager
|
||||||
tags:
|
tags:
|
||||||
- init
|
- init
|
||||||
@ -143,7 +143,7 @@
|
|||||||
|
|
||||||
- name: Installing the api.yaml (api configuration)
|
- name: Installing the api.yaml (api configuration)
|
||||||
template: src=api.yaml.j2
|
template: src=api.yaml.j2
|
||||||
dest=/var/ossec/api/configuration/api.yaml
|
dest="{{ wazuh_dir }}/api/configuration/api.yaml"
|
||||||
owner=root
|
owner=root
|
||||||
group=ossec
|
group=ossec
|
||||||
mode=0640
|
mode=0640
|
||||||
@ -156,7 +156,7 @@
|
|||||||
|
|
||||||
- name: Installing the local_internal_options.conf
|
- name: Installing the local_internal_options.conf
|
||||||
template: src=var-ossec-etc-local-internal-options.conf.j2
|
template: src=var-ossec-etc-local-internal-options.conf.j2
|
||||||
dest=/var/ossec/etc/local_internal_options.conf
|
dest="{{ wazuh_dir }}/etc/local_internal_options.conf"
|
||||||
owner=root
|
owner=root
|
||||||
group=ossec
|
group=ossec
|
||||||
mode=0640
|
mode=0640
|
||||||
@ -186,9 +186,9 @@
|
|||||||
- name: Check if client-syslog is enabled
|
- name: Check if client-syslog is enabled
|
||||||
shell: |
|
shell: |
|
||||||
set -o pipefail
|
set -o pipefail
|
||||||
"grep -c 'ossec-csyslogd' /var/ossec/bin/.process_list | xargs echo"
|
"grep -c 'ossec-csyslogd' {{ wazuh_dir }}/bin/.process_list | xargs echo"
|
||||||
args:
|
args:
|
||||||
removes: /var/ossec/bin/.process_list
|
removes: "{{ wazuh_dir }}/bin/.process_list"
|
||||||
executable: /bin/bash
|
executable: /bin/bash
|
||||||
changed_when: false
|
changed_when: false
|
||||||
check_mode: false
|
check_mode: false
|
||||||
@ -197,7 +197,7 @@
|
|||||||
- config
|
- config
|
||||||
|
|
||||||
- name: Enable client-syslog
|
- name: Enable client-syslog
|
||||||
command: /var/ossec/bin/ossec-control enable client-syslog
|
command: "{{ wazuh_dir }}/bin/ossec-control enable client-syslog"
|
||||||
notify: restart wazuh-manager
|
notify: restart wazuh-manager
|
||||||
when:
|
when:
|
||||||
- csyslog_enabled.stdout == '0' or "skipped" in csyslog_enabled.stdout
|
- csyslog_enabled.stdout == '0' or "skipped" in csyslog_enabled.stdout
|
||||||
@ -208,9 +208,9 @@
|
|||||||
- name: Check if ossec-agentlessd is enabled
|
- name: Check if ossec-agentlessd is enabled
|
||||||
shell: |
|
shell: |
|
||||||
set -o pipefail
|
set -o pipefail
|
||||||
"grep -c 'ossec-agentlessd' /var/ossec/bin/.process_list | xargs echo"
|
"grep -c 'ossec-agentlessd' {{ wazuh_dir }}/bin/.process_list | xargs echo"
|
||||||
args:
|
args:
|
||||||
removes: /var/ossec/bin/.process_list
|
removes: "{{ wazuh_dir }}/bin/.process_list"
|
||||||
executable: /bin/bash
|
executable: /bin/bash
|
||||||
changed_when: false
|
changed_when: false
|
||||||
check_mode: false
|
check_mode: false
|
||||||
@ -219,7 +219,7 @@
|
|||||||
- config
|
- config
|
||||||
|
|
||||||
- name: Enable ossec-agentlessd
|
- name: Enable ossec-agentlessd
|
||||||
command: /var/ossec/bin/ossec-control enable agentless
|
command: "{{ wazuh_dir }}/bin/ossec-control enable agentless"
|
||||||
notify: restart wazuh-manager
|
notify: restart wazuh-manager
|
||||||
when:
|
when:
|
||||||
- agentlessd_enabled.stdout == '0' or "skipped" in agentlessd_enabled.stdout
|
- agentlessd_enabled.stdout == '0' or "skipped" in agentlessd_enabled.stdout
|
||||||
@ -239,7 +239,7 @@
|
|||||||
- name: Configure ossec.conf
|
- name: Configure ossec.conf
|
||||||
template:
|
template:
|
||||||
src: var-ossec-etc-ossec-server.conf.j2
|
src: var-ossec-etc-ossec-server.conf.j2
|
||||||
dest: /var/ossec/etc/ossec.conf
|
dest: "{{ wazuh_dir }}/etc/ossec.conf"
|
||||||
owner: root
|
owner: root
|
||||||
group: ossec
|
group: ossec
|
||||||
mode: 0644
|
mode: 0644
|
||||||
@ -251,7 +251,7 @@
|
|||||||
- name: Ossec-authd password
|
- name: Ossec-authd password
|
||||||
template:
|
template:
|
||||||
src: authd_pass.j2
|
src: authd_pass.j2
|
||||||
dest: "/var/ossec/etc/authd.pass"
|
dest: "{{ wazuh_dir }}/etc/authd.pass"
|
||||||
owner: ossec
|
owner: ossec
|
||||||
group: ossec
|
group: ossec
|
||||||
mode: 0640
|
mode: 0640
|
||||||
@ -268,16 +268,16 @@
|
|||||||
- name: Copy create_user script
|
- name: Copy create_user script
|
||||||
copy:
|
copy:
|
||||||
src: create_user.py
|
src: create_user.py
|
||||||
dest: /var/ossec/framework/scripts/create_user.py
|
dest: "{{ wazuh_dir }}/framework/scripts/create_user.py"
|
||||||
owner: root
|
owner: root
|
||||||
group: ossec
|
group: ossec
|
||||||
mode: 0644
|
mode: 0644
|
||||||
|
|
||||||
- name: Execute create_user script
|
- name: Execute create_user script
|
||||||
script:
|
script:
|
||||||
chdir: /var/ossec/framework/scripts/
|
chdir: "{{ wazuh_dir }}/framework/scripts/"
|
||||||
cmd: create_user.py --username "{{ item.username }}" --password "{{ item.password }}"
|
cmd: create_user.py --username "{{ item.username }}" --password "{{ item.password }}"
|
||||||
executable: /var/ossec/framework/python/bin/python3
|
executable: "{{ wazuh_dir }}/framework/python/bin/python3"
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ wazuh_api_users }}"
|
- "{{ wazuh_api_users }}"
|
||||||
|
|
||||||
@ -290,7 +290,7 @@
|
|||||||
- name: Agentless Hosts & Passwd
|
- name: Agentless Hosts & Passwd
|
||||||
template:
|
template:
|
||||||
src: agentless.j2
|
src: agentless.j2
|
||||||
dest: "/var/ossec/agentless/.passlist_tmp"
|
dest: "{{ wazuh_dir }}/agentless/.passlist_tmp"
|
||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: 0644
|
mode: 0644
|
||||||
@ -300,7 +300,7 @@
|
|||||||
- config
|
- config
|
||||||
|
|
||||||
- name: Encode the secret
|
- name: Encode the secret
|
||||||
shell: /usr/bin/base64 /var/ossec/agentless/.passlist_tmp > /var/ossec/agentless/.passlist && rm /var/ossec/agentless/.passlist_tmp
|
shell: "/usr/bin/base64 {{ wazuh_dir }}/agentless/.passlist_tmp > {{ wazuh_dir }}/agentless/.passlist && rm {{ wazuh_dir }}/agentless/.passlist_tmp"
|
||||||
when: agentless_creds is defined
|
when: agentless_creds is defined
|
||||||
tags:
|
tags:
|
||||||
- config
|
- config
|
||||||
@ -314,7 +314,7 @@
|
|||||||
- config
|
- config
|
||||||
|
|
||||||
- name: Create agent groups
|
- name: Create agent groups
|
||||||
command: "/var/ossec/bin/agent_groups -a -g {{ item }} -q"
|
command: "{{ wazuh_dir }}/bin/agent_groups -a -g {{ item }} -q"
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ agent_groups }}"
|
- "{{ agent_groups }}"
|
||||||
when:
|
when:
|
||||||
|
|||||||
@ -128,8 +128,8 @@
|
|||||||
<!-- Frequency that rootcheck is executed - every 12 hours -->
|
<!-- Frequency that rootcheck is executed - every 12 hours -->
|
||||||
<frequency>{{ wazuh_manager_config.rootcheck.frequency }}</frequency>
|
<frequency>{{ wazuh_manager_config.rootcheck.frequency }}</frequency>
|
||||||
|
|
||||||
<rootkit_files>/var/ossec/etc/rootcheck/rootkit_files.txt</rootkit_files>
|
<rootkit_files>{{ wazuh_dir }}/etc/rootcheck/rootkit_files.txt</rootkit_files>
|
||||||
<rootkit_trojans>/var/ossec/etc/rootcheck/rootkit_trojans.txt</rootkit_trojans>
|
<rootkit_trojans>{{ wazuh_dir }}/etc/rootcheck/rootkit_trojans.txt</rootkit_trojans>
|
||||||
|
|
||||||
<skip_nfs>yes</skip_nfs>
|
<skip_nfs>yes</skip_nfs>
|
||||||
</rootcheck>
|
</rootcheck>
|
||||||
@ -640,16 +640,16 @@
|
|||||||
<ciphers>{{wazuh_manager_config.authd.ciphers}}</ciphers>
|
<ciphers>{{wazuh_manager_config.authd.ciphers}}</ciphers>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if wazuh_manager_config.authd.ssl_agent_ca is not none %}
|
{% if wazuh_manager_config.authd.ssl_agent_ca is not none %}
|
||||||
<ssl_agent_ca>/var/ossec/etc/{{wazuh_manager_config.authd.ssl_agent_ca | basename}}</ssl_agent_ca>
|
<ssl_agent_ca>{{ wazuh_dir }}/etc/{{wazuh_manager_config.authd.ssl_agent_ca | basename}}</ssl_agent_ca>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if wazuh_manager_config.authd.ssl_verify_host is not none %}
|
{% if wazuh_manager_config.authd.ssl_verify_host is not none %}
|
||||||
<ssl_verify_host>{{wazuh_manager_config.authd.ssl_verify_host}}</ssl_verify_host>
|
<ssl_verify_host>{{wazuh_manager_config.authd.ssl_verify_host}}</ssl_verify_host>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if wazuh_manager_config.authd.ssl_manager_cert is not none %}
|
{% if wazuh_manager_config.authd.ssl_manager_cert is not none %}
|
||||||
<ssl_manager_cert>/var/ossec/etc/{{wazuh_manager_config.authd.ssl_manager_cert | basename}}</ssl_manager_cert>
|
<ssl_manager_cert>{{ wazuh_dir }}/etc/{{wazuh_manager_config.authd.ssl_manager_cert | basename}}</ssl_manager_cert>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if wazuh_manager_config.authd.ssl_manager_key is not none %}
|
{% if wazuh_manager_config.authd.ssl_manager_key is not none %}
|
||||||
<ssl_manager_key>/var/ossec/etc/{{wazuh_manager_config.authd.ssl_manager_key | basename}}</ssl_manager_key>
|
<ssl_manager_key>{{ wazuh_dir }}/etc/{{wazuh_manager_config.authd.ssl_manager_key | basename}}</ssl_manager_key>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if wazuh_manager_config.authd.ssl_auto_negotiate is not none %}
|
{% if wazuh_manager_config.authd.ssl_auto_negotiate is not none %}
|
||||||
<ssl_auto_negotiate>{{wazuh_manager_config.authd.ssl_auto_negotiate}}</ssl_auto_negotiate>
|
<ssl_auto_negotiate>{{wazuh_manager_config.authd.ssl_auto_negotiate}}</ssl_auto_negotiate>
|
||||||
|
|||||||
@ -94,7 +94,7 @@
|
|||||||
<frequency>{{ agent_config.rootcheck.frequency }}</frequency>
|
<frequency>{{ agent_config.rootcheck.frequency }}</frequency>
|
||||||
|
|
||||||
{% if agent_config.rootcheck.cis_distribution_filename is defined %}
|
{% if agent_config.rootcheck.cis_distribution_filename is defined %}
|
||||||
<system_audit>/var/ossec/etc/shared/default/{{ agent_config.rootcheck.cis_distribution_filename }}</system_audit>
|
<system_audit>{{ wazuh_dir }}/etc/shared/default/{{ agent_config.rootcheck.cis_distribution_filename }}</system_audit>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
<skip_nfs>yes</skip_nfs>
|
<skip_nfs>yes</skip_nfs>
|
||||||
</rootcheck>
|
</rootcheck>
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user