Updating wazuh-agent & wazuh-manager tasks

This commit is contained in:
Miguelangel Freitas 2017-05-18 06:23:49 -04:00
parent 8c6dbff5db
commit d7b91ad7aa
28 changed files with 228 additions and 308 deletions

View File

@ -27,6 +27,7 @@
apt: apt:
name: oracle-java8-installer name: oracle-java8-installer
state: present state: present
tags: install
- name: Debian/Ubuntu | Add Elasticsearch GPG key. - name: Debian/Ubuntu | Add Elasticsearch GPG key.
apt_key: apt_key:
@ -44,3 +45,4 @@
apt: apt:
name: elasticsearch={{ elk_stack_version }} name: elasticsearch={{ elk_stack_version }}
state: present state: present
tags: install

View File

@ -11,6 +11,7 @@
action: "yum name=/tmp/jdk-8-linux-x64.rpm state=present" action: "yum name=/tmp/jdk-8-linux-x64.rpm state=present"
when: not oracle_java_task_rpm_download|skipped when: not oracle_java_task_rpm_download|skipped
become: yes become: yes
tags: install
- name: RedHat | Add Elasticsearch GPG key - name: RedHat | Add Elasticsearch GPG key
rpm_key: rpm_key:
@ -27,3 +28,4 @@
- name: RedHat | Install Elasticsarch - name: RedHat | Install Elasticsarch
yum: pkg=elasticsearch-{{ elk_stack_version }} state=present yum: pkg=elasticsearch-{{ elk_stack_version }} state=present
tags: install

View File

@ -13,6 +13,7 @@
group: elasticsearch group: elasticsearch
mode: 0660 mode: 0660
notify: restart elasticsearch notify: restart elasticsearch
tags: configure
- name: Configure Elasticsearch JVM memmory. - name: Configure Elasticsearch JVM memmory.
template: template:
@ -22,9 +23,7 @@
group: elasticsearch group: elasticsearch
mode: 0660 mode: 0660
notify: restart elasticsearch notify: restart elasticsearch
tags: configure
- name: Start Elasticsearch.
service: name=elasticsearch state=started enabled=yes
- name: Ensure Elasticsearch started and enabled - name: Ensure Elasticsearch started and enabled
service: service:

View File

@ -7,12 +7,14 @@
group: root group: root
mode: 0644 mode: 0644
notify: restart filebeat notify: restart filebeat
tags: configure
- name: Ensure Filebeat SSL key pair directory exists. - name: Ensure Filebeat SSL key pair directory exists.
file: file:
path: "{{ filebeat_ssl_dir }}" path: "{{ filebeat_ssl_dir }}"
state: directory state: directory
when: filebeat_ssl_key_file when: filebeat_ssl_key_file
tags: configure
- name: Copy SSL key and cert for filebeat. - name: Copy SSL key and cert for filebeat.
copy: copy:
@ -24,3 +26,4 @@
- "{{ filebeat_ssl_certificate_file }}" - "{{ filebeat_ssl_certificate_file }}"
notify: restart filebeat notify: restart filebeat
when: filebeat_ssl_key_file and filebeat_ssl_certificate_file when: filebeat_ssl_key_file and filebeat_ssl_certificate_file
tags: configure

View File

@ -7,6 +7,8 @@
- name: Install Filebeat. - name: Install Filebeat.
package: name=filebeat state=present package: name=filebeat state=present
tags:
- install
- include: config.yml - include: config.yml
when: filebeat_create_config when: filebeat_create_config

View File

@ -15,3 +15,4 @@
apt: apt:
name: kibana={{ elk_stack_version }} name: kibana={{ elk_stack_version }}
state: present state: present
tags: install

View File

@ -14,3 +14,4 @@
- name: RedHat | Install Kibana - name: RedHat | Install Kibana
yum: pkg=kibana-{{ elk_stack_version }} state=present yum: pkg=kibana-{{ elk_stack_version }} state=present
tags: install

View File

@ -7,6 +7,7 @@
- name: Make sure Elasticsearch is running before proceeding. - name: Make sure Elasticsearch is running before proceeding.
wait_for: host={{ elasticsearch_network_host }} port={{ elasticsearch_http_port }} delay=3 timeout=300 wait_for: host={{ elasticsearch_network_host }} port={{ elasticsearch_http_port }} delay=3 timeout=300
tags: configure
- name: Kibana configuration - name: Kibana configuration
template: template:
@ -16,6 +17,7 @@
group: root group: root
mode: 0664 mode: 0664
notify: restart kibana notify: restart kibana
tags: configure
- name: Checking Wazuh-APP version compatibility - name: Checking Wazuh-APP version compatibility
shell: grep -E 'version.*{{ elk_stack_version }}' /usr/share/kibana/plugins/wazuh/package.json shell: grep -E 'version.*{{ elk_stack_version }}' /usr/share/kibana/plugins/wazuh/package.json
@ -23,15 +25,18 @@
register: wazuh_app_notok register: wazuh_app_notok
ignore_errors: yes ignore_errors: yes
changed_when: "wazuh_app_notok.rc != 0" changed_when: "wazuh_app_notok.rc != 0"
tags: install
- name: Removing Wazuh-APP by compatibility issues - name: Removing Wazuh-APP by compatibility issues
shell: /usr/share/kibana/bin/kibana-plugin remove wazuh shell: /usr/share/kibana/bin/kibana-plugin remove wazuh
when: wazuh_app_notok.rc != 0 when: wazuh_app_notok.rc != 0
tags: install
- name: Install Wazuh-APP (can take a while) - name: Install Wazuh-APP (can take a while)
shell: /usr/share/kibana/bin/kibana-plugin install https://packages.wazuh.com/wazuhapp/wazuhapp-2.0_{{ elk_stack_version }}.zip shell: /usr/share/kibana/bin/kibana-plugin install https://packages.wazuh.com/wazuhapp/wazuhapp-2.0_{{ elk_stack_version }}.zip
creates=/usr/share/kibana/plugins/wazuh/package.json creates=/usr/share/kibana/plugins/wazuh/package.json
notify: restart kibana notify: restart kibana
tags: install
- name: Ensure Kibana started and enabled - name: Ensure Kibana started and enabled
service: service:

View File

@ -28,6 +28,7 @@
name: oracle-java8-installer name: oracle-java8-installer
update_cache: yes update_cache: yes
state: present state: present
tags: install
- name: Debian/Ubuntu | Add Elasticsearch GPG key - name: Debian/Ubuntu | Add Elasticsearch GPG key
apt_key: apt_key:
@ -45,3 +46,4 @@
apt: apt:
name: logstash=1:{{ elk_stack_version }}-1 name: logstash=1:{{ elk_stack_version }}-1
state: present state: present
tags: install

View File

@ -26,5 +26,5 @@
gpgcheck: yes gpgcheck: yes
- name: RedHat | Install Logstash - name: RedHat | Install Logstash
yum: pkg=logstash-{{ elk_stack_version }} yum: pkg=logstash-{{ elk_stack_version }} state=present
state=present tags: install

View File

@ -12,6 +12,7 @@
owner: root owner: root
group: root group: root
notify: restart logstash notify: restart logstash
tags: configure
- name: Logstash template - name: Logstash template
template: template:
@ -20,6 +21,7 @@
owner: root owner: root
group: root group: root
notify: restart logstash notify: restart logstash
tags: configure
- name: Ensure Logstash started and enabled - name: Ensure Logstash started and enabled
service: service:

View File

@ -2,3 +2,44 @@
ossec_server_ip: 127.0.0.1 ossec_server_ip: 127.0.0.1
ossec_server_name: "" ossec_server_name: ""
ossec_managed_server: true ossec_managed_server: true
ossec_agent_config:
frequency_check: 43200
syscheck_scan_on_start: 'yes'
ignore_files:
- /etc/mtab
- /etc/mnttab
- /etc/hosts.deny
- /etc/mail/statistics
- /etc/random-seed
- /etc/random.seed
- /etc/adjtime
- /etc/httpd/logs
- /etc/utmpx
- /etc/wtmpx
- /etc/cups/certs
- /etc/dumpdates
- /etc/svc/volatile
no_diff:
- /etc/ssl/private.key
directories:
- check_all: 'yes'
dirs: /etc,/usr/bin,/usr/sbin
- check_all: 'yes'
dirs: /bin,/sbin
localfiles:
- format: 'syslog'
location: '/var/log/messages'
- format: 'syslog'
location: '/var/log/secure'
- format: 'command'
command: 'df -P'
frequency: '360'
- format: 'full_command'
command: 'netstat -tln | grep -v 127.0.0.1 | sort'
frequency: '360'
- format: 'full_command'
command: 'last -n 20'
frequency: '360'
globals:
- '127.0.0.1'
- '192.168.2.1'

View File

@ -15,11 +15,7 @@
apt_repository: apt_repository:
repo: deb https://packages.wazuh.com/apt {{ ansible_distribution_release }} main repo: deb https://packages.wazuh.com/apt {{ ansible_distribution_release }} main
state: present state: present
register: wazuh_repo update_cache: yes
- name: Update apt cache if repo was added.
apt: update_cache=yes
when: wazuh_repo.changed
- name: Set Distribution CIS filename for debian - name: Set Distribution CIS filename for debian
set_fact: set_fact:

View File

@ -1,43 +0,0 @@
---
# vars file for ossec-agent
ossec_agent_config:
frequency_check: 43200
syscheck_scan_on_start: 'yes'
ignore_files:
- /etc/mtab
- /etc/mnttab
- /etc/hosts.deny
- /etc/mail/statistics
- /etc/random-seed
- /etc/random.seed
- /etc/adjtime
- /etc/httpd/logs
- /etc/utmpx
- /etc/wtmpx
- /etc/cups/certs
- /etc/dumpdates
- /etc/svc/volatile
no_diff:
- /etc/ssl/private.key
directories:
- check_all: 'yes'
dirs: /etc,/usr/bin,/usr/sbin
- check_all: 'yes'
dirs: /bin,/sbin
localfiles:
- format: 'syslog'
location: '/var/log/messages'
- format: 'syslog'
location: '/var/log/secure'
- format: 'command'
command: 'df -P'
frequency: '360'
- format: 'full_command'
command: 'netstat -tln | grep -v 127.0.0.1 | sort'
frequency: '360'
- format: 'full_command'
command: 'last -n 20'
frequency: '360'
globals:
- '127.0.0.1'
- '192.168.2.1'

View File

@ -1,6 +1,114 @@
--- ---
# defaults file for ossec-server
#
ossec_server_config: []
ossec_agent_configs: []
ossec_server_fqdn: "ossec-server" ossec_server_fqdn: "ossec-server"
ossec_server_config:
email_notification: no
mail_to:
- admin@example.net
mail_smtp_server: localhost
mail_from: ossec@example.com
frequency_check: 43200
syscheck_scan_on_start: 'yes'
log_level: 1
email_level: 12
ignore_files:
- /etc/mtab
- /etc/mnttab
- /etc/hosts.deny
- /etc/mail/statistics
- /etc/random-seed
- /etc/random.seed
- /etc/adjtime
- /etc/httpd/logs
- /etc/utmpx
- /etc/wtmpx
- /etc/cups/certs
- /etc/dumpdates
- /etc/svc/volatile
no_diff:
- /etc/ssl/private.key
directories:
- check_all: 'yes'
dirs: /etc,/usr/bin,/usr/sbin
- check_all: 'yes'
dirs: /bin,/sbin
localfiles:
- format: 'syslog'
location: '/var/log/messages'
- format: 'syslog'
location: '/var/log/secure'
- format: 'command'
command: 'df -P'
frequency: '360'
- format: 'full_command'
command: 'netstat -tln | grep -v 127.0.0.1 | sort'
frequency: '360'
- format: 'full_command'
command: 'last -n 20'
frequency: '360'
globals:
- '127.0.0.1'
- '192.168.2.1'
connection:
- type: 'secure'
port: '1514'
protocol: 'tcp'
commands:
- name: 'disable-account'
executable: 'disable-account.sh'
expect: 'user'
timeout_allowed: 'yes'
- name: 'restart-ossec'
executable: 'restart-ossec.sh'
expect: ''
timeout_allowed: 'no'
- name: 'firewall-drop'
executable: 'firewall-drop.sh'
expect: 'srcip'
timeout_allowed: 'yes'
- name: 'host-deny'
executable: 'host-deny.sh'
expect: 'srcip'
timeout_allowed: 'yes'
- name: 'route-null'
executable: 'route-null.sh'
expect: 'srcip'
timeout_allowed: 'yes'
- name: 'win_route-null'
executable: 'route-null.cmd'
expect: 'srcip'
timeout_allowed: 'yes'
active_responses:
- command: 'host-deny'
location: 'local'
level: 6
timeout: 600
ossec_agent_configs:
- type: os
type_value: linux
frequency_check: 79200
ignore_files:
- /etc/mtab
- /etc/mnttab
- /etc/hosts.deny
- /etc/mail/statistics
- /etc/svc/volatile
directories:
- check_all: yes
dirs: /etc,/usr/bin,/usr/sbin
- check_all: yes
dirs: /bin,/sbin
localfiles:
- format: 'syslog'
location: '/var/log/messages'
- format: 'syslog'
location: '/var/log/secure'
- format: 'syslog'
location: '/var/log/maillog'
- format: 'apache'
location: '/var/log/httpd/error_log'
- format: 'apache'
location: '/var/log/httpd/access_log'
- format: 'apache'
location: '/var/ossec/logs/active-responses.log'

View File

@ -3,34 +3,24 @@
apt: pkg=apt-transport-https apt: pkg=apt-transport-https
state=present state=present
update_cache=yes update_cache=yes
cache_valid_time=3600
- name: Debian/Ubuntu | Installing Wazuh repository key - name: Debian/Ubuntu | Installing Wazuh repository key
apt_key: url=https://packages.wazuh.com/key/GPG-KEY-WAZUH apt_key: url=https://packages.wazuh.com/key/GPG-KEY-WAZUH
- name: Add Wazuh epositories. - name: Add Wazuh repositories.
apt_repository: apt_repository:
repo: deb https://packages.wazuh.com/apt {{ ansible_distribution_release }} main repo: deb https://packages.wazuh.com/apt {{ ansible_distribution_release }} main
state: present state: present
register: wazuh_repo update_cache: yes
- name: Debian/Ubuntu | Installing NodeJS repository key - name: Debian/Ubuntu | Installing NodeJS repository key
apt_key: url=https://deb.nodesource.com/gpgkey/nodesource.gpg.key apt_key: url=https://deb.nodesource.com/gpgkey/nodesource.gpg.key
- name: Add NodeSource repositories for Node.js. - name: Add NodeSource repositories for Node.js.
apt_repository: apt_repository:
repo: "{{ item }}" repo: deb https://deb.nodesource.com/node_6.x {{ ansible_distribution_release }} main
state: present state: present
with_items: update_cache: yes
- deb https://deb.nodesource.com/node_6.x {{ ansible_distribution_release }} main
- deb-src https://deb.nodesource.com/node_6.x {{ ansible_distribution_release }} main
register: node_repo
- name: Update apt cache if repo was added.
apt: update_cache=yes
when:
- node_repo.changed
- wazuh_repo.changed
- name: Debian/Ubuntu | Install wazuh-manager - name: Debian/Ubuntu | Install wazuh-manager
apt: pkg={{ item }} apt: pkg={{ item }}
@ -40,6 +30,7 @@
with_items: with_items:
- wazuh-manager - wazuh-manager
- wazuh-api - wazuh-api
- expect
tags: tags:
- init - init

View File

@ -7,13 +7,5 @@
- name: Remove Nodejs repository. - name: Remove Nodejs repository.
apt_repository: apt_repository:
repo: deb-src https://deb.nodesource.com/node_6.x {{ ansible_distribution_release }} main repo: deb https://deb.nodesource.com/node_6.x {{ ansible_distribution_release }} main
- deb https://deb.nodesource.com/node_6.x {{ ansible_distribution_release }} main
- deb-src https://deb.nodesource.com/node_6.x {{ ansible_distribution_release }} main
- deb https://packages.wazuh.com/apt {{ ansible_distribution_release }} main
state: absent
- name: Remove Nodejs repository.
apt_repository:
repo: deb https://packages.wazuh.com/apt {{ ansible_distribution_release }} main
state: absent state: absent

View File

@ -33,6 +33,7 @@
with_items: with_items:
- wazuh-manager - wazuh-manager
- wazuh-api - wazuh-api
- expect
tags: tags:
- init - init

View File

@ -8,7 +8,6 @@
include: "Debian.yml" include: "Debian.yml"
when: ansible_os_family == "Debian" when: ansible_os_family == "Debian"
- name: Generate SSL files - name: Generate SSL files
command: "openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:1825 -keyout sslmanager.key -out sslmanager.cert -subj /CN={{ossec_server_fqdn}}/" command: "openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:1825 -keyout sslmanager.key -out sslmanager.cert -subj /CN={{ossec_server_fqdn}}/"
args: args:
@ -70,7 +69,7 @@
register: agentless_running register: agentless_running
changed_when: False changed_when: False
- name: Enable client-syslog if not running and ossec_server_config.syslog_outputs is given - name: Enable ossec-agentlessd
command: /var/ossec/bin/ossec-control enable agentless command: /var/ossec/bin/ossec-control enable agentless
when: agentless_running.stdout == '0' and ossec_server_config.agentless is defined when: agentless_running.stdout == '0' and ossec_server_config.agentless is defined
@ -78,6 +77,12 @@
command: /var/ossec/bin/ossec-control start agentless command: /var/ossec/bin/ossec-control start agentless
when: agentless_running.stdout == '0' and ossec_server_config.agentless is defined when: agentless_running.stdout == '0' and ossec_server_config.agentless is defined
- name: Retrieving Agentless Credentials
include_vars: agentless_creeds.yml
- name: Retrieving Wazuh-api User Credentials
include_vars: wazuh_api_creds.yml
- name: Configure ossec.conf - name: Configure ossec.conf
template: src=var-ossec-etc-ossec-server.conf.j2 template: src=var-ossec-etc-ossec-server.conf.j2
dest=/var/ossec/etc/ossec.conf dest=/var/ossec/etc/ossec.conf
@ -109,10 +114,6 @@
- init - init
- config - config
- name: Import api_user secret variable file
include_vars: "api_user.yml"
no_log: true
- name: Wazuh-api User - name: Wazuh-api User
template: template:
src: api_user.j2 src: api_user.j2
@ -122,12 +123,9 @@
mode: 0750 mode: 0750
no_log: true no_log: true
notify: restart wazuh-api notify: restart wazuh-api
when: wazuh_api_user is defined
- name: Import agentless secret variable file - name: Agentless Hosts & Passwd
include_vars: "agentless.yml"
no_log: true
- name: Agentless Credentials
template: template:
src: agentless.j2 src: agentless.j2
dest: "/var/ossec/agentless/.passlist_tmp" dest: "/var/ossec/agentless/.passlist_tmp"
@ -135,11 +133,11 @@
group: root group: root
mode: 0644 mode: 0644
no_log: true no_log: true
when: agentless_passlist is defined when: agentless_creeds is defined
- name: Encode the secret - name: Encode the secret
shell: /usr/bin/base64 /var/ossec/agentless/.passlist_tmp > /var/ossec/agentless/.passlist && rm /var/ossec/agentless/.passlist_tmp shell: /usr/bin/base64 /var/ossec/agentless/.passlist_tmp > /var/ossec/agentless/.passlist && rm /var/ossec/agentless/.passlist_tmp
when: agentless_passlist is defined when: agentless_creeds is defined
- name: Ensure Wazuh Manager, wazuh api and ossec-authd service is started and enabled - name: Ensure Wazuh Manager, wazuh api and ossec-authd service is started and enabled
service: service:

View File

@ -1,3 +1,3 @@
{% for agentless in agentless_passlist %} {% for agentless in agentless_creeds %}
{{ agentless.host }}|{{ agentless.passwd }} {{ agentless.host }}|{{ agentless.passwd }}
{% endfor %} {% endfor %}

View File

@ -1,3 +1,3 @@
{% for user in api_user %} {% for user in wazuh_api_user %}
{{ user }} {{ user }}
{% endfor %} {% endfor %}

View File

@ -8,11 +8,11 @@
<global> <global>
<jsonout_output>yes</jsonout_output> <jsonout_output>yes</jsonout_output>
<alerts_log>yes</alerts_log> <alerts_log>yes</alerts_log>
{% if ossec_server_config.email_notification is not defined or ossec_server_config.email_notification | lower == "yes" %} {% if ossec_server_config.email_notification | lower == "yes" %}
<email_notification>yes</email_notification> <email_notification>yes</email_notification>
{% for to in ossec_server_config.mail_to %} {% for to in ossec_server_config.mail_to %}
<email_to>{{ to }}</email_to> <email_to>{{ to }}</email_to>
{% endfor %} {% endfor %}
<smtp_server>{{ ossec_server_config.mail_smtp_server }}</smtp_server> <smtp_server>{{ ossec_server_config.mail_smtp_server }}</smtp_server>
<email_from>{{ ossec_server_config.mail_from }}</email_from> <email_from>{{ ossec_server_config.mail_from }}</email_from>
{% else %} {% else %}
@ -147,8 +147,8 @@
</wodle> </wodle>
{% endif %} {% endif %}
{% if ossec_server_config.agentless is defined %} {% if agentless_creeds is defined %}
{% for agentless in ossec_server_config.agentless %} {% for agentless in agentless_creeds %}
<agentless> <agentless>
<type>{{ agentless.type }}</type> <type>{{ agentless.type }}</type>
<frequency>{{ agentless.frequency }}</frequency> <frequency>{{ agentless.frequency }}</frequency>

View File

@ -1,65 +1,18 @@
<!-- @(#) $Id: ./etc/rules/local_rules.xml, 2011/09/08 dcid Exp $ <!-- Local rules -->
- Example of local rules for OSSEC.
-
- Copyright (C) 2009 Trend Micro Inc.
- All rights reserved.
-
- This program is a free software; you can redistribute it
- and/or modify it under the terms of the GNU General Public
- License (version 2) as published by the FSF - Free Software
- Foundation.
-
- License details: http://www.ossec.net/en/licensing.html
-->
<!-- Modify it at your will. --> <!-- Modify it at your will. -->
<group name="local,syslog,"> <!-- Example -->
<group name="local,syslog,sshd,">
<!--
<rule id="5703" level="10" frequency="10" timeframe="360" overwrite="yes"> Dec 10 01:02:02 host sshd[1234]: Failed none for root from 1.1.1.1 port 1066 ssh2
<if_matched_sid>5702</if_matched_sid>
<description>sshd: Possible breakin attempt </description>
<description>(high number of reverse lookup errors).</description>
<group>pci_dss_11.4,</group>
</rule>
<!-- Note that rule id 5711 is defined at the ssh_rules file
- as a ssh failed login. This is just an example
- since ip 1.1.1.1 shouldn't be used anywhere.
- Level 0 means ignore.
--> -->
<rule id="100001" level="0"> <rule id="100001" level="5">
<if_sid>5711</if_sid> <if_sid>5716</if_sid>
<srcip>1.1.1.1</srcip> <srcip>1.1.1.1</srcip>
<description>Example of rule that will ignore sshd </description> <description>sshd: authentication failed from IP 1.1.1.1.</description>
<description>failed logins from IP 1.1.1.1.</description> <group>authentication_failed,pci_dss_10.2.4,pci_dss_10.2.5,</group>
</rule> </rule>
</group>
<!-- This example will ignore ssh failed logins for the user name XYZABC.
-->
<!--
<rule id="100020" level="0" >
<if_sid>5711</if_sid>
<user>XYZABC</user>
<description>Example of rule that will ignore sshd </description>
<description>failed logins for user XYZABC.</description>
</rule>
-->
<!-- Specify here a list of rules to ignore. -->
<!--
<rule id="100030" level="0">
<if_sid>12345, 23456, xyz, abc</if_sid>
<description>List of rules to be ignored.</description>
</rule>
-->
</group> <!-- SYSLOG,LOCAL -->
<!-- EOF -->

View File

@ -1,11 +0,0 @@
$ANSIBLE_VAULT;1.1;AES256
65316634333362393962623133616234373639323463366332336331373337313066393962333231
3931646633633136653736666533346562353435336333360a306161343039363533623766393264
30323539616462636238393861386463366434636333323361623035393038663263633964353335
3432363337386631630a313835643062363666356464663130353533386234383430356633303037
61653338636435626464353031333865646165663635303030396131366565303439353039303831
37636462383933306138663130353966666162356435323862376635333635303931333765663335
38336634396236336239636330626638303865373565653262616563613336353838303931316464
37666634633131343537396565376265633064353835656639303962643735376564623935356466
66623837356137326635613132383834663436366635396234333965393338383565393938393331
3062373862333862323138373637653531373262346139323732

View File

@ -0,0 +1,8 @@
# Be sure you encrypt this file with ansible-vault.
# agentless_creeds:
# - type: ssh_integrity_check_linux
# frequency: 3600
# host: root@example.net
# state: periodic
# arguments: '/bin /etc/ /sbin'
# passwd: qwerty

View File

@ -1,11 +0,0 @@
$ANSIBLE_VAULT;1.1;AES256
30626565633363656662393332653964653565376238633538323230333934613934323231343262
6130313831653766333463653765643336313864373934620a646139336334346165346163633262
36333031313434623439663839323036323533623235653536376534636137636334396233636236
6238653531316136620a633361333130313335393333313861316233623037306131653733623661
37363163346361366631623530323166373861623366633633396164326331376664666665646236
64333738326538303063653266623930613130383637663864336664646361663935343231383965
34303734333031373161376435373538613262373037386430333933383639323965356336383563
34666431343136376132633632393938653965613236396333626430643538353533313131353338
37373138396435623230306262303934396164303238346563363230663032316334613262336235
3235313265333561366130393966643632333735623761643261

View File

@ -1,125 +0,0 @@
ossec_server_config:
mail_to:
- victor@wazuh.com
mail_smtp_server: localhost
mail_from: ossec@example.com
frequency_check: 43200
syscheck_scan_on_start: 'yes'
ignore_files:
- /etc/mtab
- /etc/mnttab
- /etc/hosts.deny
- /etc/mail/statistics
- /etc/random-seed
- /etc/random.seed
- /etc/adjtime
- /etc/httpd/logs
- /etc/utmpx
- /etc/wtmpx
- /etc/cups/certs
- /etc/dumpdates
- /etc/svc/volatile
no_diff:
- /etc/ssl/private.key
directories:
- check_all: 'yes'
dirs: /etc,/usr/bin,/usr/sbin
- check_all: 'yes'
dirs: /bin,/sbin
agentless:
- type: ssh_integrity_check_linux
frequency: 36000
host: root@example.net
state: periodic
arguments: '/bin /etc/ /sbin'
- type: ssh_integrity_check_linux
frequency: 36000
host: root@example.net
state: periodic
arguments: '/bin /etc/ /sbin'
- type: ssh_integrity_check_linux
frequency: 36000
host: root@example.net
state: periodic
localfiles:
- format: 'syslog'
location: '/var/log/messages'
- format: 'syslog'
location: '/var/log/secure'
- format: 'command'
command: 'df -P'
frequency: '360'
- format: 'full_command'
command: 'netstat -tln | grep -v 127.0.0.1 | sort'
frequency: '360'
- format: 'full_command'
command: 'last -n 20'
frequency: '360'
globals:
- '127.0.0.1'
- '192.168.2.1'
connection:
- type: 'secure'
port: '1514'
protocol: 'tcp'
log_level: 1
email_level: 12
commands:
- name: 'disable-account'
executable: 'disable-account.sh'
expect: 'user'
timeout_allowed: 'yes'
- name: 'restart-ossec'
executable: 'restart-ossec.sh'
expect: ''
timeout_allowed: 'no'
- name: 'firewall-drop'
executable: 'firewall-drop.sh'
expect: 'srcip'
timeout_allowed: 'yes'
- name: 'host-deny'
executable: 'host-deny.sh'
expect: 'srcip'
timeout_allowed: 'yes'
- name: 'route-null'
executable: 'route-null.sh'
expect: 'srcip'
timeout_allowed: 'yes'
- name: 'win_route-null'
executable: 'route-null.cmd'
expect: 'srcip'
timeout_allowed: 'yes'
active_responses:
- command: 'host-deny'
location: 'local'
level: 6
timeout: 600
ossec_agent_configs:
- type: os
type_value: linux
frequency_check: 79200
ignore_files:
- /etc/mtab
- /etc/mnttab
- /etc/hosts.deny
- /etc/mail/statistics
- /etc/svc/volatile
directories:
- check_all: yes
dirs: /etc,/usr/bin,/usr/sbin
- check_all: yes
dirs: /bin,/sbin
localfiles:
- format: 'syslog'
location: '/var/log/messages'
- format: 'syslog'
location: '/var/log/secure'
- format: 'syslog'
location: '/var/log/maillog'
- format: 'apache'
location: '/var/log/httpd/error_log'
- format: 'apache'
location: '/var/log/httpd/access_log'
- format: 'apache'
location: '/var/ossec/logs/active-responses.log'

View File

@ -0,0 +1,3 @@
# Be sure you encrypt this file with ansible-vault
wazuh_api_user:
- foo:$apr1$/axqZYWQ$Xo/nz/IG3PdwV82EnfYKh/