Merge pull request #708 from wazuh/732-config_yml

Wazuh cert gen tool update
This commit is contained in:
Alberto Rodríguez 2022-03-11 21:07:05 +01:00 committed by GitHub
commit e1eb62d8db
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 14 additions and 15 deletions

View File

@ -56,16 +56,16 @@ These playbooks install and configure Wazuh agent, manager and indexer and dashb
│ ├── playbooks │ ├── playbooks
│ │ ├── wazuh-agent.yml │ │ ├── wazuh-agent.yml
│ │ ├── wazuh-dashboard.yml
│ │ ├── wazuh-elastic.yml │ │ ├── wazuh-elastic.yml
│ │ ├── wazuh-elastic_stack-distributed.yml │ │ ├── wazuh-elastic_stack-distributed.yml
│ │ ├── wazuh-elastic_stack-single.yml │ │ ├── wazuh-elastic_stack-single.yml
│ │ ├── wazuh-indexer.yml
│ │ ├── wazuh-kibana.yml │ │ ├── wazuh-kibana.yml
│ │ ├── wazuh-manager-oss.yml │ │ ├── wazuh-manager-oss.yml
│ │ ├── wazuh-manager.yml │ │ ├── wazuh-manager.yml
│ │ ├── wazuh-opensearch-opensearch_dashboards.yml | | ├── wazuh-production-ready
| | ├── wazuh-opensearch-production-ready │ │ ├── wazuh-single.yml
│ │ ├── wazuh-opensearch-single.yml
│ │ ├── wazuh-opensearch.yml
│ ├── README.md │ ├── README.md
│ ├── VERSION │ ├── VERSION
@ -321,7 +321,7 @@ ansible_ssh_extra_args='-o StrictHostKeyChecking=no'
### Launching the playbook ### Launching the playbook
```bash ```bash
sudo ansible-playbook wazuh-opensearch-production-ready.yml -i inventory sudo ansible-playbook wazuh-production-ready.yml -i inventory
``` ```
After the playbook execution, the Wazuh UI should be reachable through `https://<dashboard_host>:5601` After the playbook execution, the Wazuh UI should be reachable through `https://<dashboard_host>:5601`
@ -389,7 +389,7 @@ ansible_ssh_extra_args='-o StrictHostKeyChecking=no'
### Launching the playbook ### Launching the playbook
```bash ```bash
sudo ansible-playbook wazuh-opensearch-single.yml -i inventory sudo ansible-playbook wazuh-single.yml -i inventory
``` ```
After the playbook execution, the Wazuh UI should be reachable through `https://<your server host>:5601` After the playbook execution, the Wazuh UI should be reachable through `https://<your server host>:5601`

View File

@ -12,5 +12,4 @@ server.ssl.enabled: true
server.ssl.key: "/etc/wazuh-dashboard/certs/{{ dashboard_node_name }}-key.pem" server.ssl.key: "/etc/wazuh-dashboard/certs/{{ dashboard_node_name }}-key.pem"
server.ssl.certificate: "/etc/wazuh-dashboard/certs/{{ dashboard_node_name }}.pem" server.ssl.certificate: "/etc/wazuh-dashboard/certs/{{ dashboard_node_name }}.pem"
opensearch.ssl.certificateAuthorities: ["/etc/wazuh-dashboard/certs/root-ca.pem"] opensearch.ssl.certificateAuthorities: ["/etc/wazuh-dashboard/certs/root-ca.pem"]
logging.dest: "/var/log/wazuh-dashboard/wazuh-dashboard.log"
uiSettings.overrides.defaultRoute: /app/wazuh?security_tenant=global uiSettings.overrides.defaultRoute: /app/wazuh?security_tenant=global

View File

@ -56,7 +56,7 @@ indexer_http_port: 9200
certs_gen_tool_version: 4.3 certs_gen_tool_version: 4.3
# Url of certificates generator tool # Url of certificates generator tool
certs_gen_tool_url: "https://packages.wazuh.com/resources/{{ certs_gen_tool_version }}/install_functions/opendistro/wazuh-cert-tool.sh" certs_gen_tool_url: "https://packages.wazuh.com/resources/{{ certs_gen_tool_version }}/wazuh-certs-tool.sh"
indexer_admin_password: changeme indexer_admin_password: changeme
dashboard_password: changeme dashboard_password: changeme

View File

@ -1,6 +1,6 @@
nodes: nodes:
# Elasticsearch server nodes # Indexer server nodes
elasticsearch: indexer:
{% for (key,value) in instances.items() %} {% for (key,value) in instances.items() %}
{% if (value.role is defined and value.role == 'indexer') %} {% if (value.role is defined and value.role == 'indexer') %}
name: {{ value.name }} name: {{ value.name }}
@ -10,7 +10,7 @@ nodes:
# Wazuh server nodes # Wazuh server nodes
# Use node_type only with more than one Wazuh manager # Use node_type only with more than one Wazuh manager
wazuh_servers: server:
{% for (key,value) in instances.items() %} {% for (key,value) in instances.items() %}
{% if (value.role is defined and value.role == 'wazuh') %} {% if (value.role is defined and value.role == 'wazuh') %}
name: {{ value.name }} name: {{ value.name }}
@ -23,8 +23,8 @@ nodes:
{% endif %} {% endif %}
{% endfor %} {% endfor %}
# Kibana node # Dashboard node
kibana: dashboard:
{% for (key,value) in instances.items() %} {% for (key,value) in instances.items() %}
{% if (value.role is defined and value.role == 'dashboard') %} {% if (value.role is defined and value.role == 'dashboard') %}
name: {{ value.name }} name: {{ value.name }}

View File

@ -42,12 +42,12 @@ plugins.security.ssl.transport.resolve_hostname: false
plugins.security.audit.type: internal_opensearch plugins.security.audit.type: internal_opensearch
plugins.security.authcz.admin_dn: plugins.security.authcz.admin_dn:
- "CN=admin,OU=Docu,O=Wazuh,L=California,C=US" - "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
plugins.security.check_snapshot_restore_write_privileges: true plugins.security.check_snapshot_restore_write_privileges: true
plugins.security.enable_snapshot_restore_privilege: true plugins.security.enable_snapshot_restore_privilege: true
plugins.security.nodes_dn: plugins.security.nodes_dn:
{% for (key,value) in instances.items() %} {% for (key,value) in instances.items() %}
- "CN={{ value.name }},OU=Docu,O=Wazuh,L=California,C=US" - "CN={{ value.name }},OU=Wazuh,O=Wazuh,L=California,C=US"
{% endfor %} {% endfor %}
plugins.security.restapi.roles_enabled: plugins.security.restapi.roles_enabled:
- "all_access" - "all_access"