Install Elastic Stack with RPM packages

The RPM packages are suitable for installation on Red Hat, CentOS and other RPM-based systems.


Many of the commands described below need to be executed with root user privileges.


  1. Oracle Java JRE is required by Logstash and Elasticsearch.


The following command accepts the necessary cookies to download Oracle Java JRE. Please, visit Oracle Java 8 JRE Download Page for more information.

# curl -Lo jre-8-linux-x64.rpm --header "Cookie: oraclelicense=accept-securebackup-cookie" ""

Now check if the package was download successfully:

# rpm -qlp jre-8-linux-x64.rpm > /dev/null 2>&1 && echo "Java package downloaded successfully" || echo "Java package did not download successfully"

Finally, install the RPM package using yum:

# yum install jre-8-linux-x64.rpm
# rm jre-8-linux-x64.rpm
  1. Install the Elastic repository and its GPG key:

# rpm --import

# cat > /etc/yum.repos.d/elastic.repo << EOF
name=Elasticsearch repository for 6.x packages


Elasticsearch is a highly scalable full-text search and analytics engine. For more info please see Elasticsearch.

  1. Install the Elasticsearch package:

# yum install elasticsearch-6.1.0
  1. Enable and start the Elasticsearch service:

  1. For Systemd:

# systemctl daemon-reload
# systemctl enable elasticsearch.service
# systemctl start elasticsearch.service
  1. For SysV Init:

# chkconfig --add elasticsearch
# service elasticsearch start
  1. Load Wazuh Elasticsearch templates:

# curl | curl -XPUT 'http://localhost:9200/_template/wazuh' -H 'Content-Type: application/json' -d @-
# curl | curl -XPUT 'http://localhost:9200/_template/wazuh-agent' -H 'Content-Type: application/json' -d @-
  1. Insert sample alert:

# curl | curl -XPUT "http://localhost:9200/wazuh-alerts-3.x-"`date +%Y.%m.%d`"/wazuh/sample" -H 'Content-Type: application/json' -d @-


It is recommended to edit the default configuration to improve the Elasticsearch performance. To do so, please see Elasticsearch tuning.


Logstash is the tool that will collect, parse, and forward to Elasticsearch for indexing and storage all logs generated by Wazuh server. For more info please see Logstash.

  1. Install the Logstash package:

# yum install logstash-6.1.0
  1. Download the Wazuh config for Logstash:

  • Local configuration (only in a single-host architecture):

    # curl -so /etc/logstash/conf.d/01-wazuh.conf

    Because the Logstash user needs to read the alerts.json file, please add it to OSSEC group by running:

    # usermod -a -G ossec logstash
  • Remote configuration (only in a distributed architecture):

    # curl -so /etc/logstash/conf.d/01-wazuh.conf


Follow the next steps if you use CentOS-6/RHEL-6 or Amazon AMI (logstash uses Upstart like service manager and need to be fixed, see bug)

1) Edit the file /etc/logstash/startup.options and in the line 30 change the LS_GROUP=logstash to LS_GROUP=ossec.
2) Update the service with the new parameters run the command /usr/share/logstash/bin/system-install
3) Start Logstash again.
  1. Enable and start the Logstash service:

  1. For Systemd:

# systemctl daemon-reload
# systemctl enable logstash.service
# systemctl start logstash.service
  1. For SysV Init:

# chkconfig --add logstash
# service logstash start


If you are running Wazuh server and the Elastic Stack server on separate systems (distributed architecture), then it is important to configure encryption between Filebeat and Logstash. To do so, please see Setting up SSL for Filebeat and Logstash.


Kibana is a flexible and intuitive web interface for mining and visualizing the events and archives stored in Elasticsearch. More info at Kibana.

  1. Install the Kibana package:

# yum install kibana-6.1.0
  1. Install the Wazuh App plugin for Kibana:

2.1) Increase the default Node.js heap memory limit to prevent out of memory errors when installing the Wazuh App. Set the limit as follow:

# export NODE_OPTIONS="--max-old-space-size=3072"

2.2) Install Wazuh App:

# /usr/share/kibana/bin/kibana-plugin install


The Kibana plugin installation process may take several minutes. Please wait patiently.


If you want to download a different Wazuh App plugin for another version of Wazuh or the Elastic Stack, you can check the table available at GitHub and use the appropiate installation command.

  1. Optional. Kibana will listen only on the loopback interface (localhost) by default. To set up Kibana to listen on all interfaces, edit the file /etc/kibana/kibana.yml. Uncomment the setting and change the value to: ""


It is recommended to set up an Nginx proxy for Kibana in order to use SSL encryption and to enable authentication. Instructions to set the proxy up can be found at Setting up SSL and authentication for Kibana.

  1. Enable and start the Kibana service:

  1. For Systemd:

# systemctl daemon-reload
# systemctl enable kibana.service
# systemctl start kibana.service
  1. For SysV Init:

# chkconfig --add kibana
# service kibana start
  1. Disable the Elasticsearch repository:

We recommend to disable the Elasticsearch repository in order to prevent an upgrade to a newer Elastic Stack version due to possible breaking changes with our App, so you should do it as follow:

# sed -i "s/^enabled=1/enabled=0/" /etc/yum.repos.d/elastic.repo

Connecting the Wazuh App with the API

Follow the next guide in order to connect the Wazuh App with the API: