Install Wazuh Manager

Once the Ansible repository has been cloned, we proceed to install the Wazuh server, that is, we will install a Wazuh manager, Wazuh API and Filebeat.

  1. Access to wazuh-ansible

  2. Preparing the playbook

  3. Running the playbook

1 - Access to wazuh-ansible

1.1 - We access the directory where we have cloned the repository from our Ansible server.

ansible@ansible:/etc/ansible/roles/wazuh-ansible$ ls
CHANGELOG.md  playbooks  README.md  roles  VERSION

We can see the roles we have.

ansible@ansible:/etc/ansible/roles/wazuh-ansible$ tree roles -d
roles
├── ansible-galaxy
│   └── meta
├── elastic-stack
│   ├── ansible-elasticsearch
│   │   ├── defaults
│   │   ├── handlers
│   │   ├── meta
│   │   ├── tasks
│   │   └── templates
│   └── ansible-kibana
│       ├── defaults
│       ├── handlers
│       ├── meta
│       ├── tasks
│       └── templates
└── wazuh
    ├── ansible-filebeat
    │   ├── defaults
    │   ├── handlers
    │   ├── meta
    │   ├── tasks
    │   ├── templates
    │   └── tests
    ├── ansible-wazuh-agent
    │   ├── defaults
    │   ├── handlers
    │   ├── meta
    │   ├── tasks
    │   ├── templates
    │   └── vars
    └── ansible-wazuh-manager
        ├── defaults
        ├── files
        ├── handlers
        ├── meta
        ├── tasks
        ├── templates
        └── vars

And we can see the preconfigured playbooks we have.

ansible@ansible:/etc/ansible/roles/wazuh-ansible$ tree playbooks/
playbooks/
├── wazuh-agent.yml
├── wazuh-elastic_stack-distributed.yml
├── wazuh-elastic_stack-single.yml
├── wazuh-elastic.yml
├── wazuh-kibana.yml
└── wazuh-manager.yml

Using Wazuh Manager role we will install and configure Wazuh Manager and Wazuh API, there are several variables we can use to customize the installation or configuration. To consult the default configuration go to this section.

If we want to change the default configuration we can change the /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-manager/defaults/main.yml file directly or we can create another YAML file only with the content we want to change the configuration. If we would like to do this, we can find more information at Wazuh Manager role, where we can also see how to change the default configuration of agentless and Wazuh API.

We also can create another YAML file only with the content we want to change for Filebeat, or modify the configuration directly in the /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-filebeat/defaults/main.yml file. We can find more information at Filebeat role.

Let's see below, the content of the YAML file /etc/ansible/roles/wazuh-ansible/playbooks/wazuh-manager.yml that we are going to run for a complete installation of the server.

ansible@ansible:/etc/ansible/roles/wazuh-ansible/playbooks$ cat wazuh-manager.yml
- hosts: <your wazuh server host>
  roles:
    - role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-manager
    - { role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-filebeat, filebeat_output_elasticsearch_hosts: '<YOUR_ELASTICSEARCH_IP>:9200' }

Let's take a closer look at the content.

The first line hosts: indicates the machines where the commands below will be executed.

The roles: section indicates the roles that will be executed on the hosts mentioned above. Specifically, we are going to install the role of wazuh-manager (Wazuh manager + API) and the role of filebeat to which we indicate to overwrite the field filebeat_output_elasticsearch_hosts with that IP address.

2 - Preparing the playbook

2.1 - We must create a similar YAML file or modify the one we already have to adapt it to our configuration. We will use the IP address of the machine where we are going to install the Wazuh server adding it to the hosts section and we will add the IP address of the machine where we are going to install our Elasticsearch service to the filebeat_output_elasticsearch_hosts field.

Our resulting file is:

- hosts: 192.168.0.180
  roles:
    - role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-manager
    - { role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-filebeat, filebeat_output_elasticsearch_hosts: '192.168.0.108:9200' }

Note

In this case we have chosen to install Filebeat. If we don't want to install it, it would be enough to delete the corresponding entry in the roles section.

- hosts: 192.168.0.180
  roles:
    - role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-wazuh-manager

Note

Analogically, we can only install the role of Filebeat.

- hosts: 192.168.0.180
  roles:
    - { role: /etc/ansible/roles/wazuh-ansible/roles/wazuh/ansible-filebeat, filebeat_output_elasticsearch_hosts: '192.168.0.108:9200' }

3 - Running the playbook

It seems that we are ready to run the playbook and start the installation, but some of the operations we will perform on the remote systems will need sudo permissions. We can solve this in several ways, opting to enter the password when Ansible requests it. To contemplate other options we consult the option become (to avoid entering passwords one by one).

3.1 - Let's launch the playbook run.

  • We use the -b option to indicate that we are going to become a super user.

  • We use the -K option to indicate Ansible to ask for the password.

ansible@ansible:/etc/ansible/roles/wazuh-ansible/playbooks$ ansible-playbook wazuh-manager.yml -b -K

We will obtain a final result similar to the one shown in the following code block.

TASK [ansible-role-filebeat : Debian/Ubuntu | Add Filebeat repository.] **********************************************************************************
skipping: [192.168.0.180]

TASK [ansible-role-filebeat : Install Filebeat.] *********************************************************************************************************
changed: [192.168.0.180]

TASK [ansible-role-filebeat : Copy Filebeat configuration.] **********************************************************************************************
changed: [192.168.0.180]

TASK [ansible-role-filebeat : Ensure Filebeat SSL key pair directory exists.] ****************************************************************************
skipping: [192.168.0.180]

TASK [ansible-role-filebeat : Copy SSL key and cert for filebeat.] ***************************************************************************************
skipping: [192.168.0.180] => (item=)
skipping: [192.168.0.180] => (item=)

TASK [ansible-role-filebeat : Reload systemd] ************************************************************************************************************
ok: [192.168.0.180]

TASK [ansible-role-filebeat : Ensure Filebeat is started and enabled at boot.] ***************************************************************************
changed: [192.168.0.180]

TASK [ansible-role-filebeat : RedHat/CentOS/Fedora | Remove Filebeat repository (and clean up left-over metadata)] ***************************************
changed: [192.168.0.180]

TASK [ansible-role-filebeat : Debian/Ubuntu | Remove Filebeat repository (and clean up left-over metadata)] **********************************************
skipping: [192.168.0.180]

RUNNING HANDLER [ansible-wazuh-manager : rebuild cdb_lists] **********************************************************************************************
changed: [192.168.0.180]

RUNNING HANDLER [ansible-wazuh-manager : restart wazuh-manager] ******************************************************************************************
changed: [192.168.0.180]

RUNNING HANDLER [ansible-wazuh-manager : restart wazuh-api] **********************************************************************************************
changed: [192.168.0.180]

RUNNING HANDLER [ansible-role-filebeat : restart filebeat] ***********************************************************************************************
changed: [192.168.0.180]

PLAY RECAP ***********************************************************************************************************************************************
192.168.0.180              : ok=36   changed=19   unreachable=0    failed=0

ansible@ansible:/etc/ansible/wazuh-ansible$

We can check the status of our new services in our Wazuh server.

  • Wazuh manager.

[root@localhost centos]# systemctl status wazuh-manager
● wazuh-manager.service - Wazuh manager
   Loaded: loaded (/etc/systemd/system/wazuh-manager.service; enabled; vendor preset: disabled)
   Active: active (running) since jue 2018-09-13 12:36:52 CEST; 35min ago
  • Wazuh API.

[root@localhost centos]# systemctl status wazuh-api
● wazuh-api.service - Wazuh API daemon
   Loaded: loaded (/etc/systemd/system/wazuh-api.service; enabled; vendor preset: disabled)
   Active: active (running) since jue 2018-09-13 12:36:54 CEST; 36min ago
  • Filebeat.

[root@localhost centos]# systemctl status filebeat
● filebeat.service - Filebeat sends log files to Elasticsearch.
   Loaded: loaded (/usr/lib/systemd/system/filebeat.service; enabled; vendor preset: disabled)
   Active: active (running) since jue 2018-09-13 12:36:55 CEST; 37min ago