Unattended installation
This part of the documentation explains how to install Wazuh on a single host by using a script that will automatically detect whether the operating system uses rpm or deb packages.
The script will perform a health-check verifying that the available system resources meet the minimal requirements. For more information, please visit the requirements section.
The script will install Java Development Kit and other packages including unzip and libcap required by Open Distro for Elasticsearch. Besides, the Search Guard offline TLS tool will be used to generate the certificates for protecting data in the Elastic Stack.
Installing Wazuh
Note
Root user privileges are required to run all the commands described below. The curl package will be used to download the script.
Download and run the script:
# curl -so ~/all-in-one-installation.sh https://raw.githubusercontent.com/wazuh/wazuh-documentation/4.0/resources/open-distro/unattended-installation/all-in-one-installation.sh && bash ~/all-in-one-installation.sh
The script will perform a health-check to ensure that the host has enough resources to guarantee the proper performance. To skip this step, add the
-ior--ignore-healthcheckoption when running the script.After the execution of the script, it will show the following messages to confirm that the installation was successful:
Starting the installation... Installing all necessary utilities for the installation... Done Adding the Wazuh repository... Done Installing the Wazuh manager... Done Wazuh-manager started Installing Open Distro for Elasticsearch... Done Configuring Elasticsearch... Certificates created Elasticsearch started Initializing Elasticsearch... Done Installing Filebeat... Filebeat started Done Installing Open Distro for Kibana... Kibana started Done Checking the installation... Elasticsearch installation succeeded. Filebeat installation succeeded. Initializing Kibana (this may take a while) ######## Installation finished
Access the web interface:
URL: https://<wazuh_server_ip> user: admin password: admin
On the first access to Kibana, the browser displays a warning message indicating that the certificate was not issued by a trusted authority. It is possible to add an exception in the browser's advanced options or, for increased security, the file previously generated root-ca.pem file can be imported into the certificate manager of the browser. Alternatively, it is possible to configure a certificate from a trusted authority.
Note
The Open Distro for Elasticsearch performance analyzer plugin is removed during the installation since it may have a negative impact on system resources.
Customizing the installation
The Kibana configuration found at the /etc/kibana/kibana.yml file has the server.host parameter set to 0.0.0.0. This means that Kibana can be accessed from the outside and will accept all the available IPs of the host. This value can be changed for a specific IP if needed.
It is highly recommended to change Elasticsearch’s default passwords for the users found at the /usr/share/elasticsearch/plugins/opendistro_security/securityconfig/internal_users.yml file. More information about this process can be found here.
Once Kibana is running, it is necessary to assign each user their corresponding role. To learn more, visit the Setting up the Wazuh Kibana plugin section.
To uninstall all the components of the all in one installation, visit the uninstalling section.
Next steps
Once the Wazuh environment is ready, a Wazuh agent can be installed in every endpoint to be monitored. To find out more, visit the Wazuh agent installation guide, available for most operating systems.