Deployment variables for Linux using dnf repository

For an agent to be fully deployed and connected to the Wazuh server it needs to be installed, registered and configured. To make the process simple, the installers can use variables that allow the configuration provisioning.

Below you can find a table describing the variables used by Wazuh installers, and a few examples on how to use them.

Option

Description

WAZUH_MANAGER

Specifies the manager IP address or hostname. In case you want to specify multiple managers, you can add them separated by commas. See address.

WAZUH_MANAGER_PORT

Specifies the manager’s connection port. See port.

WAZUH_PROTOCOL

Sets the communication protocol between the manager and the agent. Accepts UDP and TCP. Default is TCP. See protocol.

WAZUH_REGISTRATION_SERVER

Specifies the Wazuh registration server, used for the agent registration. See agent-auth options. If empty, the value set in WAZUH_MANAGER will be used.

WAZUH_REGISTRATION_PORT

Specifies the port used by the Wazuh registration server. See agent-auth options.

WAZUH_REGISTRATION_PASSWORD

Sets the Wazuh registration server. See agent-auth options.

WAZUH_KEEP_ALIVE_INTERVAL

Sets the time between agent checks for manager connection. See notify-time.

WAZUH_TIME_RECONNECT

Sets the time interval for the agent to reconnect with the Wazuh manager when connectivity is lost. See time-reconnect.

WAZUH_REGISTRATION_CA

Host SSL validation need of Certificate of Authority. This option specifies the CA path. See agent-auth options.

WAZUH_REGISTRATION_CERTIFICATE

The SSL agent verification needs a CA signed certificate and the respective key. This option specifies the certificate path. See agent-auth options.

WAZUH_REGISTRATION_KEY

Specifies the key path completing the required variables with WAZUH_REGISTRATION_CERTIFICATE for the SSL agent verification process. See agent-auth options.

WAZUH_AGENT_NAME

Designates the agent's name. By default it will be the computer name. See agent-auth options.

WAZUH_AGENT_GROUP

Assigns the agent to one or more existing groups (separated by commas). See agent-auth options.

Examples:

  • Registration with password:

# WAZUH_MANAGER="10.0.0.2" WAZUH_REGISTRATION_PASSWORD="TopSecret" \
     WAZUH_AGENT_NAME="fedora-agent" dnf install wazuh-agent
  • Registration with password and assigning a group:

# WAZUH_MANAGER="10.0.0.2" WAZUH_REGISTRATION_SERVER="10.0.0.2" WAZUH_REGISTRATION_PASSWORD="TopSecret" \
     WAZUH_AGENT_GROUP="my-group" dnf install wazuh-agent
  • Registration with relative path to CA. It will be searched at your Wazuh installation folder:

# WAZUH_MANAGER="10.0.0.2" WAZUH_REGISTRATION_SERVER="10.0.0.2" WAZUH_AGENT_NAME="fedora-agent" \
     WAZUH_REGISTRATION_CA="rootCA.pem" dnf install wazuh-agent
  • Registration with protocol:

# WAZUH_MANAGER="10.0.0.2" WAZUH_REGISTRATION_SERVER="10.0.0.2" WAZUH_AGENT_NAME="fedora-agent" \
     WAZUH_PROTOCOL="tcp" dnf install wazuh-agent
  • Registration and adding multiple address:

# WAZUH_MANAGER="10.0.0.2,10.0.0.3" WAZUH_REGISTRATION_SERVER="10.0.0.2" \
     WAZUH_AGENT_NAME="fedora-agent" dnf install wazuh-agent
  • Absolute paths to CA, certificate or key that contain spaces can be written as shown below:

# WAZUH_MANAGER "10.0.0.2" WAZUH_REGISTRATION_SERVER "10.0.0.2" WAZUH_REGISTRATION_KEY "/var/ossec/etc/sslagent.key" \
     WAZUH_REGISTRATION_CERTIFICATE "/var/ossec/etc/sslagent.cert" dnf install wazuh-agent

Note

To verify agents identity with the registration server, it's necessary to use both KEY and PEM options. See the Registration Service with host verification - Agent verification with host validation section.