mirror of
				https://github.com/wazuh/wazuh-docker.git
				synced 2025-11-04 14:03:24 +00:00 
			
		
		
		
	Compare commits
	
		
			206 Commits
		
	
	
		
			v4.6.0-pre
			...
			v4.7.0
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					dcf48426c1 | ||
| 
						 | 
					f8eb0b5f1d | ||
| 
						 | 
					2df37520a7 | ||
| 
						 | 
					423fc248ef | ||
| 
						 | 
					6c50089d53 | ||
| 
						 | 
					56ccf81185 | ||
| 
						 | 
					20a3f170d8 | ||
| 
						 | 
					25e4c24c87 | ||
| 
						 | 
					2ccd5dc431 | ||
| 
						 | 
					504e1f2017 | ||
| 
						 | 
					15413250e8 | ||
| 
						 | 
					fa956c53e7 | ||
| 
						 | 
					d352019385 | ||
| 
						 | 
					92b3395abc | ||
| 
						 | 
					b1d10f879c | ||
| 
						 | 
					98e96a5260 | ||
| 
						 | 
					84e57b9c9a | ||
| 
						 | 
					e13cfcf454 | ||
| 
						 | 
					e48255641f | ||
| 
						 | 
					0c7d298eea | ||
| 
						 | 
					05ef9b899b | ||
| 
						 | 
					c46b1c0d82 | ||
| 
						 | 
					3a3218f0d4 | ||
| 
						 | 
					dd86d1b707 | ||
| 
						 | 
					60563720f3 | ||
| 
						 | 
					0cd98767c8 | ||
| 
						 | 
					8aad8651d7 | ||
| 
						 | 
					3c073ab5ea | ||
| 
						 | 
					b8ff013b36 | ||
| 
						 | 
					5106715b0c | ||
| 
						 | 
					523a28b20d | ||
| 
						 | 
					0f1cc4b955 | ||
| 
						 | 
					aee83a1a2d | ||
| 
						 | 
					0555e4956b | ||
| 
						 | 
					dee2c3c8dc | ||
| 
						 | 
					c18a1eca56 | ||
| 
						 | 
					14dcc8b6a6 | ||
| 
						 | 
					89e0fc9604 | ||
| 
						 | 
					64f083631d | ||
| 
						 | 
					fa2f2b2a31 | ||
| 
						 | 
					8d1c239a3c | ||
| 
						 | 
					ded91b2f0a | ||
| 
						 | 
					d7e051af19 | ||
| 
						 | 
					b4db7f16cc | ||
| 
						 | 
					61bfe58491 | ||
| 
						 | 
					9d3701fa60 | ||
| 
						 | 
					c550c1a852 | ||
| 
						 | 
					1b41068618 | ||
| 
						 | 
					8ac3ea1e8a | ||
| 
						 | 
					893796c4a2 | ||
| 
						 | 
					d6a72c6fb1 | ||
| 
						 | 
					7172c818c7 | ||
| 
						 | 
					a2ee29bfd3 | ||
| 
						 | 
					e205c87d37 | ||
| 
						 | 
					545ef6851b | ||
| 
						 | 
					36c06dc4c8 | ||
| 
						 | 
					3fd3f42389 | ||
| 
						 | 
					b22fa235c7 | ||
| 
						 | 
					c3c8ea3d02 | ||
| 
						 | 
					905b4de859 | ||
| 
						 | 
					23d34f6a89 | ||
| 
						 | 
					8fa20abbbd | ||
| 
						 | 
					d9b053caf4 | ||
| 
						 | 
					d5dc67e9c3 | ||
| 
						 | 
					93c53a712d | ||
| 
						 | 
					5f3a0481ba | ||
| 
						 | 
					958e466682 | ||
| 
						 | 
					7d5b1c4f85 | ||
| 
						 | 
					6407325761 | ||
| 
						 | 
					7312f86235 | ||
| 
						 | 
					d6b73cb3dc | ||
| 
						 | 
					62627e32fd | ||
| 
						 | 
					149df5e492 | ||
| 
						 | 
					8cc5c8b0bb | ||
| 
						 | 
					536dd51aa7 | ||
| 
						 | 
					088b855f73 | ||
| 
						 | 
					5769159cf9 | ||
| 
						 | 
					41515e9c49 | ||
| 
						 | 
					0fbbf5aee2 | ||
| 
						 | 
					37f565bb8a | ||
| 
						 | 
					2ac53b9b3d | ||
| 
						 | 
					d1c252c6c0 | ||
| 
						 | 
					e9f689dbfc | ||
| 
						 | 
					be19c70082 | ||
| 
						 | 
					0c6077c3e0 | ||
| 
						 | 
					de7754364d | ||
| 
						 | 
					73ada94ed6 | ||
| 
						 | 
					63817dfd55 | ||
| 
						 | 
					17029c5510 | ||
| 
						 | 
					2234517218 | ||
| 
						 | 
					637110c278 | ||
| 
						 | 
					b18c068650 | ||
| 
						 | 
					9a871dbbcb | ||
| 
						 | 
					1fae0d3452 | ||
| 
						 | 
					0a4c057492 | ||
| 
						 | 
					2902a0ce0b | ||
| 
						 | 
					c0fb4172f3 | ||
| 
						 | 
					8886e2347e | ||
| 
						 | 
					f1d8565989 | ||
| 
						 | 
					e5abd5d24e | ||
| 
						 | 
					902b0d8e52 | ||
| 
						 | 
					b377a0f6eb | ||
| 
						 | 
					44e9bebed0 | ||
| 
						 | 
					2de4a28098 | ||
| 
						 | 
					760fc8ccbf | ||
| 
						 | 
					44303d3701 | ||
| 
						 | 
					c0d97893a4 | ||
| 
						 | 
					0826f2c176 | ||
| 
						 | 
					d531b8dd72 | ||
| 
						 | 
					41267d4ddf | ||
| 
						 | 
					67f34fb8fe | ||
| 
						 | 
					865f7625f4 | ||
| 
						 | 
					c56952eaa0 | ||
| 
						 | 
					cb7d8785c6 | ||
| 
						 | 
					f1001c2f25 | ||
| 
						 | 
					17ed766228 | ||
| 
						 | 
					6c91bac96d | ||
| 
						 | 
					216b5a6818 | ||
| 
						 | 
					e19fa14013 | ||
| 
						 | 
					57c7eaa5af | ||
| 
						 | 
					fbe073612c | ||
| 
						 | 
					1dec665a97 | ||
| 
						 | 
					757e5dbf05 | ||
| 
						 | 
					32b1d88e36 | ||
| 
						 | 
					94be842afc | ||
| 
						 | 
					d20bbe247c | ||
| 
						 | 
					e01d39e138 | ||
| 
						 | 
					1eeca6267b | ||
| 
						 | 
					d755ffbac8 | ||
| 
						 | 
					221c3ccd24 | ||
| 
						 | 
					1ff589ccaf | ||
| 
						 | 
					d4c98491fc | ||
| 
						 | 
					673c28b637 | ||
| 
						 | 
					7d3bea67f7 | ||
| 
						 | 
					3953986652 | ||
| 
						 | 
					f2dab81387 | ||
| 
						 | 
					da82008a75 | ||
| 
						 | 
					54975ab099 | ||
| 
						 | 
					a9d505b316 | ||
| 
						 | 
					a0899a8358 | ||
| 
						 | 
					b27d991f0c | ||
| 
						 | 
					4d0aa57ed2 | ||
| 
						 | 
					1a75d4eb77 | ||
| 
						 | 
					247555b1b6 | ||
| 
						 | 
					442d457933 | ||
| 
						 | 
					0f65448718 | ||
| 
						 | 
					a9533264d6 | ||
| 
						 | 
					ce8dd29425 | ||
| 
						 | 
					a433989865 | ||
| 
						 | 
					ff1e5f991a | ||
| 
						 | 
					55ee49aff5 | ||
| 
						 | 
					75f92308a1 | ||
| 
						 | 
					61c37a78de | ||
| 
						 | 
					39208c513c | ||
| 
						 | 
					3650feeb0e | ||
| 
						 | 
					3c9b5ac717 | ||
| 
						 | 
					6a98b87b8e | ||
| 
						 | 
					56dbf052c9 | ||
| 
						 | 
					4e7c2cf72a | ||
| 
						 | 
					1238820b6c | ||
| 
						 | 
					f168bd62fe | ||
| 
						 | 
					efc8ab88df | ||
| 
						 | 
					f71616939e | ||
| 
						 | 
					7427eff847 | ||
| 
						 | 
					5abe95a0f1 | ||
| 
						 | 
					fed4302744 | ||
| 
						 | 
					750aa90b91 | ||
| 
						 | 
					aec90c2f3d | ||
| 
						 | 
					84a40b9eea | ||
| 
						 | 
					57c63bc60e | ||
| 
						 | 
					dd46f8a2c1 | ||
| 
						 | 
					76a38f68b5 | ||
| 
						 | 
					4caf18f12c | ||
| 
						 | 
					ea11d66f42 | ||
| 
						 | 
					02a75a7678 | ||
| 
						 | 
					7e0311e99a | ||
| 
						 | 
					e939010507 | ||
| 
						 | 
					b7bce45e82 | ||
| 
						 | 
					697b7538cc | ||
| 
						 | 
					2cbf64dafa | ||
| 
						 | 
					638d548d74 | ||
| 
						 | 
					d6f19cebf5 | ||
| 
						 | 
					944c6aa4c8 | ||
| 
						 | 
					5e3676e125 | ||
| 
						 | 
					fd9c09a7e5 | ||
| 
						 | 
					395b769b6a | ||
| 
						 | 
					ee46520701 | ||
| 
						 | 
					b838023509 | ||
| 
						 | 
					be9019a065 | ||
| 
						 | 
					42193f4cfa | ||
| 
						 | 
					6e7b1c2899 | ||
| 
						 | 
					06a1efc094 | ||
| 
						 | 
					e9764b0a6a | ||
| 
						 | 
					6398b66e10 | ||
| 
						 | 
					70938d52d2 | ||
| 
						 | 
					d5932ac4a1 | ||
| 
						 | 
					4b621466a0 | ||
| 
						 | 
					e24d17f730 | ||
| 
						 | 
					b33aea9ef8 | ||
| 
						 | 
					3525003ef7 | ||
| 
						 | 
					00a94ce5b0 | ||
| 
						 | 
					095d878b04 | ||
| 
						 | 
					53903126cf | ||
| 
						 | 
					63ceab20b0 | ||
| 
						 | 
					5fb369f9e8 | ||
| 
						 | 
					6ddaecd7b5 | 
							
								
								
									
										4
									
								
								.env
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								.env
									
									
									
									
									
								
							@@ -1,3 +1,3 @@
 | 
			
		||||
WAZUH_VERSION=4.6.0
 | 
			
		||||
WAZUH_IMAGE_VERSION=4.6.0
 | 
			
		||||
WAZUH_VERSION=4.7.0
 | 
			
		||||
WAZUH_IMAGE_VERSION=4.7.0
 | 
			
		||||
WAZUH_TAG_REVISION=1
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								.github/.goss.yaml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.github/.goss.yaml
									
									
									
									
										vendored
									
									
								
							@@ -56,7 +56,7 @@ package:
 | 
			
		||||
  wazuh-manager:
 | 
			
		||||
    installed: true
 | 
			
		||||
    versions:
 | 
			
		||||
    - 4.6.0-1
 | 
			
		||||
    - 4.7.0-1
 | 
			
		||||
port:
 | 
			
		||||
  tcp:1514:
 | 
			
		||||
    listening: true
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										71
									
								
								.github/workflows/trivy-dashboard-4-4.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										71
									
								
								.github/workflows/trivy-dashboard-4-4.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,71 @@
 | 
			
		||||
# This workflow uses actions that are not certified by GitHub.
 | 
			
		||||
# They are provided by a third-party and are governed by
 | 
			
		||||
# separate terms of service, privacy policy, and support
 | 
			
		||||
# documentation.
 | 
			
		||||
 | 
			
		||||
name: Trivy scan Wazuh dashboard
 | 
			
		||||
 | 
			
		||||
on:
 | 
			
		||||
  release:
 | 
			
		||||
    types:
 | 
			
		||||
    - published
 | 
			
		||||
  pull_request:
 | 
			
		||||
    branches:
 | 
			
		||||
      - master
 | 
			
		||||
      - stable
 | 
			
		||||
  schedule:
 | 
			
		||||
    - cron: '34 2 * * 1'
 | 
			
		||||
  workflow_dispatch:
 | 
			
		||||
 | 
			
		||||
permissions:
 | 
			
		||||
  contents: read
 | 
			
		||||
 | 
			
		||||
jobs:
 | 
			
		||||
  build:
 | 
			
		||||
    permissions:
 | 
			
		||||
      contents: read # for actions/checkout to fetch code
 | 
			
		||||
      security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
 | 
			
		||||
 | 
			
		||||
    name: Build images and upload Trivy results
 | 
			
		||||
    runs-on: "ubuntu-latest"
 | 
			
		||||
    steps:
 | 
			
		||||
      - name: Checkout code
 | 
			
		||||
        uses: actions/checkout@v3
 | 
			
		||||
        with: { ref: 4.4 }
 | 
			
		||||
 | 
			
		||||
      - name: Installing dependencies
 | 
			
		||||
        run: |
 | 
			
		||||
          sudo apt-get update
 | 
			
		||||
          sudo apt-get install -y jq
 | 
			
		||||
      - name: Build Wazuh images
 | 
			
		||||
        run: build-docker-images/build-images.sh
 | 
			
		||||
 | 
			
		||||
      - name: Create enviroment variables
 | 
			
		||||
        run: |
 | 
			
		||||
          cat .env > $GITHUB_ENV
 | 
			
		||||
          echo "GITHUB_REF_NAME="${GITHUB_REF_NAME%/*} >> $GITHUB_ENV
 | 
			
		||||
 | 
			
		||||
      - name: Run Trivy vulnerability scanner for Wazuh dashboard
 | 
			
		||||
        uses: aquasecurity/trivy-action@2a2157eb22c08c9a1fac99263430307b8d1bc7a2
 | 
			
		||||
        with:
 | 
			
		||||
          image-ref: 'wazuh/wazuh-dashboard:${{env.WAZUH_IMAGE_VERSION}}'
 | 
			
		||||
          format: 'template'
 | 
			
		||||
          template: '@/contrib/sarif.tpl'
 | 
			
		||||
          output: 'trivy-results-dashboard.sarif'
 | 
			
		||||
          severity: 'LOW,MEDIUM,CRITICAL,HIGH'
 | 
			
		||||
 | 
			
		||||
      - name: Upload Trivy scan results to GitHub Security tab
 | 
			
		||||
        uses: github/codeql-action/upload-sarif@v2
 | 
			
		||||
        with:
 | 
			
		||||
          sarif_file: 'trivy-results-dashboard.sarif'
 | 
			
		||||
 | 
			
		||||
      - name: Slack notification
 | 
			
		||||
        uses: rtCamp/action-slack-notify@v2
 | 
			
		||||
        env:
 | 
			
		||||
          SLACK_CHANNEL: cicd-monitoring
 | 
			
		||||
          SLACK_COLOR: ${{ job.status }} # or a specific color like 'good' or '#ff00ff'
 | 
			
		||||
          #SLACK_ICON: https://github.com/rtCamp.png?size=48
 | 
			
		||||
          SLACK_MESSAGE: "Check the results: https://github.com/wazuh/wazuh-docker/security/code-scanning?query=is%3Aopen+branch%3A${{ env.GITHUB_REF_NAME }}"
 | 
			
		||||
          SLACK_TITLE: Wazuh docker Trivy vulnerability scan finished.
 | 
			
		||||
          SLACK_USERNAME: github_actions
 | 
			
		||||
          SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK }}
 | 
			
		||||
							
								
								
									
										71
									
								
								.github/workflows/trivy-indexer-4-4.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										71
									
								
								.github/workflows/trivy-indexer-4-4.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,71 @@
 | 
			
		||||
# This workflow uses actions that are not certified by GitHub.
 | 
			
		||||
# They are provided by a third-party and are governed by
 | 
			
		||||
# separate terms of service, privacy policy, and support
 | 
			
		||||
# documentation.
 | 
			
		||||
 | 
			
		||||
name: Trivy scan Wazuh indexer
 | 
			
		||||
 | 
			
		||||
on:
 | 
			
		||||
  release:
 | 
			
		||||
    types:
 | 
			
		||||
    - published
 | 
			
		||||
  pull_request:
 | 
			
		||||
    branches:
 | 
			
		||||
      - master
 | 
			
		||||
      - stable
 | 
			
		||||
  schedule:
 | 
			
		||||
    - cron: '34 2 * * 1'
 | 
			
		||||
  workflow_dispatch:
 | 
			
		||||
 | 
			
		||||
permissions:
 | 
			
		||||
  contents: read
 | 
			
		||||
 | 
			
		||||
jobs:
 | 
			
		||||
  build:
 | 
			
		||||
    permissions:
 | 
			
		||||
      contents: read # for actions/checkout to fetch code
 | 
			
		||||
      security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
 | 
			
		||||
 | 
			
		||||
    name: Build images and upload Trivy results
 | 
			
		||||
    runs-on: "ubuntu-latest"
 | 
			
		||||
    steps:
 | 
			
		||||
      - name: Checkout code
 | 
			
		||||
        uses: actions/checkout@v3
 | 
			
		||||
        with: { ref: 4.4 }
 | 
			
		||||
 | 
			
		||||
      - name: Installing dependencies
 | 
			
		||||
        run: |
 | 
			
		||||
          sudo apt-get update
 | 
			
		||||
          sudo apt-get install -y jq
 | 
			
		||||
      - name: Build Wazuh images
 | 
			
		||||
        run: build-docker-images/build-images.sh
 | 
			
		||||
 | 
			
		||||
      - name: Create enviroment variables
 | 
			
		||||
        run: |
 | 
			
		||||
          cat .env > $GITHUB_ENV
 | 
			
		||||
          echo "GITHUB_REF_NAME="${GITHUB_REF_NAME%/*} >> $GITHUB_ENV
 | 
			
		||||
 | 
			
		||||
      - name: Run Trivy vulnerability scanner for Wazuh indexer
 | 
			
		||||
        uses: aquasecurity/trivy-action@2a2157eb22c08c9a1fac99263430307b8d1bc7a2
 | 
			
		||||
        with:
 | 
			
		||||
          image-ref: 'wazuh/wazuh-indexer:${{env.WAZUH_IMAGE_VERSION}}'
 | 
			
		||||
          format: 'template'
 | 
			
		||||
          template: '@/contrib/sarif.tpl'
 | 
			
		||||
          output: 'trivy-results-indexer.sarif'
 | 
			
		||||
          severity: 'LOW,MEDIUM,CRITICAL,HIGH'
 | 
			
		||||
 | 
			
		||||
      - name: Upload Trivy scan results to GitHub Security tab
 | 
			
		||||
        uses: github/codeql-action/upload-sarif@v2
 | 
			
		||||
        with:
 | 
			
		||||
          sarif_file: 'trivy-results-indexer.sarif'
 | 
			
		||||
 | 
			
		||||
      - name: Slack notification
 | 
			
		||||
        uses: rtCamp/action-slack-notify@v2
 | 
			
		||||
        env:
 | 
			
		||||
          SLACK_CHANNEL: cicd-monitoring
 | 
			
		||||
          SLACK_COLOR: ${{ job.status }} # or a specific color like 'good' or '#ff00ff'
 | 
			
		||||
          #SLACK_ICON: https://github.com/rtCamp.png?size=48
 | 
			
		||||
          SLACK_MESSAGE: "Check the results: https://github.com/wazuh/wazuh-docker/security/code-scanning?query=is%3Aopen+branch%3A${{ env.GITHUB_REF_NAME }}"
 | 
			
		||||
          SLACK_TITLE: Wazuh docker Trivy vulnerability scan finished.
 | 
			
		||||
          SLACK_USERNAME: github_actions
 | 
			
		||||
          SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK }}
 | 
			
		||||
							
								
								
									
										71
									
								
								.github/workflows/trivy-manager-4-4.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										71
									
								
								.github/workflows/trivy-manager-4-4.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,71 @@
 | 
			
		||||
# This workflow uses actions that are not certified by GitHub.
 | 
			
		||||
# They are provided by a third-party and are governed by
 | 
			
		||||
# separate terms of service, privacy policy, and support
 | 
			
		||||
# documentation.
 | 
			
		||||
 | 
			
		||||
name: Trivy scan Wazuh manager
 | 
			
		||||
 | 
			
		||||
on:
 | 
			
		||||
  release:
 | 
			
		||||
    types:
 | 
			
		||||
    - published
 | 
			
		||||
  pull_request:
 | 
			
		||||
    branches:
 | 
			
		||||
      - master
 | 
			
		||||
      - stable
 | 
			
		||||
  schedule:
 | 
			
		||||
    - cron: '34 2 * * 1'
 | 
			
		||||
  workflow_dispatch:
 | 
			
		||||
 | 
			
		||||
permissions:
 | 
			
		||||
  contents: read
 | 
			
		||||
 | 
			
		||||
jobs:
 | 
			
		||||
  build:
 | 
			
		||||
    permissions:
 | 
			
		||||
      contents: read # for actions/checkout to fetch code
 | 
			
		||||
      security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
 | 
			
		||||
 | 
			
		||||
    name: Build images and upload Trivy results
 | 
			
		||||
    runs-on: "ubuntu-latest"
 | 
			
		||||
    steps:
 | 
			
		||||
      - name: Checkout code
 | 
			
		||||
        uses: actions/checkout@v3
 | 
			
		||||
        with: { ref: 4.4 }
 | 
			
		||||
 | 
			
		||||
      - name: Installing dependencies
 | 
			
		||||
        run: |
 | 
			
		||||
          sudo apt-get update
 | 
			
		||||
          sudo apt-get install -y jq
 | 
			
		||||
      - name: Build Wazuh images
 | 
			
		||||
        run: build-docker-images/build-images.sh
 | 
			
		||||
 | 
			
		||||
      - name: Create enviroment variables
 | 
			
		||||
        run: |
 | 
			
		||||
          cat .env > $GITHUB_ENV
 | 
			
		||||
          echo "GITHUB_REF_NAME="${GITHUB_REF_NAME%/*} >> $GITHUB_ENV
 | 
			
		||||
 | 
			
		||||
      - name: Run Trivy vulnerability scanner for Wazuh manager
 | 
			
		||||
        uses: aquasecurity/trivy-action@2a2157eb22c08c9a1fac99263430307b8d1bc7a2
 | 
			
		||||
        with:
 | 
			
		||||
          image-ref: 'wazuh/wazuh-manager:${{env.WAZUH_IMAGE_VERSION}}'
 | 
			
		||||
          format: 'template'
 | 
			
		||||
          template: '@/contrib/sarif.tpl'
 | 
			
		||||
          output: 'trivy-results-manager.sarif'
 | 
			
		||||
          severity: 'LOW,MEDIUM,CRITICAL,HIGH'
 | 
			
		||||
 | 
			
		||||
      - name: Upload Trivy scan results to GitHub Security tab
 | 
			
		||||
        uses: github/codeql-action/upload-sarif@v2
 | 
			
		||||
        with:
 | 
			
		||||
          sarif_file: 'trivy-results-manager.sarif'
 | 
			
		||||
 | 
			
		||||
      - name: Slack notification
 | 
			
		||||
        uses: rtCamp/action-slack-notify@v2
 | 
			
		||||
        env:
 | 
			
		||||
          SLACK_CHANNEL: cicd-monitoring
 | 
			
		||||
          SLACK_COLOR: ${{ job.status }} # or a specific color like 'good' or '#ff00ff'
 | 
			
		||||
          #SLACK_ICON: https://github.com/rtCamp.png?size=48
 | 
			
		||||
          SLACK_MESSAGE: "Check the results: https://github.com/wazuh/wazuh-docker/security/code-scanning?query=is%3Aopen+branch%3A${{ env.GITHUB_REF_NAME }}"
 | 
			
		||||
          SLACK_TITLE: Wazuh docker Trivy vulnerability scan finished.
 | 
			
		||||
          SLACK_USERNAME: github_actions
 | 
			
		||||
          SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK }}
 | 
			
		||||
							
								
								
									
										25
									
								
								CHANGELOG.md
									
									
									
									
									
								
							
							
						
						
									
										25
									
								
								CHANGELOG.md
									
									
									
									
									
								
							@@ -1,11 +1,36 @@
 | 
			
		||||
# Change Log
 | 
			
		||||
All notable changes to this project will be documented in this file.
 | 
			
		||||
 | 
			
		||||
## Wazuh Docker v4.7.0
 | 
			
		||||
### Added
 | 
			
		||||
 | 
			
		||||
- Update Wazuh to version [4.7.0](https://github.com/wazuh/wazuh/blob/v4.7.0/CHANGELOG.md#v470)
 | 
			
		||||
 | 
			
		||||
## Wazuh Docker v4.6.0
 | 
			
		||||
### Added
 | 
			
		||||
 | 
			
		||||
- Update Wazuh to version [4.6.0](https://github.com/wazuh/wazuh/blob/v4.6.0/CHANGELOG.md#v460)
 | 
			
		||||
 | 
			
		||||
## Wazuh Docker v4.5.4
 | 
			
		||||
### Added
 | 
			
		||||
 | 
			
		||||
- Update Wazuh to version [4.5.4](https://github.com/wazuh/wazuh/blob/v4.5.4/CHANGELOG.md#v454)
 | 
			
		||||
 | 
			
		||||
## Wazuh Docker v4.5.3
 | 
			
		||||
### Added
 | 
			
		||||
 | 
			
		||||
- Update Wazuh to version [4.5.3](https://github.com/wazuh/wazuh/blob/v4.5.3/CHANGELOG.md#v453)
 | 
			
		||||
 | 
			
		||||
## Wazuh Docker v4.5.2
 | 
			
		||||
### Added
 | 
			
		||||
 | 
			
		||||
- Update Wazuh to version [4.5.2](https://github.com/wazuh/wazuh/blob/v4.5.2/CHANGELOG.md#v452)
 | 
			
		||||
 | 
			
		||||
## Wazuh Docker v4.5.1
 | 
			
		||||
### Added
 | 
			
		||||
 | 
			
		||||
- Update Wazuh to version [4.5.1](https://github.com/wazuh/wazuh/blob/v4.5.1/CHANGELOG.md#v451)
 | 
			
		||||
 | 
			
		||||
## Wazuh Docker v4.5.0
 | 
			
		||||
### Added
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -195,7 +195,12 @@ WAZUH_MONITORING_REPLICAS=0         ##
 | 
			
		||||
 | 
			
		||||
| Wazuh version | ODFE    | XPACK  |
 | 
			
		||||
|---------------|---------|--------|
 | 
			
		||||
| v4.7.0        |         |        |
 | 
			
		||||
| v4.6.0        |         |        |
 | 
			
		||||
| v4.5.4        |         |        |
 | 
			
		||||
| v4.5.3        |         |        |
 | 
			
		||||
| v4.5.2        |         |        |
 | 
			
		||||
| v4.5.1        |         |        |
 | 
			
		||||
| v4.5.0        |         |        |
 | 
			
		||||
| v4.4.5        |         |        |
 | 
			
		||||
| v4.4.4        |         |        |
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										4
									
								
								VERSION
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								VERSION
									
									
									
									
									
								
							@@ -1,2 +1,2 @@
 | 
			
		||||
WAZUH-DOCKER_VERSION="4.6.0"
 | 
			
		||||
REVISION="40600"
 | 
			
		||||
WAZUH-DOCKER_VERSION="4.7.0"
 | 
			
		||||
REVISION="40704"
 | 
			
		||||
 
 | 
			
		||||
@@ -9,3 +9,24 @@ $ build-docker-images/build-images.sh
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
This script initializes the environment variables needed to build each of the images.
 | 
			
		||||
 | 
			
		||||
The script allows you to build images from other versions of Wazuh, to do this you must use the -v or --version argument:
 | 
			
		||||
 | 
			
		||||
```
 | 
			
		||||
$ build-docker-images/build-images.sh -v 4.5.2
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
To get all the available script options use the -h or --help option:
 | 
			
		||||
 | 
			
		||||
```
 | 
			
		||||
$ build-docker-images/build-images.sh -h
 | 
			
		||||
 | 
			
		||||
Usage: build-docker-images/build-images.sh [OPTIONS]
 | 
			
		||||
 | 
			
		||||
    -d, --dev <ref>              [Optional] Set the development stage you want to build, example rc1 or beta1, not used by default.
 | 
			
		||||
    -f, --filebeat-module <ref>  [Optional] Set Filebeat module version. By default 0.3.
 | 
			
		||||
    -r, --revision <rev>         [Optional] Package revision. By default 1
 | 
			
		||||
    -v, --version <ver>          [Optional] Set the Wazuh version should be builded. By default, 4.7.0.
 | 
			
		||||
    -h, --help                   Show this help.
 | 
			
		||||
 | 
			
		||||
```
 | 
			
		||||
@@ -1,17 +1,144 @@
 | 
			
		||||
WAZUH_IMAGE_VERSION=4.6.0
 | 
			
		||||
WAZUH_IMAGE_VERSION=4.7.0
 | 
			
		||||
WAZUH_VERSION=$(echo $WAZUH_IMAGE_VERSION | sed -e 's/\.//g')
 | 
			
		||||
WAZUH_TAG_REVISION=1
 | 
			
		||||
WAZUH_CURRENT_VERSION=$(curl --silent https://api.github.com/repos/wazuh/wazuh/releases/latest | grep '\"tag_name\":' | sed -E 's/.*\"([^\"]+)\".*/\1/' | cut -c 2- | sed -e 's/\.//g')
 | 
			
		||||
IMAGE_VERSION=${WAZUH_IMAGE_VERSION}
 | 
			
		||||
 | 
			
		||||
## If wazuh manager exists in apt dev repository, change variables, if not, exit 1
 | 
			
		||||
if [ "$WAZUH_VERSION" -le "$WAZUH_CURRENT_VERSION" ]; then
 | 
			
		||||
  IMAGE_VERSION=${WAZUH_IMAGE_VERSION}
 | 
			
		||||
else
 | 
			
		||||
  IMAGE_VERSION=${WAZUH_IMAGE_VERSION}
 | 
			
		||||
fi
 | 
			
		||||
# Wazuh package generator
 | 
			
		||||
# Copyright (C) 2023, Wazuh Inc.
 | 
			
		||||
#
 | 
			
		||||
# This program is a free software; you can redistribute it
 | 
			
		||||
# and/or modify it under the terms of the GNU General Public
 | 
			
		||||
# License (version 2) as published by the FSF - Free Software
 | 
			
		||||
# Foundation.
 | 
			
		||||
 | 
			
		||||
echo WAZUH_VERSION=$WAZUH_IMAGE_VERSION > .env
 | 
			
		||||
echo WAZUH_IMAGE_VERSION=$IMAGE_VERSION >> .env
 | 
			
		||||
echo WAZUH_TAG_REVISION=$WAZUH_TAG_REVISION >> .env
 | 
			
		||||
WAZUH_IMAGE_VERSION="4.7.0"
 | 
			
		||||
WAZUH_TAG_REVISION="1"
 | 
			
		||||
WAZUH_DEV_STAGE=""
 | 
			
		||||
FILEBEAT_MODULE_VERSION="0.3"
 | 
			
		||||
 | 
			
		||||
docker-compose -f build-docker-images/build-images.yml --env-file .env build --no-cache
 | 
			
		||||
# -----------------------------------------------------------------------------
 | 
			
		||||
 | 
			
		||||
trap ctrl_c INT
 | 
			
		||||
 | 
			
		||||
clean() {
 | 
			
		||||
    exit_code=$1
 | 
			
		||||
 | 
			
		||||
    exit ${exit_code}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
ctrl_c() {
 | 
			
		||||
    clean 1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# -----------------------------------------------------------------------------
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
build() {
 | 
			
		||||
 | 
			
		||||
    WAZUH_VERSION="$(echo $WAZUH_IMAGE_VERSION | sed -e 's/\.//g')"
 | 
			
		||||
    FILEBEAT_TEMPLATE_BRANCH="${WAZUH_IMAGE_VERSION}"
 | 
			
		||||
    WAZUH_FILEBEAT_MODULE="wazuh-filebeat-${FILEBEAT_MODULE_VERSION}.tar.gz"
 | 
			
		||||
    WAZUH_UI_REVISION="${WAZUH_TAG_REVISION}"
 | 
			
		||||
 | 
			
		||||
    if  [ "${WAZUH_DEV_STAGE}" ];then
 | 
			
		||||
        FILEBEAT_TEMPLATE_BRANCH="v${FILEBEAT_TEMPLATE_BRANCH}-${WAZUH_DEV_STAGE,,}"
 | 
			
		||||
        if ! curl --output /dev/null --silent --head --fail "https://github.com/wazuh/wazuh/tree/${FILEBEAT_TEMPLATE_BRANCH}"; then
 | 
			
		||||
            echo "The indicated branch does not exist in the wazuh/wazuh repository: ${FILEBEAT_TEMPLATE_BRANCH}"
 | 
			
		||||
            clean 1
 | 
			
		||||
        fi
 | 
			
		||||
    else
 | 
			
		||||
        if curl --output /dev/null --silent --head --fail "https://github.com/wazuh/wazuh/tree/v${FILEBEAT_TEMPLATE_BRANCH}"; then
 | 
			
		||||
            FILEBEAT_TEMPLATE_BRANCH="v${FILEBEAT_TEMPLATE_BRANCH}"
 | 
			
		||||
        elif curl --output /dev/null --silent --head --fail "https://github.com/wazuh/wazuh/tree/${FILEBEAT_TEMPLATE_BRANCH}"; then
 | 
			
		||||
            FILEBEAT_TEMPLATE_BRANCH="${FILEBEAT_TEMPLATE_BRANCH}"
 | 
			
		||||
        else
 | 
			
		||||
            WAZUH_MASTER_VERSION="$(curl -s https://raw.githubusercontent.com/wazuh/wazuh/master/src/VERSION | sed -e 's/v//g')"
 | 
			
		||||
            if [ "${FILEBEAT_TEMPLATE_BRANCH}" == "${WAZUH_MASTER_VERSION}" ]; then
 | 
			
		||||
                FILEBEAT_TEMPLATE_BRANCH="master"
 | 
			
		||||
            else
 | 
			
		||||
                echo "The indicated branch does not exist in the wazuh/wazuh repository: ${FILEBEAT_TEMPLATE_BRANCH}"
 | 
			
		||||
                clean 1
 | 
			
		||||
            fi
 | 
			
		||||
        fi
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    echo WAZUH_VERSION=$WAZUH_IMAGE_VERSION > .env
 | 
			
		||||
    echo WAZUH_IMAGE_VERSION=$WAZUH_IMAGE_VERSION >> .env
 | 
			
		||||
    echo WAZUH_TAG_REVISION=$WAZUH_TAG_REVISION >> .env
 | 
			
		||||
    echo FILEBEAT_TEMPLATE_BRANCH=$FILEBEAT_TEMPLATE_BRANCH >> .env
 | 
			
		||||
    echo WAZUH_FILEBEAT_MODULE=$WAZUH_FILEBEAT_MODULE >> .env
 | 
			
		||||
    echo WAZUH_UI_REVISION=$WAZUH_UI_REVISION >> .env
 | 
			
		||||
 | 
			
		||||
    docker-compose -f build-docker-images/build-images.yml --env-file .env build --no-cache
 | 
			
		||||
 | 
			
		||||
    return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# -----------------------------------------------------------------------------
 | 
			
		||||
 | 
			
		||||
help() {
 | 
			
		||||
    echo
 | 
			
		||||
    echo "Usage: $0 [OPTIONS]"
 | 
			
		||||
    echo
 | 
			
		||||
    echo "    -d, --dev <ref>              [Optional] Set the development stage you want to build, example rc1 or beta1, not used by default."
 | 
			
		||||
    echo "    -f, --filebeat-module <ref>  [Optional] Set Filebeat module version. By default ${FILEBEAT_MODULE_VERSION}."
 | 
			
		||||
    echo "    -r, --revision <rev>         [Optional] Package revision. By default ${WAZUH_TAG_REVISION}"
 | 
			
		||||
    echo "    -v, --version <ver>          [Optional] Set the Wazuh version should be builded. By default, ${WAZUH_IMAGE_VERSION}."
 | 
			
		||||
    echo "    -h, --help                   Show this help."
 | 
			
		||||
    echo
 | 
			
		||||
    exit $1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# -----------------------------------------------------------------------------
 | 
			
		||||
 | 
			
		||||
main() {
 | 
			
		||||
    while [ -n "${1}" ]
 | 
			
		||||
    do
 | 
			
		||||
        case "${1}" in
 | 
			
		||||
        "-h"|"--help")
 | 
			
		||||
            help 0
 | 
			
		||||
            ;;
 | 
			
		||||
        "-d"|"--dev")
 | 
			
		||||
            if [ -n "${2}" ]; then
 | 
			
		||||
                WAZUH_DEV_STAGE="${2}"
 | 
			
		||||
                shift 2
 | 
			
		||||
            else
 | 
			
		||||
                help 1
 | 
			
		||||
            fi
 | 
			
		||||
            ;;
 | 
			
		||||
        "-f"|"--filebeat-module")
 | 
			
		||||
            if [ -n "${2}" ]; then
 | 
			
		||||
                FILEBEAT_MODULE_VERSION="${2}"
 | 
			
		||||
                shift 2
 | 
			
		||||
            else
 | 
			
		||||
                help 1
 | 
			
		||||
            fi
 | 
			
		||||
            ;;
 | 
			
		||||
        "-r"|"--revision")
 | 
			
		||||
            if [ -n "${2}" ]; then
 | 
			
		||||
                WAZUH_TAG_REVISION="${2}"
 | 
			
		||||
                shift 2
 | 
			
		||||
            else
 | 
			
		||||
                help 1
 | 
			
		||||
            fi
 | 
			
		||||
            ;;
 | 
			
		||||
        "-v"|"--version")
 | 
			
		||||
            if [ -n "$2" ]; then
 | 
			
		||||
                WAZUH_IMAGE_VERSION="$2"
 | 
			
		||||
                shift 2
 | 
			
		||||
            else
 | 
			
		||||
                help 1
 | 
			
		||||
            fi
 | 
			
		||||
            ;;
 | 
			
		||||
        *)
 | 
			
		||||
            help 1
 | 
			
		||||
        esac
 | 
			
		||||
    done
 | 
			
		||||
 | 
			
		||||
    build || clean 1
 | 
			
		||||
 | 
			
		||||
    clean 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
main "$@"
 | 
			
		||||
 
 | 
			
		||||
@@ -8,6 +8,8 @@ services:
 | 
			
		||||
      args:
 | 
			
		||||
        WAZUH_VERSION: ${WAZUH_VERSION}
 | 
			
		||||
        WAZUH_TAG_REVISION: ${WAZUH_TAG_REVISION}
 | 
			
		||||
        FILEBEAT_TEMPLATE_BRANCH: ${FILEBEAT_TEMPLATE_BRANCH}
 | 
			
		||||
        WAZUH_FILEBEAT_MODULE: ${WAZUH_FILEBEAT_MODULE}
 | 
			
		||||
    image: wazuh/wazuh-manager:${WAZUH_IMAGE_VERSION}
 | 
			
		||||
    hostname: wazuh.manager
 | 
			
		||||
    restart: always
 | 
			
		||||
@@ -61,6 +63,7 @@ services:
 | 
			
		||||
      args:
 | 
			
		||||
        WAZUH_VERSION: ${WAZUH_VERSION}
 | 
			
		||||
        WAZUH_TAG_REVISION: ${WAZUH_TAG_REVISION}
 | 
			
		||||
        WAZUH_UI_REVISION: ${WAZUH_UI_REVISION}
 | 
			
		||||
    image: wazuh/wazuh-dashboard:${WAZUH_IMAGE_VERSION}
 | 
			
		||||
    hostname: wazuh.dashboard
 | 
			
		||||
    restart: always
 | 
			
		||||
 
 | 
			
		||||
@@ -4,7 +4,7 @@ FROM ubuntu:focal AS builder
 | 
			
		||||
ARG WAZUH_VERSION
 | 
			
		||||
ARG WAZUH_TAG_REVISION
 | 
			
		||||
ARG INSTALL_DIR=/usr/share/wazuh-dashboard
 | 
			
		||||
ARG WAZUH_UI_REVISION=1
 | 
			
		||||
ARG WAZUH_UI_REVISION
 | 
			
		||||
 | 
			
		||||
# Update and install dependencies
 | 
			
		||||
RUN apt-get update && apt install curl libcap2-bin xz-utils -y
 | 
			
		||||
@@ -66,6 +66,8 @@ ENV PATTERN="" \
 | 
			
		||||
    EXTENSIONS_CISCAT="" \
 | 
			
		||||
    EXTENSIONS_AWS="" \
 | 
			
		||||
    EXTENSIONS_GCP="" \
 | 
			
		||||
    EXTENSIONS_GITHUB=""\
 | 
			
		||||
    EXTENSIONS_OFFICE=""\
 | 
			
		||||
    EXTENSIONS_VIRUSTOTAL="" \
 | 
			
		||||
    EXTENSIONS_OSQUERY="" \
 | 
			
		||||
    EXTENSIONS_DOCKER="" \
 | 
			
		||||
@@ -78,9 +80,6 @@ ENV PATTERN="" \
 | 
			
		||||
    WAZUH_MONITORING_SHARDS="" \
 | 
			
		||||
    WAZUH_MONITORING_REPLICAS=""
 | 
			
		||||
 | 
			
		||||
# Install dependencies
 | 
			
		||||
RUN apt update && apt install -y libnss3-dev fonts-liberation libfontconfig1
 | 
			
		||||
 | 
			
		||||
# Create wazuh-dashboard user and group
 | 
			
		||||
RUN getent group $GROUP || groupadd -r -g 1000 $GROUP
 | 
			
		||||
RUN useradd --system \
 | 
			
		||||
@@ -102,6 +101,10 @@ RUN chown 1000:1000 /*.sh
 | 
			
		||||
# Copy Install dir from builder to current image
 | 
			
		||||
COPY --from=builder --chown=1000:1000 $INSTALL_DIR $INSTALL_DIR
 | 
			
		||||
 | 
			
		||||
# Create custom directory
 | 
			
		||||
RUN mkdir -p /usr/share/wazuh-dashboard/plugins/wazuh/public/assets/custom
 | 
			
		||||
RUN chown 1000:1000 /usr/share/wazuh-dashboard/plugins/wazuh/public/assets/custom
 | 
			
		||||
 | 
			
		||||
# Set workdir and user
 | 
			
		||||
WORKDIR $INSTALL_DIR
 | 
			
		||||
USER wazuh-dashboard
 | 
			
		||||
 
 | 
			
		||||
@@ -9,8 +9,8 @@ export CONFIG_DIR=${INSTALLATION_DIR}/config
 | 
			
		||||
 | 
			
		||||
## Variables
 | 
			
		||||
CERT_TOOL=wazuh-certs-tool.sh
 | 
			
		||||
PACKAGES_URL=https://packages.wazuh.com/4.6/
 | 
			
		||||
PACKAGES_DEV_URL=https://packages-dev.wazuh.com/4.6/
 | 
			
		||||
PACKAGES_URL=https://packages.wazuh.com/4.7/
 | 
			
		||||
PACKAGES_DEV_URL=https://packages-dev.wazuh.com/4.7/
 | 
			
		||||
 | 
			
		||||
## Check if the cert tool exists in S3 buckets
 | 
			
		||||
CERT_TOOL_PACKAGES=$(curl --silent -I $PACKAGES_URL$CERT_TOOL | grep -E "^HTTP" | awk  '{print $2}')
 | 
			
		||||
 
 | 
			
		||||
@@ -16,7 +16,7 @@
 | 
			
		||||
# https://documentation.wazuh.com/current/installation-guide/index.html
 | 
			
		||||
#
 | 
			
		||||
# Also, you can check our repository:
 | 
			
		||||
# https://github.com/wazuh/wazuh-kibana-app
 | 
			
		||||
# https://github.com/wazuh/wazuh-dashboard-plugins
 | 
			
		||||
#
 | 
			
		||||
# ------------------------------- Index patterns -------------------------------
 | 
			
		||||
#
 | 
			
		||||
 
 | 
			
		||||
@@ -25,6 +25,8 @@ declare -A CONFIG_MAP=(
 | 
			
		||||
  [extensions.ciscat]=$EXTENSIONS_CISCAT
 | 
			
		||||
  [extensions.aws]=$EXTENSIONS_AWS
 | 
			
		||||
  [extensions.gcp]=$EXTENSIONS_GCP
 | 
			
		||||
  [extensions.github]=$EXTENSIONS_GITHUB
 | 
			
		||||
  [extensions.office]=$EXTENSIONS_OFFICE
 | 
			
		||||
  [extensions.virustotal]=$EXTENSIONS_VIRUSTOTAL
 | 
			
		||||
  [extensions.osquery]=$EXTENSIONS_OSQUERY
 | 
			
		||||
  [extensions.docker]=$EXTENSIONS_DOCKER
 | 
			
		||||
 
 | 
			
		||||
@@ -53,8 +53,8 @@ tar -xf ${INDEXER_FILE}
 | 
			
		||||
## Variables
 | 
			
		||||
CERT_TOOL=wazuh-certs-tool.sh
 | 
			
		||||
PASSWORD_TOOL=wazuh-passwords-tool.sh
 | 
			
		||||
PACKAGES_URL=https://packages.wazuh.com/4.6/
 | 
			
		||||
PACKAGES_DEV_URL=https://packages-dev.wazuh.com/4.6/
 | 
			
		||||
PACKAGES_URL=https://packages.wazuh.com/4.7/
 | 
			
		||||
PACKAGES_DEV_URL=https://packages-dev.wazuh.com/4.7/
 | 
			
		||||
 | 
			
		||||
## Check if the cert tool exists in S3 buckets
 | 
			
		||||
CERT_TOOL_PACKAGES=$(curl --silent -I $PACKAGES_URL$CERT_TOOL | grep -E "^HTTP" | awk  '{print $2}')
 | 
			
		||||
@@ -133,6 +133,14 @@ cp -pr /wazuh-certificates/admin-key.pem ${TARGET_DIR}${CONFIG_DIR}/certs/admin-
 | 
			
		||||
# Delete xms and xmx parameters in jvm.options
 | 
			
		||||
sed '/-Xms/d' -i ${TARGET_DIR}${CONFIG_DIR}/jvm.options
 | 
			
		||||
sed '/-Xmx/d' -i ${TARGET_DIR}${CONFIG_DIR}/jvm.options
 | 
			
		||||
sed -i 's/-Djava.security.policy=file:\/\/\/etc\/wazuh-indexer\/opensearch-performance-analyzer\/opensearch_security.policy/-Djava.security.policy=file:\/\/\/usr\/share\/wazuh-indexer\/opensearch-performance-analyzer\/opensearch_security.policy/g' ${TARGET_DIR}${CONFIG_DIR}/jvm.options
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
chmod -R 500 ${TARGET_DIR}${CONFIG_DIR}/certs
 | 
			
		||||
chmod -R 400 ${TARGET_DIR}${CONFIG_DIR}/certs/*
 | 
			
		||||
chmod -R 400 ${TARGET_DIR}${CONFIG_DIR}/certs/*
 | 
			
		||||
 | 
			
		||||
find ${TARGET_DIR} -type d -exec chmod 750 {} \;
 | 
			
		||||
find ${TARGET_DIR} -type f -perm 644 -exec chmod 640 {} \;
 | 
			
		||||
find ${TARGET_DIR} -type f -perm 664 -exec chmod 660 {} \;
 | 
			
		||||
find ${TARGET_DIR} -type f -perm 755 -exec chmod 750 {} \;
 | 
			
		||||
find ${TARGET_DIR} -type f -perm 744 -exec chmod 740 {} \;
 | 
			
		||||
 
 | 
			
		||||
@@ -5,10 +5,10 @@ RUN rm /bin/sh && ln -s /bin/bash /bin/sh
 | 
			
		||||
 | 
			
		||||
ARG WAZUH_VERSION
 | 
			
		||||
ARG WAZUH_TAG_REVISION
 | 
			
		||||
ARG TEMPLATE_VERSION=4.6
 | 
			
		||||
ARG FILEBEAT_TEMPLATE_BRANCH
 | 
			
		||||
ARG FILEBEAT_CHANNEL=filebeat-oss
 | 
			
		||||
ARG FILEBEAT_VERSION=7.10.2
 | 
			
		||||
ARG WAZUH_FILEBEAT_MODULE="wazuh-filebeat-0.2.tar.gz"
 | 
			
		||||
ARG WAZUH_FILEBEAT_MODULE
 | 
			
		||||
 | 
			
		||||
RUN apt-get update && apt install curl apt-transport-https lsb-release gnupg -y
 | 
			
		||||
 | 
			
		||||
@@ -24,8 +24,6 @@ RUN curl -L -O https://artifacts.elastic.co/downloads/beats/filebeat/${FILEBEAT_
 | 
			
		||||
    dpkg -i ${FILEBEAT_CHANNEL}-${FILEBEAT_VERSION}-amd64.deb && rm -f ${FILEBEAT_CHANNEL}-${FILEBEAT_VERSION}-amd64.deb && \
 | 
			
		||||
    curl -s https://packages.wazuh.com/4.x/filebeat/${WAZUH_FILEBEAT_MODULE} | tar -xvz -C /usr/share/filebeat/module
 | 
			
		||||
 | 
			
		||||
RUN curl -L https://github.com/aelsabbahy/goss/releases/latest/download/goss-linux-amd64 -o /usr/local/bin/goss && chmod +rx /usr/local/bin/goss
 | 
			
		||||
 | 
			
		||||
ARG S6_VERSION="v2.2.0.3"
 | 
			
		||||
RUN curl --fail --silent -L https://github.com/just-containers/s6-overlay/releases/download/${S6_VERSION}/s6-overlay-amd64.tar.gz \
 | 
			
		||||
    -o /tmp/s6-overlay-amd64.tar.gz && \
 | 
			
		||||
@@ -40,7 +38,7 @@ COPY config/filebeat.yml /etc/filebeat/
 | 
			
		||||
 | 
			
		||||
RUN chmod go-w /etc/filebeat/filebeat.yml
 | 
			
		||||
 | 
			
		||||
ADD https://raw.githubusercontent.com/wazuh/wazuh/$TEMPLATE_VERSION/extensions/elasticsearch/7.x/wazuh-template.json /etc/filebeat
 | 
			
		||||
ADD https://raw.githubusercontent.com/wazuh/wazuh/$FILEBEAT_TEMPLATE_BRANCH/extensions/elasticsearch/7.x/wazuh-template.json /etc/filebeat
 | 
			
		||||
RUN chmod go-w /etc/filebeat/wazuh-template.json
 | 
			
		||||
 | 
			
		||||
# Prepare permanent data
 | 
			
		||||
@@ -54,4 +52,4 @@ RUN chmod 755 /permanent_data.sh && \
 | 
			
		||||
# Services ports
 | 
			
		||||
EXPOSE 55000/tcp 1514/tcp 1515/tcp 514/udp 1516/tcp
 | 
			
		||||
 | 
			
		||||
ENTRYPOINT [ "/init" ]
 | 
			
		||||
ENTRYPOINT [ "/init" ]
 | 
			
		||||
 
 | 
			
		||||
@@ -13,7 +13,7 @@ SPECIAL_CHARS = "@$!%*?&-_"
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
try:
 | 
			
		||||
    from wazuh.rbac.orm import create_rbac_db
 | 
			
		||||
    from wazuh.rbac.orm import check_database_integrity
 | 
			
		||||
    from wazuh.security import (
 | 
			
		||||
        create_user,
 | 
			
		||||
        get_users,
 | 
			
		||||
@@ -69,7 +69,7 @@ if __name__ == "__main__":
 | 
			
		||||
    username, password = read_user_file()
 | 
			
		||||
 | 
			
		||||
    # create RBAC database
 | 
			
		||||
    create_rbac_db()
 | 
			
		||||
    check_database_integrity()
 | 
			
		||||
 | 
			
		||||
    initial_users = db_users()
 | 
			
		||||
    if username not in initial_users:
 | 
			
		||||
 
 | 
			
		||||
@@ -21,6 +21,8 @@ PERMANENT_DATA_EXCP[((i++))]="/var/ossec/integrations/slack"
 | 
			
		||||
PERMANENT_DATA_EXCP[((i++))]="/var/ossec/integrations/slack.py"
 | 
			
		||||
PERMANENT_DATA_EXCP[((i++))]="/var/ossec/integrations/virustotal"
 | 
			
		||||
PERMANENT_DATA_EXCP[((i++))]="/var/ossec/integrations/virustotal.py"
 | 
			
		||||
PERMANENT_DATA_EXCP[((i++))]="/var/ossec/integrations/shuffle"
 | 
			
		||||
PERMANENT_DATA_EXCP[((i++))]="/var/ossec/integrations/shuffle.py"
 | 
			
		||||
PERMANENT_DATA_EXCP[((i++))]="/var/ossec/active-response/bin/default-firewall-drop"
 | 
			
		||||
PERMANENT_DATA_EXCP[((i++))]="/var/ossec/active-response/bin/disable-account"
 | 
			
		||||
PERMANENT_DATA_EXCP[((i++))]="/var/ossec/active-response/bin/firewalld-drop"
 | 
			
		||||
 
 | 
			
		||||
@@ -8,8 +8,8 @@
 | 
			
		||||
## Variables
 | 
			
		||||
CERT_TOOL=wazuh-certs-tool.sh
 | 
			
		||||
PASSWORD_TOOL=wazuh-passwords-tool.sh
 | 
			
		||||
PACKAGES_URL=https://packages.wazuh.com/4.6/
 | 
			
		||||
PACKAGES_DEV_URL=https://packages-dev.wazuh.com/4.6/
 | 
			
		||||
PACKAGES_URL=https://packages.wazuh.com/4.7/
 | 
			
		||||
PACKAGES_DEV_URL=https://packages-dev.wazuh.com/4.7/
 | 
			
		||||
 | 
			
		||||
## Check if the cert tool exists in S3 buckets
 | 
			
		||||
CERT_TOOL_PACKAGES=$(curl --silent -I $PACKAGES_URL$CERT_TOOL | grep -E "^HTTP" | awk  '{print $2}')
 | 
			
		||||
@@ -17,13 +17,13 @@ CERT_TOOL_PACKAGES_DEV=$(curl --silent -I $PACKAGES_DEV_URL$CERT_TOOL | grep -E
 | 
			
		||||
 | 
			
		||||
## If cert tool exists in some bucket, download it, if not exit 1
 | 
			
		||||
if [ "$CERT_TOOL_PACKAGES" = "200" ]; then
 | 
			
		||||
  curl -o $CERT_TOOL $PACKAGES_URL$CERT_TOOL
 | 
			
		||||
  echo "Cert tool exists in Packages bucket"
 | 
			
		||||
  curl -o $CERT_TOOL $PACKAGES_URL$CERT_TOOL -s
 | 
			
		||||
  echo "The tool to create the certificates exists in the in Packages bucket"
 | 
			
		||||
elif [ "$CERT_TOOL_PACKAGES_DEV" = "200" ]; then
 | 
			
		||||
  curl -o $CERT_TOOL $PACKAGES_DEV_URL$CERT_TOOL
 | 
			
		||||
  echo "Cert tool exists in Packages-dev bucket"
 | 
			
		||||
  curl -o $CERT_TOOL $PACKAGES_DEV_URL$CERT_TOOL -s
 | 
			
		||||
  echo "The tool to create the certificates exists in Packages-dev bucket"
 | 
			
		||||
else
 | 
			
		||||
  echo "Cert tool does not exist in any bucket"
 | 
			
		||||
  echo "The tool to create the certificates does not exist in any bucket"
 | 
			
		||||
  echo "ERROR: certificates were not created"
 | 
			
		||||
  exit 1
 | 
			
		||||
fi
 | 
			
		||||
@@ -41,9 +41,9 @@ source /$CERT_TOOL -A
 | 
			
		||||
nodes_server=$( cert_parseYaml /config.yml | grep nodes_server__name | sed 's/nodes_server__name=//' )
 | 
			
		||||
node_names=($nodes_server)
 | 
			
		||||
 | 
			
		||||
echo "Moving created certificates to destination directory"
 | 
			
		||||
echo "Moving created certificates to the destination directory"
 | 
			
		||||
cp /wazuh-certificates/* /certificates/
 | 
			
		||||
echo "changing certificate permissions"
 | 
			
		||||
echo "Changing certificate permissions"
 | 
			
		||||
chmod -R 500 /certificates
 | 
			
		||||
chmod -R 400 /certificates/*
 | 
			
		||||
echo "Setting UID indexer and dashboard"
 | 
			
		||||
 
 | 
			
		||||
@@ -108,15 +108,16 @@
 | 
			
		||||
      <os>xenial</os>
 | 
			
		||||
      <os>bionic</os>
 | 
			
		||||
      <os>focal</os>
 | 
			
		||||
      <os>jammy</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- Debian OS vulnerabilities -->
 | 
			
		||||
    <provider name="debian">
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>stretch</os>
 | 
			
		||||
      <os>buster</os>
 | 
			
		||||
      <os>bullseye</os>
 | 
			
		||||
      <os>bookworm</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
@@ -127,6 +128,7 @@
 | 
			
		||||
      <os>6</os>
 | 
			
		||||
      <os>7</os>
 | 
			
		||||
      <os>8</os>
 | 
			
		||||
      <os>9</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
@@ -135,6 +137,19 @@
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>amazon-linux</os>
 | 
			
		||||
      <os>amazon-linux-2</os>
 | 
			
		||||
      <os>amazon-linux-2023</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- SUSE Linux Enterprise OS vulnerabilities -->
 | 
			
		||||
    <provider name="suse">
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>11-server</os>
 | 
			
		||||
      <os>11-desktop</os>
 | 
			
		||||
      <os>12-server</os>
 | 
			
		||||
      <os>12-desktop</os>
 | 
			
		||||
      <os>15-server</os>
 | 
			
		||||
      <os>15-desktop</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
@@ -150,10 +165,17 @@
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- Alma Linux OS vulnerabilities -->
 | 
			
		||||
    <provider name="almalinux">
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>8</os>
 | 
			
		||||
      <os>9</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- Aggregate vulnerabilities -->
 | 
			
		||||
    <provider name="nvd">
 | 
			
		||||
      <enabled>yes</enabled>
 | 
			
		||||
      <update_from_year>2010</update_from_year>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
@@ -354,4 +376,4 @@
 | 
			
		||||
    <location>/var/log/dpkg.log</location>
 | 
			
		||||
  </localfile>
 | 
			
		||||
 | 
			
		||||
</ossec_config>
 | 
			
		||||
</ossec_config>
 | 
			
		||||
 
 | 
			
		||||
@@ -108,15 +108,16 @@
 | 
			
		||||
      <os>xenial</os>
 | 
			
		||||
      <os>bionic</os>
 | 
			
		||||
      <os>focal</os>
 | 
			
		||||
      <os>jammy</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- Debian OS vulnerabilities -->
 | 
			
		||||
    <provider name="debian">
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>stretch</os>
 | 
			
		||||
      <os>buster</os>
 | 
			
		||||
      <os>bullseye</os>
 | 
			
		||||
      <os>bookworm</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
@@ -127,6 +128,7 @@
 | 
			
		||||
      <os>6</os>
 | 
			
		||||
      <os>7</os>
 | 
			
		||||
      <os>8</os>
 | 
			
		||||
      <os>9</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
@@ -135,6 +137,19 @@
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>amazon-linux</os>
 | 
			
		||||
      <os>amazon-linux-2</os>
 | 
			
		||||
      <os>amazon-linux-2023</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- SUSE Linux Enterprise OS vulnerabilities -->
 | 
			
		||||
    <provider name="suse">
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>11-server</os>
 | 
			
		||||
      <os>11-desktop</os>
 | 
			
		||||
      <os>12-server</os>
 | 
			
		||||
      <os>12-desktop</os>
 | 
			
		||||
      <os>15-server</os>
 | 
			
		||||
      <os>15-desktop</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
@@ -144,6 +159,14 @@
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- Alma Linux OS vulnerabilities -->
 | 
			
		||||
    <provider name="almalinux">
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>8</os>
 | 
			
		||||
      <os>9</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- Windows OS vulnerabilities -->
 | 
			
		||||
    <provider name="msu">
 | 
			
		||||
      <enabled>yes</enabled>
 | 
			
		||||
@@ -153,7 +176,6 @@
 | 
			
		||||
    <!-- Aggregate vulnerabilities -->
 | 
			
		||||
    <provider name="nvd">
 | 
			
		||||
      <enabled>yes</enabled>
 | 
			
		||||
      <update_from_year>2010</update_from_year>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
@@ -354,4 +376,4 @@
 | 
			
		||||
    <location>/var/log/dpkg.log</location>
 | 
			
		||||
  </localfile>
 | 
			
		||||
 | 
			
		||||
</ossec_config>
 | 
			
		||||
</ossec_config>
 | 
			
		||||
 
 | 
			
		||||
@@ -3,9 +3,16 @@ version: '3.7'
 | 
			
		||||
 | 
			
		||||
services:
 | 
			
		||||
  wazuh.master:
 | 
			
		||||
    image: wazuh/wazuh-manager:4.6.0
 | 
			
		||||
    image: wazuh/wazuh-manager:4.7.0
 | 
			
		||||
    hostname: wazuh.master
 | 
			
		||||
    restart: always
 | 
			
		||||
    ulimits:
 | 
			
		||||
      memlock:
 | 
			
		||||
        soft: -1
 | 
			
		||||
        hard: -1
 | 
			
		||||
      nofile:
 | 
			
		||||
        soft: 655360
 | 
			
		||||
        hard: 655360
 | 
			
		||||
    ports:
 | 
			
		||||
      - "1515:1515"
 | 
			
		||||
      - "514:514/udp"
 | 
			
		||||
@@ -38,9 +45,16 @@ services:
 | 
			
		||||
      - ./config/wazuh_cluster/wazuh_manager.conf:/wazuh-config-mount/etc/ossec.conf
 | 
			
		||||
 | 
			
		||||
  wazuh.worker:
 | 
			
		||||
    image: wazuh/wazuh-manager:4.6.0
 | 
			
		||||
    image: wazuh/wazuh-manager:4.7.0
 | 
			
		||||
    hostname: wazuh.worker
 | 
			
		||||
    restart: always
 | 
			
		||||
    ulimits:
 | 
			
		||||
      memlock:
 | 
			
		||||
        soft: -1
 | 
			
		||||
        hard: -1
 | 
			
		||||
      nofile:
 | 
			
		||||
        soft: 655360
 | 
			
		||||
        hard: 655360
 | 
			
		||||
    environment:
 | 
			
		||||
      - INDEXER_URL=https://wazuh1.indexer:9200
 | 
			
		||||
      - INDEXER_USERNAME=admin
 | 
			
		||||
@@ -67,7 +81,7 @@ services:
 | 
			
		||||
      - ./config/wazuh_cluster/wazuh_worker.conf:/wazuh-config-mount/etc/ossec.conf
 | 
			
		||||
 | 
			
		||||
  wazuh1.indexer:
 | 
			
		||||
    image: wazuh/wazuh-indexer:4.6.0
 | 
			
		||||
    image: wazuh/wazuh-indexer:4.7.0
 | 
			
		||||
    hostname: wazuh1.indexer
 | 
			
		||||
    restart: always
 | 
			
		||||
    ports:
 | 
			
		||||
@@ -93,7 +107,7 @@ services:
 | 
			
		||||
      - ./config/wazuh_indexer/internal_users.yml:/usr/share/wazuh-indexer/opensearch-security/internal_users.yml
 | 
			
		||||
 | 
			
		||||
  wazuh2.indexer:
 | 
			
		||||
    image: wazuh/wazuh-indexer:4.6.0
 | 
			
		||||
    image: wazuh/wazuh-indexer:4.7.0
 | 
			
		||||
    hostname: wazuh2.indexer
 | 
			
		||||
    restart: always
 | 
			
		||||
    environment:
 | 
			
		||||
@@ -115,7 +129,7 @@ services:
 | 
			
		||||
      - ./config/wazuh_indexer/internal_users.yml:/usr/share/wazuh-indexer/opensearch-security/internal_users.yml
 | 
			
		||||
 | 
			
		||||
  wazuh3.indexer:
 | 
			
		||||
    image: wazuh/wazuh-indexer:4.6.0
 | 
			
		||||
    image: wazuh/wazuh-indexer:4.7.0
 | 
			
		||||
    hostname: wazuh3.indexer
 | 
			
		||||
    restart: always
 | 
			
		||||
    environment:
 | 
			
		||||
@@ -137,7 +151,7 @@ services:
 | 
			
		||||
      - ./config/wazuh_indexer/internal_users.yml:/usr/share/wazuh-indexer/opensearch-security/internal_users.yml
 | 
			
		||||
 | 
			
		||||
  wazuh.dashboard:
 | 
			
		||||
    image: wazuh/wazuh-dashboard:4.6.0
 | 
			
		||||
    image: wazuh/wazuh-dashboard:4.7.0
 | 
			
		||||
    hostname: wazuh.dashboard
 | 
			
		||||
    restart: always
 | 
			
		||||
    ports:
 | 
			
		||||
@@ -155,6 +169,8 @@ services:
 | 
			
		||||
      - ./config/wazuh_indexer_ssl_certs/root-ca.pem:/usr/share/wazuh-dashboard/certs/root-ca.pem
 | 
			
		||||
      - ./config/wazuh_dashboard/opensearch_dashboards.yml:/usr/share/wazuh-dashboard/config/opensearch_dashboards.yml
 | 
			
		||||
      - ./config/wazuh_dashboard/wazuh.yml:/usr/share/wazuh-dashboard/data/wazuh/config/wazuh.yml
 | 
			
		||||
      - wazuh-dashboard-config:/usr/share/wazuh-dashboard/data/wazuh/config
 | 
			
		||||
      - wazuh-dashboard-custom:/usr/share/wazuh-dashboard/plugins/wazuh/public/assets/custom
 | 
			
		||||
    depends_on:
 | 
			
		||||
      - wazuh1.indexer
 | 
			
		||||
    links:
 | 
			
		||||
@@ -204,3 +220,5 @@ volumes:
 | 
			
		||||
  wazuh-indexer-data-1:
 | 
			
		||||
  wazuh-indexer-data-2:
 | 
			
		||||
  wazuh-indexer-data-3:
 | 
			
		||||
  wazuh-dashboard-config:
 | 
			
		||||
  wazuh-dashboard-custom:
 | 
			
		||||
 
 | 
			
		||||
@@ -108,15 +108,16 @@
 | 
			
		||||
      <os>xenial</os>
 | 
			
		||||
      <os>bionic</os>
 | 
			
		||||
      <os>focal</os>
 | 
			
		||||
      <os>jammy</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- Debian OS vulnerabilities -->
 | 
			
		||||
    <provider name="debian">
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>stretch</os>
 | 
			
		||||
      <os>buster</os>
 | 
			
		||||
      <os>bullseye</os>
 | 
			
		||||
      <os>bookworm</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
@@ -127,6 +128,7 @@
 | 
			
		||||
      <os>6</os>
 | 
			
		||||
      <os>7</os>
 | 
			
		||||
      <os>8</os>
 | 
			
		||||
      <os>9</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
@@ -135,6 +137,19 @@
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>amazon-linux</os>
 | 
			
		||||
      <os>amazon-linux-2</os>
 | 
			
		||||
      <os>amazon-linux-2023</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- SUSE Linux Enterprise OS vulnerabilities -->
 | 
			
		||||
    <provider name="suse">
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>11-server</os>
 | 
			
		||||
      <os>11-desktop</os>
 | 
			
		||||
      <os>12-server</os>
 | 
			
		||||
      <os>12-desktop</os>
 | 
			
		||||
      <os>15-server</os>
 | 
			
		||||
      <os>15-desktop</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
@@ -144,6 +159,14 @@
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- Alma Linux OS vulnerabilities -->
 | 
			
		||||
    <provider name="almalinux">
 | 
			
		||||
      <enabled>no</enabled>
 | 
			
		||||
      <os>8</os>
 | 
			
		||||
      <os>9</os>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
    <!-- Windows OS vulnerabilities -->
 | 
			
		||||
    <provider name="msu">
 | 
			
		||||
      <enabled>yes</enabled>
 | 
			
		||||
@@ -153,7 +176,6 @@
 | 
			
		||||
    <!-- Aggregate vulnerabilities -->
 | 
			
		||||
    <provider name="nvd">
 | 
			
		||||
      <enabled>yes</enabled>
 | 
			
		||||
      <update_from_year>2010</update_from_year>
 | 
			
		||||
      <update_interval>1h</update_interval>
 | 
			
		||||
    </provider>
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -3,9 +3,16 @@ version: '3.7'
 | 
			
		||||
 | 
			
		||||
services:
 | 
			
		||||
  wazuh.manager:
 | 
			
		||||
    image: wazuh/wazuh-manager:4.6.0
 | 
			
		||||
    image: wazuh/wazuh-manager:4.7.0
 | 
			
		||||
    hostname: wazuh.manager
 | 
			
		||||
    restart: always
 | 
			
		||||
    ulimits:
 | 
			
		||||
      memlock:
 | 
			
		||||
        soft: -1
 | 
			
		||||
        hard: -1
 | 
			
		||||
      nofile:
 | 
			
		||||
        soft: 655360
 | 
			
		||||
        hard: 655360
 | 
			
		||||
    ports:
 | 
			
		||||
      - "1514:1514"
 | 
			
		||||
      - "1515:1515"
 | 
			
		||||
@@ -39,7 +46,7 @@ services:
 | 
			
		||||
      - ./config/wazuh_cluster/wazuh_manager.conf:/wazuh-config-mount/etc/ossec.conf
 | 
			
		||||
 | 
			
		||||
  wazuh.indexer:
 | 
			
		||||
    image: wazuh/wazuh-indexer:4.6.0
 | 
			
		||||
    image: wazuh/wazuh-indexer:4.7.0
 | 
			
		||||
    hostname: wazuh.indexer
 | 
			
		||||
    restart: always
 | 
			
		||||
    ports:
 | 
			
		||||
@@ -64,7 +71,7 @@ services:
 | 
			
		||||
      - ./config/wazuh_indexer/internal_users.yml:/usr/share/wazuh-indexer/opensearch-security/internal_users.yml
 | 
			
		||||
 | 
			
		||||
  wazuh.dashboard:
 | 
			
		||||
    image: wazuh/wazuh-dashboard:4.6.0
 | 
			
		||||
    image: wazuh/wazuh-dashboard:4.7.0
 | 
			
		||||
    hostname: wazuh.dashboard
 | 
			
		||||
    restart: always
 | 
			
		||||
    ports:
 | 
			
		||||
@@ -83,6 +90,8 @@ services:
 | 
			
		||||
      - ./config/wazuh_indexer_ssl_certs/root-ca.pem:/usr/share/wazuh-dashboard/certs/root-ca.pem
 | 
			
		||||
      - ./config/wazuh_dashboard/opensearch_dashboards.yml:/usr/share/wazuh-dashboard/config/opensearch_dashboards.yml
 | 
			
		||||
      - ./config/wazuh_dashboard/wazuh.yml:/usr/share/wazuh-dashboard/data/wazuh/config/wazuh.yml
 | 
			
		||||
      - wazuh-dashboard-config:/usr/share/wazuh-dashboard/data/wazuh/config
 | 
			
		||||
      - wazuh-dashboard-custom:/usr/share/wazuh-dashboard/plugins/wazuh/public/assets/custom
 | 
			
		||||
    depends_on:
 | 
			
		||||
      - wazuh.indexer
 | 
			
		||||
    links:
 | 
			
		||||
@@ -102,3 +111,5 @@ volumes:
 | 
			
		||||
  filebeat_etc:
 | 
			
		||||
  filebeat_var:
 | 
			
		||||
  wazuh-indexer-data:
 | 
			
		||||
  wazuh-dashboard-config:
 | 
			
		||||
  wazuh-dashboard-custom:
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user