mirror of
				https://github.com/wazuh/wazuh-docker.git
				synced 2025-11-03 21:43:17 +00:00 
			
		
		
		
	
			
				
					
						
					
					ee59bf6f382d557e0f812d83af64a3b409259f78
				
			
			
		
	- Use a clean template without enabled defaults - Remove legacy code to clean defaults
Wazuh containers for Docker
In this repository you will find the containers to run:
- wazuh: It runs the Wazuh manager, Wazuh API and Filebeat (for integration with Elastic Stack)
 - wazuh-kibana: Provides a web user interface to browse through alerts data. It includes Wazuh plugin for Kibana, that allows you to visualize agents configuration and status.
 - nginx: Proxies the Kibana container, adding HTTPS (via your own certificate or self-signed) and Basic authentication. It is required to set up SSL certificate before deploying
 - wazuh-elasticsearch: An Elasticsearch container (working as a single-node cluster) using Elastic Stack Docker images. Be aware to increase the 
vm.max_map_countsetting, as it's detailed in the Wazuh documentation. 
In addition, a docker-compose file is provided to launch the containers mentioned above.
- Elasticsearch cluster. In the Elasticsearch Dockerfile we can visualize variables to configure an Elasticsearch Cluster. These variables are used in the file config_cluster.sh to set them in the elasticsearch.yml configuration file. You can see the meaning of the node variables here and other cluster settings here.
 
Documentation
Setup SSL certificate and Basic Authentication
Before starting the environment it is required to provide an SSL certificate (or just generate one self-signed) and setup the basic auth.
Directory structure
wazuh-docker
├── CHANGELOG.md
├── docker-compose.yml
├── elasticsearch
│   ├── config
│   │   ├── config_cluster.sh
│   │   ├── configure_s3.sh
│   │   ├── entrypoint.sh
│   │   └── load_settings.sh
│   └── Dockerfile
├── kibana
│   ├── config
│   │   ├── entrypoint.sh
│   │   ├── kibana_settings.sh
│   │   ├── wazuh_app_config.sh
│   │   ├── welcome_wazuh.sh
│   │   └── xpack_config.sh
│   └── Dockerfile
├── LICENSE
├── README.md
├── VERSION
└── wazuh
    ├── config
    │   ├── etc
    │   │   ├── cont-init.d
    │   │   │   ├── 0-wazuh-init
    │   │   │   ├── 1-config-filebeat
    │   │   │   └── 2-manager
    │   │   └── services.d
    │   │       ├── api
    │   │       └── filebeat
    │   ├── filebeat.yml
    │   ├── permanent_data.env
    │   ├── permanent_data.sh
    │   └── wazuh.repo
    └── Dockerfile
Branches
stablebranch on correspond to the latest Wazuh-Docker stable version.masterbranch contains the latest code, be aware of possible bugs on this branch.Wazuh.Version_ElasticStack.Version(for example 3.10.2_7.5.0) branch. This branch contains the current release referenced in Docker Hub. The container images are installed under the current version of this branch.
Credits and Thank you
These Docker containers are based on:
- "deviantony" dockerfiles which can be found at https://github.com/deviantony/docker-elk
 - "xetus-oss" dockerfiles, which can be found at https://github.com/xetus-oss/docker-ossec-server
 
We thank you them and everyone else who has contributed to this project.
License and copyright
Wazuh Docker Copyright (C) 2020 Wazuh Inc. (License GPLv2)
Web references
Description
				Wazuh - Docker containers
						
						
						
							
							compliancedockerelasticsearchfile-integrity-managementhacktoberfesthacktoberfest-acceptedidsincident-responseintrusion-detectionlog-analysisloganalyzermonitoringossecpci-dsspolicy-monitoringsecuritysecurity-awarenesssecurity-hardeningvulnerability-detectionwazuh
						
						
						
							
								 Readme
							
						
						
						
						
							
							
							 390 MiB
						
					
					Languages
				
				
								
								
									Shell
								
								75.5%
							
						
							
								
								
									Dockerfile
								
								18.8%
							
						
							
								
								
									Python
								
								5.7%