Skip to content
Snippets Groups Projects
Commit b458e2c1 authored by Matevz Erzen's avatar Matevz Erzen
Browse files

Changed repo structure

parent 9671be87
No related branches found
No related tags found
No related merge requests found
Showing
with 8 additions and 43 deletions
...@@ -2,4 +2,4 @@ ...@@ -2,4 +2,4 @@
wazuh-ansible/ wazuh-ansible/
*.swp *.swp
*.retry *.retry
security-monitoring-ansible/ansible/opendistro/ ansible/opendistro/
File moved
...@@ -3,6 +3,8 @@ ...@@ -3,6 +3,8 @@
This project is meant for quickly setting up Wazuh instance using Ansible scripts This project is meant for quickly setting up Wazuh instance using Ansible scripts
on top infrastructure provisioned using Vagrant. on top infrastructure provisioned using Vagrant.
In addition to Wazuh, ClamAV is also installed to agent machines (for testing purposes).
## Requirements ## Requirements
* Vagrant 2.2.14 * Vagrant 2.2.14
...@@ -21,7 +23,6 @@ $ git checkout tags/v4.1.5 ...@@ -21,7 +23,6 @@ $ git checkout tags/v4.1.5
1. Provision Wazuh server and Wazuh agents: 1. Provision Wazuh server and Wazuh agents:
``` ```
$ cd security-monitoring-ansible
$ make create provision $ make create provision
``` ```
......
...@@ -5,7 +5,7 @@ ...@@ -5,7 +5,7 @@
pre_tasks: pre_tasks:
- import_tasks: "{{ ansible_dir }}/globals/vars.yml" - import_tasks: "{{ ansible_dir }}/globals/vars.yml"
roles: roles:
- ../../../wazuh-ansible/roles/wazuh/ansible-wazuh-agent - ../wazuh-ansible/roles/wazuh/ansible-wazuh-agent
- docker - docker
vars: vars:
wazuh_managers: wazuh_managers:
......
...@@ -20,7 +20,6 @@ ...@@ -20,7 +20,6 @@
registry: "{{ docker_registry }}" registry: "{{ docker_registry }}"
username: "{{ docker_username }}" username: "{{ docker_username }}"
password: "{{ docker_token }}" password: "{{ docker_token }}"
reauthorize: yes
- name: Run Docker container - name: Run Docker container
docker_container: docker_container:
name: evidence-collector name: evidence-collector
......
...@@ -6,10 +6,10 @@ ...@@ -6,10 +6,10 @@
pre_tasks: pre_tasks:
- import_tasks: "{{ ansible_dir }}/globals/vars.yml" - import_tasks: "{{ ansible_dir }}/globals/vars.yml"
roles: roles:
- role: ../../../wazuh-ansible/roles/opendistro/opendistro-elasticsearch - role: ../wazuh-ansible/roles/opendistro/opendistro-elasticsearch
- role: ../../../wazuh-ansible/roles/wazuh/ansible-wazuh-manager - role: ../wazuh-ansible/roles/wazuh/ansible-wazuh-manager
- role: ../../../wazuh-ansible/roles/wazuh/ansible-filebeat-oss - role: ../wazuh-ansible/roles/wazuh/ansible-filebeat-oss
- role: ../../../wazuh-ansible/roles/opendistro/opendistro-kibana - role: ../wazuh-ansible/roles/opendistro/opendistro-kibana
- role: custom-integration - role: custom-integration
vars: vars:
single_node: true single_node: true
......
# Security Monitoring
This project is meant for quickly setting up Wazuh instance using Ansible scripts
on top infrastructure provisioned using Vagrant.
In addition to Wazuh, ClamAV is also installed to agent machines (for testing purposes).
## Requirements
* Vagrant 2.2.14
* Ansible 2.9.16
## Setting up the demo
First, checkout Wazuh's tag `v4.1.5` into the directory above the current one:
```
$ cd ..
$ git clone https://github.com/wazuh/wazuh-ansible.git
$ git checkout tags/v4.1.5
```
1. Provision Wazuh server and Wazuh agents:
```
[sre maj 12][10:31:32][ales@~/workspace/PIACERE/security-monitoring/security-monitoring-ansible]
$ make create provision
```
2. Check the running instances:
Navigate browser to: `https://192.168.33.10:5601`, login with default credentials `admin:changeme`. Navigate to `wazuh` section on the left hand-side.
You should see 2 agents registered and running with Wazuh.
\ No newline at end of file
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment