Skip to content
Snippets Groups Projects
README.md 5.19 KiB
Newer Older
This project includes modules for collecting evidence regarding Wazuh and VAT and sending it to [Clouditor](https://github.com/clouditor/clouditor) for further processing.

## Wazuh evidence collector

Wazuh evidence collector uses [Wazuh's API](https://documentation.wazuh.com/current/user-manual/api/reference.html) to access information about manager's and agents' system informations and configurations. As an additional measure to ensure correct configuration of [ClamAV](https://www.clamav.net/) (if installed on machine) we also make use of [Elasticsearch's API](https://www.elastic.co/guide/en/elasticsearch/reference/current/search.html) to dirrectly access collected logs - Elastic stack is one of the Wazuh's required components (usually installed on the same machine as Wazuh server, but can be stand alone as well).

## Installation & use

### Using docker
> Note: Docker image is not yet complete and might not work due to recent changes around scheduler etc.

1. Set up your Wazuh development environment. Use [Security Monitoring](https://gitlab.xlab.si/medina/security-monitoring) repository to create and deploy Vagrant box with all the required components.
Matevz Erzen's avatar
Matevz Erzen committed
2. Clone this repository.

3. Build Docker image:

```
$ docker build -t evidence-collector .
Matevz Erzen's avatar
Matevz Erzen committed
```

4. Run the image:

```
$ docker run evidence-collector
Matevz Erzen's avatar
Matevz Erzen committed
```

> Note: Current simple image runs code from `test.py`. If you wish to test anything else, change this file or edit `Dockerfile`.

### Local environment
Matevz Erzen's avatar
Matevz Erzen committed

1. Set up your Wazuh development environment. Use [Security Monitoring](https://gitlab.xlab.si/medina/security-monitoring) repository to create and deploy Vagrant box with all required components.

2. Clone this repository.

3. Install dependencies:
$ pip install -r requirements.txt
$ sudo apt-get install jq
Matevz Erzen's avatar
Matevz Erzen committed
4. a) Install Redis server locally:
$ sudo apt-get install redis-server
```

> Note: To stop Redis server use `/etc/init.d/redis-server stop`.

Matevz Erzen's avatar
Matevz Erzen committed
4. b) Run Redis server in Docker container:

```
$ docker run --name my-redis-server -p 6379:6379 -d redis
Matevz Erzen's avatar
Matevz Erzen committed
```

In this case also comment-out server start command in `entrypoint.sh`:

```
#redis-server &
```

5. Run `entrypoint.sh`:
$ ./entrypoint.sh
> Note: This repository consists of multiple Python modules. When running Python code manually, use of `-m` flag might be necessary.
Matevz Erzen's avatar
Matevz Erzen committed
## Component configuration 

### Generate gRPC code from `.proto` files

```
pip3 install grpcio-tools # (included in requirements.txt)
python3 -m grpc_tools.protoc --proto_path=proto evidence.proto --python_out=grpc_gen --grpc_python_out=grpc_gen
python3 -m grpc_tools.protoc --proto_path=proto assessment.proto --python_out=grpc_gen --grpc_python_out=grpc_gen
python3 -m grpc_tools.protoc --proto_path=proto metric.proto --python_out=grpc_gen --grpc_python_out=grpc_gen
As we are interacting with Clouditor, .proto files are taken from [there](https://github.com/clouditor/clouditor/tree/main/proto).  
Because of dependencies on Google APIs, .proto files in proto/google are taken from [here](https://github.com/googleapis/googleapis/tree/master/google/api).

> Note:
> since we are running the code as a package, we have to modify imports in newly generated code:
> `import evidence_pb2 as evidence__pb2` --> `import grpc_gen.evidence_pb2 as evidence__pb2`  
> (check all generated files)
### API User authentication

Matevz Erzen's avatar
Matevz Erzen committed
Current implementation has disabled SSL certificate verification & uses simple username/password verification (defined inside `/constants/constants.py`). Production version should change this with cert verification.

### Manual Elasticsearch API testin with cURL

Example command for testing the API via CLI: 

```
$ curl --user admin:changeme --insecure -X GET "https://192.168.33.10:9200/wazuh-alerts*/_search?pretty" -H 'Content-Type: application/json' -d'
  {"query": {
    "bool": {
      "must": [{"match": {"predecoder.program_name": "clamd"}},
              {"match": {"rule.description": "Clamd restarted"}},
              {"match": {"agent.id": "001"}}]
      }
### Running [RQ](https://github.com/rq/rq) and [RQ-scheduler](https://github.com/rq/rq-scheduler) localy

1. Install (if needed) and run `redis-server`:

```
$ sudo apt-get install redis-server
$ redis-server
```

> Note: By default, server listens on port `6379`. Take this into consideration when starting other components.

2. Install RQ and RQ-scheduler:

```
$ pip install rq
$ pip install rq-scheduler
```

3. Run both components in 2 terminals:

```
$ rqworker low
$ rqscheduler --host localhost --port 6379
```

> Note: `low` in the first command references task queue worker will use.

4. Run Python script containing RQ commands as usual:

```
$ python3 -m wazuh_evidence_collector.wazuh_evidence_collector
## Known issues

### Python Elasticsearch library problems with ODFE

Latest versions (`7.14.0` & `7.15.0`) of Python Elasticsearch library have problems connecting to Open Distro for Elasticsearch and produce the following error when trying to do so: 

```
elasticsearch.exceptions.UnsupportedProductError: The client noticed that the server is not a supported distribution of Elasticsearch
```

To resolve this, downgrade to older package version: 

```
$ pip install 'elasticsearch<7.14.0'