@@ -57,7 +57,9 @@ Define VM sizing in ``etc/kayobe/inventory/group_vars/wazuh-manager/infra-vms``:
57
57
infra_vm_data_capacity: "200G"
58
58
59
59
60
- Optional: define LVM volumes ``etc/kayobe/inventory/group_vars/wazuh-manager/lvm ``:
60
+ Optional: define LVM volumes in ``etc/kayobe/inventory/group_vars/wazuh-manager/lvm ``.
61
+ ``/var/ossec `` often requires greater storage space, and ``/var/lib/wazuh-indexer ``
62
+ may be beneficial too.
61
63
62
64
.. code-block :: console
63
65
@@ -73,7 +75,7 @@ Optional: define LVM volumes ``etc/kayobe/inventory/group_vars/wazuh-manager/lvm
73
75
size: "100%VG"
74
76
filesystem: "ext4"
75
77
mount: true
76
- mntp: “ /var/lib/elasticsearch”
78
+ mntp: " /var/ossec"
77
79
create: true
78
80
79
81
@@ -249,7 +251,7 @@ It will be used by wazuh secrets playbook to generate wazuh secrets vault file.
249
251
.. code-block :: console
250
252
251
253
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-secrets.yml
252
- ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/inventory/group_vars/ wazuh/wazuh-manager/wazuh- secrets
254
+ ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/wazuh- secrets.yml
253
255
254
256
255
257
TLS (optional)
@@ -300,6 +302,21 @@ Example OpenSSL rune to convert to PKCS#8:
300
302
301
303
TODO: document how to use a local certificate. Do we need to override all certificates?
302
304
305
+ Custom SCA Policies (optional)
306
+ ------------------------------
307
+
308
+ Wazuh ships with a large selection of Security Configuration Assessment
309
+ rulesets. However, you may find you want to add more. This can be achieved via
310
+ `custom policies <https://documentation.wazuh.com/current/user-manual/capabilities/sec-config-assessment/how-to-configure.html >`_.
311
+
312
+ SKC supports this automatically, just add the policy file from this PR to
313
+ ``{{ kayobe_env_config_path }}/wazuh/custom_sca_policies ``.
314
+
315
+ Currently, Wazuh does not ship with a CIS benchmark for Rocky 9. You can find
316
+ the in-development policy here: https://github.com/wazuh/wazuh/pull/17810 To
317
+ include this in your deployment, simply copy it to
318
+ ``{{ kayobe_env_config_path }}/wazuh/custom_sca_policies/cis_rocky_linux_9.yml ``.
319
+
303
320
Deploy
304
321
------
305
322
@@ -314,6 +331,8 @@ Encrypt the keys (and remember to commit to git):
314
331
315
332
``ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/ansible/wazuh/certificates/certs/*.key ``
316
333
334
+ .. _wazuh-verification :
335
+
317
336
Verification
318
337
------------
319
338
0 commit comments