You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,16 +3,15 @@ All notable changes to this project will be documented in this file.
3
3
4
4
## [v4.13.1]
5
5
6
-
### Changed
7
-
8
-
-**Post-release**: Updated curl commands in the Upgrade guide. ([#8934](https://github.com/wazuh/wazuh-documentation/pull/8934))
9
-
-**Post-release**: Added indexer connector configuration steps to vulnerability detection documentation and removed troubleshooting section. ([#8942](https://github.com/wazuh/wazuh-documentation/pull/8942))
10
-
11
-
12
6
### Added
13
7
14
8
-**Post-release**: Updated the Wazuh Amazon Machine Images (AMI) documentation. ([#8938](https://github.com/wazuh/wazuh-documentation/pull/8938))
15
9
10
+
### Changed
11
+
12
+
-**Post-release**: Updated the upgrade guide for Wazuh central components. ([#8934](https://github.com/wazuh/wazuh-documentation/pull/8934)) ([#8941](https://github.com/wazuh/wazuh-documentation/pull/8941)) ([#8944](https://github.com/wazuh/wazuh-documentation/pull/8944))
13
+
-**Post-release**: Added indexer connector configuration steps to vulnerability detection documentation and removed troubleshooting section. ([#8942](https://github.com/wazuh/wazuh-documentation/pull/8942))
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
88
+
OpenSearch Version: 2.19.1
89
+
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
90
+
Clustername: wazuh-cluster
91
+
Clusterstate: GREEN
92
+
Number of nodes: 1
93
+
Number of data nodes: 1
94
+
.opendistro_security index already exists, so we do not need to create one.
95
+
Will retrieve '/config' into /etc/wazuh-indexer/opensearch-security/config.yml
96
+
SUCC: Configuration for 'config' stored in /etc/wazuh-indexer/opensearch-security/config.yml
97
+
Will retrieve '/roles' into /etc/wazuh-indexer/opensearch-security/roles.yml
98
+
SUCC: Configuration for 'roles' stored in /etc/wazuh-indexer/opensearch-security/roles.yml
99
+
Will retrieve '/rolesmapping' into /etc/wazuh-indexer/opensearch-security/roles_mapping.yml
100
+
SUCC: Configuration for 'rolesmapping' stored in /etc/wazuh-indexer/opensearch-security/roles_mapping.yml
101
+
Will retrieve '/internalusers' into /etc/wazuh-indexer/opensearch-security/internal_users.yml
102
+
SUCC: Configuration for 'internalusers' stored in /etc/wazuh-indexer/opensearch-security/internal_users.yml
103
+
Will retrieve '/actiongroups' into /etc/wazuh-indexer/opensearch-security/action_groups.yml
104
+
SUCC: Configuration for 'actiongroups' stored in /etc/wazuh-indexer/opensearch-security/action_groups.yml
105
+
Will retrieve '/tenants' into /etc/wazuh-indexer/opensearch-security/tenants.yml
106
+
SUCC: Configuration for 'tenants' stored in /etc/wazuh-indexer/opensearch-security/tenants.yml
107
+
Will retrieve '/nodesdn' into /etc/wazuh-indexer/opensearch-security/nodes_dn.yml
108
+
SUCC: Configuration for 'nodesdn' stored in /etc/wazuh-indexer/opensearch-security/nodes_dn.yml
109
+
Will retrieve '/whitelist' into /etc/wazuh-indexer/opensearch-security/whitelist.yml
110
+
SUCC: Configuration for 'whitelist' stored in /etc/wazuh-indexer/opensearch-security/whitelist.yml
111
+
Will retrieve '/allowlist' into /etc/wazuh-indexer/opensearch-security/allowlist.yml
112
+
SUCC: Configuration for 'allowlist' stored in /etc/wazuh-indexer/opensearch-security/allowlist.yml
113
+
Will retrieve '/audit' into /etc/wazuh-indexer/opensearch-security/audit.yml
114
+
SUCC: Configuration for 'audit' stored in /etc/wazuh-indexer/opensearch-security/audit.yml
115
+
76
116
#. Disable shard replication to prevent shard replicas from being created while Wazuh indexer nodes are being taken offline for the upgrade.
77
117
78
118
.. code-block:: bash
@@ -164,7 +204,7 @@ Perform the following steps on each Wazuh indexer node to upgrade them. Upgrade
164
204
165
205
# service wazuh-indexer stop
166
206
167
-
#. Backup the ``/etc/wazuh-indexer/jvm.options`` file to preserve your custom JVM settings. For example, create a copy of the file using the following command:
207
+
#. Backup the ``/etc/wazuh-indexer/jvm.options`` file to preserve your custom JVM settings. Create a copy of the file using the following command:
168
208
169
209
.. code-block:: console
170
210
@@ -205,6 +245,49 @@ Post-upgrade actions
205
245
206
246
Perform the following steps on any of the Wazuh indexer nodes replacing ``<WAZUH_INDEXER_IP_ADDRESS>``, ``<USERNAME>``, and ``<PASSWORD>``.
207
247
248
+
#. Run the ``indexer-security-init.sh`` script to apply the security configuration files from backup into the new Wazuh indexer:
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
260
+
OpenSearch Version: 2.19.2
261
+
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
262
+
Clustername: wazuh-cluster
263
+
Clusterstate: GREEN
264
+
Number of nodes: 1
265
+
Number of data nodes: 1
266
+
.opendistro_security index already exists, so we do not need to create one.
267
+
Populate config from /etc/wazuh-indexer/opensearch-security/
268
+
Will update '/config' with /etc/wazuh-indexer/opensearch-security/config.yml
269
+
SUCC: Configuration for 'config' created or updated
270
+
Will update '/roles' with /etc/wazuh-indexer/opensearch-security/roles.yml
271
+
SUCC: Configuration for 'roles' created or updated
272
+
Will update '/rolesmapping' with /etc/wazuh-indexer/opensearch-security/roles_mapping.yml
273
+
SUCC: Configuration for 'rolesmapping' created or updated
274
+
Will update '/internalusers' with /etc/wazuh-indexer/opensearch-security/internal_users.yml
275
+
SUCC: Configuration for 'internalusers' created or updated
276
+
Will update '/actiongroups' with /etc/wazuh-indexer/opensearch-security/action_groups.yml
277
+
SUCC: Configuration for 'actiongroups' created or updated
278
+
Will update '/tenants' with /etc/wazuh-indexer/opensearch-security/tenants.yml
279
+
SUCC: Configuration for 'tenants' created or updated
280
+
Will update '/nodesdn' with /etc/wazuh-indexer/opensearch-security/nodes_dn.yml
281
+
SUCC: Configuration for 'nodesdn' created or updated
282
+
Will update '/whitelist' with /etc/wazuh-indexer/opensearch-security/whitelist.yml
283
+
SUCC: Configuration for 'whitelist' created or updated
284
+
Will update '/audit' with /etc/wazuh-indexer/opensearch-security/audit.yml
285
+
SUCC: Configuration for 'audit' created or updated
286
+
Will update '/allowlist' with /etc/wazuh-indexer/opensearch-security/allowlist.yml
287
+
SUCC: Configuration for 'allowlist' created or updated
288
+
SUCC: Expected 10 config types for node {"updated_config_types":["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","actiongroups","config","internalusers"],"updated_config_size":10,"message":null} is 10 (["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","actiongroups","config","internalusers"]) due to: null
289
+
Done with success
290
+
208
291
#. Check that the newly upgraded Wazuh indexer nodes are in the cluster.
209
292
210
293
.. code-block:: console
@@ -296,27 +379,57 @@ Upgrading the Wazuh manager
296
379
#. Upgrade the Wazuh manager to the latest version:
If the ``/var/ossec/etc/ossec.conf`` configuration file was modified, it will not be replaced by the upgrade. You will therefore have to add the settings of the new capabilities manually. More information can be found in the :doc:`/user-manual/index`.
315
398
316
399
#. Run the following command on the Wazuh manager node(s) to start the Wazuh manager service if you stopped it earlier:
317
400
318
401
.. include:: /_templates/common/start_manager.rst
319
402
403
+
Configuring CDB lists
404
+
^^^^^^^^^^^^^^^^^^^^^
405
+
406
+
When upgrading from Wazuh 4.12.x or earlier, follow these steps to configure the newly added CDB lists.
407
+
408
+
#. Edit the ``/var/ossec/etc/ossec.conf`` file and update the ``<ruleset>`` block with the CDB lists highlighted below.
#. Restart the Wazuh manager to apply the configuration changes
430
+
431
+
.. include:: /_templates/common/start_manager.rst
432
+
320
433
.. _configuring_vulnerability_detection:
321
434
322
435
Configuring vulnerability detection
@@ -385,6 +498,10 @@ When upgrading from Wazuh version 4.7.x or earlier, follow these steps to config
385
498
386
499
If you have forgotten your Wazuh indexer password, refer to the :doc:`password management guide </user-manual/user-administration/password-management>` to reset it.
387
500
501
+
#. Restart the Wazuh manager to apply the configuration changes
0 commit comments