You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,7 @@ All notable changes to this project will be documented in this file.
10
10
### Changed
11
11
12
12
-**Post-release**: Updated the upgrade guide for Wazuh central components. ([#8934](https://github.com/wazuh/wazuh-documentation/pull/8934)) ([#8941](https://github.com/wazuh/wazuh-documentation/pull/8941)) ([#8944](https://github.com/wazuh/wazuh-documentation/pull/8944))
13
+
-**Post-release**: Added indexer connector configuration steps to vulnerability detection documentation and removed troubleshooting section. ([#8942](https://github.com/wazuh/wazuh-documentation/pull/8942))
Copy file name to clipboardExpand all lines: source/user-manual/capabilities/vulnerability-detection/configuring-scans.rst
+97Lines changed: 97 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,103 @@ Where:
24
24
- ``<index-status>`` enables the indexing of vulnerability inventory data. The default value is ``yes``. The allowed values are ``yes`` and ``no``.
25
25
- ``<feed-update-interval>`` specifies the time interval for periodic feed updates. The default value is ``60m`` (one hour), the minimum allowed. The allowed value is a positive number that contains a suffix character indicating a time unit, such as ``s`` (seconds), ``m`` (minutes), ``h`` (hours), and ``d`` (days).
26
26
27
+
The detected vulnerabilities are forwarded to the Wazuh indexer for querying, visualization, and deeper analysis using the :doc:`indexer connector </user-manual/reference/ossec-conf/indexer>` setting. The indexer connector setting is enabled by default in the ``/var/ossec/etc/ossec.conf`` file of the Wazuh manager.
28
+
29
+
The indexer connector may be missing if the Wazuh manager is using an old configuration file or if vulnerability detection was disabled during installation. In such cases, follow the steps below to add the indexer connector setting.
30
+
31
+
#. Add the indexer connector configuration block below to the ``/var/ossec/etc/ossec.conf`` file on the Wazuh manager:
- The ``<hosts>`` section contains the IP address or hostname of your Wazuh indexer node. You can find this value in the Filebeat configuration file at ``/etc/filebeat/filebeat.yml``.
52
+
- The ``<ca>``, ``<certificate>``, and ``<key>`` names match the files located in ``/etc/filebeat/certs/``.
53
+
54
+
#. If you are running a Wazuh indexer cluster infrastructure, add a ``<host>`` entry for each one of your Wazuh indexer nodes. For example, in a two-node configuration:
55
+
56
+
.. code-block:: xml
57
+
58
+
<hosts>
59
+
<host>https://10.0.0.1:9200</host>
60
+
<host>https://10.0.0.2:9200</host>
61
+
</hosts>
62
+
63
+
The Wazuh server will prioritize reporting to the first Wazuh indexer node in the list and switch to the next available node if the first one becomes unavailable.
64
+
65
+
#. Save the Wazuh indexer username and password into the Wazuh manager keystore using the :doc:`Wazuh-keystore </user-manual/reference/tools/wazuh-keystore>` tool:
If you have forgotten your Wazuh indexer password, refer to the :doc:`password management guide </user-manual/user-administration/password-management>` to reset it.
73
+
74
+
#. Run the command below to verify the connection to the Wazuh indexer using the curl command from the Wazuh server. Enter the Wazuh indexer password when prompted:
- ``<WAZUH_INDEXER_USER>``: Admin username of the Wazuh indexer.
84
+
- ``<INDEXER_IP_ADDRESS>``: IP address of the Wazuh indexer.
85
+
86
+
If this command fails, the vulnerability detector module won't be able to connect to the Wazuh indexer.
87
+
88
+
To check if the issue is related to certificates, bypass certificate verification using the ``-k`` option. Enter the Wazuh indexer password when prompted:
A successful connection returns a result similar to the following:
95
+
96
+
.. code-block:: json
97
+
98
+
{
99
+
"cluster_name": "opensearch",
100
+
"status": "green",
101
+
"timed_out": false,
102
+
"number_of_nodes": 1,
103
+
"number_of_data_nodes": 1,
104
+
"discovered_master": true,
105
+
"discovered_cluster_manager": true,
106
+
"active_primary_shards": 9,
107
+
"active_shards": 9,
108
+
"relocating_shards": 0,
109
+
"initializing_shards": 0,
110
+
"unassigned_shards": 0,
111
+
"delayed_unassigned_shards": 0,
112
+
"number_of_pending_tasks": 0,
113
+
"number_of_in_flight_fetch": 0,
114
+
"task_max_waiting_in_queue_millis": 0,
115
+
"active_shards_percent_as_number": 100.0
116
+
}
117
+
118
+
#. Restart the Wazuh manager to apply the configuration:
119
+
120
+
.. code-block:: console
121
+
122
+
# sudo systemctl restart wazuh-manager
123
+
27
124
.. note::
28
125
29
126
To enable vulnerability detection on the Wazuh manager, modify the ``internal_options.conf`` file at ``/var/ossec/etc/internal_options.conf``. Set the parameter ``vulnerability-detection.disable_scan_manager`` from ``1`` to ``0``. This change allows the Vulnerability Detection module to include the Wazuh manager host in its scans. After updating the configuration, restart the Wazuh manager to ensure the changes take effect.
0 commit comments