-
Notifications
You must be signed in to change notification settings - Fork 98
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Updated cert tool and added config files
- Loading branch information
Showing
5 changed files
with
320 additions
and
0 deletions.
There are no files selected for viewing
10 changes: 10 additions & 0 deletions
10
unattended_installer/config/opensearch/certificate/config_aio.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
nodes: | ||
elasticsearch: | ||
name: elasticsearch | ||
ip: 127.0.0.1 | ||
wazuh_servers: | ||
name: filebeat | ||
ip: 127.0.0.1 | ||
kibana: | ||
name: kibana | ||
ip: 127.0.0.1 |
74 changes: 74 additions & 0 deletions
74
unattended_installer/config/opensearch/roles/internal_users.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,74 @@ | ||
--- | ||
# This is the internal user database | ||
# The hash value is a bcrypt hash and can be generated with plugin/tools/hash.sh | ||
|
||
_meta: | ||
type: "internalusers" | ||
config_version: 2 | ||
|
||
# Define your internal users here | ||
|
||
## Demo users | ||
|
||
admin: | ||
hash: "$2a$12$VcCDgh2NDk07JGN0rjGbM.Ad41qVR/YFJcgHp0UGns5JDymv..TOG" | ||
reserved: true | ||
backend_roles: | ||
- "admin" | ||
description: "Demo admin user" | ||
|
||
kibanaserver: | ||
hash: "$2a$12$4AcgAt3xwOWadA5s5blL6ev39OXDNhmOesEoo33eZtrq2N0YrU3H." | ||
reserved: true | ||
description: "Demo kibanaserver user" | ||
|
||
kibanaro: | ||
hash: "$2a$12$JJSXNfTowz7Uu5ttXfeYpeYE0arACvcwlPBStB1F.MI7f0U9Z4DGC" | ||
reserved: false | ||
backend_roles: | ||
- "kibanauser" | ||
- "readall" | ||
attributes: | ||
attribute1: "value1" | ||
attribute2: "value2" | ||
attribute3: "value3" | ||
description: "Demo kibanaro user" | ||
|
||
logstash: | ||
hash: "$2a$12$u1ShR4l4uBS3Uv59Pa2y5.1uQuZBrZtmNfqB3iM/.jL0XoV9sghS2" | ||
reserved: false | ||
backend_roles: | ||
- "logstash" | ||
description: "Demo logstash user" | ||
|
||
readall: | ||
hash: "$2a$12$ae4ycwzwvLtZxwZ82RmiEunBbIPiAmGZduBAjKN0TXdwQFtCwARz2" | ||
reserved: false | ||
backend_roles: | ||
- "readall" | ||
description: "Demo readall user" | ||
|
||
snapshotrestore: | ||
hash: "$2y$12$DpwmetHKwgYnorbgdvORCenv4NAK8cPUg8AI6pxLCuWf/ALc0.v7W" | ||
reserved: false | ||
backend_roles: | ||
- "snapshotrestore" | ||
description: "Demo snapshotrestore user" | ||
|
||
wazuh_admin: | ||
hash: "$2y$12$d2awHiOYvZjI88VfsDON.u6buoBol0gYPJEgdG1ArKVE0OMxViFfu" | ||
reserved: true | ||
hidden: false | ||
backend_roles: [] | ||
attributes: {} | ||
opendistro_security_roles: [] | ||
static: false | ||
|
||
wazuh_user: | ||
hash: "$2y$12$BQixeoQdRubZdVf/7sq1suHwiVRnSst1.lPI2M0.GPZms4bq2D9vO" | ||
reserved: true | ||
hidden: false | ||
backend_roles: [] | ||
attributes: {} | ||
opendistro_security_roles: [] | ||
static: false |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,163 @@ | ||
_meta: | ||
type: "roles" | ||
config_version: 2 | ||
|
||
# Restrict users so they can only view visualization and dashboard on kibana | ||
kibana_read_only: | ||
reserved: true | ||
|
||
# The security REST API access role is used to assign specific users access to change the security settings through the REST API. | ||
security_rest_api_access: | ||
reserved: true | ||
|
||
# Allows users to view monitors, destinations and alerts | ||
alerting_read_access: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster:admin/opendistro/alerting/alerts/get' | ||
- 'cluster:admin/opendistro/alerting/destination/get' | ||
- 'cluster:admin/opendistro/alerting/monitor/get' | ||
- 'cluster:admin/opendistro/alerting/monitor/search' | ||
|
||
# Allows users to view and acknowledge alerts | ||
alerting_ack_alerts: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster:admin/opendistro/alerting/alerts/*' | ||
|
||
# Allows users to use all alerting functionality | ||
alerting_full_access: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster_monitor' | ||
- 'cluster:admin/opendistro/alerting/*' | ||
index_permissions: | ||
- index_patterns: | ||
- '*' | ||
allowed_actions: | ||
- 'indices_monitor' | ||
- 'indices:admin/aliases/get' | ||
- 'indices:admin/mappings/get' | ||
|
||
# Allow users to read Anomaly Detection detectors and results | ||
anomaly_read_access: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster:admin/opendistro/ad/detector/info' | ||
- 'cluster:admin/opendistro/ad/detector/search' | ||
- 'cluster:admin/opendistro/ad/detectors/get' | ||
- 'cluster:admin/opendistro/ad/result/search' | ||
- 'cluster:admin/opendistro/ad/tasks/search' | ||
|
||
# Allows users to use all Anomaly Detection functionality | ||
anomaly_full_access: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster_monitor' | ||
- 'cluster:admin/opendistro/ad/*' | ||
index_permissions: | ||
- index_patterns: | ||
- '*' | ||
allowed_actions: | ||
- 'indices_monitor' | ||
- 'indices:admin/aliases/get' | ||
- 'indices:admin/mappings/get' | ||
|
||
# Allows users to read Notebooks | ||
notebooks_read_access: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster:admin/opendistro/notebooks/list' | ||
- 'cluster:admin/opendistro/notebooks/get' | ||
|
||
# Allows users to all Notebooks functionality | ||
notebooks_full_access: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster:admin/opendistro/notebooks/create' | ||
- 'cluster:admin/opendistro/notebooks/update' | ||
- 'cluster:admin/opendistro/notebooks/delete' | ||
- 'cluster:admin/opendistro/notebooks/get' | ||
- 'cluster:admin/opendistro/notebooks/list' | ||
|
||
# Allows users to read and download Reports | ||
reports_instances_read_access: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster:admin/opendistro/reports/instance/list' | ||
- 'cluster:admin/opendistro/reports/instance/get' | ||
- 'cluster:admin/opendistro/reports/menu/download' | ||
|
||
# Allows users to read and download Reports and Report-definitions | ||
reports_read_access: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster:admin/opendistro/reports/definition/get' | ||
- 'cluster:admin/opendistro/reports/definition/list' | ||
- 'cluster:admin/opendistro/reports/instance/list' | ||
- 'cluster:admin/opendistro/reports/instance/get' | ||
- 'cluster:admin/opendistro/reports/menu/download' | ||
|
||
# Allows users to all Reports functionality | ||
reports_full_access: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster:admin/opendistro/reports/definition/create' | ||
- 'cluster:admin/opendistro/reports/definition/update' | ||
- 'cluster:admin/opendistro/reports/definition/on_demand' | ||
- 'cluster:admin/opendistro/reports/definition/delete' | ||
- 'cluster:admin/opendistro/reports/definition/get' | ||
- 'cluster:admin/opendistro/reports/definition/list' | ||
- 'cluster:admin/opendistro/reports/instance/list' | ||
- 'cluster:admin/opendistro/reports/instance/get' | ||
- 'cluster:admin/opendistro/reports/menu/download' | ||
|
||
# Allows users to use all asynchronous-search functionality | ||
asynchronous_search_full_access: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster:admin/opendistro/asynchronous_search/*' | ||
index_permissions: | ||
- index_patterns: | ||
- '*' | ||
allowed_actions: | ||
- 'indices:data/read/search*' | ||
|
||
# Allows users to read stored asynchronous-search results | ||
asynchronous_search_read_access: | ||
reserved: true | ||
cluster_permissions: | ||
- 'cluster:admin/opendistro/asynchronous_search/get' | ||
|
||
wazuh_ui_user: | ||
reserved: true | ||
hidden: false | ||
cluster_permissions: [] | ||
index_permissions: | ||
- index_patterns: | ||
- "wazuh-*" | ||
dls: "" | ||
fls: [] | ||
masked_fields: [] | ||
allowed_actions: | ||
- "read" | ||
tenant_permissions: [] | ||
static: false | ||
|
||
wazuh_ui_admin: | ||
reserved: true | ||
hidden: false | ||
cluster_permissions: [] | ||
index_permissions: | ||
- index_patterns: | ||
- "wazuh-*" | ||
dls: "" | ||
fls: [] | ||
masked_fields: [] | ||
allowed_actions: | ||
- "read" | ||
- "delete" | ||
- "manage" | ||
- "index" | ||
tenant_permissions: [] | ||
static: false |
71 changes: 71 additions & 0 deletions
71
unattended_installer/config/opensearch/roles/roles_mapping.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,71 @@ | ||
--- | ||
# In this file users, backendroles and hosts can be mapped to Open Distro Security roles. | ||
# Permissions for Opendistro roles are configured in roles.yml | ||
|
||
_meta: | ||
type: "rolesmapping" | ||
config_version: 2 | ||
|
||
# Define your roles mapping here | ||
|
||
## Demo roles mapping | ||
|
||
all_access: | ||
reserved: false | ||
backend_roles: | ||
- "admin" | ||
description: "Maps admin to all_access" | ||
|
||
own_index: | ||
reserved: false | ||
users: | ||
- "*" | ||
description: "Allow full access to an index named like the username" | ||
|
||
logstash: | ||
reserved: false | ||
backend_roles: | ||
- "logstash" | ||
|
||
kibana_user: | ||
reserved: false | ||
backend_roles: | ||
- "kibanauser" | ||
users: | ||
- "wazuh_user" | ||
- "wazuh_admin" | ||
description: "Maps kibanauser to kibana_user" | ||
|
||
readall: | ||
reserved: false | ||
backend_roles: | ||
- "readall" | ||
|
||
manage_snapshots: | ||
reserved: false | ||
backend_roles: | ||
- "snapshotrestore" | ||
|
||
kibana_server: | ||
reserved: true | ||
users: | ||
- "kibanaserver" | ||
|
||
wazuh_ui_admin: | ||
reserved: true | ||
hidden: false | ||
backend_roles: [] | ||
hosts: [] | ||
users: | ||
- "wazuh_admin" | ||
- "kibanaserver" | ||
and_backend_roles: [] | ||
|
||
wazuh_ui_user: | ||
reserved: true | ||
hidden: false | ||
backend_roles: [] | ||
hosts: [] | ||
users: | ||
- "wazuh_user" | ||
and_backend_roles: [] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters