Skip to content

Commit

Permalink
status: 2023q2: Wazuh: markup and other changes
Browse files Browse the repository at this point in the history
Disambiguate the word 'It'. Express runtime dependencies.

Clarify that alongside porting of components, there was adaptation.

Remove a superfluous hard line break.

One sentence per line.

Other minor changes.

Reviewed-by:  acm, salvadore
Approved-by:  acm, salvadore
Pull-request: #213
  • Loading branch information
grahamperrin committed Jul 14, 2023
1 parent 25822ab commit 7b2a14d
Showing 1 changed file with 7 additions and 9 deletions.
16 changes: 7 additions & 9 deletions website/content/en/status/report-2023-04-2023-06/wazuh.adoc
Original file line number Diff line number Diff line change
@@ -1,32 +1,30 @@
=== Wazuh on FreeBSD

Links: +
link:https://www.wazuh.com/[Wazuh] URL: link:https://www.wazuh.com/[] +
link:https://www.wazuh.com/[Wazuh] URL: link:https://www.wazuh.com/[]

Contact: José Alonso Cárdenas Márquez <acm@FreeBSD.org>

Wazuh is a free and open source platform used for threat prevention, detection, and response.
It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments.

The Wazuh solution consists of an endpoint security agent, deployed to the monitored systems, and a management server, which collects and analyzes data gathered by the agents.
Besides, Wazuh has been fully integrated with the Elastic Stack or OpenSearch Stack, providing a search engine and data visualization tool that allows users to navigate through their security alerts.
Wazuh features include full integration with https://www.elastic.co/elastic-stack/[Elastic Stack] and https://opensearch.org/[OpenSearch], providing a search engine and data visualization tool through which users can navigate security alerts.

Wazuh porting to FreeBSD was started by mailto:[email protected][Michael Muenz].
The first Wazuh port he added to the FreeBSD ports tree was package:security/wazuh-agent[] in September 2021.
In July 2022, I took maintainership of this port and I started porting other Wazuh components.
His first Wazuh addition to the ports tree was package:security/wazuh-agent[] in September 2021.
In July 2022, I took maintainership of this port and started porting other Wazuh components.

Currently, all Wazuh components are part of the FreeBSD ports tree. It includes package:security/wazuh-manager[], package:security/wazuh-agent[],
package:security/wazuh-server[], package:security/wazuh-indexer[] and package:security/wazuh-dashboard[] ports.
Currently, all Wazuh components are ported or adapted: package:security/wazuh-manager[], package:security/wazuh-agent[], package:security/wazuh-server[], package:security/wazuh-indexer[], and package:security/wazuh-dashboard[].

On FreeBSD, package:security/wazuh-manager[] and package:security/wazuh-agent[] are compiled from Wazuh source code.
package:security/wazuh-indexer[] is an adapted package:textproc/opensearch[] used for storing agents data.
package:security/wazuh-server[] is a port for installing the package:security/wazuh-manager[], package:sysutils/beats8[] (filebeat), and package:sysutils/logstash8[] components.
It includes adapted configuration files to work on FreeBSD.
package:security/wazuh-server[] includes FreeBSD-oriented adaptions to configuration files. Runtime dependences comprise package:security/wazuh-manager[], package:sysutils/beats8[] (filebeat), and package:sysutils/logstash8[].

This comment has been minimized.

Copy link
@grahamperrin

grahamperrin Jul 16, 2023

Author Contributor

My misspelling fixed by a37b35e thanks to maxim@, my markup omission fixed by 4f1190f.

package:security/wazuh-dashboard[] uses an adapted package:textproc/opensearch-dashboards[] and the wazuh-kibana-app plugin generated from wazuh-kibana-app source code for FreeBSD.

The main goal of this work is enhancing visibility of FreeBSD as a useful platform for information security or cybersecurity.

Additionally, you can test a Wazuh single-node infrastructure (All-in-one) easily using link:https://github.com/alonsobsd/wazuh-makejail[] or link:https://github.com/AppJail-makejails/wazuh[] from link:https://github.com/DtxdF/AppJail[AppJail].
Additionally, you can easily test a Wazuh single-node infrastructure (All-in-one) using link:https://github.com/alonsobsd/wazuh-makejail[] or link:https://github.com/AppJail-makejails/wazuh[] from link:https://github.com/DtxdF/AppJail[AppJail].
AppJail is a good tool for managing jail containers from the command line.

People interested in helping with the project are welcome.
Expand Down

0 comments on commit 7b2a14d

Please sign in to comment.