-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fixed bugs for offline installation with the installation assistant #3074
Merged
c-bordon
merged 4 commits into
4.9.0
from
bug/3072-offline-install-fix-template-download
Aug 15, 2024
Merged
Fixed bugs for offline installation with the installation assistant #3074
c-bordon
merged 4 commits into
4.9.0
from
bug/3072-offline-install-fix-template-download
Aug 15, 2024
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
All in One installationAIOubuntu@ip-172-31-46-83:~$ sudo bash wazuh-install.sh --offline-installation -a -v
15/08/2024 17:25:31 DEBUG: Checking root permissions.
15/08/2024 17:25:31 DEBUG: Checking sudo package.
15/08/2024 17:25:31 INFO: Starting Wazuh installation assistant. Wazuh version: 4.9.0
15/08/2024 17:25:31 INFO: Verbose logging redirected to /var/log/wazuh-install.log
15/08/2024 17:25:31 DEBUG: APT package manager will be used.
15/08/2024 17:25:32 DEBUG: Checking system distribution.
15/08/2024 17:25:32 DEBUG: Detected distribution name: ubuntu
15/08/2024 17:25:32 DEBUG: Detected distribution version: 22
15/08/2024 17:25:32 INFO: Checking installed dependencies for Offline installation.
15/08/2024 17:25:35 DEBUG: Offline dependencies are installed.
15/08/2024 17:25:35 DEBUG: Checking Wazuh installation.
15/08/2024 17:25:37 DEBUG: Checking system architecture.
15/08/2024 17:25:37 INFO: Verifying that your system meets the recommended minimum hardware requirements.
15/08/2024 17:25:37 DEBUG: CPU cores detected: 2
15/08/2024 17:25:37 DEBUG: Free RAM memory detected: 7833
15/08/2024 17:25:37 INFO: Wazuh web interface port will be 443.
15/08/2024 17:25:37 DEBUG: Checking ports availability.
15/08/2024 17:25:39 INFO: Checking prerequisites for Offline installation.
15/08/2024 17:25:45 DEBUG: Offline prerequisites are installed.
15/08/2024 17:25:45 INFO: Checking wazuh-offline.tar.gz file.
15/08/2024 17:25:45 DEBUG: wazuh-offline.tar.gz was found correctly.
15/08/2024 17:25:45 DEBUG: Extracting files from wazuh-offline.tar.gz
15/08/2024 17:25:45 DEBUG: Offline files extracted successfully.
15/08/2024 17:25:45 DEBUG: Checking curl tool version.
15/08/2024 17:25:45 INFO: --- Configuration files ---
15/08/2024 17:25:45 INFO: Generating configuration files.
15/08/2024 17:25:46 DEBUG: Creating Wazuh certificates.
15/08/2024 17:25:46 DEBUG: Reading configuration file.
15/08/2024 17:25:46 DEBUG: Checking if 127.0.0.1 is private.
15/08/2024 17:25:46 DEBUG: Checking if 127.0.0.1 is private.
15/08/2024 17:25:46 DEBUG: Checking if 127.0.0.1 is private.
15/08/2024 17:25:46 INFO: Generating the root certificate.
15/08/2024 17:25:46 INFO: Generating Admin certificates.
15/08/2024 17:25:46 DEBUG: Generating Admin private key.
15/08/2024 17:25:47 DEBUG: Converting Admin private key to PKCS8 format.
15/08/2024 17:25:47 DEBUG: Generating Admin CSR.
15/08/2024 17:25:47 DEBUG: Creating Admin certificate.
15/08/2024 17:25:47 INFO: Generating Wazuh indexer certificates.
15/08/2024 17:25:47 DEBUG: Creating the certificates for wazuh-indexer indexer node.
15/08/2024 17:25:47 DEBUG: Generating certificate configuration.
15/08/2024 17:25:47 DEBUG: Creating the Wazuh indexer tmp key pair.
15/08/2024 17:25:47 DEBUG: Creating the Wazuh indexer certificates.
15/08/2024 17:25:47 INFO: Generating Filebeat certificates.
15/08/2024 17:25:47 DEBUG: Generating the certificates for wazuh-server server node.
15/08/2024 17:25:47 DEBUG: Generating certificate configuration.
15/08/2024 17:25:47 DEBUG: Creating the Wazuh server tmp key pair.
15/08/2024 17:25:48 DEBUG: Creating the Wazuh server certificates.
15/08/2024 17:25:48 INFO: Generating Wazuh dashboard certificates.
15/08/2024 17:25:48 DEBUG: Generating certificate configuration.
15/08/2024 17:25:48 DEBUG: Creating the Wazuh dashboard tmp key pair.
15/08/2024 17:25:48 DEBUG: Creating the Wazuh dashboard certificates.
15/08/2024 17:25:48 DEBUG: Cleaning certificate files.
15/08/2024 17:25:48 DEBUG: Generating password file.
15/08/2024 17:25:48 DEBUG: Generating random passwords.
15/08/2024 17:25:49 INFO: Created wazuh-install-files.tar. It contains the Wazuh cluster key, certificates, and passwords necessary for installation.
15/08/2024 17:25:49 DEBUG: Extracting Wazuh configuration.
15/08/2024 17:25:49 DEBUG: Reading configuration file.
15/08/2024 17:25:49 DEBUG: Checking if 127.0.0.1 is private.
15/08/2024 17:25:49 DEBUG: Checking if 127.0.0.1 is private.
15/08/2024 17:25:49 DEBUG: Checking if 127.0.0.1 is private.
15/08/2024 17:25:49 INFO: --- Wazuh indexer ---
15/08/2024 17:25:49 INFO: Starting Wazuh indexer installation.
Reading package lists... Building dependency tree... Reading state information... The following NEW packages will be installed: wazuh-indexer 0 upgraded, 1 newly installed, 0 to remove and 32 not upgraded. Need to get 0 B/850 MB of archives. After this operation, 1077 MB of additional disk space will be used. Get:1 /home/ubuntu/wazuh-offline/wazuh-packages/wazuh-indexer_4.9.0-1_amd64.deb wazuh-indexer amd64 4.9.0-1 [850 MB] Selecting previously unselected package wazu NEEDRESTART-VER: 3.5 NEEDRESTART-KCUR: 6.5.0-1022-aws NEEDRESTART-KEXP: 6.5.0-1022-aws NEEDRESTART-KSTA: 1 NEEDRESTART-SVC: filebeat.servicestemd
15/08/2024 17:26:19 DEBUG: Checking Wazuh installation.
15/08/2024 17:26:20 DEBUG: There are Wazuh indexer remaining files.
15/08/2024 17:26:22 INFO: Wazuh indexer installation finished.
15/08/2024 17:26:22 DEBUG: Configuring Wazuh indexer.
15/08/2024 17:26:22 DEBUG: Copying Wazuh indexer certificates.
15/08/2024 17:26:22 INFO: Wazuh indexer post-install configuration finished.
15/08/2024 17:26:22 INFO: Starting service wazuh-indexer.
Synchronizing state of wazuh-indexer.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install enable wazuh-indexer
15/08/2024 17:26:48 INFO: wazuh-indexer service started.
15/08/2024 17:26:48 INFO: Initializing Wazuh indexer cluster security settings.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755 **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.13.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index does not exists, attempt to create it ... done (0-all replicas)
Populate config from /etc/wazuh-indexer/opensearch-security/
Will update '/config' with /etc/wazuh-indexer/opensearch-security/config.yml
SUCC: Configuration for 'config' created or updated
Will update '/roles' with /etc/wazuh-indexer/opensearch-security/roles.yml
SUCC: Configuration for 'roles' created or updated
Will update '/rolesmapping' with /etc/wazuh-indexer/opensearch-security/roles_mapping.yml
SUCC: Configuration for 'rolesmapping' created or updated
Will update '/internalusers' with /etc/wazuh-indexer/opensearch-security/internal_users.yml
SUCC: Configuration for 'internalusers' created or updated
Will update '/actiongroups' with /etc/wazuh-indexer/opensearch-security/action_groups.yml
SUCC: Configuration for 'actiongroups' created or updated
Will update '/tenants' with /etc/wazuh-indexer/opensearch-security/tenants.yml
SUCC: Configuration for 'tenants' created or updated
Will update '/nodesdn' with /etc/wazuh-indexer/opensearch-security/nodes_dn.yml
SUCC: Configuration for 'nodesdn' created or updated
Will update '/whitelist' with /etc/wazuh-indexer/opensearch-security/whitelist.yml
SUCC: Configuration for 'whitelist' created or updated
Will update '/audit' with /etc/wazuh-indexer/opensearch-security/audit.yml
SUCC: Configuration for 'audit' created or updated
Will update '/allowlist' with /etc/wazuh-indexer/opensearch-security/allowlist.yml
SUCC: Configuration for 'allowlist' created or updated
SUCC: Expected 10 config types for node {"updated_config_types":["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","internalusers","actiongroups","config"],"updated_config_size":10,"message":null} is 10 (["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","internalusers","actiongroups","config"]) due to: null
Done with success
15/08/2024 17:26:56 INFO: Wazuh indexer cluster security configuration initialized.
15/08/2024 17:26:56 INFO: Wazuh indexer cluster initialized.
15/08/2024 17:26:56 INFO: --- Wazuh server ---
15/08/2024 17:26:56 INFO: Starting the Wazuh manager installation.
Reading package lists... Building dependency tree... Reading state information... Suggested packages: expect The following NEW packages will be installed: wazuh-manager 0 upgraded, 1 newly installed, 0 to remove and 32 not upgraded. Need to get 0 B/322 MB of archives. After this operation, 891 MB of additional disk space will be used. Get:1 /home/ubuntu/wazuh-offline/wazuh-packages/wazuh-manager_4.9.0-1_amd64.deb wazuh-manager amd64 4.9.0-1 [322 MB] Selecting previous NEEDRESTART-VER: 3.5 NEEDRESTART-KCUR: 6.5.0-1022-aws NEEDRESTART-KEXP: 6.5.0-1022-aws NEEDRESTART-KSTA: 1 NEEDRESTART-SVC: filebeat.service
15/08/2024 17:28:54 DEBUG: Checking Wazuh installation.
15/08/2024 17:28:55 DEBUG: There are Wazuh remaining files.
15/08/2024 17:28:56 DEBUG: There are Wazuh indexer remaining files.
15/08/2024 17:28:57 INFO: Wazuh manager installation finished.
15/08/2024 17:28:57 DEBUG: Configuring Wazuh manager.
15/08/2024 17:28:57 DEBUG: Setting provisional Wazuh indexer password.
15/08/2024 17:28:57 INFO: Wazuh manager vulnerability detection configuration finished.
15/08/2024 17:28:57 INFO: Starting service wazuh-manager.
Created symlink /etc/systemd/system/multi-user.target.wants/wazuh-manager.service → /lib/systemd/system/wazuh-manager.service.
15/08/2024 17:29:22 INFO: wazuh-manager service started.
15/08/2024 17:29:22 INFO: Starting Filebeat installation.
Reading package lists... Building dependency tree... Reading state information... The following NEW packages will be installed: filebeat 0 upgraded, 1 newly installed, 0 to remove and 32 not upgraded. Need to get 0 B/22.1 MB of archives NEEDRESTART-VER: 3.5 NEEDRESTART-KCUR: 6.5.0-1022-aws NEEDRESTART-KEXP: 6.5.0-1022-aws NEEDRESTART-KSTA: 1 NEEDRESTART-SVC: filebeat.serviced64.deb filebeat amd64 7.10.2 [22.1 MB] Selecting previously unselected package filebeat.
15/08/2024 17:29:32 DEBUG: Checking Wazuh installation.
15/08/2024 17:29:33 DEBUG: There are Wazuh remaining files.
15/08/2024 17:29:34 DEBUG: There are Wazuh indexer remaining files.
15/08/2024 17:29:34 DEBUG: There are Filebeat remaining files.
15/08/2024 17:29:35 INFO: Filebeat installation finished.
15/08/2024 17:29:35 DEBUG: Configuring Filebeat.
wazuh/
wazuh/_meta/
wazuh/_meta/docs.asciidoc
wazuh/_meta/fields.yml
wazuh/_meta/config.yml
wazuh/alerts/
wazuh/alerts/config/
wazuh/alerts/config/alerts.yml
wazuh/alerts/manifest.yml
wazuh/alerts/ingest/
wazuh/alerts/ingest/pipeline.json
wazuh/module.yml
wazuh/archives/
wazuh/archives/config/
wazuh/archives/config/archives.yml
wazuh/archives/manifest.yml
wazuh/archives/ingest/
wazuh/archives/ingest/pipeline.json
15/08/2024 17:29:35 DEBUG: Copying Filebeat certificates.
Created filebeat keystore
Successfully updated the keystore
Successfully updated the keystore
15/08/2024 17:29:36 INFO: Filebeat post-install configuration finished.
15/08/2024 17:29:36 INFO: Starting service filebeat.
Synchronizing state of filebeat.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install enable filebeat
Created symlink /etc/systemd/system/multi-user.target.wants/filebeat.service → /lib/systemd/system/filebeat.service.
15/08/2024 17:29:38 INFO: filebeat service started.
15/08/2024 17:29:38 INFO: --- Wazuh dashboard ---
15/08/2024 17:29:38 INFO: Starting Wazuh dashboard installation.
Reading package lists... Building dependency tree... Reading state information... The following NEW packages will be installed: wazuh-dashboard 0 upgraded, 1 newly installed, 0 to remove and 32 not upgraded. Need to get 0 B/166 MB of archives. After this operation, 935 MB of additional disk space will be used. Get:1 /home/ubuntu/wazuh-offline/wazuh-packages/wazuh-dashboard_4.9.0-1_amd64.deb wazuh-dashboard amd64 4.9.0-1 [166 MB] Selecting previously unselected package NEEDRESTART-VER: 3.5 NEEDRESTART-KCUR: 6.5.0-1022-aws NEEDRESTART-KEXP: 6.5.0-1022-aws NEEDRESTART-KSTA: 1 NEEDRESTART-SVC: filebeat.service
15/08/2024 17:31:59 DEBUG: Checking Wazuh installation.
15/08/2024 17:31:59 DEBUG: There are Wazuh remaining files.
15/08/2024 17:32:00 DEBUG: There are Wazuh indexer remaining files.
15/08/2024 17:32:01 DEBUG: There are Filebeat remaining files.
15/08/2024 17:32:02 DEBUG: There are Wazuh dashboard remaining files.
15/08/2024 17:32:02 INFO: Wazuh dashboard installation finished.
15/08/2024 17:32:02 DEBUG: Configuring Wazuh dashboard.
15/08/2024 17:32:02 DEBUG: Copying Wazuh dashboard certificates.
15/08/2024 17:32:02 DEBUG: Wazuh dashboard certificate setup finished.
15/08/2024 17:32:02 INFO: Wazuh dashboard post-install configuration finished.
15/08/2024 17:32:02 INFO: Starting service wazuh-dashboard.
Created symlink /etc/systemd/system/multi-user.target.wants/wazuh-dashboard.service → /etc/systemd/system/wazuh-dashboard.service.
15/08/2024 17:32:03 INFO: wazuh-dashboard service started.
15/08/2024 17:32:03 DEBUG: Setting Wazuh indexer cluster passwords.
15/08/2024 17:32:03 DEBUG: Checking Wazuh installation.
15/08/2024 17:32:03 DEBUG: There are Wazuh remaining files.
15/08/2024 17:32:04 DEBUG: There are Wazuh indexer remaining files.
15/08/2024 17:32:05 DEBUG: There are Filebeat remaining files.
15/08/2024 17:32:05 DEBUG: There are Wazuh dashboard remaining files.
15/08/2024 17:32:05 INFO: Updating the internal users.
15/08/2024 17:32:05 DEBUG: Creating password backup.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755 **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.13.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Will retrieve '/config' into /etc/wazuh-indexer/backup/config.yml
SUCC: Configuration for 'config' stored in /etc/wazuh-indexer/backup/config.yml
Will retrieve '/roles' into /etc/wazuh-indexer/backup/roles.yml
SUCC: Configuration for 'roles' stored in /etc/wazuh-indexer/backup/roles.yml
Will retrieve '/rolesmapping' into /etc/wazuh-indexer/backup/roles_mapping.yml
SUCC: Configuration for 'rolesmapping' stored in /etc/wazuh-indexer/backup/roles_mapping.yml
Will retrieve '/internalusers' into /etc/wazuh-indexer/backup/internal_users.yml
SUCC: Configuration for 'internalusers' stored in /etc/wazuh-indexer/backup/internal_users.yml
Will retrieve '/actiongroups' into /etc/wazuh-indexer/backup/action_groups.yml
SUCC: Configuration for 'actiongroups' stored in /etc/wazuh-indexer/backup/action_groups.yml
Will retrieve '/tenants' into /etc/wazuh-indexer/backup/tenants.yml
SUCC: Configuration for 'tenants' stored in /etc/wazuh-indexer/backup/tenants.yml
Will retrieve '/nodesdn' into /etc/wazuh-indexer/backup/nodes_dn.yml
SUCC: Configuration for 'nodesdn' stored in /etc/wazuh-indexer/backup/nodes_dn.yml
Will retrieve '/whitelist' into /etc/wazuh-indexer/backup/whitelist.yml
SUCC: Configuration for 'whitelist' stored in /etc/wazuh-indexer/backup/whitelist.yml
Will retrieve '/allowlist' into /etc/wazuh-indexer/backup/allowlist.yml
SUCC: Configuration for 'allowlist' stored in /etc/wazuh-indexer/backup/allowlist.yml
Will retrieve '/audit' into /etc/wazuh-indexer/backup/audit.yml
SUCC: Configuration for 'audit' stored in /etc/wazuh-indexer/backup/audit.yml
15/08/2024 17:32:14 DEBUG: Password backup created in /etc/wazuh-indexer/backup.
15/08/2024 17:32:14 INFO: A backup of the internal users has been saved in the /etc/wazuh-indexer/internalusers-backup folder.
15/08/2024 17:32:14 DEBUG: The internal users have been updated before changing the passwords.
15/08/2024 17:32:16 DEBUG: Generating password hashes.
15/08/2024 17:32:26 DEBUG: Password hashes generated.
15/08/2024 17:32:26 DEBUG: Creating password backup.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755 **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.13.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Will retrieve '/config' into /etc/wazuh-indexer/backup/config.yml
SUCC: Configuration for 'config' stored in /etc/wazuh-indexer/backup/config.yml
Will retrieve '/roles' into /etc/wazuh-indexer/backup/roles.yml
SUCC: Configuration for 'roles' stored in /etc/wazuh-indexer/backup/roles.yml
Will retrieve '/rolesmapping' into /etc/wazuh-indexer/backup/roles_mapping.yml
SUCC: Configuration for 'rolesmapping' stored in /etc/wazuh-indexer/backup/roles_mapping.yml
Will retrieve '/internalusers' into /etc/wazuh-indexer/backup/internal_users.yml
SUCC: Configuration for 'internalusers' stored in /etc/wazuh-indexer/backup/internal_users.yml
Will retrieve '/actiongroups' into /etc/wazuh-indexer/backup/action_groups.yml
SUCC: Configuration for 'actiongroups' stored in /etc/wazuh-indexer/backup/action_groups.yml
Will retrieve '/tenants' into /etc/wazuh-indexer/backup/tenants.yml
SUCC: Configuration for 'tenants' stored in /etc/wazuh-indexer/backup/tenants.yml
Will retrieve '/nodesdn' into /etc/wazuh-indexer/backup/nodes_dn.yml
SUCC: Configuration for 'nodesdn' stored in /etc/wazuh-indexer/backup/nodes_dn.yml
Will retrieve '/whitelist' into /etc/wazuh-indexer/backup/whitelist.yml
SUCC: Configuration for 'whitelist' stored in /etc/wazuh-indexer/backup/whitelist.yml
Will retrieve '/allowlist' into /etc/wazuh-indexer/backup/allowlist.yml
SUCC: Configuration for 'allowlist' stored in /etc/wazuh-indexer/backup/allowlist.yml
Will retrieve '/audit' into /etc/wazuh-indexer/backup/audit.yml
SUCC: Configuration for 'audit' stored in /etc/wazuh-indexer/backup/audit.yml
15/08/2024 17:32:31 DEBUG: Password backup created in /etc/wazuh-indexer/backup.
Successfully updated the keystore
Successfully updated the keystore
15/08/2024 17:32:31 INFO: The filebeat.yml file has been updated to use the Filebeat Keystore username and password.
15/08/2024 17:32:31 DEBUG: Restarting filebeat service...
15/08/2024 17:32:32 DEBUG: filebeat started.
15/08/2024 17:32:32 DEBUG: Restarting wazuh-manager service...
15/08/2024 17:34:00 DEBUG: wazuh-manager started.
15/08/2024 17:34:02 DEBUG: Restarting wazuh-dashboard service...
15/08/2024 17:34:03 DEBUG: wazuh-dashboard started.
15/08/2024 17:34:03 DEBUG: Running security admin tool.
15/08/2024 17:34:03 DEBUG: Loading new passwords changes.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755 **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.13.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Populate config from /home/ubuntu
Force type: internalusers
Will update '/internalusers' with /etc/wazuh-indexer/backup/internal_users.yml
SUCC: Configuration for 'internalusers' created or updated
SUCC: Expected 1 config types for node {"updated_config_types":["internalusers"],"updated_config_size":1,"message":null} is 1 (["internalusers"]) due to: null
Done with success
15/08/2024 17:34:12 DEBUG: Passwords changed.
15/08/2024 17:34:12 DEBUG: Changing API passwords.
15/08/2024 17:34:20 INFO: Initializing Wazuh dashboard web application.
15/08/2024 17:34:20 INFO: Wazuh dashboard web application not yet initialized. Waiting...
15/08/2024 17:34:36 INFO: Wazuh dashboard web application not yet initialized. Waiting...
15/08/2024 17:34:51 INFO: Wazuh dashboard web application initialized.
15/08/2024 17:34:51 INFO: --- Summary ---
15/08/2024 17:34:51 INFO: You can access the web interface https://<wazuh-dashboard-ip>:443
User: admin
Password: dwx.h6jD9ar3?YwSHCh8ujAHDz?6d7lU
15/08/2024 17:34:51 INFO: Installation finished.
|
teddytpc1
approved these changes
Aug 15, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
close #3072
After testing on a machine without internet access, a couple of errors were detected which were corrected with the changes in this PR:
Tests
Wazuh indexer:
Wazuh manager:
Wazuh dashboard: