Thanks Santiago,
I asked this mainly to see where you were going with this. I tried to install alienvault usm for aws last week but it failed to start most of the services. Since its a commercial product I was also evaluating their support so I am waiting for help from them. But we are also looking at alertlogic, qualys, nessus, and the other big players. (Any guidance here would be much appreciated.)
I am very much not happy about the manual agent install promoted by alienvault. Our infrastructure is way too dynamic for that. Hence, I spent today ansible'izing around ossec. I studied all the existing projects and learned from them.
I now have working ansible playbooks/roles to
- install wazuh ossec server and api idempotently (a bit painful to get right)
- register both with consul as services
- install agents and auto register idempotently (also a bit painful to get right)
using our existing elk cluster
- collect the alert.log and route via rabbit the elk nodes
- extended the existing elk playbook to add the ossec template and define a new output to es
- adding the kibana dashboards is still manual, thinking of using something like elasticdump to automate that
into our aws staging environment
- fired up an instance to run the ossec server (along with all the supporting stuff like consul, logstash, datadog, etc).
- extended the provisioning playbooks to define security groups and modify acls
So far its quite nice. I have not yet dug into any real ossec configuration yet, but am already starting to get actionable alerts.
Once I have deployed this to production and proved its robustness I will be happy donate back to wazuh or publish a git project.
When I get back to usm, I will try to route wazuh alerts to it.
cheers and thanks again!