I followed the instructions on the link again. As of now, kibana is at: kibana/stable 7.17.3 amd64
188 curl -s
https://packages.wazuh.com/key/GPG-KEY-WAZUH | apt-key add -
189 echo "deb
https://packages.wazuh.com/4.x/apt/ stable main" | tee -a /etc/apt/sources.list.d/wazuh.list
190 apt update
191 nano /etc/apt/sources.list.d/wazuh.list
192 apt update
193 apt install wazuh-agent
194 apt list wazuh-manager --versions
195 apt list wazuh-manager --all-versions
196 exit
197 systemctl stop filebeat.service kibana.service
198 sed -i "s/^deb/#deb/" /et/apt/sources.list.d/opendistroforelasticsearch.list
199 curl -X PUT "
https://10.60.26.149:9200/_cluster/settings" -H 'Content-Type: application/json' -d' { "persistent": { "cluster.routing.allocation.enable": "primaries" } } ,
200 curl -X PUT "
https://10.60.26.149:9200/_cluster/settings" -H 'Content-Type: application/json' -d' { "persistent": { "cluster.routing.allocation.enable": "primaries" } } ,
201 curl -X PUT "
https://127.0.0.1:9200/_cluster/settings" -u <username>:<password> -k -H 'Content-Type: application/json' -d'
202 {
203 "persistent": {
204 "cluster.routing.allocation.enable": "primaries"
205 }
206 }
207 '
208 systemctl stop elasticsearch.service
209 apt install elasticsearch-oss=7.10.2
210 apt install opendistroforelasticsearch=1.13.2-1
211 apt autoremove
212 mkdir -p /etc/elasticsearch/jvm.options.d
213 echo '-Dlog4j2.formatMsgNoLookups=true' > /etc/elasticsearch/jvm.options.d/disabledlog4j.options
214 chmod 2750 /etc/elasticsearch/jvm.options.d/disabledlog4j.options
215 chown root:elasticsearch /etc/elasticsearch/jvm.options.d/disabledlog4j.options
216 systemctl daemon-reload
217 systemctl enable elasticsearch
218 systemctl start elasticsearch.service
219 apt-get install filebeat=7.10.2
220 curl -so /etc/filebeat/wazuh-template.json
https://raw.githubusercontent.com/wazuh/wazuh/v4.3.0/extensions/elasticsearch/7.x/wazuh-template.json 221 chmod go+r /etc/filebeat/wazuh-template.json
222 curl -s
https://packages.wazuh.com/4.x/filebeat/wazuh-filebeat-0.1.tar.gz | sudo tar -xvz -C /usr/share/filebeat/module
223 nano /etc/filebeat/filebeat.yml
224 systemctl daemon-reload
225 systemctl enable filebeat
226 systemctl start filebeat.service
227 mkdir -p /usr/share/kibana/data/wazuh/config/
228 cp /usr/share/kibana/optimize/wazuh/config/wazuh.yml /usr/share/kibana/data/wazuh/config/wazuh.yml
229 cd /usr/share/kibana/
230 sudo -u kibana /usr/share/kibana/bin/kibana-plugin install
https://packages.wazuh.com/4.x/ui/kibana/wazuh_kibana-4.3.0_7.10.2-1.zip 231 systemctl daemon-reload
232 systemctl enable kibana
233 systemctl start kibana.service
234 history | tail -n 30
235 history | tail -n 50
236 history
237 cd /
238 systemctl status httpd
239 systemctl status wazuh-manager.service
240 systemctl status apache
241 systemctl status apache2
242 reboot
243 systemctl status filebeat.service
244 systemctl status kibana.service
245 systemctl status wazuh-manager.service
246 history
247 apt update
248 systemctl start elasticsearch
249 systemctl start elasticsearch.service
250 systemctl status elasticsearch.service
251 nano /etc/elasticsearch/jvm.options.d/disabledlog4j.options
252 nano /etc/apt/sources.list.d/opendistroforelasticsearch.list
253 systemctl status wazuh-dashboard
254 systemctl status wazuh-indexer
255 apt install wazuh-indexer
256 apt install wazuh-dashboard
257 systemctl daemon-reload
258 systemctl enable wazuh-dashboard.service wazuh-indexer.service wazuh-indexer-performance-analyzer.service
259 systemctl start wazuh-dashboard.service wazuh-indexer.service wazuh-i
260 systemctl status wazuh-indexer
261 systemctl start wazuh-indexer.service
262 systemctl status wazuh-indexer.service
263 apt remove wazuh-indexer
264 systemctl status wazuh-dashboard.service
265 reboot
266 curl -so /etc/elasticsearch/elasticsearch.yml
https://packages.wazuh.com/4.3/tpl/elastic-basic/elasticsearch_all_in_one.yml 267 /usr/share/elasticsearch/bin/elasticsearch-certutil cert ca --pem --in instances.yml --keep-ca-key --out ~/certs.zip
268 curl -so /usr/share/elasticsearch/instances.yml
https://packages.wazuh.com/4.3/tpl/elastic-basic/instances_aio.yml 269 /usr/share/elasticsearch/bin/elasticsearch-certutil cert ca --pem --in instances.yml --keep-ca-key --out ~/certs.zip
270 systemctl status elasticsearch.service
271 curl -XGET
https://localhost:9200 -u elastic:<elastic_password> -k
272 curl -XGET
https://localhost:9200 -k
273 curl -XGET
https://localhost:9200 -u '[redacted]:[redacted] -k
274 apt list elasticsearch -a
275 apt list elasticsearch --all-versions
276 whichi elasticsearch
277 which elasticsearch
278 which elastic*
279 which *elastic*
280 apt list install-info elasticsearch-oss
281 which elasticsearch-oss
282 apt list opendistroforelasticsearch
283 apt list opendistroforelasticsearch -a
284 history | tail -n 80
285 history | tail -n 120
286 cd /var/
287 ls -lash
288 cd log/
289 ls -lash
290 less dmesg
291 cd
292 systemctl list --help
293 systemctl list-units --type=service
294 apt remove wazuh-dashboard
295 service --status-all
296 htop
297 top
298 systemctl restart wazuh-manager.service
299 cd /var/ossec/
300 ls -lash
301 cd logs/
302 ls -lash
303 cd wazuh/
304 ls -lash
305 cd 2022/
306 ls -lash
307 cd may
308 cd Ma
309 cd May
310 ls -lash
311 less ossec-17.log.gz
312 systemctl status ossec-remoted
313 cd /
314 less /var/ossec/logs/ossec.log
315 cat /var/ossec/logs/ossec.log | grep error
316 cat /var/ossec/logs/ossec.log | grep Error
317 cat /var/ossec/logs/ossec.log | grep critical
318 cat /var/log/elasticsearch/wazuh-cluster.log
319 ufw --help
320 ufw ruleset
321 ufw ruleset --help
322 ufw app list
323 cd etc/ufw/applications.d/
324 ls -lash
325 cd ..
326 ls -lash
327 less ufw.conf
328 less after.rules
329 less before.rules
330 systemctl ufw status
331 systemctl status ufw.service
332 netstat
333 apt install net-tools
334 netstat
335 systemctl restart wazuh-dashboard.service
336 systemctl status wazuh-dashboard.service
337 apt install wazuh-dashboard
338 uft allow https
339 ufw allow https
340 systemctl enable wazuh-dashboard.service
341 systemctl start wazuh-dashboard
342 systemctl status wazuh-dashboard.service
343 apt remove wazuh-indexer
344 systemctl status wazuh-manager.service
345 systemctl status wazuh-dashboard.service
346 systemctl start wazuh-dashboard
347 systemctl status wazuh-dashboard.service
348 reboot
349 ls -lash
350 nano upgrade.sh
351 chmod +x upgrade.sh
352 ./upgrade.sh
353 mkdir -p /usr/share/kibana/data/wazuh/config/
354 cp /usr/share/kibana/optimize/wazuh/config/wazuh.yml /usr/share/kibana/data/wazuh/config/wazuh.yml
355 cd /usr/share/kibana/
356 ls -lash
357 cd data/
358 cd wazuh/config/
359 ls -lash
360 cd /
361 locate wazuh.yml
362 apt install mlocate
363 locate wazuh.yml
364 less /usr/share/kibana/data/wazuh/config/wazuh.yml
365 less /etc/apt/sources.list.d/wazuh.list
366 less /var/ossec/etc/ossec.conf
367 cat /var/log/elasticsearch/wazuh-cluster.log
368 at /var/log/elasticsearch/wazuh-cluster-2022-05-17-1.log.gz | grep -i -E "error|warn"
369 cat /var/log/elasticsearch/wazuh-cluster-2022-05-17-1.log.gz | grep -i -E "error|warn"
370 cat /var/log/elasticsearch/wazuh-cluster.log | grep -i -E "error|warn"
371 curl -k -X GET "
https://localhost:55000/" -H "Authorization: Bearer $TOKEN"
372 TOKEN=$(curl -u wazuh:[redacted] -k -X GET "
https://localhost:55000/security/user/authenticate?raw=true")
373 curl -k -X GET "
https://localhost:55000/" -H "Authorization: Bearer $TOKEN"
374 TOKEN=$(curl -u wazuh:[redacted] -k -X GET "
https://localhost:55000/security/user/authenticate?raw=true")
375 curl -k -X GET "
https://localhost:55000/" -H "Authorization: Bearer $TOKEN"
376 curl -k -X GET "
https://localhost:55000/"
377 curl -s
https://artifacts.elastic.co/GPG-KEY-elasticsearch | apt-key add -
378 echo "deb
https://artifacts.elastic.co/packages/7.x/apt stable main" | tee /etc/apt/sources.list.d/elastic-7.x.list
379 apt update
380 apt install elasticsearch=7.17.3
381 nano /etc/wazuh-dashboard/opensearch_dashboards.yml
382 nano /etc/filebeat/filebeat.yml
383 curl -sO
https://packages.wazuh.com/4.3/wazuh-certs-tool.sh 384 curl -sO
https://packages.wazuh.com/4.3/config.yml 385 nano config.yml
386 bash ./wazuh-certs-tool.sh -A
387 tar -cvf ./wazuh-certificates.tar -C ./wazuh-certificates/ .
388 rm -rf ./wazuh-certificates
389 NODE_NAME=10.60.26.149
390 ls /etc/filebeat/certs/
391 NODE_NAME=wazuh-1
392 $NODE_NAME
393 tar -xf ./wazuh-certificates.tar -C /etc/filebeat/certs/ ./wazuh-1.pem ./wazuh-1-key.pem ./root-ca.pem
394 mv -n /etc/filebeat/certs/wazuh-1.pem /etc/filebeat/certs/filebeat.pem
395 mv -n /etc/filebeat/certs/wazuh-1-key.pem /etc/filebeat/certs/filebeat-key.pem
396 chmod 500 /etc/filebeat/certs
397 chmod 400 /etc/filebeat/certs/*
398 chown -R root:root /etc/filebeat/certs
399 systemctl daemon-reload
400 systemctl enable filebeat
401 systemctl start filebeat
402 filebeat test output
403 apt install debconf adduser procps
404 apt -y install wazuh-indexer
405 nano /etc/wazuh-indexer/opensearch.yml
406 ls -lash
407 ls -lash wazuh-certificates.tar
408 tar -tvf wazuh-certificates.tar
409 systemctl daemon-reload
410 systemctl enable wazuh-indexer.service
411 systemctl start wazuh-indexer.service
412 journalctl -xeu wazuh-indexer.service
413 less /var/log/wazuh-indexer/wazuh-cluster.log
414 curl -k -u admin:admin
https://127.0.0.1:9200 415 curl -k -u admin:admin
https://10.60.26.149:9200 416 systemctl status wazuh-manager.service
417 curl -so /etc/filebeat/filebeat.yml
https://packages.wazuh.com/4.3/tpl/wazuh/filebeat/filebeat.yml 418 nano /etc/filebeat/filebeat.yml
419 filebeat keystore create
420 echo admin | filebeat keystore add username --stdin --force
421 echo admin | filebeat keystore add password --stdin --force
422 curl -so /etc/filebeat/wazuh-template.json
https://raw.githubusercontent.com/wazuh/wazuh/4.3/extensions/elasticsearch/7.x/wazuh-template.json 423 chmod go+r /etc/filebeat/wazuh-template.json
424 curl -s
https://packages.wazuh.com/4.x/filebeat/wazuh-filebeat-0.1.tar.gz | tar -xvz -C /usr/share/filebeat/module
425 NODE_NAME=wazuh-1
426 tar -xf ./wazuh-certificates.tar -C /etc/filebeat/certs/ ./wazuh-1.pem ./wazuh-1-key.pem ./root-ca.pem
427 mv -n /etc/filebeat/certs/wazuh-1.pem /etc/filebeat/certs/filebeat.pem
428 mv -n /etc/filebeat/certs/wazuh-1-key.pem /etc/filebeat/certs/filebeat-key.pem
429 chmod 500 /etc/filebeat/certs
430 chmod 400 /etc/filebeat/certs/*
431 chown -R root:root /etc/filebeat/certs
432 systemctl daemon-reload
433 systemctl enable filebeat
434 systemctl start filebeat
435 filebeat test output
436 apt install debhelper tar curl libcap2-bin
437 nano /etc/wazuh-dashboard/opensearch_dashboards.yml
438 mkdir /etc/wazuh-dashboard/certs
439 tar -xf ./wazuh-certificates.tar -C /etc/wazuh-dashboard/certs/ ./.pem ./$NODE_NAME-key.pem ./root-ca.pem
440 tar -xf ./wazuh-certificates.tar -C /etc/wazuh-dashboard/certs/ ./wazuh-1.pem ./wazuh-1-key.pem ./root-ca.pem
441 mv -n /etc/wazuh-dashboard/certs/wazuh-1.pem /etc/wazuh-dashboard/certs/dashboard.pem
442 mv -n /etc/wazuh-dashboard/certs/wazuh-1-key.pem /etc/wazuh-dashboard/certs/dashboard-key.pem
443 chmod 500 /etc/wazuh-dashboard/certs
444 chmod 400 /etc/wazuh-dashboard/certs/*
445 chown -R wazuh-dashboard:wazuh-dashboard /etc/wazuh-dashboard/certs
446 systemctl daemon-reload
447 systemctl enable wazuh-dashboard
448 systemctl start wazuh-dashboard
449 nano /usr/share/wazuh-dashboard/data/wazuh/config/wazuh.yml
450 reboot
451 curl -sO
https://packages.wazuh.com/4.3/wazuh-install.sh 452 bash wazuh-install.sh --wazuh-server wazuh-1
453 bash wazuh-install.sh --wazuh-dashboard dashboard
454 /var/ossec/bin/wazuh-control info
455 cp /usr/share/kibana/optimize/wazuh/config/wazuh.yml /usr/share/kibana/data/wazuh/config/wazuh.yml
456 nano /usr/share/kibana/data/wazuh/config/wazuh.yml
457 cd /usr/share/kibana/
458 sudo -u kibana bin/kibana-plugin remove wazuh
459 apt install opendistroforelasticsearch-kibana=1.13.2
460 chown -R kibana:kibana /usr/share/kibana/data/
461 chown -R kibana:kibana /usr/share/kibana/plugins/
462 cd /usr/share/kibana/
463 sudo -u kibana /usr/share/kibana/bin/kibana-plugin install
https://packages.wazuh.com/4.x/ui/kibana/wazuh_kibana-4.3.1_7.10.2-1.zip 464 sudo chown kibana:kibana /usr/share/kibana/data/wazuh/config/wazuh.yml
465 chmod 600 /usr/share/kibana/data/wazuh/config/wazuh.yml
466 cat >> /etc/default/kibana << EOF
NODE_OPTIONS="--max_old_space_size=2048"
EOF
467 setcap 'cap_net_bind_service=+ep' /usr/share/kibana/node/bin/node
468 nano /etc/kibana/kibana.yml
469 cd /
470 tar -xf ./wazuh-certificates.tar -C /etc/kibana/certs/ ./wazuh-1.pem ./wazuh-1-key.pem ./root-ca.pem
471 mv -n /etc/kibana/certs/wazuh-1.pem /etc/kibana/certs/kibana.pem
472 systemctl daemon-reload
473 systemctl enable kibana.service
474 systemctl restart kibana.service
475 systemctl status kibana.service
476 systemctl start kibana.service
477 systemctl status kibana.service
478 sed -i "s/^deb/#deb/" /etc/apt/sources.list.d/wazuh.list
479 apt update
480 apt list --upgradable
481 apt dist-upgrade -y
482 apt list kibana --all-versions
483 sudo apt install filebeat=7.17.2
484 sudo apt install wazuh-manager=7.17.2
485 sudo apt list wazuh-manager --all-versions
486 sudo apt list wazuh-dashboards --all-versions
487 sudo apt list wazuh-dashboard --all-versions
488 apt install elasticsearch-oss=7.17.2
489 apt list elasticsearch-oss --all-versions
490 apt install opendistroforelasticsearch=1.13.2-1
491 apt list opendistroforelasticsearch --all-versions
492 systemctl stop kibana
493 systemctl stop kibana.service
494 systemctl status kibana.service
495 systemctl stop kibana.service
496 systemctl status kibana.service
497 systemctl start kibana.service
498 systemctl status kibana.service
There has been much struggle... I am willing to re-deploy on Ubuntu 20.04 if I can keep all of the collected events and configuration files+connected agents