Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update CCS setup blog to work with Vulnerability Scanner #7842

Open
MiguelazoDS opened this issue Oct 3, 2024 · 2 comments
Open

Update CCS setup blog to work with Vulnerability Scanner #7842

MiguelazoDS opened this issue Oct 3, 2024 · 2 comments
Labels
level/task Task issue request/operational Operational requests type/bug Bug issue

Comments

@MiguelazoDS
Copy link
Member

MiguelazoDS commented Oct 3, 2024

Description

A user reported that the scanner was not working properly

After troubleshooting, the user shared the configuration used for the UI stack. Cross-Cluster Search detailed here.

CCS architecture

image

Conclusion

The manager was properly configured and the indexer directly connected to the manager has the information indexed, but the dashboard could not display the information in the dashboard.

DoD

This issue was created to investigate this setup and find a solution or the required changes through all the components to make this work.

@MiguelazoDS MiguelazoDS self-assigned this Oct 3, 2024
@MiguelazoDS MiguelazoDS added level/task Task issue type/enhancement Enhancement issue labels Oct 3, 2024
@MiguelazoDS MiguelazoDS removed their assignment Oct 3, 2024
@sebasfalcone sebasfalcone added request/operational Operational requests and removed type/enhancement Enhancement issue labels Oct 3, 2024
@MiguelazoDS
Copy link
Member Author

Research

Environment

Following step by step the guide here https://wazuh.com/blog/managing-multiple-wazuh-clusters-with-cross-cluster-search

CCS environment

  • Centos 9 (wazuh-indexer, wazuh-dashboard)

Cluster A

  • Manager: Ubuntu Jammy (wazuh-server, wazuh-indexer)
  • Agent : Arch Linux

Deployment

  • Indices indexer CCS environment

image

  • Indices indexer Cluster A

image

  • Indexed vulnerabilities
root@jammy:/home/vagrant/wazuh# curl -k -u admin:admin -XGET https://192.168.33.70:9200/wazuh-states-vulnerabilities-jammy/_search
{"took":1,"timed_out":false,"_shards":{"total":1,"successful":1,"skipped":0,"failed":0},"hits":{"total":{"value":1,"relation":"eq"},"max_score":1.0,"hits":[{"_index":"wazuh-states-vulnerabilities-jammy","_id":"001_6f70d338e7db6bd7014f520b47ac02dfcbeb83a2_CVE-2020-15078","_score":1.0,"_source":{"agent":{"id":"001","name":"archlinux","type":"wazuh","version":"v4.9.0"},"host":{"os":{"full":"Arch Linux ","kernel":"6.10.0-arch1-2","name":"Arch Linux","platform":"arch","type":"arch","version":".rolling"}},"package":{"architecture":"x86_64","description":"An easy-to-use, robust and highly configurable VPN (Virtual Private Network)","name":"openvpn","size":1552249,"type":"pacman","version":"2.5.1-1"},"vulnerability":{"category":"Packages","classification":"CVSS","description":"OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.","detected_at":"2024-10-02T21:20:49.713Z","enumeration":"CVE","id":"CVE-2020-15078","published_at":"2021-04-26T14:15:08Z","reference":"https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements, https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html, https://community.openvpn.net/openvpn/wiki/CVE-2020-15078, https://security.gentoo.org/glsa/202105-25, https://usn.ubuntu.com/usn/usn-4933-1, https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJUXEYHUPREEBPX23VPEKMFXUPVO3PMU/, https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGEGLC4YGBDN5CGHTNWN2GH6DJJA36T2/, https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLDB3OBQ3AODYYRN7NRCABV6I4AUFAT6/","scanner":{"vendor":"Wazuh"},"score":{"base":5.0,"version":"2.0"},"severity":"Medium"},"wazuh":{"cluster":{"name":"jammy"},"schema":{"version":"1.0.0"}}}}]}}
  • Agent connected

image

  • After adding the indices in cluster A

image
image
image

Unable to visualize the dashboard
image

@Dwordcito Dwordcito changed the title Research vulnerability scanner functioning in a CCS setup Spike: Research vulnerability scanner functioning in a CCS setup Oct 4, 2024
@Dwordcito Dwordcito added request/operational Operational requests and removed request/operational Operational requests labels Oct 4, 2024
@MiguelazoDS
Copy link
Member Author

Solution

Thanks to the indexer and dashboard teams' help, we could figure out how to fix this. It is just a setting we needed to tweak.

  • If we check Dashboard Management -> Dashboard Management -> Index Patterns we can see no index for vulnerabilities.

image

  • we just need to modify the index pattern for vulnerabilities in Dashboard Management -> App Settings
    with this value *:wazuh-states-vulnerabilities-*

Where the first '*' matches any indexer in any cluster.

image

  • We can go then to the vulnerability dashboard

image

and verify the index pattern is now created

image

@sebasfalcone sebasfalcone transferred this issue from wazuh/wazuh Oct 4, 2024
@sebasfalcone sebasfalcone changed the title Spike: Research vulnerability scanner functioning in a CCS setup Update CCS setup blog to work with Vulnerability Scanner Oct 4, 2024
@sebasfalcone sebasfalcone added the type/bug Bug issue label Oct 4, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
level/task Task issue request/operational Operational requests type/bug Bug issue
Projects
None yet
Development

No branches or pull requests

3 participants