🕹️
Ghoulsec Vault
Website Toolbase
  • Welcome !
  • 🗃️Exam Prep Notes
    • 📔CEH V13 (Master Edition)
      • Module 02: Footprinting and Reconnaissance
      • Module 03: Scanning Networks
      • Module 04: Enumeration
      • Module 05: Vulnerability Analysis
      • Module 06: System Hacking
      • Module 07: Malware Threats
      • Module 08: Sniffing
      • Module 09 : Social Engineering
      • Module 10: Denial of Service
      • Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls , Honeypots
      • Module 13: Hacking web servers
      • Module 14: Hacking Web Applications
      • Module 15:SQL Injection
      • Module 16: Wireless Attacks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT & OT Hacking
      • Module 19 : Cloud Computing
      • Module 20 : Cryptography
    • 📘ISC2 -Certified in Cyber Security
      • Chapter -1 Security Principals
      • Chapter -2 Disaster Recovery,Business Continuity & Incident Response
      • Chapter -3 Access Control Concepts
      • Chapter -4 Network Security
      • Chapter -5 Security Operations
    • 📗AZ - 900
      • Basics of Cloud Computing
        • Economic of Scale
        • CapEx & OpEx
        • Consumption based model
        • Cloud Deployment Models
        • Shared Responsibility Model
        • Data centers, Regions & Availability Zones & Geographyies in Azure
        • Resources & Resource Group
        • Azure Access Tools
        • Azure Service Lifecycle
        • Azure SLAs
        • Azure Cloud Adoption Framework
      • Azure Services
        • Azure Computing Services
        • Azure Networking Services
        • Azure Storage Services
        • Azure Database Service
        • Azure Marketplace
        • Big Data & Azure
        • Azure Serverless Computing
        • IoT & Azure
        • Other Azure Services
        • Azure Resource Locks & Resource Tags
        • Azure Security Services
          • Security Groups
          • Routing Tables
          • Azure Firewall
          • Azure DDOS Protection
          • Azure Identity & Access Management (Azure AD)
          • Azure RBAC
          • Azure Security Center
          • Azure Key Vault
      • Azure policies & Blueprints
      • Azure Cost Management
      • Azure Core Tenents
    • 📗SC - 900
      • Zero Trust Model
      • Shared Responsibility Model
      • Defense in Depth
      • Security Controls
      • CIA Triad
      • Encryption / Hashing / Signing
      • Microsoft Security & Compliance Principals
      • Common Identity Attacks
      • Microsoft Identity as Primary Security Perimeter
      • Modern Authentication with Azure AD
      • Azure AD Identity Types
      • Azure External Identities
      • Hybrid Identities
      • Authentication Methods & Password Protection
      • Conditional Access
      • Azure AD Roles & RBAC
      • Governance in Azure AD
      • Azure Identity Protection
      • Azure NSG, DDOS, Firewall
      • Azure Bastion & Keyvault
      • Azure Encryption
      • Azure CSPM
      • Azure Security Center
      • Azure Defender
        • Microsoft O365 Defender
        • Azure Sentinel
      • Microsoft Cloud App Security
      • Microsoft Intune
      • Microsoft Complaince Manager
      • Information Protection
      • Microsoft insider risk capabilities
    • 📔AWS Cloud Practitioner
      • Cloud Deployment
        • AWS Global Infrastructure
      • AWS Cloud Essentials
        • AWS SNS
          • AWS SQS
      • AWS Compute & Container Services
        • AWS EC2
          • Elasticity & Agility
        • AWS Serverless Computing
        • AWS Container Services
        • AWS Beanstalk
        • AWS Load Balancing
      • AWS Storage & Databases
      • AWS Networking
      • AWS Security
        • AWS Organisation
        • AWS Compliance
        • AWS DDOS
        • Additional Security Services
      • AWS Monitoring & Analytics
        • Other Analytics Services
      • AWS Pricing & Support
      • AWS Migration & Innovation
        • Migration Statergies
        • AWS Snow Family
        • AWS Transfer Family
        • Innovation on AWS
      • AWS Well Architecture Framework
      • Other AWS Services
  • 🧑‍💻Cyber Security Base
    • Ghoul's Den
    • Cheatsheets
    • SSL Handbook
      • Installing OpenSSL
      • Encrypting Web Servers using SSL
      • Compiling .pfx file using openssl
      • De-compiling .pfx file
      • Zimbra Mail Server SSL renew
      • SSL Certificates
    • ☁️Cloud Security
      • Amazon Web Services (AWS)
        • AWS - IAM & Policy Management
        • AWS Organization
        • AWS - Roles (Assume Role)
        • AWS - EC2 (Elastic Computing)
        • AWS - VPC
        • AWS - Bastion Host
        • AWS Application Load Balancer
        • AWS Auto Scaling Group
        • AWS WAF
        • AWS - VPC Peering
        • AWS Transit Gateway
        • AWS NAT Gateway
        • AWS - Route 53
        • AWS Certificates Manager
        • AWS Network Load Balancer (NLB)
    • 🕸️Network Security
      • Firewalls
        • Sophos - Security Suite
          • Sophos Firewalls
      • VPN
        • VPNs
          • Wireguard Tunneling
          • StrongSwan Gateway VPN Server on Ubuntu
      • IP Address and IP Subnetting
      • Basic to Advance Networking Materials
    • 🧑‍💻VAPT
      • Sample Report Templete
      • OWASP
        • OWASP Web Application Security & WebGoat
      • Web Application testing checklist
        • Client Side Penetration Testing
          • Clickjacking
          • Websockets
          • CSRF
          • XSS Filters
        • Server Side Penetration Testing
        • Advanced Web Application Pentesting
          • OAuth
          • JWT Injection
          • Server Side Templete Injection
    • ☄️GRC
      • ISMS AUDIT PLAN
      • CIS Compliance Windows
    • 🔍Forensic
      • Forensic Tools
      • EMAIL Forensics
      • File header forensics
    • Trend Micro
      • Deep Security
        • Installation & Prerequisite
          • Microsoft SQL server 2022
          • Postgres 16 Core
          • Installation
    • Practical Malware Analysis & API Threats
  • 🕹️Server are fun !
    • Securing Linux
      • Securing SSH
      • Sudoers
      • UFW (Uncomplicated FW)
      • Unattended Upgrades
      • Password Complexiety
      • Auditing Linux
      • Samba - SMB
      • NFS - Network File System
      • FTP
      • AIDE
    • Servers
      • Linux Sever
        • OpenLDAP Server Setup
          • ldap-account-manager
          • Securing OpenLDAP
          • OpenLDAP client setup
          • Checking LDAP setup
        • Users & Groups
        • Password Policy
        • File & File Permissions
        • Automatic Updates
        • Adding GUI to Ubuntu Server
        • DNS Server
        • NTP Server
      • Windows Sever
        • Deep dive into Windows Server
        • Windows server Installation
        • Disable IPv6
        • Disable Server Manager on startup
        • Promoting OS to AD server
        • AD DNS
        • AD DHCP
        • AD Activation
        • AD Users & Groups
        • AD FileServer
        • Adding Users into AD
        • Bulk Importing users into Domain
        • Windows AD Resources
        • Group Policy Editor
          • Creating First Policy
          • Restricting CMD & Powershell
          • Password Policies
          • Audit Policies
          • Log Retention Policy
          • Windows Defender Firewall
          • Patch Management & Window Updates
        • Setting Up local accounts for windows hosts
    • Hacking Systems
      • Linux Systems
        • Battery Charge Threshold (Linux)
        • Metasploitable OS Complete Solved
      • Tricking Windows
        • Bitlocker & Time based policy bypass
    • Monitoring HeartBeats
    • RAID Technology
    • Managing Partitions
      • Parted
      • Fdisk
      • LVM
        • Re-claiming unused disk space
        • Adding physical volume into VG
        • Removing physical volume from VG
      • SWAP Memory
    • Virtualization
      • Proxmox
        • Proxmox VE Installation
        • Default Storage Expansion
        • Proxmox Network Link Aggegration
        • NAT Interface Configuration
        • Importing disk into proxmox
        • Creating an LVM Thin Pool
        • Proxmox IAM
  • 🙍‍♂️Dan the AI Expert
    • Ollama Ollama ...
      • Ollama
        • Ollama models
        • Open Web UI & Ollama Integration
    • Microsoft Presentation using AI
  • 🛡️Security Operations
    • Wazuh - Open Source XDR. Open Source SIEM.
      • Components
      • Deployment Methods
      • Installation
        • Single Node Installation
          • Wazuh Indexer Installation
          • Wazuh Server Installation
          • Wazuh Dashboard Installation
          • Single node deployment with Script
        • Managing multiple Wazuh clusters with Cross-Cluster Search
          • Cluster Configuration
          • Set up Cross-Cluster Search
        • Upgrading Wazuh Central Components
        • Uninstalling Wazuh
      • Custom Decoder & Rules
        • Pfsense Decoders
        • Pfsense Rules
      • Security Operations Center Tools (Wazuh)
    • IRIS-DFIR / Case Management
    • Graylog & ElasticSearch
    • Zabbix NMS
      • Zabbix Installation
      • Zabbix Database Management
        • Zabbix Database backup
        • Zabbix Database restore
        • MySQL Replication (M-M)
        • MySQL Replication (M-W)
      • Zabbix Geomap Setup
      • Adding Hosts into Zabbix
      • Zabbix Hostgroups
      • Auto Registration Hosts Zabbix
      • Zabbix Globalscrips
      • Zabbix HA Cluster
      • Zabbix Proxy
      • Zabbix Notifications
      • Zabbix Maintainance
      • Zabbix User Management & Authentication
      • Zabbix Housekeeping
      • Scheduled Reporting
      • Service Monitoring using Zabbix
  • Git the master!!
    • Configuring git
    • Git Branches
    • Undoing changes
    • Git - Cheat sheet
    • My first git...
Powered by GitBook
On this page
  • 1. Standalone Installation on a Linux Server
  • 2. All-in-One Installation Script
  • 3. Virtual Machine (OVA)
  • 4. Amazon Machine Images (AMI)
  • 5. Deployment on Docker
  • 6. Deployment on Kubernetes
  • 7. Offline Installation
  • 8. Installation from Sources
  • 9. Deployment with Ansible
  • 10. Deployment with Puppet
  1. Security Operations
  2. Wazuh - Open Source XDR. Open Source SIEM.

Deployment Methods

PreviousComponentsNextInstallation

Last updated 2 months ago

1. Standalone Installation on a Linux Server

Description:

In a standalone installation, Wazuh is installed directly on a Linux server. This method is suitable for smaller environments or testing purposes where the Wazuh manager and agent run on the same system. The server becomes responsible for collecting, analyzing, and storing security data locally.

Considerations:

  • Simplicity: A straightforward method that requires manual configuration of agents for distributed monitoring.

  • Limitations: Limited scalability and not ideal for larger, distributed environments.

Installation Documentation :

  1. Wazuh dashboard :

  2. Wazuh Server :

  3. Wazuh Indexer :


2. All-in-One Installation Script

Description:

The all-in-one installation script offers an automated method to deploy both the Wazuh manager and the agent on the same machine. It is typically used for quick deployments where Wazuh is needed on a single server. The script handles the installation and configuration process, ensuring all necessary components are set up automatically.

Considerations:

  • Speed: Quick deployment with minimal configuration.

  • Less Customization: Limited flexibility as the installation follows default configurations.


3. Virtual Machine (OVA)

Description:

Deploying Wazuh via a Virtual Machine (OVA) template allows for a pre-configured setup that is easy to import and run in virtualized environments. This method is useful for those running hypervisors such as VMware or VirtualBox, as it provides a self-contained environment for Wazuh.

Considerations:

  • Ease of Use: Ideal for users who need a quick and hassle-free setup.

  • Resource Consumption: Requires a virtualized environment (VMware, VirtualBox, etc.) and may require additional resources depending on the VM's configuration.


4. Amazon Machine Images (AMI)

Description:

Wazuh provides pre-configured Amazon Machine Images (AMIs) for deployment on Amazon Web Services (AWS). Using an AMI streamlines the process of launching a Wazuh instance in the cloud, as it already includes the necessary configurations for Wazuh manager and agent. This is a perfect option for cloud environments.

Considerations:

  • Scalability: Easy to scale and integrate with other AWS services.

  • Cloud-Focused: Best suited for cloud-native environments like AWS.


5. Deployment on Docker

Description:

Docker enables the deployment of Wazuh in a containerized environment. This method provides portability and flexibility, as Docker containers can run on any system that supports Docker, making it ideal for developers and teams that prefer microservices architecture. It simplifies deployment, scaling, and version control.

Considerations:

  • Portability: Wazuh can run on any system supporting Docker, making it easy to deploy across different platforms.

  • Isolation: Each Wazuh instance runs in isolation, which may help in multi-environment setups, but may require additional configuration for integration with other services.


6. Deployment on Kubernetes

Description:

Wazuh can be deployed on Kubernetes, which is a container orchestration platform. This is suitable for large-scale environments that require high availability, scalability, and automated management of Wazuh instances across many nodes. Kubernetes offers features like self-healing, scaling, and easy integration with other microservices.

Considerations:

  • Scalability and Automation: Kubernetes makes it easier to manage and scale multiple Wazuh instances.

  • Complexity: Requires understanding Kubernetes concepts such as Pods, Deployments, and Services.


7. Offline Installation

Description:

Offline installation is useful in environments that do not have direct internet access. It involves manually downloading all necessary Wazuh installation files and transferring them to the target machine. This approach is often used in secure or air-gapped environments where internet access is restricted.

Considerations:

  • Security and Isolation: Ideal for secure environments with strict network policies.

  • Manual Management: Requires careful management of dependencies and installation files.


8. Installation from Sources

Description:

Installing Wazuh from source gives users full control over the installation process. This method allows for greater customization, as users can modify the source code, configure specific options, and optimize Wazuh for their unique requirements. It is ideal for advanced users or developers who need to build a tailored version of Wazuh.

Considerations:

  • Flexibility: Maximum control over the installation, with the ability to customize configurations and features.

  • Complexity: Requires a deep understanding of Wazuh and its dependencies.


9. Deployment with Ansible

Description:

Ansible is an open-source automation tool used for configuration management. By using Ansible, you can automate the deployment of Wazuh across multiple machines. It allows for repeatable, consistent deployments and can be integrated into an organization's existing automation and DevOps pipelines.

Considerations:

  • Automation: Ideal for large-scale deployments where you need to manage configurations across many nodes.

  • Integration: Works well within existing automation frameworks.


10. Deployment with Puppet

Description:

Puppet is another automation and configuration management tool that can be used for deploying Wazuh. It allows for automated configuration across multiple systems, ensuring consistent setups and easy management. Puppet uses a declarative language to define system states, making it ideal for large environments requiring regular configuration updates.

Considerations:

  • Consistency: Ensures consistent configuration across multiple nodes.

  • Complexity: Like Ansible, Puppet requires knowledge of its language and configuration methods.


🛡️
https://documentation.wazuh.com/4.9/installation-guide/wazuh-dashboard/step-by-step.html
https://documentation.wazuh.com/4.9/installation-guide/wazuh-server/step-by-step.html
https://documentation.wazuh.com/4.9/installation-guide/wazuh-indexer/step-by-step.html
https://documentation.wazuh.com/current/quickstart.html
https://documentation.wazuh.com/current/deployment-options/virtual-machine/virtual-machine.html