FAQ
How can I tune the ThreatLockDown dashboard configuration?
The ThreatLockDown dashboard reads its configuration from config/wazuh_dashboard/opensearch_dashboards.yml
:
wazuh-dashboard:
...
volumes:
- ./custom_opensearch_dashboards.yml:/usr/share/wazuh-dashboard/opensearch_dashboards.yml
Read the YAML files Opensearch documentation to know more about the variables you can use on this image.
How can I tune the ThreatLockDown indexer configuration?
The ThreatLockDown indexer container uses the default configuration, and it’s not exposed by default.
If you want to override the default configuration, create a file config/wazuh_indexer/<new_wazuh_indexer>.yml
and add your custom version of the configuration to it. Then map your configuration file inside the container in the docker-compose.yml
. Update the ThreatLockDown indexer container declaration to:
<new_wazuh_indexer>:
image: wazuh/wazuh-indexer:latest
ports:
- "9200:9200"
- "9300:9300"
environment:
ES_JAVA_OPTS: "-Xms6g -Xmx6g"
networks:
- docker_wazuh
How can I store the ThreatLockDown indexer data?
The data stored in the ThreatLockDown indexer persists after container reboots but not after container removal.
By default, the single-node and multi-node deployments already have volumes configured. For example, see wazuh1.indexer
volume in the multi-node docker-compose.yml
file:
wazuh1.indexer:
...
volumes:
- wazuh-indexer-data-1:/var/lib/wazuh-indexer
This stores ThreatLockDown indexer data inside wazuh-indexer-data-1
volume in the Docker host local file system.