Installing the ThreatLockDown indexer step by step
Install and configure the ThreatLockDown indexer as a single-node or multi-node cluster following step-by-step instructions. ThreatLockDown indexer is a highly scalable full-text search engine and offers advanced security, alerting, index management, deep performance analysis, and several other features.
The installation process is divided into three stages.
Certificates creation
Nodes installation
Cluster initialization
Note
You need root user privileges to run all the commands described below.
1. Certificates creation
Generating the SSL certificates
Download the
wazuh-certs-tool.sh
script and theconfig.yml
configuration file. This creates the certificates that encrypt communications between the ThreatLockDown central components.# curl -sO https://packages.wazuh.com/4.9/wazuh-certs-tool.sh # curl -sO https://packages.wazuh.com/4.9/config.yml
Edit
./config.yml
and replace the node names and IP values with the corresponding names and IP addresses. You need to do this for all ThreatLockDown server, ThreatLockDown indexer, and ThreatLockDown dashboard nodes. Add as many node fields as needed.nodes: # ThreatLockDown indexer nodes indexer: - name: node-1 ip: "<indexer-node-ip>" #- name: node-2 # ip: "<indexer-node-ip>" #- name: node-3 # ip: "<indexer-node-ip>" # ThreatLockDown server nodes # If there is more than one ThreatLockDown server # node, each one must have a node_type server: - name: wazuh-1 ip: "<wazuh-manager-ip>" # node_type: master #- name: wazuh-2 # ip: "<wazuh-manager-ip>" # node_type: worker #- name: wazuh-3 # ip: "<wazuh-manager-ip>" # node_type: worker # ThreatLockDown dashboard nodes dashboard: - name: dashboard ip: "<dashboard-node-ip>"
To learn more about how to create and configure the certificates, see the Certificates deployment section.
Run
./wazuh-certs-tool.sh
to create the certificates. For a multi-node cluster, these certificates need to be later deployed to all ThreatLockDown instances in your cluster.# bash ./wazuh-certs-tool.sh -A
Compress all the necessary files.
# tar -cvf ./wazuh-certificates.tar -C ./wazuh-certificates/ . # rm -rf ./wazuh-certificates
Copy the
wazuh-certificates.tar
file to all the nodes, including the ThreatLockDown indexer, ThreatLockDown server, and ThreatLockDown dashboard nodes. This can be done by using thescp
utility.
2. Nodes installation
Installing package dependencies
Install the following packages if missing:
# yum install coreutils
# apt-get install debconf adduser procps
Adding the ThreatLockDown repository
Import the GPG key.
# rpm --import https://packages.wazuh.com/key/GPG-KEY-WAZUHAdd the repository.
# echo -e '[wazuh]\ngpgcheck=1\ngpgkey=https://packages.wazuh.com/key/GPG-KEY-WAZUH\nenabled=1\nname=EL-$releasever - Wazuh\nbaseurl=https://packages.wazuh.com/4.x/yum/\nprotect=1' | tee /etc/yum.repos.d/wazuh.repo
Install the following packages if missing.
# apt-get install gnupg apt-transport-httpsInstall the GPG key.
# curl -s https://packages.wazuh.com/key/GPG-KEY-WAZUH | gpg --no-default-keyring --keyring gnupg-ring:/usr/share/keyrings/wazuh.gpg --import && chmod 644 /usr/share/keyrings/wazuh.gpgAdd the repository.
# echo "deb [signed-by=/usr/share/keyrings/wazuh.gpg] https://packages.wazuh.com/4.x/apt/ stable main" | tee -a /etc/apt/sources.list.d/wazuh.listUpdate the packages information.
# apt-get update
Installing the ThreatLockDown indexer
Install the ThreatLockDown indexer package.
# yum -y install wazuh-indexer
# apt-get -y install wazuh-indexer
Configuring the ThreatLockDown indexer
Edit the
/etc/wazuh-indexer/opensearch.yml
configuration file and replace the following values:
network.host
: Sets the address of this node for both HTTP and transport traffic. The node will bind to this address and use it as its publish address. Accepts an IP address or a hostname.Use the same node address set in
config.yml
to create the SSL certificates.
node.name
: Name of the ThreatLockDown indexer node as defined in theconfig.yml
file. For example,node-1
.
cluster.initial_master_nodes
: List of the names of the master-eligible nodes. These names are defined in theconfig.yml
file. Uncomment thenode-2
andnode-3
lines, change the names, or add more lines, according to yourconfig.yml
definitions.cluster.initial_master_nodes: - "node-1" - "node-2" - "node-3"
discovery.seed_hosts:
List of the addresses of the master-eligible nodes. Each element can be either an IP address or a hostname. You may leave this setting commented if you are configuring the ThreatLockDown indexer as a single node. For multi-node configurations, uncomment this setting and set the IP addresses of each master-eligible node.discovery.seed_hosts: - "10.0.0.1" - "10.0.0.2" - "10.0.0.3"
plugins.security.nodes_dn
: List of the Distinguished Names of the certificates of all the ThreatLockDown indexer cluster nodes. Uncomment the lines fornode-2
andnode-3
and change the common names (CN) and values according to your settings and yourconfig.yml
definitions.plugins.security.nodes_dn: - "CN=node-1,OU=Wazuh,O=Wazuh,L=California,C=US" - "CN=node-2,OU=Wazuh,O=Wazuh,L=California,C=US" - "CN=node-3,OU=Wazuh,O=Wazuh,L=California,C=US"
Deploying certificates
Note
Make sure that a copy of the
wazuh-certificates.tar
file, created during the initial configuration step, is placed in your working directory.
Run the following commands replacing
<indexer-node-name>
with the name of the ThreatLockDown indexer node you are configuring as defined inconfig.yml
. For example,node-1
. This deploys the SSL certificates to encrypt communications between the ThreatLockDown central components.# NODE_NAME=<indexer-node-name># mkdir /etc/wazuh-indexer/certs # tar -xf ./wazuh-certificates.tar -C /etc/wazuh-indexer/certs/ ./$NODE_NAME.pem ./$NODE_NAME-key.pem ./admin.pem ./admin-key.pem ./root-ca.pem # mv -n /etc/wazuh-indexer/certs/$NODE_NAME.pem /etc/wazuh-indexer/certs/indexer.pem # mv -n /etc/wazuh-indexer/certs/$NODE_NAME-key.pem /etc/wazuh-indexer/certs/indexer-key.pem # chmod 500 /etc/wazuh-indexer/certs # chmod 400 /etc/wazuh-indexer/certs/* # chown -R wazuh-indexer:wazuh-indexer /etc/wazuh-indexer/certsRecommended action: If no other ThreatLockDown components are going to be installed on this node, remove the
wazuh-certificates.tar
file by runningrm -f ./wazuh-certificates.tar
to increase security.
Starting the service
Enable and start the ThreatLockDown indexer service.
# systemctl daemon-reload # systemctl enable wazuh-indexer # systemctl start wazuh-indexerChoose one option according to the operating system used.
RPM-based operating system:
# chkconfig --add wazuh-indexer # service wazuh-indexer start
Debian-based operating system:
# update-rc.d wazuh-indexer defaults 95 10 # service wazuh-indexer start
Repeat this stage of the installation process for every ThreatLockDown indexer node in your cluster. Then proceed with initializing your single-node or multi-node cluster in the next stage.
3. Cluster initialization
Cluster initialization involves configuring a default ISM policy, loading new certificate information, and starting the single-node or multi-node cluster.
Run the ThreatLockDown indexer
indexer-init.sh
script on any ThreatLockDown indexer node to initialize the cluster. Check Index life management for customization options.# bash /usr/share/wazuh-indexer/bin/indexer-init.sh -i <WAZUH_INDEXER_IP_ADDRESS>
Note
You only have to initialize the cluster once, there is no need to run this command on every node.
Testing the cluster installation
Replace
<WAZUH_INDEXER_IP_ADDRESS>
and run the following commands to confirm that the installation is successful.# curl -k -u admin:admin https://<WAZUH_INDEXER_IP_ADRESS>:9200
{ "name" : "node-1", "cluster_name" : "wazuh-cluster", "cluster_uuid" : "095jEW-oRJSFKLz5wmo5PA", "version" : { "number" : "7.10.2", "build_type" : "rpm", "build_hash" : "db90a415ff2fd428b4f7b3f800a51dc229287cb4", "build_date" : "2023-06-03T06:24:25.112415503Z", "build_snapshot" : false, "lucene_version" : "9.6.0", "minimum_wire_compatibility_version" : "7.10.0", "minimum_index_compatibility_version" : "7.0.0" }, "tagline" : "The OpenSearch Project: https://opensearch.org/" }
Replace
<WAZUH_INDEXER_IP_ADDRESS>
and run the following command to check if the single-node or multi-node cluster is working correctly.# curl -k -u admin:admin https://<WAZUH_INDEXER_IP_ADDRESS>:9200/_cat/nodes?v
Next steps
The ThreatLockDown indexer is now successfully installed on your single-node or multi-node cluster, and you can proceed with installing the ThreatLockDown server. To perform this action, see the Installing the ThreatLockDown server step by step section.
If you want to uninstall the ThreatLockDown indexer, see Uninstall the ThreatLockDown indexer.