Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merge 4.7.2 into 4.8.0 #2741

Merged
merged 6 commits into from
Jan 5, 2024

Fix source branch version

c7d4df1
Select commit
Loading
Failed to load commit list.
Merged

Merge 4.7.2 into 4.8.0 #2741

Fix source branch version
c7d4df1
Select commit
Loading
Failed to load commit list.
Wazuh CI / All In One - Rhel 7 installation succeeded Jan 5, 2024 in 8m 22s

Test_unattended

Below you have the stage output

Details

Rhel 7 log



--------------------------------
05/01/2024 04:37:37 DEBUG: Checking root permissions.
05/01/2024 04:37:37 INFO: Starting Wazuh installation assistant. Wazuh version: 4.8.0
05/01/2024 04:37:37 INFO: Verbose logging redirected to /var/log/wazuh-install.log
05/01/2024 04:37:37 DEBUG: YUM package manager will be used.
05/01/2024 04:37:37 DEBUG: Checking system distribution.
05/01/2024 04:37:37 DEBUG: Detected distribution name: rhel
05/01/2024 04:37:37 DEBUG: Detected distribution version: 7
05/01/2024 04:37:37 DEBUG: Checking Wazuh installation.
05/01/2024 04:37:41 DEBUG: Installing check dependencies.
05/01/2024 04:37:47 INFO: --- Dependencies ---
05/01/2024 04:37:47 INFO: Installing lsof.
Loaded plugins: amazon-id, search-disabled-repos Resolving Dependencies --> Running transaction check ---> Package lsof.x86_64 0:4.87-6.el7 will be installed --> Finished Dependency Resolution Depende
ncies Resolved ================================================================================ Package Arch Version Repository Size ===================================================================
============= Installing: lsof x86_64 4.87-6.el7 rhel-7-server-rhui-rpms 331 k Transaction Summary ================================================================================ Install 1 Package To
tal download size: 331 k Installed size: 927 k Downloading packages: Running transaction check Running transaction test Transaction test succeeded Running transaction Installing : lsof-4.87-6.el7.x86_
64 1/1 Verifying : lsof-4.87-6.el7.x86_64 1/1 Installed: lsof.x86_64 0:4.87-6.el7 Complete!
Loaded plugins: amazon-id, search-disabled-repos Resolving Dependencies --> Running transaction check ---> Package lsof.x86_64 0:4.87-6.el7 will be installed --> Finished Dependency Resolution Depende
ncies Resolved ================================================================================ Package Arch Version Repository Size ===================================================================
============= Installing: lsof x86_64 4.87-6.el7 rhel-7-server-rhui-rpms 331 k Transaction Summary ================================================================================ Install 1 Package To
tal download size: 331 k Installed size: 927 k Downloading packages: Running transaction check Running transaction test Transaction test succeeded Running transaction Installing : lsof-4.87-6.el7.x86_
64 1/1 Verifying : lsof-4.87-6.el7.x86_64 1/1 Installed: lsof.x86_64 0:4.87-6.el7 Complete!
05/01/2024 04:37:49 DEBUG: Checking system architecture.
05/01/2024 04:37:49 INFO: Verifying that your system meets the recommended minimum hardware requirements.
05/01/2024 04:37:49 DEBUG: CPU cores detected: 2
05/01/2024 04:37:49 DEBUG: Free RAM memory detected: 7741
05/01/2024 04:37:49 INFO: Wazuh web interface port will be 443.
05/01/2024 04:37:49 DEBUG: Checking ports availability.
05/01/2024 04:37:50 DEBUG: Installing prerequisites dependencies.
05/01/2024 04:37:51 DEBUG: Checking curl tool version.
05/01/2024 04:37:51 DEBUG: Adding the Wazuh repository.
[wazuh]
gpgcheck=1
gpgkey=https://packages-dev.wazuh.com/key/GPG-KEY-WAZUH
enabled=1
name=EL-${releasever} - Wazuh
baseurl=https://packages-dev.wazuh.com/staging/yum/
protect=1
05/01/2024 04:37:52 INFO: Wazuh development repository added.
05/01/2024 04:37:52 INFO: --- Configuration files ---
05/01/2024 04:37:52 INFO: Generating configuration files.
05/01/2024 04:37:52 DEBUG: Creating Wazuh certificates.
05/01/2024 04:37:52 DEBUG: Reading configuration file.
05/01/2024 04:37:52 DEBUG: Creating the root certificate.
Generating a 2048 bit RSA private key
........................................................+++
................+++
writing new private key to '/tmp/wazuh-certificates//root-ca.key'
-----
05/01/2024 04:37:52 DEBUG: Generating Admin certificates.
Generating RSA private key, 2048 bit long modulus
....................+++
............+++
e is 65537 (0x10001)
Signature ok
subject=/C=US/L=California/O=Wazuh/OU=Wazuh/CN=admin
Getting CA Private Key
05/01/2024 04:37:52 DEBUG: Generating Wazuh indexer certificates.
05/01/2024 04:37:52 DEBUG: Creating the Wazuh indexer certificates.
05/01/2024 04:37:52 DEBUG: Generating certificate configuration.
Generating a 2048 bit RSA private key
....................+++
.................................................................................+++
writing new private key to '/tmp/wazuh-certificates//wazuh-indexer-key.pem'
-----
Signature ok
subject=/C=US/L=California/O=Wazuh/OU=Wazuh/CN=wazuh-indexer
Getting CA Private Key
05/01/2024 04:37:52 DEBUG: Generating Filebeat certificates.
05/01/2024 04:37:52 DEBUG: Creating the Wazuh server certificates.
05/01/2024 04:37:52 DEBUG: Generating certificate configuration.
Generating a 2048 bit RSA private key
........+++
........................................................................................................................................................+++
writing new private key to '/tmp/wazuh-certificates//wazuh-server-key.pem'
-----
Signature ok
subject=/C=US/L=California/O=Wazuh/OU=Wazuh/CN=wazuh-server
Getting CA Private Key
05/01/2024 04:37:53 DEBUG: Generating Wazuh dashboard certificates.
05/01/2024 04:37:53 DEBUG: Creating the Wazuh dashboard certificates.
05/01/2024 04:37:53 DEBUG: Generating certificate configuration.
Generating a 2048 bit RSA private key
..........................................................+++
.................+++
writing new private key to '/tmp/wazuh-certificates//wazuh-dashboard-key.pem'
-----
Signature ok
subject=/C=US/L=California/O=Wazuh/OU=Wazuh/CN=wazuh-dashboard
Getting CA Private Key
05/01/2024 04:37:53 DEBUG: Cleaning certificate files.
05/01/2024 04:37:53 DEBUG: Generating password file.
05/01/2024 04:37:53 DEBUG: Generating random passwords.
05/01/2024 04:37:53 INFO: Created wazuh-install-files.tar. It contains the Wazuh cluster key, certificates, and passwords necessary for installation.
05/01/2024 04:37:53 DEBUG: Extracting Wazuh configuration.
05/01/2024 04:37:53 DEBUG: Reading configuration file.
05/01/2024 04:37:53 INFO: --- Wazuh indexer ---
05/01/2024 04:37:53 INFO: Starting Wazuh indexer installation.
Loaded plugins: amazon-id, search-disabled-repos
Resolving Dependencies
--> Running transaction check
---> Package wazuh-indexer.x86_64 0:4.8.0-40800 will be installed
--> Finished Dependency Resolution

Dependencies Resolved

================================================================================
 Package               Arch           Version               Repository     Size
================================================================================
Installing:
 wazuh-indexer         x86_64         4.8.0-40800           wazuh         743 M

Transaction Summary
================================================================================
Install  1 Package

Total download size: 743 M
Installed size: 1.0 G
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
  Installing : wazuh-indexer-4.8.0-40800.x86_64                             1/1 
Created opensearch keystore in /etc/wazuh-indexer/opensearch.keystore
  Verifying  : wazuh-indexer-4.8.0-40800.x86_64                             1/1 

Installed:
  wazuh-indexer.x86_64 0:4.8.0-40800                                            

Complete!
05/01/2024 04:39:27 DEBUG: Checking Wazuh installation.
05/01/2024 04:39:28 DEBUG: There are Wazuh indexer remaining files.
05/01/2024 04:39:30 INFO: Wazuh indexer installation finished.
05/01/2024 04:39:30 DEBUG: Configuring Wazuh indexer.
05/01/2024 04:39:30 DEBUG: Copying Wazuh indexer certificates.
05/01/2024 04:39:30 INFO: Wazuh indexer post-install configuration finished.
05/01/2024 04:39:30 INFO: Starting service wazuh-indexer.
Created symlink from /etc/systemd/system/multi-user.target.wants/wazuh-indexer.service to /usr/lib/systemd/system/wazuh-indexer.service.
05/01/2024 04:39:53 INFO: wazuh-indexer service started.
05/01/2024 04:39:53 INFO: Initializing Wazuh indexer cluster security settings.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index does not exists, attempt to create it ... done (0-all replicas)
Populate config from /etc/wazuh-indexer/opensearch-security/
Will update '/config' with /etc/wazuh-indexer/opensearch-security/config.yml 
   SUCC: Configuration for 'config' created or updated
Will update '/roles' with /etc/wazuh-indexer/opensearch-security/roles.yml 
   SUCC: Configuration for 'roles' created or updated
Will update '/rolesmapping' with /etc/wazuh-indexer/opensearch-security/roles_mapping.yml 
   SUCC: Configuration for 'rolesmapping' created or updated
Will update '/internalusers' with /etc/wazuh-indexer/opensearch-security/internal_users.yml 
   SUCC: Configuration for 'internalusers' created or updated
Will update '/actiongroups' with /etc/wazuh-indexer/opensearch-security/action_groups.yml 
   SUCC: Configuration for 'actiongroups' created or updated
Will update '/tenants' with /etc/wazuh-indexer/opensearch-security/tenants.yml 
   SUCC: Configuration for 'tenants' created or updated
Will update '/nodesdn' with /etc/wazuh-indexer/opensearch-security/nodes_dn.yml 
   SUCC: Configuration for 'nodesdn' created or updated
Will update '/whitelist' with /etc/wazuh-indexer/opensearch-security/whitelist.yml 
   SUCC: Configuration for 'whitelist' created or updated
Will update '/audit' with /etc/wazuh-indexer/opensearch-security/audit.yml 
   SUCC: Configuration for 'audit' created or updated
Will update '/allowlist' with /etc/wazuh-indexer/opensearch-security/allowlist.yml 
   SUCC: Configuration for 'allowlist' created or updated
SUCC: Expected 10 config types for node {"updated_config_types":["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","internalusers","actiongroups","config"],"updated_config_siz
e":10,"message":null} is 10 (["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","internalusers","actiongroups","config"]) due to: null
Done with success
wazuh-alerts template uploaded
wazuh-archives template uploaded
rollover_policy policy uploaded
wazuh-alerts write index created
wazuh-archives write index created
Indexer ISM initialization finished successfully
05/01/2024 04:40:07 INFO: The Wazuh indexer cluster ISM initialized.
05/01/2024 04:40:07 INFO: Wazuh indexer cluster initialized.
05/01/2024 04:40:07 INFO: --- Wazuh server ---
05/01/2024 04:40:07 INFO: Starting the Wazuh manager installation.
Loaded plugins: amazon-id, search-disabled-repos
Resolving Dependencies
--> Running transaction check
---> Package wazuh-manager.x86_64 0:4.8.0-40800 will be installed
--> Finished Dependency Resolution

Dependencies Resolved

================================================================================
 Package               Arch           Version               Repository     Size
================================================================================
Installing:
 wazuh-manager         x86_64         4.8.0-40800           wazuh         165 M

Transaction Summary
================================================================================
Install  1 Package

Total download size: 165 M
Installed size: 602 M
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
  Installing : wazuh-manager-4.8.0-40800.x86_64                             1/1 
  Verifying  : wazuh-manager-4.8.0-40800.x86_64                             1/1 

Installed:
  wazuh-manager.x86_64 0:4.8.0-40800                                            

Complete!
05/01/2024 04:41:09 DEBUG: Checking Wazuh installation.
05/01/2024 04:41:10 DEBUG: There are Wazuh remaining files.
05/01/2024 04:41:11 DEBUG: There are Wazuh indexer remaining files.
05/01/2024 04:41:12 INFO: Wazuh manager installation finished.
05/01/2024 04:41:12 INFO: Starting service wazuh-manager.
Created symlink from /etc/systemd/system/multi-user.target.wants/wazuh-manager.service to /usr/lib/systemd/system/wazuh-manager.service.
05/01/2024 04:41:30 INFO: wazuh-manager service started.
05/01/2024 04:41:30 INFO: Starting Filebeat installation.
05/01/2024 04:41:35 DEBUG: Checking Wazuh installation.
05/01/2024 04:41:36 DEBUG: There are Wazuh remaining files.
05/01/2024 04:41:37 DEBUG: There are Wazuh indexer remaining files.
05/01/2024 04:41:38 DEBUG: There are Filebeat remaining files.
05/01/2024 04:41:39 INFO: Filebeat installation finished.
05/01/2024 04:41:39 DEBUG: Configuring Filebeat.
05/01/2024 04:41:39 DEBUG: Filebeat template was download successfully.
wazuh/
wazuh/archives/
wazuh/archives/ingest/
wazuh/archives/ingest/pipeline.json
wazuh/archives/config/
wazuh/archives/config/archives.yml
wazuh/archives/manifest.yml
wazuh/_meta/
wazuh/_meta/config.yml
wazuh/_meta/docs.asciidoc
wazuh/_meta/fields.yml
wazuh/alerts/
wazuh/alerts/ingest/
wazuh/alerts/ingest/pipeline.json
wazuh/alerts/config/
wazuh/alerts/config/alerts.yml
wazuh/alerts/manifest.yml
wazuh/module.yml
05/01/2024 04:41:39 DEBUG: Filebeat module was downloaded successfully.
05/01/2024 04:41:40 DEBUG: Copying Filebeat certificates.
Created filebeat keystore
Successfully updated the keystore
Successfully updated the keystore
05/01/2024 04:41:40 INFO: Filebeat post-install configuration finished.
05/01/2024 04:41:40 INFO: Starting service filebeat.
Created symlink from /etc/systemd/system/multi-user.target.wants/filebeat.service to /usr/lib/systemd/system/filebeat.service.
05/01/2024 04:41:40 INFO: filebeat service started.
05/01/2024 04:41:40 INFO: --- Wazuh dashboard ---
05/01/2024 04:41:40 INFO: Starting Wazuh dashboard installation.
Loaded plugins: amazon-id, search-disabled-repos
Resolving Dependencies
--> Running transaction check
---> Package wazuh-dashboard.x86_64 0:4.8.0-40800 will be installed
--> Finished Dependency Resolution

Dependencies Resolved

================================================================================
 Package                 Arch           Version             Repository     Size
================================================================================
Installing:
 wazuh-dashboard         x86_64         4.8.0-40800         wazuh         269 M

Transaction Summary
================================================================================
Install  1 Package

Total download size: 269 M
Installed size: 890 M
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
  Installing : wazuh-dashboard-4.8.0-40800.x86_64                           1/1 
  Verifying  : wazuh-dashboard-4.8.0-40800.x86_64                           1/1 

Installed:
  wazuh-dashboard.x86_64 0:4.8.0-40800                                          

Complete!
05/01/2024 04:43:32 DEBUG: Checking Wazuh installation.
05/01/2024 04:43:33 DEBUG: There are Wazuh remaining files.
05/01/2024 04:43:34 DEBUG: There are Wazuh indexer remaining files.
05/01/2024 04:43:35 DEBUG: There are Filebeat remaining files.
05/01/2024 04:43:35 DEBUG: There are Wazuh dashboard remaining files.
05/01/2024 04:43:35 INFO: Wazuh dashboard installation finished.
05/01/2024 04:43:35 DEBUG: Configuring Wazuh dashboard.
05/01/2024 04:43:35 DEBUG: Copying Wazuh dashboard certificates.
05/01/2024 04:43:36 DEBUG: Wazuh dashboard certificate setup finished.
05/01/2024 04:43:36 INFO: Wazuh dashboard post-install configuration finished.
05/01/2024 04:43:36 INFO: Starting service wazuh-dashboard.
Created symlink from /etc/systemd/system/multi-user.target.wants/wazuh-dashboard.service to /etc/systemd/system/wazuh-dashboard.service.
05/01/2024 04:43:36 INFO: wazuh-dashboard service started.
05/01/2024 04:43:36 DEBUG: Setting Wazuh indexer cluster passwords.
05/01/2024 04:43:36 DEBUG: Checking Wazuh installation.
05/01/2024 04:43:37 DEBUG: There are Wazuh remaining files.
05/01/2024 04:43:38 DEBUG: There are Wazuh indexer remaining files.
05/01/2024 04:43:39 DEBUG: There are Filebeat remaining files.
05/01/2024 04:43:40 DEBUG: There are Wazuh dashboard remaining files.
05/01/2024 04:43:40 INFO: Updating the internal users.
05/01/2024 04:43:40 DEBUG: Creating password backup.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to localhost:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: YELLOW
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Will retrieve '/config' into /etc/wazuh-indexer/backup/config.yml 
   SUCC: Configuration for 'config' stored in /etc/wazuh-indexer/backup/config.yml
Will retrieve '/roles' into /etc/wazuh-indexer/backup/roles.yml 
   SUCC: Configuration for 'roles' stored in /etc/wazuh-indexer/backup/roles.yml
Will retrieve '/rolesmapping' into /etc/wazuh-indexer/backup/roles_mapping.yml 
   SUCC: Configuration for 'rolesmapping' stored in /etc/wazuh-indexer/backup/roles_mapping.yml
Will retrieve '/internalusers' into /etc/wazuh-indexer/backup/internal_users.yml 
   SUCC: Configuration for 'internalusers' stored in /etc/wazuh-indexer/backup/internal_users.yml
Will retrieve '/actiongroups' into /etc/wazuh-indexer/backup/action_groups.yml 
   SUCC: Configuration for 'actiongroups' stored in /etc/wazuh-indexer/backup/action_groups.yml
Will retrieve '/tenants' into /etc/wazuh-indexer/backup/tenants.yml 
   SUCC: Configuration for 'tenants' stored in /etc/wazuh-indexer/backup/tenants.yml
Will retrieve '/nodesdn' into /etc/wazuh-indexer/backup/nodes_dn.yml 
   SUCC: Configuration for 'nodesdn' stored in /etc/wazuh-indexer/backup/nodes_dn.yml
Will retrieve '/whitelist' into /etc/wazuh-indexer/backup/whitelist.yml 
   SUCC: Configuration for 'whitelist' stored in /etc/wazuh-indexer/backup/whitelist.yml
Will retrieve '/allowlist' into /etc/wazuh-indexer/backup/allowlist.yml 
   SUCC: Configuration for 'allowlist' stored in /etc/wazuh-indexer/backup/allowlist.yml
Will retrieve '/audit' into /etc/wazuh-indexer/backup/audit.yml 
   SUCC: Configuration for 'audit' stored in /etc/wazuh-indexer/backup/audit.yml
05/01/2024 04:43:47 DEBUG: Password backup created in /etc/wazuh-indexer/backup.
05/01/2024 04:43:47 INFO: A backup of the internal users has been saved in the /etc/wazuh-indexer/internalusers-backup folder.
05/01/2024 04:43:47 DEBUG: The internal users have been updated before changing the passwords.
05/01/2024 04:43:49 DEBUG: Generating password hashes.
05/01/2024 04:43:56 DEBUG: Password hashes generated.
05/01/2024 04:43:56 DEBUG: Creating password backup.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to localhost:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: YELLOW
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Will retrieve '/config' into /etc/wazuh-indexer/backup/config.yml 
   SUCC: Configuration for 'config' stored in /etc/wazuh-indexer/backup/config.yml
Will retrieve '/roles' into /etc/wazuh-indexer/backup/roles.yml 
   SUCC: Configuration for 'roles' stored in /etc/wazuh-indexer/backup/roles.yml
Will retrieve '/rolesmapping' into /etc/wazuh-indexer/backup/roles_mapping.yml 
   SUCC: Configuration for 'rolesmapping' stored in /etc/wazuh-indexer/backup/roles_mapping.yml
Will retrieve '/internalusers' into /etc/wazuh-indexer/backup/internal_users.yml 
   SUCC: Configuration for 'internalusers' stored in /etc/wazuh-indexer/backup/internal_users.yml
Will retrieve '/actiongroups' into /etc/wazuh-indexer/backup/action_groups.yml 
   SUCC: Configuration for 'actiongroups' stored in /etc/wazuh-indexer/backup/action_groups.yml
Will retrieve '/tenants' into /etc/wazuh-indexer/backup/tenants.yml 
   SUCC: Configuration for 'tenants' stored in /etc/wazuh-indexer/backup/tenants.yml
Will retrieve '/nodesdn' into /etc/wazuh-indexer/backup/nodes_dn.yml 
   SUCC: Configuration for 'nodesdn' stored in /etc/wazuh-indexer/backup/nodes_dn.yml
Will retrieve '/whitelist' into /etc/wazuh-indexer/backup/whitelist.yml 
   SUCC: Configuration for 'whitelist' stored in /etc/wazuh-indexer/backup/whitelist.yml
Will retrieve '/allowlist' into /etc/wazuh-indexer/backup/allowlist.yml 
   SUCC: Configuration for 'allowlist' stored in /etc/wazuh-indexer/backup/allowlist.yml
Will retrieve '/audit' into /etc/wazuh-indexer/backup/audit.yml 
   SUCC: Configuration for 'audit' stored in /etc/wazuh-indexer/backup/audit.yml
05/01/2024 04:44:00 DEBUG: Password backup created in /etc/wazuh-indexer/backup.
Successfully updated the keystore
05/01/2024 04:44:00 DEBUG: Restarting filebeat service...
05/01/2024 04:44:00 DEBUG: filebeat started.
05/01/2024 04:44:01 DEBUG: Restarting wazuh-dashboard service...
05/01/2024 04:44:02 DEBUG: wazuh-dashboard started.
05/01/2024 04:44:02 DEBUG: Running security admin tool.
05/01/2024 04:44:02 DEBUG: Loading new passwords changes.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to localhost:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: YELLOW
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Populate config from /tmp/unattended/unattended_installer
Force type: internalusers
Will update '/internalusers' with /etc/wazuh-indexer/backup/internal_users.yml 
   SUCC: Configuration for 'internalusers' created or updated
SUCC: Expected 1 config types for node {"updated_config_types":["internalusers"],"updated_config_size":1,"message":null} is 1 (["internalusers"]) due to: null
Done with success
05/01/2024 04:44:08 DEBUG: Passwords changed.
05/01/2024 04:44:08 DEBUG: Changing API passwords.
05/01/2024 04:45:11 INFO: Initializing Wazuh dashboard web application.
05/01/2024 04:45:12 INFO: Wazuh dashboard web application initialized.
05/01/2024 04:45:12 INFO: --- Summary ---
05/01/2024 04:45:12 INFO: You can access the web interface https://<wazuh-dashboard-ip>:443
    User: admin
    Password: pB7MzGZdN6zn?2j4T?uVLnV39ZGr+KRp
05/01/2024 04:45:12 INFO: --- Dependencies ---
05/01/2024 04:45:12 INFO: Removing lsof.
Loaded plugins: amazon-id, search-disabled-repos Resolving Dependencies --> Running transaction check ---> Package lsof.x86_64 0:4.87-6.el7 will be erased --> Finished Dependency Resolution Dependenci
es Resolved ================================================================================ Package Arch Version Repository Size ======================================================================
========== Removing: lsof x86_64 4.87-6.el7 @rhel-7-server-rhui-rpms 927 k Transaction Summary ================================================================================ Remove 1 Package Install
ed size: 927 k Downloading packages: Running transaction check Running transaction test Transaction test succeeded Running transaction Erasing : lsof-4.87-6.el7.x86_64 1/1 Verifying : lsof-4.87-6.el7.
x86_64 1/1 Removed: lsof.x86_64 0:4.87-6.el7 Complete!
05/01/2024 04:45:13 DEBUG: Restoring Wazuh repository.
05/01/2024 04:45:13 INFO: Installation finished.