Merge 4.7.2 into 4.8.0 #2741
Merged
Merge 4.7.2 into 4.8.0 #2741
Wazuh CI / All In One - Rhel 7 installation
succeeded
Jan 5, 2024 in 8m 22s
Test_unattended
Below you have the stage output
Details
Rhel 7 log
--------------------------------
05/01/2024 04:37:37 DEBUG: Checking root permissions.
05/01/2024 04:37:37 INFO: Starting Wazuh installation assistant. Wazuh version: 4.8.0
05/01/2024 04:37:37 INFO: Verbose logging redirected to /var/log/wazuh-install.log
05/01/2024 04:37:37 DEBUG: YUM package manager will be used.
05/01/2024 04:37:37 DEBUG: Checking system distribution.
05/01/2024 04:37:37 DEBUG: Detected distribution name: rhel
05/01/2024 04:37:37 DEBUG: Detected distribution version: 7
05/01/2024 04:37:37 DEBUG: Checking Wazuh installation.
05/01/2024 04:37:41 DEBUG: Installing check dependencies.
05/01/2024 04:37:47 INFO: --- Dependencies ---
05/01/2024 04:37:47 INFO: Installing lsof.
Loaded plugins: amazon-id, search-disabled-repos Resolving Dependencies --> Running transaction check ---> Package lsof.x86_64 0:4.87-6.el7 will be installed --> Finished Dependency Resolution Depende
ncies Resolved ================================================================================ Package Arch Version Repository Size ===================================================================
============= Installing: lsof x86_64 4.87-6.el7 rhel-7-server-rhui-rpms 331 k Transaction Summary ================================================================================ Install 1 Package To
tal download size: 331 k Installed size: 927 k Downloading packages: Running transaction check Running transaction test Transaction test succeeded Running transaction Installing : lsof-4.87-6.el7.x86_
64 1/1 Verifying : lsof-4.87-6.el7.x86_64 1/1 Installed: lsof.x86_64 0:4.87-6.el7 Complete!
Loaded plugins: amazon-id, search-disabled-repos Resolving Dependencies --> Running transaction check ---> Package lsof.x86_64 0:4.87-6.el7 will be installed --> Finished Dependency Resolution Depende
ncies Resolved ================================================================================ Package Arch Version Repository Size ===================================================================
============= Installing: lsof x86_64 4.87-6.el7 rhel-7-server-rhui-rpms 331 k Transaction Summary ================================================================================ Install 1 Package To
tal download size: 331 k Installed size: 927 k Downloading packages: Running transaction check Running transaction test Transaction test succeeded Running transaction Installing : lsof-4.87-6.el7.x86_
64 1/1 Verifying : lsof-4.87-6.el7.x86_64 1/1 Installed: lsof.x86_64 0:4.87-6.el7 Complete!
05/01/2024 04:37:49 DEBUG: Checking system architecture.
05/01/2024 04:37:49 INFO: Verifying that your system meets the recommended minimum hardware requirements.
05/01/2024 04:37:49 DEBUG: CPU cores detected: 2
05/01/2024 04:37:49 DEBUG: Free RAM memory detected: 7741
05/01/2024 04:37:49 INFO: Wazuh web interface port will be 443.
05/01/2024 04:37:49 DEBUG: Checking ports availability.
05/01/2024 04:37:50 DEBUG: Installing prerequisites dependencies.
05/01/2024 04:37:51 DEBUG: Checking curl tool version.
05/01/2024 04:37:51 DEBUG: Adding the Wazuh repository.
[wazuh]
gpgcheck=1
gpgkey=https://packages-dev.wazuh.com/key/GPG-KEY-WAZUH
enabled=1
name=EL-${releasever} - Wazuh
baseurl=https://packages-dev.wazuh.com/staging/yum/
protect=1
05/01/2024 04:37:52 INFO: Wazuh development repository added.
05/01/2024 04:37:52 INFO: --- Configuration files ---
05/01/2024 04:37:52 INFO: Generating configuration files.
05/01/2024 04:37:52 DEBUG: Creating Wazuh certificates.
05/01/2024 04:37:52 DEBUG: Reading configuration file.
05/01/2024 04:37:52 DEBUG: Creating the root certificate.
Generating a 2048 bit RSA private key
........................................................+++
................+++
writing new private key to '/tmp/wazuh-certificates//root-ca.key'
-----
05/01/2024 04:37:52 DEBUG: Generating Admin certificates.
Generating RSA private key, 2048 bit long modulus
....................+++
............+++
e is 65537 (0x10001)
Signature ok
subject=/C=US/L=California/O=Wazuh/OU=Wazuh/CN=admin
Getting CA Private Key
05/01/2024 04:37:52 DEBUG: Generating Wazuh indexer certificates.
05/01/2024 04:37:52 DEBUG: Creating the Wazuh indexer certificates.
05/01/2024 04:37:52 DEBUG: Generating certificate configuration.
Generating a 2048 bit RSA private key
....................+++
.................................................................................+++
writing new private key to '/tmp/wazuh-certificates//wazuh-indexer-key.pem'
-----
Signature ok
subject=/C=US/L=California/O=Wazuh/OU=Wazuh/CN=wazuh-indexer
Getting CA Private Key
05/01/2024 04:37:52 DEBUG: Generating Filebeat certificates.
05/01/2024 04:37:52 DEBUG: Creating the Wazuh server certificates.
05/01/2024 04:37:52 DEBUG: Generating certificate configuration.
Generating a 2048 bit RSA private key
........+++
........................................................................................................................................................+++
writing new private key to '/tmp/wazuh-certificates//wazuh-server-key.pem'
-----
Signature ok
subject=/C=US/L=California/O=Wazuh/OU=Wazuh/CN=wazuh-server
Getting CA Private Key
05/01/2024 04:37:53 DEBUG: Generating Wazuh dashboard certificates.
05/01/2024 04:37:53 DEBUG: Creating the Wazuh dashboard certificates.
05/01/2024 04:37:53 DEBUG: Generating certificate configuration.
Generating a 2048 bit RSA private key
..........................................................+++
.................+++
writing new private key to '/tmp/wazuh-certificates//wazuh-dashboard-key.pem'
-----
Signature ok
subject=/C=US/L=California/O=Wazuh/OU=Wazuh/CN=wazuh-dashboard
Getting CA Private Key
05/01/2024 04:37:53 DEBUG: Cleaning certificate files.
05/01/2024 04:37:53 DEBUG: Generating password file.
05/01/2024 04:37:53 DEBUG: Generating random passwords.
05/01/2024 04:37:53 INFO: Created wazuh-install-files.tar. It contains the Wazuh cluster key, certificates, and passwords necessary for installation.
05/01/2024 04:37:53 DEBUG: Extracting Wazuh configuration.
05/01/2024 04:37:53 DEBUG: Reading configuration file.
05/01/2024 04:37:53 INFO: --- Wazuh indexer ---
05/01/2024 04:37:53 INFO: Starting Wazuh indexer installation.
Loaded plugins: amazon-id, search-disabled-repos
Resolving Dependencies
--> Running transaction check
---> Package wazuh-indexer.x86_64 0:4.8.0-40800 will be installed
--> Finished Dependency Resolution
Dependencies Resolved
================================================================================
Package Arch Version Repository Size
================================================================================
Installing:
wazuh-indexer x86_64 4.8.0-40800 wazuh 743 M
Transaction Summary
================================================================================
Install 1 Package
Total download size: 743 M
Installed size: 1.0 G
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
Installing : wazuh-indexer-4.8.0-40800.x86_64 1/1
Created opensearch keystore in /etc/wazuh-indexer/opensearch.keystore
Verifying : wazuh-indexer-4.8.0-40800.x86_64 1/1
Installed:
wazuh-indexer.x86_64 0:4.8.0-40800
Complete!
05/01/2024 04:39:27 DEBUG: Checking Wazuh installation.
05/01/2024 04:39:28 DEBUG: There are Wazuh indexer remaining files.
05/01/2024 04:39:30 INFO: Wazuh indexer installation finished.
05/01/2024 04:39:30 DEBUG: Configuring Wazuh indexer.
05/01/2024 04:39:30 DEBUG: Copying Wazuh indexer certificates.
05/01/2024 04:39:30 INFO: Wazuh indexer post-install configuration finished.
05/01/2024 04:39:30 INFO: Starting service wazuh-indexer.
Created symlink from /etc/systemd/system/multi-user.target.wants/wazuh-indexer.service to /usr/lib/systemd/system/wazuh-indexer.service.
05/01/2024 04:39:53 INFO: wazuh-indexer service started.
05/01/2024 04:39:53 INFO: Initializing Wazuh indexer cluster security settings.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755 **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index does not exists, attempt to create it ... done (0-all replicas)
Populate config from /etc/wazuh-indexer/opensearch-security/
Will update '/config' with /etc/wazuh-indexer/opensearch-security/config.yml
SUCC: Configuration for 'config' created or updated
Will update '/roles' with /etc/wazuh-indexer/opensearch-security/roles.yml
SUCC: Configuration for 'roles' created or updated
Will update '/rolesmapping' with /etc/wazuh-indexer/opensearch-security/roles_mapping.yml
SUCC: Configuration for 'rolesmapping' created or updated
Will update '/internalusers' with /etc/wazuh-indexer/opensearch-security/internal_users.yml
SUCC: Configuration for 'internalusers' created or updated
Will update '/actiongroups' with /etc/wazuh-indexer/opensearch-security/action_groups.yml
SUCC: Configuration for 'actiongroups' created or updated
Will update '/tenants' with /etc/wazuh-indexer/opensearch-security/tenants.yml
SUCC: Configuration for 'tenants' created or updated
Will update '/nodesdn' with /etc/wazuh-indexer/opensearch-security/nodes_dn.yml
SUCC: Configuration for 'nodesdn' created or updated
Will update '/whitelist' with /etc/wazuh-indexer/opensearch-security/whitelist.yml
SUCC: Configuration for 'whitelist' created or updated
Will update '/audit' with /etc/wazuh-indexer/opensearch-security/audit.yml
SUCC: Configuration for 'audit' created or updated
Will update '/allowlist' with /etc/wazuh-indexer/opensearch-security/allowlist.yml
SUCC: Configuration for 'allowlist' created or updated
SUCC: Expected 10 config types for node {"updated_config_types":["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","internalusers","actiongroups","config"],"updated_config_siz
e":10,"message":null} is 10 (["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","internalusers","actiongroups","config"]) due to: null
Done with success
wazuh-alerts template uploaded
wazuh-archives template uploaded
rollover_policy policy uploaded
wazuh-alerts write index created
wazuh-archives write index created
Indexer ISM initialization finished successfully
05/01/2024 04:40:07 INFO: The Wazuh indexer cluster ISM initialized.
05/01/2024 04:40:07 INFO: Wazuh indexer cluster initialized.
05/01/2024 04:40:07 INFO: --- Wazuh server ---
05/01/2024 04:40:07 INFO: Starting the Wazuh manager installation.
Loaded plugins: amazon-id, search-disabled-repos
Resolving Dependencies
--> Running transaction check
---> Package wazuh-manager.x86_64 0:4.8.0-40800 will be installed
--> Finished Dependency Resolution
Dependencies Resolved
================================================================================
Package Arch Version Repository Size
================================================================================
Installing:
wazuh-manager x86_64 4.8.0-40800 wazuh 165 M
Transaction Summary
================================================================================
Install 1 Package
Total download size: 165 M
Installed size: 602 M
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
Installing : wazuh-manager-4.8.0-40800.x86_64 1/1
Verifying : wazuh-manager-4.8.0-40800.x86_64 1/1
Installed:
wazuh-manager.x86_64 0:4.8.0-40800
Complete!
05/01/2024 04:41:09 DEBUG: Checking Wazuh installation.
05/01/2024 04:41:10 DEBUG: There are Wazuh remaining files.
05/01/2024 04:41:11 DEBUG: There are Wazuh indexer remaining files.
05/01/2024 04:41:12 INFO: Wazuh manager installation finished.
05/01/2024 04:41:12 INFO: Starting service wazuh-manager.
Created symlink from /etc/systemd/system/multi-user.target.wants/wazuh-manager.service to /usr/lib/systemd/system/wazuh-manager.service.
05/01/2024 04:41:30 INFO: wazuh-manager service started.
05/01/2024 04:41:30 INFO: Starting Filebeat installation.
05/01/2024 04:41:35 DEBUG: Checking Wazuh installation.
05/01/2024 04:41:36 DEBUG: There are Wazuh remaining files.
05/01/2024 04:41:37 DEBUG: There are Wazuh indexer remaining files.
05/01/2024 04:41:38 DEBUG: There are Filebeat remaining files.
05/01/2024 04:41:39 INFO: Filebeat installation finished.
05/01/2024 04:41:39 DEBUG: Configuring Filebeat.
05/01/2024 04:41:39 DEBUG: Filebeat template was download successfully.
wazuh/
wazuh/archives/
wazuh/archives/ingest/
wazuh/archives/ingest/pipeline.json
wazuh/archives/config/
wazuh/archives/config/archives.yml
wazuh/archives/manifest.yml
wazuh/_meta/
wazuh/_meta/config.yml
wazuh/_meta/docs.asciidoc
wazuh/_meta/fields.yml
wazuh/alerts/
wazuh/alerts/ingest/
wazuh/alerts/ingest/pipeline.json
wazuh/alerts/config/
wazuh/alerts/config/alerts.yml
wazuh/alerts/manifest.yml
wazuh/module.yml
05/01/2024 04:41:39 DEBUG: Filebeat module was downloaded successfully.
05/01/2024 04:41:40 DEBUG: Copying Filebeat certificates.
Created filebeat keystore
Successfully updated the keystore
Successfully updated the keystore
05/01/2024 04:41:40 INFO: Filebeat post-install configuration finished.
05/01/2024 04:41:40 INFO: Starting service filebeat.
Created symlink from /etc/systemd/system/multi-user.target.wants/filebeat.service to /usr/lib/systemd/system/filebeat.service.
05/01/2024 04:41:40 INFO: filebeat service started.
05/01/2024 04:41:40 INFO: --- Wazuh dashboard ---
05/01/2024 04:41:40 INFO: Starting Wazuh dashboard installation.
Loaded plugins: amazon-id, search-disabled-repos
Resolving Dependencies
--> Running transaction check
---> Package wazuh-dashboard.x86_64 0:4.8.0-40800 will be installed
--> Finished Dependency Resolution
Dependencies Resolved
================================================================================
Package Arch Version Repository Size
================================================================================
Installing:
wazuh-dashboard x86_64 4.8.0-40800 wazuh 269 M
Transaction Summary
================================================================================
Install 1 Package
Total download size: 269 M
Installed size: 890 M
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
Installing : wazuh-dashboard-4.8.0-40800.x86_64 1/1
Verifying : wazuh-dashboard-4.8.0-40800.x86_64 1/1
Installed:
wazuh-dashboard.x86_64 0:4.8.0-40800
Complete!
05/01/2024 04:43:32 DEBUG: Checking Wazuh installation.
05/01/2024 04:43:33 DEBUG: There are Wazuh remaining files.
05/01/2024 04:43:34 DEBUG: There are Wazuh indexer remaining files.
05/01/2024 04:43:35 DEBUG: There are Filebeat remaining files.
05/01/2024 04:43:35 DEBUG: There are Wazuh dashboard remaining files.
05/01/2024 04:43:35 INFO: Wazuh dashboard installation finished.
05/01/2024 04:43:35 DEBUG: Configuring Wazuh dashboard.
05/01/2024 04:43:35 DEBUG: Copying Wazuh dashboard certificates.
05/01/2024 04:43:36 DEBUG: Wazuh dashboard certificate setup finished.
05/01/2024 04:43:36 INFO: Wazuh dashboard post-install configuration finished.
05/01/2024 04:43:36 INFO: Starting service wazuh-dashboard.
Created symlink from /etc/systemd/system/multi-user.target.wants/wazuh-dashboard.service to /etc/systemd/system/wazuh-dashboard.service.
05/01/2024 04:43:36 INFO: wazuh-dashboard service started.
05/01/2024 04:43:36 DEBUG: Setting Wazuh indexer cluster passwords.
05/01/2024 04:43:36 DEBUG: Checking Wazuh installation.
05/01/2024 04:43:37 DEBUG: There are Wazuh remaining files.
05/01/2024 04:43:38 DEBUG: There are Wazuh indexer remaining files.
05/01/2024 04:43:39 DEBUG: There are Filebeat remaining files.
05/01/2024 04:43:40 DEBUG: There are Wazuh dashboard remaining files.
05/01/2024 04:43:40 INFO: Updating the internal users.
05/01/2024 04:43:40 DEBUG: Creating password backup.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755 **
**************************************************************************
Security Admin v7
Will connect to localhost:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: YELLOW
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Will retrieve '/config' into /etc/wazuh-indexer/backup/config.yml
SUCC: Configuration for 'config' stored in /etc/wazuh-indexer/backup/config.yml
Will retrieve '/roles' into /etc/wazuh-indexer/backup/roles.yml
SUCC: Configuration for 'roles' stored in /etc/wazuh-indexer/backup/roles.yml
Will retrieve '/rolesmapping' into /etc/wazuh-indexer/backup/roles_mapping.yml
SUCC: Configuration for 'rolesmapping' stored in /etc/wazuh-indexer/backup/roles_mapping.yml
Will retrieve '/internalusers' into /etc/wazuh-indexer/backup/internal_users.yml
SUCC: Configuration for 'internalusers' stored in /etc/wazuh-indexer/backup/internal_users.yml
Will retrieve '/actiongroups' into /etc/wazuh-indexer/backup/action_groups.yml
SUCC: Configuration for 'actiongroups' stored in /etc/wazuh-indexer/backup/action_groups.yml
Will retrieve '/tenants' into /etc/wazuh-indexer/backup/tenants.yml
SUCC: Configuration for 'tenants' stored in /etc/wazuh-indexer/backup/tenants.yml
Will retrieve '/nodesdn' into /etc/wazuh-indexer/backup/nodes_dn.yml
SUCC: Configuration for 'nodesdn' stored in /etc/wazuh-indexer/backup/nodes_dn.yml
Will retrieve '/whitelist' into /etc/wazuh-indexer/backup/whitelist.yml
SUCC: Configuration for 'whitelist' stored in /etc/wazuh-indexer/backup/whitelist.yml
Will retrieve '/allowlist' into /etc/wazuh-indexer/backup/allowlist.yml
SUCC: Configuration for 'allowlist' stored in /etc/wazuh-indexer/backup/allowlist.yml
Will retrieve '/audit' into /etc/wazuh-indexer/backup/audit.yml
SUCC: Configuration for 'audit' stored in /etc/wazuh-indexer/backup/audit.yml
05/01/2024 04:43:47 DEBUG: Password backup created in /etc/wazuh-indexer/backup.
05/01/2024 04:43:47 INFO: A backup of the internal users has been saved in the /etc/wazuh-indexer/internalusers-backup folder.
05/01/2024 04:43:47 DEBUG: The internal users have been updated before changing the passwords.
05/01/2024 04:43:49 DEBUG: Generating password hashes.
05/01/2024 04:43:56 DEBUG: Password hashes generated.
05/01/2024 04:43:56 DEBUG: Creating password backup.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755 **
**************************************************************************
Security Admin v7
Will connect to localhost:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: YELLOW
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Will retrieve '/config' into /etc/wazuh-indexer/backup/config.yml
SUCC: Configuration for 'config' stored in /etc/wazuh-indexer/backup/config.yml
Will retrieve '/roles' into /etc/wazuh-indexer/backup/roles.yml
SUCC: Configuration for 'roles' stored in /etc/wazuh-indexer/backup/roles.yml
Will retrieve '/rolesmapping' into /etc/wazuh-indexer/backup/roles_mapping.yml
SUCC: Configuration for 'rolesmapping' stored in /etc/wazuh-indexer/backup/roles_mapping.yml
Will retrieve '/internalusers' into /etc/wazuh-indexer/backup/internal_users.yml
SUCC: Configuration for 'internalusers' stored in /etc/wazuh-indexer/backup/internal_users.yml
Will retrieve '/actiongroups' into /etc/wazuh-indexer/backup/action_groups.yml
SUCC: Configuration for 'actiongroups' stored in /etc/wazuh-indexer/backup/action_groups.yml
Will retrieve '/tenants' into /etc/wazuh-indexer/backup/tenants.yml
SUCC: Configuration for 'tenants' stored in /etc/wazuh-indexer/backup/tenants.yml
Will retrieve '/nodesdn' into /etc/wazuh-indexer/backup/nodes_dn.yml
SUCC: Configuration for 'nodesdn' stored in /etc/wazuh-indexer/backup/nodes_dn.yml
Will retrieve '/whitelist' into /etc/wazuh-indexer/backup/whitelist.yml
SUCC: Configuration for 'whitelist' stored in /etc/wazuh-indexer/backup/whitelist.yml
Will retrieve '/allowlist' into /etc/wazuh-indexer/backup/allowlist.yml
SUCC: Configuration for 'allowlist' stored in /etc/wazuh-indexer/backup/allowlist.yml
Will retrieve '/audit' into /etc/wazuh-indexer/backup/audit.yml
SUCC: Configuration for 'audit' stored in /etc/wazuh-indexer/backup/audit.yml
05/01/2024 04:44:00 DEBUG: Password backup created in /etc/wazuh-indexer/backup.
Successfully updated the keystore
05/01/2024 04:44:00 DEBUG: Restarting filebeat service...
05/01/2024 04:44:00 DEBUG: filebeat started.
05/01/2024 04:44:01 DEBUG: Restarting wazuh-dashboard service...
05/01/2024 04:44:02 DEBUG: wazuh-dashboard started.
05/01/2024 04:44:02 DEBUG: Running security admin tool.
05/01/2024 04:44:02 DEBUG: Loading new passwords changes.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755 **
**************************************************************************
Security Admin v7
Will connect to localhost:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: YELLOW
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Populate config from /tmp/unattended/unattended_installer
Force type: internalusers
Will update '/internalusers' with /etc/wazuh-indexer/backup/internal_users.yml
SUCC: Configuration for 'internalusers' created or updated
SUCC: Expected 1 config types for node {"updated_config_types":["internalusers"],"updated_config_size":1,"message":null} is 1 (["internalusers"]) due to: null
Done with success
05/01/2024 04:44:08 DEBUG: Passwords changed.
05/01/2024 04:44:08 DEBUG: Changing API passwords.
05/01/2024 04:45:11 INFO: Initializing Wazuh dashboard web application.
05/01/2024 04:45:12 INFO: Wazuh dashboard web application initialized.
05/01/2024 04:45:12 INFO: --- Summary ---
05/01/2024 04:45:12 INFO: You can access the web interface https://<wazuh-dashboard-ip>:443
User: admin
Password: pB7MzGZdN6zn?2j4T?uVLnV39ZGr+KRp
05/01/2024 04:45:12 INFO: --- Dependencies ---
05/01/2024 04:45:12 INFO: Removing lsof.
Loaded plugins: amazon-id, search-disabled-repos Resolving Dependencies --> Running transaction check ---> Package lsof.x86_64 0:4.87-6.el7 will be erased --> Finished Dependency Resolution Dependenci
es Resolved ================================================================================ Package Arch Version Repository Size ======================================================================
========== Removing: lsof x86_64 4.87-6.el7 @rhel-7-server-rhui-rpms 927 k Transaction Summary ================================================================================ Remove 1 Package Install
ed size: 927 k Downloading packages: Running transaction check Running transaction test Transaction test succeeded Running transaction Erasing : lsof-4.87-6.el7.x86_64 1/1 Verifying : lsof-4.87-6.el7.
x86_64 1/1 Removed: lsof.x86_64 0:4.87-6.el7 Complete!
05/01/2024 04:45:13 DEBUG: Restoring Wazuh repository.
05/01/2024 04:45:13 INFO: Installation finished.
Loading