Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump version to 4.8.2 #3076

Merged
merged 1 commit into from
Aug 16, 2024

chore: bump version to 4.8.2

f14d614
Select commit
Loading
Failed to load commit list.
Merged

Bump version to 4.8.2 #3076

chore: bump version to 4.8.2
f14d614
Select commit
Loading
Failed to load commit list.
Wazuh CI / All In One - Amazonlinux 2_base installation succeeded Aug 16, 2024 in 9m 4s

Test_unattended

Below you have the stage output

Details

Amazonlinux 2_base log



--------------------------------
16/08/2024 07:55:56 DEBUG: Checking root permissions.
16/08/2024 07:55:56 DEBUG: Checking sudo package.
16/08/2024 07:55:56 INFO: Starting Wazuh installation assistant. Wazuh version: 4.8.2
16/08/2024 07:55:56 INFO: Verbose logging redirected to /var/log/wazuh-install.log
16/08/2024 07:55:56 DEBUG: YUM package manager will be used.
16/08/2024 07:55:56 DEBUG: Checking system distribution.
16/08/2024 07:55:56 DEBUG: Detected distribution name: amzn
16/08/2024 07:55:56 DEBUG: Detected distribution version: 2
16/08/2024 07:55:56 DEBUG: Checking Wazuh installation.
16/08/2024 07:55:58 DEBUG: Checking system architecture.
16/08/2024 07:55:58 INFO: Verifying that your system meets the recommended minimum hardware requirements.
16/08/2024 07:55:58 DEBUG: CPU cores detected: 2
16/08/2024 07:55:58 DEBUG: Free RAM memory detected: 7869
16/08/2024 07:55:58 DEBUG: Installing check dependencies.
16/08/2024 07:56:04 INFO: Wazuh web interface port will be 443.
16/08/2024 07:56:04 DEBUG: Checking ports availability.
16/08/2024 07:56:06 DEBUG: Installing prerequisites dependencies.
16/08/2024 07:56:06 DEBUG: Checking curl tool version.
16/08/2024 07:56:06 DEBUG: Adding the Wazuh repository.
[wazuh]
gpgcheck=1
gpgkey=https://packages-dev.wazuh.com/key/GPG-KEY-WAZUH
enabled=1
name=EL-${releasever} - Wazuh
baseurl=https://packages-dev.wazuh.com/staging/yum/
protect=1
16/08/2024 07:56:07 INFO: Wazuh development repository added.
16/08/2024 07:56:07 INFO: --- Configuration files ---
16/08/2024 07:56:07 INFO: Generating configuration files.
16/08/2024 07:56:07 DEBUG: Creating Wazuh certificates.
16/08/2024 07:56:07 DEBUG: Reading configuration file.
16/08/2024 07:56:07 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:56:07 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:56:07 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:56:07 INFO: Generating the root certificate.
16/08/2024 07:56:07 INFO: Generating Admin certificates.
16/08/2024 07:56:07 DEBUG: Generating Admin private key.
16/08/2024 07:56:07 DEBUG: Converting Admin private key to PKCS8 format.
16/08/2024 07:56:07 DEBUG: Generating Admin CSR.
16/08/2024 07:56:07 DEBUG: Creating Admin certificate.
16/08/2024 07:56:07 INFO: Generating Wazuh indexer certificates.
16/08/2024 07:56:07 DEBUG: Creating the certificates for wazuh-indexer indexer node.
16/08/2024 07:56:07 DEBUG: Generating certificate configuration.
16/08/2024 07:56:07 DEBUG: Creating the Wazuh indexer tmp key pair.
16/08/2024 07:56:07 DEBUG: Creating the Wazuh indexer certificates.
16/08/2024 07:56:07 INFO: Generating Filebeat certificates.
16/08/2024 07:56:07 DEBUG: Generating the certificates for wazuh-server server node.
16/08/2024 07:56:07 DEBUG: Generating certificate configuration.
16/08/2024 07:56:07 DEBUG: Creating the Wazuh server tmp key pair.
16/08/2024 07:56:07 DEBUG: Creating the Wazuh server certificates.
16/08/2024 07:56:07 INFO: Generating Wazuh dashboard certificates.
16/08/2024 07:56:07 DEBUG: Generating certificate configuration.
16/08/2024 07:56:07 DEBUG: Creating the Wazuh dashboard tmp key pair.
16/08/2024 07:56:08 DEBUG: Creating the Wazuh dashboard certificates.
16/08/2024 07:56:08 DEBUG: Cleaning certificate files.
16/08/2024 07:56:08 DEBUG: Generating password file.
16/08/2024 07:56:08 DEBUG: Generating random passwords.
16/08/2024 07:56:08 INFO: Created wazuh-install-files.tar. It contains the Wazuh cluster key, certificates, and passwords necessary for installation.
16/08/2024 07:56:08 DEBUG: Extracting Wazuh configuration.
16/08/2024 07:56:08 DEBUG: Reading configuration file.
16/08/2024 07:56:08 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:56:08 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:56:08 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:56:08 INFO: --- Wazuh indexer ---
16/08/2024 07:56:08 INFO: Starting Wazuh indexer installation.
Loaded plugins: extras_suggestions, langpacks, priorities, update-motd
Resolving Dependencies
--> Running transaction check
---> Package wazuh-indexer.x86_64 0:4.8.2-1 will be installed
--> Finished Dependency Resolution

Dependencies Resolved

================================================================================
 Package                Arch            Version            Repository      Size
================================================================================
Installing:
 wazuh-indexer          x86_64          4.8.2-1            wazuh          743 M

Transaction Summary
================================================================================
Install  1 Package

Total download size: 743 M
Installed size: 1.0 G
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
  Installing : wazuh-indexer-4.8.2-1.x86_64                                 1/1 
Created opensearch keystore in /etc/wazuh-indexer/opensearch.keystore
  Verifying  : wazuh-indexer-4.8.2-1.x86_64                                 1/1 

Installed:
  wazuh-indexer.x86_64 0:4.8.2-1                                                

Complete!
16/08/2024 07:57:45 DEBUG: Checking Wazuh installation.
16/08/2024 07:57:47 DEBUG: There are Wazuh indexer remaining files.
16/08/2024 07:57:48 INFO: Wazuh indexer installation finished.
16/08/2024 07:57:48 DEBUG: Configuring Wazuh indexer.
16/08/2024 07:57:48 DEBUG: Copying Wazuh indexer certificates.
16/08/2024 07:57:48 INFO: Wazuh indexer post-install configuration finished.
16/08/2024 07:57:48 INFO: Starting service wazuh-indexer.
Created symlink from /etc/systemd/system/multi-user.target.wants/wazuh-indexer.service to /usr/lib/systemd/system/wazuh-indexer.service.
16/08/2024 07:58:24 INFO: wazuh-indexer service started.
16/08/2024 07:58:24 INFO: Initializing Wazuh indexer cluster security settings.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index does not exists, attempt to create it ... done (0-all replicas)
Populate config from /etc/wazuh-indexer/opensearch-security/
Will update '/config' with /etc/wazuh-indexer/opensearch-security/config.yml 
   SUCC: Configuration for 'config' created or updated
Will update '/roles' with /etc/wazuh-indexer/opensearch-security/roles.yml 
   SUCC: Configuration for 'roles' created or updated
Will update '/rolesmapping' with /etc/wazuh-indexer/opensearch-security/roles_mapping.yml 
   SUCC: Configuration for 'rolesmapping' created or updated
Will update '/internalusers' with /etc/wazuh-indexer/opensearch-security/internal_users.yml 
   SUCC: Configuration for 'internalusers' created or updated
Will update '/actiongroups' with /etc/wazuh-indexer/opensearch-security/action_groups.yml 
   SUCC: Configuration for 'actiongroups' created or updated
Will update '/tenants' with /etc/wazuh-indexer/opensearch-security/tenants.yml 
   SUCC: Configuration for 'tenants' created or updated
Will update '/nodesdn' with /etc/wazuh-indexer/opensearch-security/nodes_dn.yml 
   SUCC: Configuration for 'nodesdn' created or updated
Will update '/whitelist' with /etc/wazuh-indexer/opensearch-security/whitelist.yml 
   SUCC: Configuration for 'whitelist' created or updated
Will update '/audit' with /etc/wazuh-indexer/opensearch-security/audit.yml 
   SUCC: Configuration for 'audit' created or updated
Will update '/allowlist' with /etc/wazuh-indexer/opensearch-security/allowlist.yml 
   SUCC: Configuration for 'allowlist' created or updated
SUCC: Expected 10 config types for node {"updated_config_types":["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","internalusers","actiongroups","config"],"updated_config_siz
e":10,"message":null} is 10 (["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","internalusers","actiongroups","config"]) due to: null
Done with success
16/08/2024 07:58:36 INFO: Wazuh indexer cluster security configuration initialized.
16/08/2024 07:58:36 INFO: Wazuh indexer cluster initialized.
16/08/2024 07:58:36 INFO: --- Wazuh server ---
16/08/2024 07:58:36 INFO: Starting the Wazuh manager installation.
Loaded plugins: extras_suggestions, langpacks, priorities, update-motd
Resolving Dependencies
--> Running transaction check
---> Package wazuh-manager.x86_64 0:4.8.2-1 will be installed
--> Finished Dependency Resolution

Dependencies Resolved

================================================================================
 Package                Arch            Version            Repository      Size
================================================================================
Installing:
 wazuh-manager          x86_64          4.8.2-1            wazuh          290 M

Transaction Summary
================================================================================
Install  1 Package

Total download size: 290 M
Installed size: 880 M
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
  Installing : wazuh-manager-4.8.2-1.x86_64                                 1/1 
  Verifying  : wazuh-manager-4.8.2-1.x86_64                                 1/1 

Installed:
  wazuh-manager.x86_64 0:4.8.2-1                                                

Complete!
16/08/2024 07:59:19 DEBUG: Checking Wazuh installation.
16/08/2024 07:59:20 DEBUG: There are Wazuh remaining files.
16/08/2024 07:59:21 DEBUG: There are Wazuh indexer remaining files.
16/08/2024 07:59:34 INFO: Wazuh manager installation finished.
16/08/2024 07:59:34 DEBUG: Configuring Wazuh manager.
16/08/2024 07:59:34 DEBUG: Setting provisional Wazuh indexer password.
16/08/2024 07:59:35 INFO: Wazuh manager vulnerability detection configuration finished.
16/08/2024 07:59:35 INFO: Starting service wazuh-manager.
Created symlink from /etc/systemd/system/multi-user.target.wants/wazuh-manager.service to /usr/lib/systemd/system/wazuh-manager.service.
16/08/2024 07:59:51 INFO: wazuh-manager service started.
16/08/2024 07:59:51 INFO: Starting Filebeat installation.
16/08/2024 08:00:02 DEBUG: Checking Wazuh installation.
16/08/2024 08:00:04 DEBUG: There are Wazuh remaining files.
16/08/2024 08:00:05 DEBUG: There are Wazuh indexer remaining files.
16/08/2024 08:00:23 DEBUG: There are Filebeat remaining files.
16/08/2024 08:00:24 INFO: Filebeat installation finished.
16/08/2024 08:00:24 DEBUG: Configuring Filebeat.
16/08/2024 08:00:24 DEBUG: Filebeat template was download successfully.
wazuh/
wazuh/_meta/
wazuh/_meta/docs.asciidoc
wazuh/_meta/fields.yml
wazuh/_meta/config.yml
wazuh/alerts/
wazuh/alerts/config/
wazuh/alerts/config/alerts.yml
wazuh/alerts/manifest.yml
wazuh/alerts/ingest/
wazuh/alerts/ingest/pipeline.json
wazuh/module.yml
wazuh/archives/
wazuh/archives/config/
wazuh/archives/config/archives.yml
wazuh/archives/manifest.yml
wazuh/archives/ingest/
wazuh/archives/ingest/pipeline.json
16/08/2024 08:00:25 DEBUG: Filebeat module was downloaded successfully.
16/08/2024 08:00:25 DEBUG: Copying Filebeat certificates.
Created filebeat keystore
Successfully updated the keystore
Successfully updated the keystore
16/08/2024 08:00:27 INFO: Filebeat post-install configuration finished.
16/08/2024 08:00:27 INFO: Starting service filebeat.
Created symlink from /etc/systemd/system/multi-user.target.wants/filebeat.service to /usr/lib/systemd/system/filebeat.service.
16/08/2024 08:00:28 INFO: filebeat service started.
16/08/2024 08:00:28 INFO: --- Wazuh dashboard ---
16/08/2024 08:00:28 INFO: Starting Wazuh dashboard installation.
Loaded plugins: extras_suggestions, langpacks, priorities, update-motd
Resolving Dependencies
--> Running transaction check
---> Package wazuh-dashboard.x86_64 0:4.8.2-1 will be installed
--> Finished Dependency Resolution

Dependencies Resolved

================================================================================
 Package                  Arch            Version          Repository      Size
================================================================================
Installing:
 wazuh-dashboard          x86_64          4.8.2-1          wazuh          273 M

Transaction Summary
================================================================================
Install  1 Package

Total download size: 273 M
Installed size: 902 M
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
  Installing : wazuh-dashboard-4.8.2-1.x86_64                               1/1 
  Verifying  : wazuh-dashboard-4.8.2-1.x86_64                               1/1 

Installed:
  wazuh-dashboard.x86_64 0:4.8.2-1                                              

Complete!
16/08/2024 08:02:03 DEBUG: Checking Wazuh installation.
16/08/2024 08:02:04 DEBUG: There are Wazuh remaining files.
16/08/2024 08:02:06 DEBUG: There are Wazuh indexer remaining files.
16/08/2024 08:02:06 INFO: Another process is using YUM. Waiting for it to release the lock. Next retry in 30 seconds (1/10)
16/08/2024 08:02:37 DEBUG: There are Filebeat remaining files.
16/08/2024 08:02:38 DEBUG: There are Wazuh dashboard remaining files.
16/08/2024 08:02:38 INFO: Wazuh dashboard installation finished.
16/08/2024 08:02:38 DEBUG: Configuring Wazuh dashboard.
16/08/2024 08:02:38 DEBUG: Copying Wazuh dashboard certificates.
16/08/2024 08:02:38 DEBUG: Wazuh dashboard certificate setup finished.
16/08/2024 08:02:38 INFO: Wazuh dashboard post-install configuration finished.
16/08/2024 08:02:38 INFO: Starting service wazuh-dashboard.
Created symlink from /etc/systemd/system/multi-user.target.wants/wazuh-dashboard.service to /etc/systemd/system/wazuh-dashboard.service.
16/08/2024 08:02:38 INFO: wazuh-dashboard service started.
16/08/2024 08:02:38 DEBUG: Setting Wazuh indexer cluster passwords.
16/08/2024 08:02:38 DEBUG: Checking Wazuh installation.
16/08/2024 08:02:39 DEBUG: There are Wazuh remaining files.
16/08/2024 08:02:40 DEBUG: There are Wazuh indexer remaining files.
16/08/2024 08:02:41 DEBUG: There are Filebeat remaining files.
16/08/2024 08:02:42 DEBUG: There are Wazuh dashboard remaining files.
16/08/2024 08:02:42 INFO: Updating the internal users.
16/08/2024 08:02:42 DEBUG: Creating password backup.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Will retrieve '/config' into /etc/wazuh-indexer/backup/config.yml 
   SUCC: Configuration for 'config' stored in /etc/wazuh-indexer/backup/config.yml
Will retrieve '/roles' into /etc/wazuh-indexer/backup/roles.yml 
   SUCC: Configuration for 'roles' stored in /etc/wazuh-indexer/backup/roles.yml
Will retrieve '/rolesmapping' into /etc/wazuh-indexer/backup/roles_mapping.yml 
   SUCC: Configuration for 'rolesmapping' stored in /etc/wazuh-indexer/backup/roles_mapping.yml
Will retrieve '/internalusers' into /etc/wazuh-indexer/backup/internal_users.yml 
   SUCC: Configuration for 'internalusers' stored in /etc/wazuh-indexer/backup/internal_users.yml
Will retrieve '/actiongroups' into /etc/wazuh-indexer/backup/action_groups.yml 
   SUCC: Configuration for 'actiongroups' stored in /etc/wazuh-indexer/backup/action_groups.yml
Will retrieve '/tenants' into /etc/wazuh-indexer/backup/tenants.yml 
   SUCC: Configuration for 'tenants' stored in /etc/wazuh-indexer/backup/tenants.yml
Will retrieve '/nodesdn' into /etc/wazuh-indexer/backup/nodes_dn.yml 
   SUCC: Configuration for 'nodesdn' stored in /etc/wazuh-indexer/backup/nodes_dn.yml
Will retrieve '/whitelist' into /etc/wazuh-indexer/backup/whitelist.yml 
   SUCC: Configuration for 'whitelist' stored in /etc/wazuh-indexer/backup/whitelist.yml
Will retrieve '/allowlist' into /etc/wazuh-indexer/backup/allowlist.yml 
   SUCC: Configuration for 'allowlist' stored in /etc/wazuh-indexer/backup/allowlist.yml
Will retrieve '/audit' into /etc/wazuh-indexer/backup/audit.yml 
   SUCC: Configuration for 'audit' stored in /etc/wazuh-indexer/backup/audit.yml
16/08/2024 08:02:51 DEBUG: Password backup created in /etc/wazuh-indexer/backup.
16/08/2024 08:02:51 INFO: A backup of the internal users has been saved in the /etc/wazuh-indexer/internalusers-backup folder.
16/08/2024 08:02:51 DEBUG: The internal users have been updated before changing the passwords.
16/08/2024 08:02:53 DEBUG: Generating password hashes.
16/08/2024 08:03:03 DEBUG: Password hashes generated.
16/08/2024 08:03:03 DEBUG: Creating password backup.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Will retrieve '/config' into /etc/wazuh-indexer/backup/config.yml 
   SUCC: Configuration for 'config' stored in /etc/wazuh-indexer/backup/config.yml
Will retrieve '/roles' into /etc/wazuh-indexer/backup/roles.yml 
   SUCC: Configuration for 'roles' stored in /etc/wazuh-indexer/backup/roles.yml
Will retrieve '/rolesmapping' into /etc/wazuh-indexer/backup/roles_mapping.yml 
   SUCC: Configuration for 'rolesmapping' stored in /etc/wazuh-indexer/backup/roles_mapping.yml
Will retrieve '/internalusers' into /etc/wazuh-indexer/backup/internal_users.yml 
   SUCC: Configuration for 'internalusers' stored in /etc/wazuh-indexer/backup/internal_users.yml
Will retrieve '/actiongroups' into /etc/wazuh-indexer/backup/action_groups.yml 
   SUCC: Configuration for 'actiongroups' stored in /etc/wazuh-indexer/backup/action_groups.yml
Will retrieve '/tenants' into /etc/wazuh-indexer/backup/tenants.yml 
   SUCC: Configuration for 'tenants' stored in /etc/wazuh-indexer/backup/tenants.yml
Will retrieve '/nodesdn' into /etc/wazuh-indexer/backup/nodes_dn.yml 
   SUCC: Configuration for 'nodesdn' stored in /etc/wazuh-indexer/backup/nodes_dn.yml
Will retrieve '/whitelist' into /etc/wazuh-indexer/backup/whitelist.yml 
   SUCC: Configuration for 'whitelist' stored in /etc/wazuh-indexer/backup/whitelist.yml
Will retrieve '/allowlist' into /etc/wazuh-indexer/backup/allowlist.yml 
   SUCC: Configuration for 'allowlist' stored in /etc/wazuh-indexer/backup/allowlist.yml
Will retrieve '/audit' into /etc/wazuh-indexer/backup/audit.yml 
   SUCC: Configuration for 'audit' stored in /etc/wazuh-indexer/backup/audit.yml
16/08/2024 08:03:07 DEBUG: Password backup created in /etc/wazuh-indexer/backup.
Successfully updated the keystore
16/08/2024 08:03:07 DEBUG: Restarting filebeat service...
16/08/2024 08:03:07 DEBUG: filebeat started.
16/08/2024 08:03:07 DEBUG: Restarting wazuh-manager service...
16/08/2024 08:03:41 DEBUG: wazuh-manager started.
16/08/2024 08:03:43 DEBUG: Restarting wazuh-dashboard service...
16/08/2024 08:03:43 DEBUG: wazuh-dashboard started.
16/08/2024 08:03:43 DEBUG: Running security admin tool.
16/08/2024 08:03:43 DEBUG: Loading new passwords changes.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Populate config from /tmp/unattended/unattended_installer
Force type: internalusers
Will update '/internalusers' with /etc/wazuh-indexer/backup/internal_users.yml 
   SUCC: Configuration for 'internalusers' created or updated
SUCC: Expected 1 config types for node {"updated_config_types":["internalusers"],"updated_config_size":1,"message":null} is 1 (["internalusers"]) due to: null
Done with success
16/08/2024 08:03:50 DEBUG: Passwords changed.
16/08/2024 08:03:50 DEBUG: Changing API passwords.
16/08/2024 08:03:58 INFO: Initializing Wazuh dashboard web application.
16/08/2024 08:03:59 INFO: Wazuh dashboard web application initialized.
16/08/2024 08:03:59 INFO: --- Summary ---
16/08/2024 08:03:59 INFO: You can access the web interface https://<wazuh-dashboard-ip>:443
    User: admin
    Password: qx5jxQ.34MDyjsq5d5yyWnRz0?PeAAq.
16/08/2024 08:03:59 DEBUG: Restoring Wazuh repository.
16/08/2024 08:03:59 INFO: Installation finished.