Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump version to 4.8.2 #3076

Merged
merged 1 commit into from
Aug 16, 2024

chore: bump version to 4.8.2

f14d614
Select commit
Loading
Failed to load commit list.
Merged

Bump version to 4.8.2 #3076

chore: bump version to 4.8.2
f14d614
Select commit
Loading
Failed to load commit list.
Wazuh CI / All In One - Ubuntu focal installation succeeded Aug 16, 2024 in 10m 28s

Test_unattended

Below you have the stage output

Details

Ubuntu focal log



--------------------------------
16/08/2024 07:57:11 DEBUG: Checking root permissions.
16/08/2024 07:57:11 DEBUG: Checking sudo package.
16/08/2024 07:57:11 INFO: Starting Wazuh installation assistant. Wazuh version: 4.8.2
16/08/2024 07:57:11 INFO: Verbose logging redirected to /var/log/wazuh-install.log
16/08/2024 07:57:11 DEBUG: APT package manager will be used.
16/08/2024 07:57:11 DEBUG: Checking system distribution.
16/08/2024 07:57:11 DEBUG: Detected distribution name: ubuntu
16/08/2024 07:57:11 DEBUG: Detected distribution version: 20
16/08/2024 07:57:11 DEBUG: Checking Wazuh installation.
16/08/2024 07:57:13 DEBUG: Checking system architecture.
16/08/2024 07:57:13 INFO: Verifying that your system meets the recommended minimum hardware requirements.
16/08/2024 07:57:13 DEBUG: CPU cores detected: 2
16/08/2024 07:57:13 DEBUG: Free RAM memory detected: 7871
16/08/2024 07:57:13 DEBUG: Installing check dependencies.
Hit:1 http://us-east-1.ec2.archive.ubuntu.com/ubuntu focal InRelease
Get:2 http://us-east-1.ec2.archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB]
Hit:3 http://us-east-1.ec2.archive.ubuntu.com/ubuntu focal-backports InRelease
Hit:4 https://download.docker.com/linux/ubuntu focal InRelease
Hit:5 http://security.ubuntu.com/ubuntu focal-security InRelease
Hit:6 http://ppa.launchpad.net/deadsnakes/ppa/ubuntu focal InRelease
Fetched 128 kB in 1s (198 kB/s)
Reading package lists...
16/08/2024 07:57:20 INFO: Wazuh web interface port will be 443.
16/08/2024 07:57:20 DEBUG: Checking ports availability.
16/08/2024 07:57:22 DEBUG: Installing prerequisites dependencies.
Hit:1 http://us-east-1.ec2.archive.ubuntu.com/ubuntu focal InRelease
Hit:2 http://us-east-1.ec2.archive.ubuntu.com/ubuntu focal-updates InRelease
Hit:3 http://us-east-1.ec2.archive.ubuntu.com/ubuntu focal-backports InRelease
Hit:4 https://download.docker.com/linux/ubuntu focal InRelease
Hit:5 http://security.ubuntu.com/ubuntu focal-security InRelease
Hit:6 http://ppa.launchpad.net/deadsnakes/ppa/ubuntu focal InRelease
Reading package lists...
16/08/2024 07:57:26 DEBUG: Checking curl tool version.
16/08/2024 07:57:26 DEBUG: Adding the Wazuh repository.
gpg: keyring '/usr/share/keyrings/wazuh.gpg' created
gpg: directory '/root/.gnupg' created
gpg: /root/.gnupg/trustdb.gpg: trustdb created
gpg: key 96B3EE5F29111145: public key "Wazuh.com (Wazuh Signing Key) <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
deb [signed-by=/usr/share/keyrings/wazuh.gpg] https://packages-dev.wazuh.com/staging/apt/ unstable main
Hit:1 http://us-east-1.ec2.archive.ubuntu.com/ubuntu focal InRelease
Hit:2 http://us-east-1.ec2.archive.ubuntu.com/ubuntu focal-updates InRelease
Hit:3 http://us-east-1.ec2.archive.ubuntu.com/ubuntu focal-backports InRelease
Hit:4 http://security.ubuntu.com/ubuntu focal-security InRelease
Hit:5 https://download.docker.com/linux/ubuntu focal InRelease
Hit:6 http://ppa.launchpad.net/deadsnakes/ppa/ubuntu focal InRelease
Get:7 https://packages-dev.wazuh.com/staging/apt unstable InRelease [17.3 kB]
Get:8 https://packages-dev.wazuh.com/staging/apt unstable/main amd64 Packages [6,682 B]
Fetched 24.0 kB in 1s (23.9 kB/s)
Reading package lists...
16/08/2024 07:57:29 INFO: Wazuh development repository added.
16/08/2024 07:57:29 INFO: --- Configuration files ---
16/08/2024 07:57:29 INFO: Generating configuration files.
16/08/2024 07:57:29 DEBUG: Creating Wazuh certificates.
16/08/2024 07:57:29 DEBUG: Reading configuration file.
16/08/2024 07:57:29 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:57:29 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:57:29 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:57:29 INFO: Generating the root certificate.
16/08/2024 07:57:30 INFO: Generating Admin certificates.
16/08/2024 07:57:30 DEBUG: Generating Admin private key.
16/08/2024 07:57:30 DEBUG: Converting Admin private key to PKCS8 format.
16/08/2024 07:57:30 DEBUG: Generating Admin CSR.
16/08/2024 07:57:30 DEBUG: Creating Admin certificate.
16/08/2024 07:57:30 INFO: Generating Wazuh indexer certificates.
16/08/2024 07:57:30 DEBUG: Creating the certificates for wazuh-indexer indexer node.
16/08/2024 07:57:30 DEBUG: Generating certificate configuration.
16/08/2024 07:57:30 DEBUG: Creating the Wazuh indexer tmp key pair.
16/08/2024 07:57:30 DEBUG: Creating the Wazuh indexer certificates.
16/08/2024 07:57:30 INFO: Generating Filebeat certificates.
16/08/2024 07:57:30 DEBUG: Generating the certificates for wazuh-server server node.
16/08/2024 07:57:30 DEBUG: Generating certificate configuration.
16/08/2024 07:57:30 DEBUG: Creating the Wazuh server tmp key pair.
16/08/2024 07:57:30 DEBUG: Creating the Wazuh server certificates.
16/08/2024 07:57:30 INFO: Generating Wazuh dashboard certificates.
16/08/2024 07:57:30 DEBUG: Generating certificate configuration.
16/08/2024 07:57:30 DEBUG: Creating the Wazuh dashboard tmp key pair.
16/08/2024 07:57:30 DEBUG: Creating the Wazuh dashboard certificates.
16/08/2024 07:57:30 DEBUG: Cleaning certificate files.
16/08/2024 07:57:30 DEBUG: Generating password file.
16/08/2024 07:57:30 DEBUG: Generating random passwords.
16/08/2024 07:57:31 INFO: Created wazuh-install-files.tar. It contains the Wazuh cluster key, certificates, and passwords necessary for installation.
16/08/2024 07:57:31 DEBUG: Extracting Wazuh configuration.
16/08/2024 07:57:31 DEBUG: Reading configuration file.
16/08/2024 07:57:31 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:57:31 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:57:31 DEBUG: Checking if 127.0.0.1 is private.
16/08/2024 07:57:31 INFO: --- Wazuh indexer ---
16/08/2024 07:57:31 INFO: Starting Wazuh indexer installation.
Reading package lists... Building dependency tree... Reading state information... The following packages were automatically installed and are no longer required: libfwupdplugin1 linux-aws-5.8-headers-
5.8.0-1038 linux-headers-5.8.0-1038-aws linux-image-5.8.0-1038-aws linux-modules-5.8.0-1038-aws Use 'sudo apt autoremove' to remove them. The following NEW packages will be installed: wazuh-indexer 0 
upgraded, 1 newly installed, 0 to remove and 286 not upgraded. Need to get 758 MB of archives. After this operation, 1,050 MB of additional disk space will be used. Get:1 https://packages-dev.wazuh.co
m/staging/apt unstable/main amd64 wazuh-indexer amd64 4.8.2-1 [758 MB] Fetched 758 MB in 36s (21.1 MB/s) Selecting previously unselected package wazuh-indexer.
 (Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 176417 files and directories currently installed.)
 Preparing to unpack .../wazuh-indexer_4.8.2-1_amd64.deb ...
 Creating wazuh-indexer group... OK
 Creating wazuh-indexer user... OK
 Unpacking wazuh-indexer (4.8.2-1) ...
 Setting up wazuh-indexer (4.8.2-1) ...
 Created opensearch keystore in /etc/wazuh-indexer/opensearch.keystore
 Processing triggers for systemd (245.4-4ubuntu3.17) ...
 Processing triggers for libc-bin (2.31-0ubuntu9.9) ...
16/08/2024 08:00:12 DEBUG: Checking Wazuh installation.
16/08/2024 08:00:13 DEBUG: There are Wazuh indexer remaining files.
16/08/2024 08:00:14 INFO: Wazuh indexer installation finished.
16/08/2024 08:00:14 DEBUG: Configuring Wazuh indexer.
16/08/2024 08:00:14 DEBUG: Copying Wazuh indexer certificates.
16/08/2024 08:00:19 INFO: Wazuh indexer post-install configuration finished.
16/08/2024 08:00:19 INFO: Starting service wazuh-indexer.
Created symlink /etc/systemd/system/multi-user.target.wants/wazuh-indexer.service ��� /lib/systemd/system/wazuh-indexer.service.
16/08/2024 08:00:43 INFO: wazuh-indexer service started.
16/08/2024 08:00:43 INFO: Initializing Wazuh indexer cluster security settings.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index does not exists, attempt to create it ... done (0-all replicas)
Populate config from /etc/wazuh-indexer/opensearch-security/
Will update '/config' with /etc/wazuh-indexer/opensearch-security/config.yml 
   SUCC: Configuration for 'config' created or updated
Will update '/roles' with /etc/wazuh-indexer/opensearch-security/roles.yml 
   SUCC: Configuration for 'roles' created or updated
Will update '/rolesmapping' with /etc/wazuh-indexer/opensearch-security/roles_mapping.yml 
   SUCC: Configuration for 'rolesmapping' created or updated
Will update '/internalusers' with /etc/wazuh-indexer/opensearch-security/internal_users.yml 
   SUCC: Configuration for 'internalusers' created or updated
Will update '/actiongroups' with /etc/wazuh-indexer/opensearch-security/action_groups.yml 
   SUCC: Configuration for 'actiongroups' created or updated
Will update '/tenants' with /etc/wazuh-indexer/opensearch-security/tenants.yml 
   SUCC: Configuration for 'tenants' created or updated
Will update '/nodesdn' with /etc/wazuh-indexer/opensearch-security/nodes_dn.yml 
   SUCC: Configuration for 'nodesdn' created or updated
Will update '/whitelist' with /etc/wazuh-indexer/opensearch-security/whitelist.yml 
   SUCC: Configuration for 'whitelist' created or updated
Will update '/audit' with /etc/wazuh-indexer/opensearch-security/audit.yml 
   SUCC: Configuration for 'audit' created or updated
Will update '/allowlist' with /etc/wazuh-indexer/opensearch-security/allowlist.yml 
   SUCC: Configuration for 'allowlist' created or updated
SUCC: Expected 10 config types for node {"updated_config_types":["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","internalusers","actiongroups","config"],"updated_config_siz
e":10,"message":null} is 10 (["allowlist","tenants","rolesmapping","nodesdn","audit","roles","whitelist","internalusers","actiongroups","config"]) due to: null
Done with success
16/08/2024 08:00:54 INFO: Wazuh indexer cluster security configuration initialized.
16/08/2024 08:00:54 INFO: Wazuh indexer cluster initialized.
16/08/2024 08:00:54 INFO: --- Wazuh server ---
16/08/2024 08:00:54 INFO: Starting the Wazuh manager installation.
Reading package lists... Building dependency tree... Reading state information... The following packages were automatically installed and are no longer required: libfwupdplugin1 linux-aws-5.8-headers-
5.8.0-1038 linux-headers-5.8.0-1038-aws linux-image-5.8.0-1038-aws linux-modules-5.8.0-1038-aws Use 'sudo apt autoremove' to remove them. Suggested packages: expect The following NEW packages will be 
installed: wazuh-manager 0 upgraded, 1 newly installed, 0 to remove and 287 not upgraded. Need to get 309 MB of archives. After this operation, 916 MB of additional disk space will be used. Get:1 http
s://packages-dev.wazuh.com/staging/apt unstable/main amd64 wazuh-manager amd64 4.8.2-1 [309 MB] Fetched 309 MB in 6s (49.5 MB/s) Selecting previously unselected package wazuh-manager.
 (Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 177589 files and directories currently installed.)
 Preparing to unpack .../wazuh-manager_4.8.2-1_amd64.deb ...
 Unpacking wazuh-manager (4.8.2-1) ...
 Setting up wazuh-manager (4.8.2-1) ...
 Processing triggers for systemd (245.4-4ubuntu3.17) ...
16/08/2024 08:02:05 DEBUG: Checking Wazuh installation.
16/08/2024 08:02:06 DEBUG: There are Wazuh remaining files.
16/08/2024 08:02:06 DEBUG: There are Wazuh indexer remaining files.
16/08/2024 08:02:07 INFO: Wazuh manager installation finished.
16/08/2024 08:02:07 DEBUG: Configuring Wazuh manager.
16/08/2024 08:02:07 DEBUG: Setting provisional Wazuh indexer password.
16/08/2024 08:02:07 INFO: Wazuh manager vulnerability detection configuration finished.
16/08/2024 08:02:07 INFO: Starting service wazuh-manager.
Created symlink /etc/systemd/system/multi-user.target.wants/wazuh-manager.service ��� /lib/systemd/system/wazuh-manager.service.
16/08/2024 08:02:28 INFO: wazuh-manager service started.
16/08/2024 08:02:28 INFO: Starting Filebeat installation.
Reading package lists... Building dependency tree... Reading state information... The following packages were automatically installed and are no longer required: libfwupdplugin1 linux-aws-5.8-headers-
5.8.0-1038 linux-headers-5.8.0-1038-aws linux-image-5.8.0-1038-aws linux-modules-5.8.0-1038-aws Use 'sudo apt autoremove' to remove them. The following NEW packages will be installed: filebeat 0 upgra
ded, 1 newly installed, 0 to remove and 288 not upgraded. Need to get 22.1 MB of archives. After this operation, 73.6 MB of additional disk space will be used. Get:1 https://packages-dev.wazuh.com/sta
ging/apt unstable/main amd64 filebeat amd64 7.10.2 [22.1 MB] Fetched 22.1 MB in 1s (16.2 MB/s) Selecting previously unselected package filebeat.
 (Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 199645 files and directories currently installed.)
 Preparing to unpack .../filebeat_7.10.2_amd64.deb ...
 Unpacking filebeat (7.10.2) ...
 Setting up filebeat (7.10.2) ...
 Processing triggers for systemd (245.4-4ubuntu3.17) ...
16/08/2024 08:02:45 DEBUG: Checking Wazuh installation.
16/08/2024 08:02:46 DEBUG: There are Wazuh remaining files.
16/08/2024 08:02:46 DEBUG: There are Wazuh indexer remaining files.
16/08/2024 08:02:47 DEBUG: There are Filebeat remaining files.
16/08/2024 08:02:48 INFO: Filebeat installation finished.
16/08/2024 08:02:48 DEBUG: Configuring Filebeat.
16/08/2024 08:02:48 DEBUG: Filebeat template was download successfully.
wazuh/
wazuh/_meta/
wazuh/_meta/docs.asciidoc
wazuh/_meta/fields.yml
wazuh/_meta/config.yml
wazuh/alerts/
wazuh/alerts/config/
wazuh/alerts/config/alerts.yml
wazuh/alerts/manifest.yml
wazuh/alerts/ingest/
wazuh/alerts/ingest/pipeline.json
wazuh/module.yml
wazuh/archives/
wazuh/archives/config/
wazuh/archives/config/archives.yml
wazuh/archives/manifest.yml
wazuh/archives/ingest/
wazuh/archives/ingest/pipeline.json
16/08/2024 08:02:48 DEBUG: Filebeat module was downloaded successfully.
16/08/2024 08:02:48 DEBUG: Copying Filebeat certificates.
Created filebeat keystore
Successfully updated the keystore
Successfully updated the keystore
16/08/2024 08:02:48 INFO: Filebeat post-install configuration finished.
16/08/2024 08:02:48 INFO: Starting service filebeat.
Synchronizing state of filebeat.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install enable filebeat
Created symlink /etc/systemd/system/multi-user.target.wants/filebeat.service ��� /lib/systemd/system/filebeat.service.
16/08/2024 08:02:50 INFO: filebeat service started.
16/08/2024 08:02:50 INFO: --- Wazuh dashboard ---
16/08/2024 08:02:50 INFO: Starting Wazuh dashboard installation.
Reading package lists... Building dependency tree... Reading state information... The following packages were automatically installed and are no longer required: libfwupdplugin1 linux-aws-5.8-headers-
5.8.0-1038 linux-headers-5.8.0-1038-aws linux-image-5.8.0-1038-aws linux-modules-5.8.0-1038-aws Use 'sudo apt autoremove' to remove them. The following NEW packages will be installed: wazuh-dashboard 
0 upgraded, 1 newly installed, 0 to remove and 288 not upgraded. Need to get 186 MB of archives. After this operation, 987 MB of additional disk space will be used. Get:1 https://packages-dev.wazuh.co
m/staging/apt unstable/main amd64 wazuh-dashboard amd64 4.8.2-1 [186 MB] Fetched 186 MB in 8s (22.9 MB/s) Selecting previously unselected package wazuh-dashboard.
 (Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 199964 files and directories currently installed.)
 Preparing to unpack .../wazuh-dashboard_4.8.2-1_amd64.deb ...
 Creating wazuh-dashboard group... OK
 Creating wazuh-dashboard user... OK
 Unpacking wazuh-dashboard (4.8.2-1) ...
 Setting up wazuh-dashboard (4.8.2-1) ...
16/08/2024 08:05:20 DEBUG: Checking Wazuh installation.
16/08/2024 08:05:20 DEBUG: There are Wazuh remaining files.
16/08/2024 08:05:21 DEBUG: There are Wazuh indexer remaining files.
16/08/2024 08:05:21 DEBUG: There are Filebeat remaining files.
16/08/2024 08:05:22 DEBUG: There are Wazuh dashboard remaining files.
16/08/2024 08:05:22 INFO: Wazuh dashboard installation finished.
16/08/2024 08:05:22 DEBUG: Configuring Wazuh dashboard.
16/08/2024 08:05:22 DEBUG: Copying Wazuh dashboard certificates.
16/08/2024 08:05:22 DEBUG: Wazuh dashboard certificate setup finished.
16/08/2024 08:05:22 INFO: Wazuh dashboard post-install configuration finished.
16/08/2024 08:05:22 INFO: Starting service wazuh-dashboard.
Created symlink /etc/systemd/system/multi-user.target.wants/wazuh-dashboard.service ��� /etc/systemd/system/wazuh-dashboard.service.
16/08/2024 08:05:23 INFO: wazuh-dashboard service started.
16/08/2024 08:05:23 DEBUG: Setting Wazuh indexer cluster passwords.
16/08/2024 08:05:23 DEBUG: Checking Wazuh installation.
16/08/2024 08:05:23 DEBUG: There are Wazuh remaining files.
16/08/2024 08:05:24 DEBUG: There are Wazuh indexer remaining files.
16/08/2024 08:05:25 DEBUG: There are Filebeat remaining files.
16/08/2024 08:05:25 DEBUG: There are Wazuh dashboard remaining files.
16/08/2024 08:05:25 INFO: Updating the internal users.
16/08/2024 08:05:25 DEBUG: Creating password backup.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Will retrieve '/config' into /etc/wazuh-indexer/backup/config.yml 
   SUCC: Configuration for 'config' stored in /etc/wazuh-indexer/backup/config.yml
Will retrieve '/roles' into /etc/wazuh-indexer/backup/roles.yml 
   SUCC: Configuration for 'roles' stored in /etc/wazuh-indexer/backup/roles.yml
Will retrieve '/rolesmapping' into /etc/wazuh-indexer/backup/roles_mapping.yml 
   SUCC: Configuration for 'rolesmapping' stored in /etc/wazuh-indexer/backup/roles_mapping.yml
Will retrieve '/internalusers' into /etc/wazuh-indexer/backup/internal_users.yml 
   SUCC: Configuration for 'internalusers' stored in /etc/wazuh-indexer/backup/internal_users.yml
Will retrieve '/actiongroups' into /etc/wazuh-indexer/backup/action_groups.yml 
   SUCC: Configuration for 'actiongroups' stored in /etc/wazuh-indexer/backup/action_groups.yml
Will retrieve '/tenants' into /etc/wazuh-indexer/backup/tenants.yml 
   SUCC: Configuration for 'tenants' stored in /etc/wazuh-indexer/backup/tenants.yml
Will retrieve '/nodesdn' into /etc/wazuh-indexer/backup/nodes_dn.yml 
   SUCC: Configuration for 'nodesdn' stored in /etc/wazuh-indexer/backup/nodes_dn.yml
Will retrieve '/whitelist' into /etc/wazuh-indexer/backup/whitelist.yml 
   SUCC: Configuration for 'whitelist' stored in /etc/wazuh-indexer/backup/whitelist.yml
Will retrieve '/allowlist' into /etc/wazuh-indexer/backup/allowlist.yml 
   SUCC: Configuration for 'allowlist' stored in /etc/wazuh-indexer/backup/allowlist.yml
Will retrieve '/audit' into /etc/wazuh-indexer/backup/audit.yml 
   SUCC: Configuration for 'audit' stored in /etc/wazuh-indexer/backup/audit.yml
16/08/2024 08:05:34 DEBUG: Password backup created in /etc/wazuh-indexer/backup.
16/08/2024 08:05:34 INFO: A backup of the internal users has been saved in the /etc/wazuh-indexer/internalusers-backup folder.
16/08/2024 08:05:34 DEBUG: The internal users have been updated before changing the passwords.
16/08/2024 08:05:36 DEBUG: Generating password hashes.
16/08/2024 08:05:45 DEBUG: Password hashes generated.
16/08/2024 08:05:45 DEBUG: Creating password backup.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Will retrieve '/config' into /etc/wazuh-indexer/backup/config.yml 
   SUCC: Configuration for 'config' stored in /etc/wazuh-indexer/backup/config.yml
Will retrieve '/roles' into /etc/wazuh-indexer/backup/roles.yml 
   SUCC: Configuration for 'roles' stored in /etc/wazuh-indexer/backup/roles.yml
Will retrieve '/rolesmapping' into /etc/wazuh-indexer/backup/roles_mapping.yml 
   SUCC: Configuration for 'rolesmapping' stored in /etc/wazuh-indexer/backup/roles_mapping.yml
Will retrieve '/internalusers' into /etc/wazuh-indexer/backup/internal_users.yml 
   SUCC: Configuration for 'internalusers' stored in /etc/wazuh-indexer/backup/internal_users.yml
Will retrieve '/actiongroups' into /etc/wazuh-indexer/backup/action_groups.yml 
   SUCC: Configuration for 'actiongroups' stored in /etc/wazuh-indexer/backup/action_groups.yml
Will retrieve '/tenants' into /etc/wazuh-indexer/backup/tenants.yml 
   SUCC: Configuration for 'tenants' stored in /etc/wazuh-indexer/backup/tenants.yml
Will retrieve '/nodesdn' into /etc/wazuh-indexer/backup/nodes_dn.yml 
   SUCC: Configuration for 'nodesdn' stored in /etc/wazuh-indexer/backup/nodes_dn.yml
Will retrieve '/whitelist' into /etc/wazuh-indexer/backup/whitelist.yml 
   SUCC: Configuration for 'whitelist' stored in /etc/wazuh-indexer/backup/whitelist.yml
Will retrieve '/allowlist' into /etc/wazuh-indexer/backup/allowlist.yml 
   SUCC: Configuration for 'allowlist' stored in /etc/wazuh-indexer/backup/allowlist.yml
Will retrieve '/audit' into /etc/wazuh-indexer/backup/audit.yml 
   SUCC: Configuration for 'audit' stored in /etc/wazuh-indexer/backup/audit.yml
16/08/2024 08:05:49 DEBUG: Password backup created in /etc/wazuh-indexer/backup.
Successfully updated the keystore
16/08/2024 08:05:49 DEBUG: Restarting filebeat service...
16/08/2024 08:05:50 DEBUG: filebeat started.
16/08/2024 08:05:50 DEBUG: Restarting wazuh-manager service...
16/08/2024 08:06:22 DEBUG: wazuh-manager started.
16/08/2024 08:06:23 DEBUG: Restarting wazuh-dashboard service...
16/08/2024 08:06:24 DEBUG: wazuh-dashboard started.
16/08/2024 08:06:24 DEBUG: Running security admin tool.
16/08/2024 08:06:24 DEBUG: Loading new passwords changes.
**************************************************************************
** This tool will be deprecated in the next major release of OpenSearch **
** https://github.com/opensearch-project/security/issues/1755           **
**************************************************************************
Security Admin v7
Will connect to 127.0.0.1:9200 ... done
Connected as "CN=admin,OU=Wazuh,O=Wazuh,L=California,C=US"
OpenSearch Version: 2.10.0
Contacting opensearch cluster 'opensearch' and wait for YELLOW clusterstate ...
Clustername: wazuh-cluster
Clusterstate: GREEN
Number of nodes: 1
Number of data nodes: 1
.opendistro_security index already exists, so we do not need to create one.
Populate config from /tmp/unattended/unattended_installer
Force type: internalusers
Will update '/internalusers' with /etc/wazuh-indexer/backup/internal_users.yml 
   SUCC: Configuration for 'internalusers' created or updated
SUCC: Expected 1 config types for node {"updated_config_types":["internalusers"],"updated_config_size":1,"message":null} is 1 (["internalusers"]) due to: null
Done with success
16/08/2024 08:06:32 DEBUG: Passwords changed.
16/08/2024 08:06:32 DEBUG: Changing API passwords.
16/08/2024 08:06:41 INFO: Initializing Wazuh dashboard web application.
16/08/2024 08:06:41 INFO: Wazuh dashboard web application initialized.
16/08/2024 08:06:41 INFO: --- Summary ---
16/08/2024 08:06:41 INFO: You can access the web interface https://<wazuh-dashboard-ip>:443
    User: admin
    Password: D8A.2gV0ktEG.6sI1v7?FS3UdV3oMZGV
16/08/2024 08:06:41 DEBUG: Restoring Wazuh repository.
16/08/2024 08:06:42 INFO: Installation finished.