Skip to content

Commit

Permalink
Roll back remaining content from ISM rollover+alias feature
Browse files Browse the repository at this point in the history
  • Loading branch information
AlexRuiz7 committed Jun 25, 2024
1 parent 327345e commit d3a0377
Show file tree
Hide file tree
Showing 6 changed files with 2 additions and 171 deletions.
2 changes: 0 additions & 2 deletions distribution/packages/src/rpm/wazuh-indexer.cicd.spec
Original file line number Diff line number Diff line change
Expand Up @@ -689,8 +689,6 @@ rm -fr %{buildroot}
%attr(750, %{USER}, %{GROUP}) %{INSTALL_DIR}/bin/opensearch-performance-analyzer/performance-analyzer-agent
%attr(440, %{USER}, %{GROUP}) %{INSTALL_DIR}/VERSION
%attr(750, %{USER}, %{GROUP}) %{INSTALL_DIR}/bin/indexer-security-init.sh
%attr(750, %{USER}, %{GROUP}) %{INSTALL_DIR}/bin/indexer-ism-init.sh
%attr(750, %{USER}, %{GROUP}) %{INSTALL_DIR}/bin/indexer-init.sh
%attr(640, %{USER}, %{GROUP}) %{INSTALL_DIR}/plugins/opensearch-security/tools/config.yml
%attr(740, %{USER}, %{GROUP}) %{INSTALL_DIR}/plugins/opensearch-security/tools/wazuh-certs-tool.sh
%attr(740, %{USER}, %{GROUP}) %{INSTALL_DIR}/plugins/opensearch-security/tools/wazuh-passwords-tool.sh
Expand Down
138 changes: 0 additions & 138 deletions distribution/src/bin/indexer-init.sh

This file was deleted.

12 changes: 0 additions & 12 deletions distribution/src/config/security/action_groups.yml

This file was deleted.

8 changes: 0 additions & 8 deletions distribution/src/config/security/roles.yml
Original file line number Diff line number Diff line change
Expand Up @@ -391,11 +391,3 @@ manage_wazuh_index:
- "index"
tenant_permissions: []
static: false

# ISM API permissions role
manage_ism:
reserved: true
hidden: false
cluster_permissions:
- "manage_ism"
static: false
9 changes: 1 addition & 8 deletions distribution/src/config/security/roles_mapping.yml
Original file line number Diff line number Diff line change
Expand Up @@ -84,11 +84,4 @@ manage_wazuh_index:
hosts: []
users:
- "kibanaserver"
and_backend_roles: []

# ISM API permissions role mapping
manage_ism:
reserved: true
hidden: false
users:
- "kibanaserver"
and_backend_roles: []
4 changes: 1 addition & 3 deletions integrations/tools/events-generator/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,9 +17,7 @@ arguments, as it's configured with default values that will work in most cases d
To know more about its capabilities and arguments, display the help menu with `-h`.

As for now, this tool generates events for the `wazuh-alerts-4.x-*` and `wazuh-archives-4.x-*` indices.
Since 4.8.0, these indices are aliased to `wazuh-alerts` and `wazuh-archives`. If you need to, run the
[indexer-ism-init.sh](../../../distribution/src/bin/indexer-ism-init.sh) script to create them. This is important as, by default, the tool will write to
the `wazuh-alerts` alias. You may also need to create an **index pattern** in _dashboards_ in order to perform
You may also need to create an **index pattern** in _dashboards_ in order to perform
queries to the index from the UI. To do that, go to Dashboards Management > Index Patterns > Create index pattern > wazuh-alerts-4.x-* > timestamp as Time field

Newer indices, like `wazuh-states-vulnerabilities`, are ECS compliant and use a dedicated events' generator.
Expand Down

0 comments on commit d3a0377

Please sign in to comment.