Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merge 4.10.2 into master #475

Merged
merged 102 commits into from
Oct 18, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
102 commits
Select commit Hold shift + click to select a range
9ad2f82
Init wazuh-indexer (#3)
AlexRuiz7 Aug 3, 2023
352e675
Create codeql.yml
AlexRuiz7 Aug 3, 2023
91fef34
Update dependabot.yml
AlexRuiz7 Aug 3, 2023
ce79f5a
Update SECURITY.md (#30)
AlexRuiz7 Sep 19, 2023
bf09e9b
Add ECS mappings generator (#36)
AlexRuiz7 Oct 9, 2023
a614448
Add default query fields to vulnerability detector index (#40)
AlexRuiz7 Oct 20, 2023
6722947
Create gradle_build.yml
AlexRuiz7 Oct 20, 2023
d376486
Update gradle_build.yml
AlexRuiz7 Oct 20, 2023
91a2de0
Add a script to configure the rollover policy (#49)
AlexRuiz7 Nov 2, 2023
0369a4e
Update ISM init script (#50)
AlexRuiz7 Nov 7, 2023
2e7f6d4
Fix bug with -i option (#51)
AlexRuiz7 Nov 8, 2023
9d5e91c
Update min_doc_count value (#52)
AlexRuiz7 Nov 14, 2023
a5f309d
Improve ISM init script (#57)
AlexRuiz7 Nov 15, 2023
bf4d828
Update distribution files (#59)
AlexRuiz7 Nov 22, 2023
b07b964
Update documentation of the ECS tooling (#67)
AlexRuiz7 Nov 28, 2023
5607ca0
Add workflow for package generation (#65)
AlexRuiz7 Nov 28, 2023
df8760e
Add docker compose environment (#66)
AlexRuiz7 Nov 29, 2023
aef0064
Rename packages to wazuh-indexer (#69)
AlexRuiz7 Dec 5, 2023
692ee6a
Update vulnerability index mappings (#75)
AlexRuiz7 Dec 7, 2023
f6c9a3c
Update `indexer-ism-init.sh` (#81)
AlexRuiz7 Dec 18, 2023
693c074
Add workflow to assemble packages (#85)
AlexRuiz7 Dec 26, 2023
458c7ee
Fix yellow cluster state (#95)
AlexRuiz7 Dec 27, 2023
62d4295
Update ism-init script (#97)
AlexRuiz7 Jan 3, 2024
3b126b8
Add tools to assemble DEB packages (#96)
AlexRuiz7 Jan 4, 2024
483f4c5
Update README.md
AlexRuiz7 Jan 4, 2024
fba5a68
Build scripts and GH workflows artifacts naming fix (#112)
f-galland Jan 10, 2024
2dfe8e9
Use short SHA as Git reference in packages naming (#100)
f-galland Jan 10, 2024
c85f426
Remove unneeded files from assembled packages (#115)
f-galland Jan 12, 2024
347103e
Add missing tools and files back into Wazuh Indexer packages (#117)
f-galland Jan 12, 2024
25c9179
Remove unneeded symbolic links from assembled packages (#121)
f-galland Jan 15, 2024
d10c450
Update issue templates (#127)
AlexRuiz7 Jan 16, 2024
fca8376
Fix RPM package references to /var/run (#119)
f-galland Jan 18, 2024
bc9546c
Removing post-install message from wazuh-indexer.rpm.spec (#131)
f-galland Jan 18, 2024
828c2f8
Add tests to the packages building process (#132)
AlexRuiz7 Jan 18, 2024
1ba2351
Get Wazuh version from VERSION file (#122)
f-galland Jan 19, 2024
3fe6905
Removing /usr/share/lintian/overrides/wazuh-indexer from deb packages…
f-galland Jan 19, 2024
b9b0aa0
Add `wazuh-template.json` to packages (#116)
f-galland Jan 19, 2024
724b7a5
Adding Debian packaging config files from Opensearch (#118)
f-galland Jan 19, 2024
c142fcd
Fix Build workflow to run on push events (#134)
AlexRuiz7 Jan 19, 2024
e89f567
Use maven for plugin download (#139)
f-galland Jan 22, 2024
23bf3a1
Add new custom field to the vulnerability detector index (#141)
AlexRuiz7 Jan 25, 2024
fb01cc0
Fine tuning permissions on assembled packages (#137)
f-galland Jan 30, 2024
3e7c582
Init. Amazon Security Lake integration (#143)
AlexRuiz7 Jan 31, 2024
c3a9d49
Add events generator tool for `wazuh-alerts` (#152)
AlexRuiz7 Feb 15, 2024
9024768
Add `wazuh.manager.name` to VD mappings (#158)
AlexRuiz7 Feb 20, 2024
4d9f2a5
Create compatibility_request.md (#163)
AlexRuiz7 Feb 23, 2024
de40567
Add Python module to accomplish OCSF compliant events (#159)
AlexRuiz7 Mar 4, 2024
092874c
Update Gradle setup action (#182)
AlexRuiz7 Mar 7, 2024
8e4d75b
Update vulnerability-states fields (#177)
AlexRuiz7 Mar 7, 2024
f152f81
Automate package's testing (#178)
AlexRuiz7 Mar 8, 2024
30f7084
Remove ecs.version from query.default_fields (#184)
AlexRuiz7 Mar 8, 2024
9eeb248
Upload packages to S3 (#179)
AlexRuiz7 Mar 8, 2024
8f07f88
Add bash to Docker dev image (#185)
AlexRuiz7 Mar 15, 2024
fa72a21
Update wazuh-states-vulnerabilities index mapping (#191)
AlexRuiz7 Mar 26, 2024
b6c98d6
Add pipeline to generate release packages (#193)
AlexRuiz7 Mar 27, 2024
43cc0d7
Build Docker images (#194)
AlexRuiz7 Apr 4, 2024
9af6fe8
Add on.workflow_call to build_single.yml workflow (#200)
AlexRuiz7 Apr 9, 2024
b936fe6
Add Pyhton module to implement Amazon Security Lake integration (#186)
AlexRuiz7 Apr 9, 2024
224a291
Replace choice with string on workflow_call (#207)
AlexRuiz7 Apr 18, 2024
0ca9f27
Use AWS_REGION secret (#209)
AlexRuiz7 Apr 24, 2024
a40b93b
Add Lambda function for the Amazon Security Lake integration (#189)
AlexRuiz7 Apr 24, 2024
bf2f55c
Bump Java version in Docker environments (#210)
AlexRuiz7 Apr 26, 2024
7fe7096
Fix access denied error during log rotation (#212)
AlexRuiz7 Apr 26, 2024
9c65d2b
Save intermediate OCSF files to an S3 bucket (#218)
AlexRuiz7 Apr 26, 2024
6127124
Fix Parquet files format (#217)
AlexRuiz7 Apr 26, 2024
d85d99f
Fix mapping to Detection Finding OCSF class (#220)
AlexRuiz7 Apr 29, 2024
d7786a3
Map events to OCSF's Security Finding class (#221)
AlexRuiz7 Apr 30, 2024
701190c
Add ID input to workflows (#229)
rauldpm May 17, 2024
31ac9a6
Add OPENSEARCH_TMPDIR variable to service and create directory in pac…
f-galland May 21, 2024
6de22a1
Improve workflow's run-name with tagret system and architeture (#237)
AlexRuiz7 May 28, 2024
4efe0a2
Add documentation for the Amazon Security Lake integration (#226)
AlexRuiz7 May 28, 2024
909a9e2
Rename environment variable (#240)
AlexRuiz7 May 28, 2024
816fa2d
Remove maintainer-approval.yml (#241)
AlexRuiz7 May 28, 2024
f5d00c2
Improve logging and error handling on ASL Lambda function (#242)
AlexRuiz7 May 29, 2024
ec9fd89
Update .gitattributes (#243)
AlexRuiz7 May 29, 2024
7a665ae
Change . for : in debian's postinst (#245)
f-galland May 31, 2024
12311e8
Add integration with Elastic (#248)
AlexRuiz7 Jun 5, 2024
c5d13aa
Added S3 URI output to package generation upload (#249)
rauldpm Jun 7, 2024
e1d0334
Add OpenSearch integration (#258)
f-galland Jun 7, 2024
5e4c84f
Add Splunk integration (#257)
AlexRuiz7 Jun 11, 2024
aae3b6f
Add Manager to Elastic integration (#266)
AlexRuiz7 Jun 12, 2024
f4cc1e6
Add Manager to Splunk integration (#268)
AlexRuiz7 Jun 14, 2024
5a7445a
Add Manager to OpenSearch integration (#267)
AlexRuiz7 Jun 14, 2024
4609871
Attempt nr.2 to fix #277 (#280)
AlexRuiz7 Jun 25, 2024
b32fa76
Remove references to indexer-ism-init.sh and wazuh-template.json (#281)
f-galland Jun 25, 2024
95f1e12
Bump 4.10.0 (#272)
AlexRuiz7 Jun 20, 2024
b4d103d
Merge 4.9.1 into 4.10.0 (#358)
AlexRuiz7 Aug 20, 2024
b8c8bab
Merge 4.9.2 into 4.10.0 (#378)
AlexRuiz7 Sep 6, 2024
d616b80
Fix build.gradle (#381)
AlexRuiz7 Sep 9, 2024
f53e992
Remove old compose files for integrations (#386)
AlexRuiz7 Sep 9, 2024
095d2e3
Delete integrations/docker/amazon-security-lake.yml
AlexRuiz7 Sep 9, 2024
c629334
Delete integrations/docker/config directory
AlexRuiz7 Sep 9, 2024
066c12a
Update vulnerability detector index template (#383)
AlexRuiz7 Sep 9, 2024
ce1c6b2
Merge 4.9.1 into 4.10.0 (#426)
AlexRuiz7 Sep 23, 2024
aad4754
Bump version to 4.10.1 (#430)
AlexRuiz7 Sep 24, 2024
ed170ac
Support new version 4.10.2 (#441)
AlexRuiz7 Oct 3, 2024
abe5f5f
Enable assembly of ARM packages (#444)
AlexRuiz7 Oct 4, 2024
e6e60cd
Merge 4.10.1 into 4.10.2 (#473)
AlexRuiz7 Oct 17, 2024
b7095ab
Merge branch '4.10.2' into merge-4.10.2-into-master
AlexRuiz7 Oct 17, 2024
caa942c
Remove packaging_scripts folder
AlexRuiz7 Oct 17, 2024
a997a1d
Remove duplicated files
AlexRuiz7 Oct 17, 2024
c65c9ec
Fix build.yml
AlexRuiz7 Oct 17, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
---
name: Integrations maintenance request
about: Used by the Indexer team to maintain third-party software integrations and track the results.
title: Integrations maintenance request
labels: level/task, request/operational, type/maintenance
assignees: ""
---

## Description

The Wazuh Indexer team is responsible for the maintenance of the third-party integrations hosted in the wazuh/wazuh-indexer repository. We must ensure these integrations work under new releases of the third-party software (Splunk, Elastic, Logstash, …) and our own.

For that, we need to:

- [ ] Create a pull request that upgrades the components to the latest version.
- [ ] Update our testing environments to verify the integrations work under new versions.
- [ ] Test the integrations, checking that:
- The Docker Compose project starts without errors.
- The data arrives to the destination.
- All the dashboards can be imported successfully.
- All the dashboards are populated with data.
- [ ] Finally, upgrade the compatibility matrix in integrations/README.md with the new versions.

> [!NOTE]
> * For Logstash, we use the logstash-oss image.
> * For Wazuh Indexer and Wazuh Dashboard, we use the opensearch and opensearch-dashboards images. These must match the opensearch version that we support (e.g: for Wazuh 4.9.0 it is OpenSearch 2.13.0).

## Issues

- _List here the detected issues_
8 changes: 4 additions & 4 deletions .github/workflows/build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ on:
architecture:
description: '[ "x64", "arm64" ]'
type: string
default: '[ "x64" ]'
default: '[ "x64", "arm64" ]'
checksum:
description: "Checksum ?"
type: boolean
Expand Down Expand Up @@ -64,7 +64,7 @@ on:
architecture:
description: '[ "x64", "arm64" ]'
type: string
default: '[ "x64" ]'
default: '[ "x64", "arm64" ]'
checksum:
description: "Checksum ?"
type: boolean
Expand Down Expand Up @@ -104,7 +104,7 @@ on:
jobs:
matrix:
name: Set up matrix
runs-on: ubuntu-latest
runs-on: ubuntu-22.04
outputs:
matrix: ${{ steps.setup.outputs.matrix }}
steps:
Expand Down Expand Up @@ -195,7 +195,7 @@ jobs:

build:
needs: [matrix, build-wazuh-plugins, build-reporting-plugin]
runs-on: ubuntu-latest
runs-on: ${{ matrix.architecture == 'arm64' && 'wz-linux-arm64' || 'ubuntu-22.04' }}
strategy:
fail-fast: false
matrix: ${{ fromJson(needs.matrix.outputs.matrix) }}
Expand Down
3 changes: 2 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
### Dependencies

### Changed
- Upgrade third-party integrations to the latest versions ([#447](https://github.com/wazuh/wazuh-indexer/pull/447))

### Deprecated

Expand All @@ -18,4 +19,4 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),

### Security

[Unreleased 5.0.x]: https://github.com/wazuh/wazuh-indexer/compare/92ffe2ed8a743c07a1170960d5949fcd6ed12e89...master
[Unreleased 5.0.x]: https://github.com/wazuh/wazuh-indexer/compare/4.10.2...master
14 changes: 5 additions & 9 deletions SECURITY.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,24 +6,20 @@ Version: 2023-06-12
This document outlines the Security Policy for Wazuh's open source projects. It emphasizes our commitment to maintain a secure environment for our users and contributors, and reflects our belief in the power of collaboration to identify and resolve security vulnerabilities.

## Scope
This policy applies to all open source projects developed, maintained, or hosted by Wazuh. In this case, as this project is a fork, we may forward the reported vulnerability to the upstream.
This policy applies to all open source projects developed, maintained, or hosted by Wazuh.

## Reporting Security Vulnerabilities
If you believe you've discovered a potential security vulnerability in one of our open source projects, we strongly encourage you to report it to us responsibly.

Please submit your findings as security advisories under the "Security" tab in the relevant GitHub repository. Alternatively, you may send the details of your findings to [email protected].
Please submit your findings as security advisories under the "Security" tab in the relevant GitHub repository. Alternatively, you may send the details of your findings to [[email protected]](mailto:[email protected]).

## Vulnerability Disclosure Policy
Upon receiving a report of a potential vulnerability, our team will initiate an investigation. If the reported issue is confirmed as a vulnerability, we will take the following steps:

1. Acknowledgment: We will acknowledge the receipt of your vulnerability report and begin our investigation.

2. Validation: We will validate the issue and work on reproducing it in our environment.

3. Remediation: We will work on a fix and thoroughly test it

3. Remediation: We will work on a fix and thoroughly test it.
4. Release & Disclosure: After 90 days from the discovery of the vulnerability, or as soon as a fix is ready and thoroughly tested (whichever comes first), we will release a security update for the affected project. We will also publicly disclose the vulnerability by publishing a CVE (Common Vulnerabilities and Exposures) and acknowledging the discovering party.

5. Exceptions: In order to preserve the security of the Wazuh community at large, we might extend the disclosure period to allow users to patch their deployments.

This 90-day period allows for end-users to update their systems and minimizes the risk of widespread exploitation of the vulnerability.
Expand All @@ -37,7 +33,7 @@ We believe in giving credit where credit is due. If you report a security vulner
We do appreciate and encourage feedback from our community, but currently we do not have a bounty program. We might start bounty programs in the future.

## Compliance with this Policy
We consider the discovery and reporting of security vulnerabilities an important public service. We encourage responsible reporting of any vulnerabilities that may be found in our site or applications.
We consider the discovery and reporting of security vulnerabilities an important public service. We encourage responsible reporting of any vulnerabilities that may be found in our site or applications.

Furthermore, we will not take legal action against or suspend or terminate access to the site or services of those who discover and report security vulnerabilities in accordance with this policy because of the fact.

Expand All @@ -46,4 +42,4 @@ We ask that all users and contributors respect this policy and the security of o
## Changes to this Security Policy
This policy may be revised from time to time. Each version of the policy will be identified at the top of the page by its effective date.

If you have any questions about this Security Policy, please contact us at [email protected]
If you have any questions about this Security Policy, please contact us at [[email protected]](mailto:[email protected])
4 changes: 2 additions & 2 deletions build-scripts/provision.sh
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,6 @@
# Install necessary packages
apt-get update -y && apt-get upgrade -y && apt-get install -y curl build-essential &&
apt-get install -y debmake debhelper-compat &&
apt-get install -y libxrender1 libxtst6 libasound2 libxi6 libgconf-2-4 &&
apt-get install -y libatk1.0-0 libatk-bridge2.0-0 libcups2 libdrm2 libatspi2.0-dev libxcomposite-dev libxdamage1 libxfixes3 libxfixes-dev libxrandr2 libgbm-dev libxkbcommon-x11-0 libpangocairo-1.0-0 libcairo2 libcairo2-dev libnss3 libnspr4 libnspr4-dev freeglut3 &&
apt-get install -y libxrender1 libxtst6 libxi6 &&
apt-get install -y libatk1.0-0 libatk-bridge2.0-0 libcups2 libdrm2 libatspi2.0-dev libxcomposite-dev libxdamage1 libxfixes3 libxfixes-dev libxrandr2 libgbm-dev libxkbcommon-x11-0 libpangocairo-1.0-0 libcairo2 libcairo2-dev libnss3 libnspr4 libnspr4-dev &&
apt-get clean -y
Original file line number Diff line number Diff line change
Expand Up @@ -6,15 +6,16 @@
# compatible open source license.

[Unit]
Description=wazuh-indexer Performance Analyzer
Description=OpenSearch Performance Analyzer

[Service]
Type=simple
ExecStart=/usr/share/wazuh-indexer/bin/wazuh-indexer-performance-analyzer/performance-analyzer-agent-cli
ExecStart=/usr/share/wazuh-indexer/bin/opensearch-performance-analyzer/performance-analyzer-agent-cli
Restart=on-failure
User=wazuh-indexer
Group=wazuh-indexer
EnvironmentFile=-/etc/sysconfig/wazuh-indexer
Environment=OPENSEARCH_HOME=/usr/share/wazuh-indexer
Environment=OPENSEARCH_PATH_CONF=/etc/wazuh-indexer/
WorkingDirectory=/usr/share/wazuh-indexer

[Install]
Expand Down
1 change: 0 additions & 1 deletion distribution/packages/src/deb/debmake_install.sh
Original file line number Diff line number Diff line change
Expand Up @@ -90,5 +90,4 @@ for i in "${binary_files[@]}"; do
chmod -c 750 "$i"
done


exit 0
11 changes: 7 additions & 4 deletions distribution/packages/src/rpm/wazuh-indexer.rpm.spec
Original file line number Diff line number Diff line change
Expand Up @@ -244,6 +244,7 @@ exit 0
%config(noreplace) %attr(660, %{name}, %{name}) %{config_dir}/log4j2.properties
%config(noreplace) %attr(660, %{name}, %{name}) %{config_dir}/jvm.options
%config(noreplace) %attr(660, %{name}, %{name}) %{config_dir}/opensearch.yml
%config(noreplace) %attr(640, %{name}, %{name}) %{config_dir}/opensearch-security/*


%if %observability_plugin
Expand All @@ -265,13 +266,15 @@ exit 0
%attr(750, %{name}, %{name}) %{product_dir}/performance-analyzer-rca/bin/*

%changelog
* Fri Dec 06 2024 support <[email protected]> - 5.0.0
* Mon Jun 23 2025 support <[email protected]> - 5.0.0
- More info: https://documentation.wazuh.com/current/release-notes/release-5.0.0-0.html
* Fri Nov 06 2024 support <[email protected]> - 4.10.1
* Tue Feb 20 2025 support <[email protected]> - 4.10.2
- More info: https://documentation.wazuh.com/current/release-notes/release-4-10-2.html
* Tue Jan 28 2025 support <[email protected]> - 4.10.1
- More info: https://documentation.wazuh.com/current/release-notes/release-4-10-1.html
* Mon Sep 23 2024 support <[email protected]> - 4.10.0
* Tue Nov 26 2024 support <[email protected]> - 4.10.0
- More info: https://documentation.wazuh.com/current/release-notes/release-4-10-0.html
* Fri Sep 20 2024 support <[email protected]> - 4.9.1
* Tue Oct 15 2024 support <[email protected]> - 4.9.1
- More info: https://documentation.wazuh.com/current/release-notes/release-4-9-1.html
* Thu Aug 15 2024 support <[email protected]> - 4.9.0
- More info: https://documentation.wazuh.com/current/release-notes/release-4-9-0.html
Expand Down
65 changes: 13 additions & 52 deletions docker/README.md
Original file line number Diff line number Diff line change
@@ -1,55 +1,19 @@
# Indexer development environments
# Docker environments

Install [Docker Desktop][docker-desktop] as per its instructions, available for Windows, Mac
and Linux (Ubuntu, Debian & Fedora).
This ensures that the development experience between Linux, Mac and Windows is as
similar as possible.

> IMPORTANT: be methodic during the installation of Docker Desktop, and proceed
> step by step as described in their documentation. Make sure that your system
> meets the system requirements before installing Docker Desktop, and read any
> post-installation note, specially on Linux: [Differences between
> Docker Desktop for Linux and Docker Engine][docker-variant].
Multipurpose Docker environments to run, test and build `wazuh-indexer`.

## Pre-requisites

1. Assign resources to [Docker Desktop][docker-desktop]. The requirements for the
environments are:
1. Install [Docker][docker] as per its instructions.

1. Your workstation must meet the minimum hardware requirements:

- 8 GB of RAM (minimum)
- 4 cores

The more resources the better ☺

2. Clone the [wazuh-indexer][wi-repo].

3. Set up user permissions

The Docker volumes will be created by the internal Docker user, making them
read-only. To prevent this, a new group named `docker-desktop` and GUID 100999
needs to be created, then added to your user and the source code folder:

```bash
sudo groupadd -g 100999 docker-desktop
sudo useradd -u 100999 -g 100999 -M docker-desktop
sudo chown -R docker-desktop:docker-desktop $WZD_HOME
sudo usermod -aG docker-desktop $USER
```

## Understanding Docker contexts

Before we begin starting Docker containers, we need to understand the
differences between Docker Engine and Docker Desktop, more precisely, that the
use different contexts.

Carefully read these two sections of the Docker documentation:

- [Differences between Docker Desktop for Linux and Docker Engine][docker-variant].
- [Switch between Docker Desktop and Docker Engine][docker-context].

Docker Desktop will change to its context automatically at start, so be sure
that any existing Docker container using the default context is **stopped**
before starting Docker Desktop and any of the environments in this folder.
1. Clone the [wazuh-indexer][wi-repo].

## Development environments

Expand All @@ -61,34 +25,31 @@ Example:
Usage: ./dev.sh {up|down|stop}
```

Once the `wi-dev:x.y.z` container is up, attach a shell to it and run `./gradlew run`
to start the application.
Once the `wi-dev:x.y.z` container is up, attach a shell to it and run `./gradlew run` to start the application.

## Containers to generate packages

Use the `ci/ci.sh` script to start provisioned containers to generate packages.

```bash
Usage: ./ci.sh {up|down|stop} [ci]
Usage: ./ci.sh {up|down|stop}
```

Refer to [scripts/README.md](../scripts/README.md) for details about how to build packages.
Refer to [build-scripts/README.md](../build-scripts/README.md) for details about how to build packages.

[docker-desktop]: https://docs.docker.com/get-docker
[docker-variant]: https://docs.docker.com/desktop/install/linux-install/#differences-between-docker-desktop-for-linux-and-docker-engine
[docker-context]: https://docs.docker.com/desktop/install/linux-install/#context
[docker]: https://docs.docker.com/engine/install
[wi-repo]: https://github.com/wazuh/wazuh-indexer

## Building Docker images

The [prod](./prod) folder contains the code to build Docker images. A tarball of `wazuh-indexer` needs to be located at the same level that the Dockerfile. Below there is example of the command needed to build the image. Set the build arguments and the image tag accordingly.
The [prod](./prod) folder contains the code to build Docker images. A tarball of `wazuh-indexer` needs to be located at the same level that the Dockerfile. Below there is an example of the command needed to build the image. Set the build arguments and the image tag accordingly.

```console
docker build --build-arg="VERSION=4.10.0" --build-arg="INDEXER_TAR_NAME=wazuh-indexer-4.10.0-1_linux-x64_cfca84f.tar.gz" --tag=wazuh-indexer:4.10.0 --progress=plain --no-cache .
docker build --build-arg="VERSION=5.0.0" --build-arg="INDEXER_TAR_NAME=wazuh-indexer-5.0.0-1_linux-x64_cfca84f.tar.gz" --tag=wazuh-indexer:5.0.0 --progress=plain --no-cache .
```

Then, start a container with:

```console
docker run -it --rm wazuh-indexer:4.10.0
docker run -it --rm wazuh-indexer:5.0.0
```
2 changes: 0 additions & 2 deletions docker/ci/ci.yml
Original file line number Diff line number Diff line change
@@ -1,5 +1,3 @@
version: "3.9"

services:
# Essentially wi-dev, but doesn't expose port 9200
wi-build:
Expand Down
2 changes: 0 additions & 2 deletions docker/dev/dev.yml
Original file line number Diff line number Diff line change
@@ -1,5 +1,3 @@
version: "3.9"

services:
wi-dev:
image: wi-dev:${VERSION}
Expand Down
1 change: 0 additions & 1 deletion ecs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,6 @@ are generated. For example, to generate the mappings for the `vulnerability-dete
```console
Loading schemas from git ref v8.11.0
Running generator. ECS version 8.11.0
Replacing "match_only_text" type with "text"
Mappings saved to ~/wazuh/wazuh-indexer/ecs/vulnerability-detector/mappings/v8.11.0
```

Expand Down
Loading