Wazuh Yandex Cloud
Wazuh is a full-featured DevSecOps platform for threat detection, cloud resource monitoring, and incident response. Wazuh collects, aggregates, and analyzes data, helping detect intrusions, anomalies, and vulnerabilities and ensure compliance with security regulations.
Alert
The image is based on a hardened Ubuntu version and may behave differently from the standard distributions.
Once you start the VM, it will take 5-10 minutes to set up. At this time, only port 22 is available. The web UI will be available after the setup is complete.
When deploying the image, use the default SSH key.
-
Get an SSH key pair for connection to a virtual machine.
-
Create a security group in the network you are going to deploy your Wazuh VM in and configure the following incoming traffic rule:
Traffic<br/>direction Port range Protocol Destination /<br/>Source CIDR blocks Inbound443AnyCIDR0.0.0.0/0 -
Create a service account with the
compute.viewer,logging.viewer, andlogging.readerroles. -
Create a log group. Save the log group ID. You’ll need it later.
-
Configure audit logs uploads to Cloud Logging.
-
Create a VM from a public image:
-
Under Boot disk image on the Marketplace tab, enter
Wazuhin the Product search field and select the Wazuh public image. -
Under Network settings:
- In the Subnet field, specify the ID of a subnet in the new VM’s availability zone. Alternatively, you can select a cloud network from the list.
- In the Security groups field, select the security group you created earlier.
-
Under Access:
- Enter the username in the Login field.
- In the SSH key field, select the previously created SSH key from the list.
- Under Advanced, in the Service account field, select the previously created service account.
It takes 5 to 10 minutes to set up the VM automatically.
-
-
Connect to the VM over SSH. Use the username you set when creating the VM and the private SSH key you created before.
-
Open the
wazuh.shfile:sudo nano /etc/profile.d/wazuh.sh -
Add the following line to the file:
export YANDEX_LOG_GROUP_ID="<log_group_ID>"Where
YANDEX_LOG_GROUP_IDis the ID of the previously created log group. -
Unpack the
wazuh-install-files.tararchive with passwords and certificates required for access to the Wazuh web interface and API:sudo tar -xvf /var/ossec/wazuh-install-files.tarThe passwords and certificates are only stored on the VM.
-
Open the
wazuh-new-passwords.txtfile:sudo nano wazuh-install-files/wazuh-new-passwords.txt -
Under
Admin user for the web user interface and Wazuh indexer. Use this user to log in to Wazuh dashboard, copy the values of the parameters to access the Wazuh web interface:indexer_username: Username.indexer_password: Password.
-
Open
https://<VM_public_IP_address>/in your browser and log in with the credentials you got earlier. -
To activate Wazuh, obtain the ID of the folder in which the VM is located and send it to support@opennix.ru.
- Analyzing the security of cloud resources, including containers.
- Detecting intrusions.
- Identifying vulnerabilities.
- Analyzing logs.
- Monitoring files.
- Evaluating the system configuration.
- Responding to security incidents.
- Performing security compliance checks.
- Analyzing security events in Yandex Cloud.
OpenNix
OpenNix provides technical support to Wazuh users in Yandex Cloud. You can contact their support team by email at support@opennix.ru. Support is available on business days from 9 a.m. to 6 p.m., GMT+3.
Yandex Cloud
Yandex Cloud does not provide technical support for this product. If you have any issues, please refer to the vendor’s information resources.
| Software | Version |
|---|---|
| Amazon Linux | 2023.6.20250218 |
| Wazuh | 4.11.0 |
| Yandex modules | v1.3.19 |
| Yara | 4.1.3-2 |
| clamav | 0.103.12 |
| rkhunter | 1.4.6-22 |
| aide | 0.18.6-1 |
| audit | 3.0.6-1 |