Merge 4.14.1 into main

This commit is contained in:
Carlos Bordon 2025-10-31 14:43:13 -03:00
commit c568e5fd3e
No known key found for this signature in database
GPG Key ID: 4C040368C34BF037
11 changed files with 46 additions and 48 deletions

View File

@ -2,6 +2,25 @@
All notable changes to this project will be documented in this file.
## [5.0.0]
### Added
- None
### Changed
- Wazuh server clean-up ([#1213](https://github.com/wazuh/wazuh-kubernetes/pull/1213))
- Replace OpenSearch deprecated settings ([#1109](https://github.com/wazuh/wazuh-kubernetes/pull/1109))
### Fixed
- None
### Deleted
- None
## [4.14.1]
### Added
@ -34,6 +53,24 @@ All notable changes to this project will be documented in this file.
### Fixed
- None
### Deleted
- None
## [4.14.0]
### Added
- None
### Changed
- None
### Fixed
- Add new config path and new permission for conf and certs files ([#1152](https://github.com/wazuh/wazuh-kubernetes/pull/1152))
### Deleted

View File

@ -1,4 +1,4 @@
{
"version": "4.14.1",
"stage": "rc1"
"version": "5.0.0",
"stage": "alpha0"
}

View File

@ -11,9 +11,7 @@ PERMANENT_DATA[((i++))]="/var/ossec/api/configuration"
PERMANENT_DATA[((i++))]="/var/ossec/etc"
PERMANENT_DATA[((i++))]="/var/ossec/logs"
PERMANENT_DATA[((i++))]="/var/ossec/queue"
PERMANENT_DATA[((i++))]="/var/ossec/agentless"
PERMANENT_DATA[((i++))]="/var/ossec/var/multigroups"
PERMANENT_DATA[((i++))]="/var/ossec/integrations"
PERMANENT_DATA[((i++))]="/var/ossec/active-response/bin"
PERMANENT_DATA[((i++))]="/var/ossec/wodles"
PERMANENT_DATA[((i++))]="/etc/filebeat"

View File

@ -32,7 +32,7 @@ spec:
secretName: dashboard-certs
containers:
- name: wazuh-dashboard
image: 'wazuh/wazuh-dashboard:4.14.1'
image: 'wazuh/wazuh-dashboard:5.0.0'
resources:
limits:
cpu: 500m

View File

@ -3,7 +3,7 @@ server.host: 0.0.0.0
server.port: 5601
opensearch.hosts: https://indexer:9200
opensearch.ssl.verificationMode: none
opensearch.requestHeadersWhitelist: [ authorization,securitytenant ]
opensearch.requestHeadersAllowlist: [ authorization,securitytenant ]
opensearch_security.multitenancy.enabled: false
opensearch_security.readonly_mode.roles: ["kibana_read_only"]
server.ssl.enabled: true

View File

@ -63,7 +63,7 @@ spec:
privileged: true
containers:
- name: wazuh-indexer
image: 'wazuh/wazuh-indexer:4.14.1'
image: 'wazuh/wazuh-indexer:5.0.0'
resources:
limits:
cpu: 500m

View File

@ -2,7 +2,7 @@ cluster.name: ${CLUSTER_NAME}
node.name: ${NODE_NAME}
network.host: ${NETWORK_HOST}
discovery.seed_hosts: wazuh-indexer-0.wazuh-indexer
cluster.initial_master_nodes:
cluster.initial_cluster_manager_nodes:
- wazuh-indexer-0
node.max_local_storage_nodes: "3"
@ -27,5 +27,4 @@ plugins.security.restapi.roles_enabled:
- "all_access"
- "security_rest_api_access"
plugins.security.allow_default_init_securityindex: true
cluster.routing.allocation.disk.threshold_enabled: false
compatibility.override_main_response_version: true
cluster.routing.allocation.disk.threshold_enabled: false

View File

@ -41,7 +41,7 @@ spec:
fsGroup: 101
containers:
- name: wazuh-manager
image: 'wazuh/wazuh-manager:4.14.1'
image: 'wazuh/wazuh-manager:5.0.0'
resources:
limits:
cpu: 400m
@ -85,15 +85,9 @@ spec:
- name: wazuh-manager-master
mountPath: /var/ossec/var/multigroups
subPath: wazuh/var/ossec/var/multigroups
- name: wazuh-manager-master
mountPath: /var/ossec/integrations
subPath: wazuh/var/ossec/integrations
- name: wazuh-manager-master
mountPath: /var/ossec/active-response/bin
subPath: wazuh/var/ossec/active-response/bin
- name: wazuh-manager-master
mountPath: /var/ossec/agentless
subPath: wazuh/var/ossec/agentless
- name: wazuh-manager-master
mountPath: /var/ossec/wodles
subPath: wazuh/var/ossec/wodles

View File

@ -48,7 +48,7 @@ spec:
fsGroup: 101
containers:
- name: wazuh-manager
image: 'wazuh/wazuh-manager:4.14.1'
image: 'wazuh/wazuh-manager:5.0.0'
resources:
limits:
cpu: 400m
@ -88,15 +88,9 @@ spec:
- name: wazuh-manager-worker
mountPath: /var/ossec/var/multigroups
subPath: wazuh/var/ossec/var/multigroups
- name: wazuh-manager-worker
mountPath: /var/ossec/integrations
subPath: wazuh/var/ossec/integrations
- name: wazuh-manager-worker
mountPath: /var/ossec/active-response/bin
subPath: wazuh/var/ossec/active-response/bin
- name: wazuh-manager-worker
mountPath: /var/ossec/agentless
subPath: wazuh/var/ossec/agentless
- name: wazuh-manager-worker
mountPath: /var/ossec/wodles
subPath: wazuh/var/ossec/wodles

View File

@ -23,11 +23,6 @@
<agents_disconnection_alert_time>100s</agents_disconnection_alert_time>
</global>
<alerts>
<log_alert_level>3</log_alert_level>
<email_alert_level>12</email_alert_level>
</alerts>
<!-- Choose between "plain", "json", or "plain,json" for the format of internal logs -->
<logging>
<log_format>plain</log_format>
@ -281,13 +276,6 @@
<rule_dir>etc/rules</rule_dir>
</ruleset>
<rule_test>
<enabled>yes</enabled>
<threads>1</threads>
<max_sessions>64</max_sessions>
<session_timeout>15m</session_timeout>
</rule_test>
<!-- Configuration for ossec-authd
To enable this service, run:
wazuh-control enable auth

View File

@ -23,11 +23,6 @@
<agents_disconnection_alert_time>100s</agents_disconnection_alert_time>
</global>
<alerts>
<log_alert_level>3</log_alert_level>
<email_alert_level>12</email_alert_level>
</alerts>
<!-- Choose between "plain", "json", or "plain,json" for the format of internal logs -->
<logging>
<log_format>plain</log_format>
@ -281,13 +276,6 @@
<rule_dir>etc/rules</rule_dir>
</ruleset>
<rule_test>
<enabled>yes</enabled>
<threads>1</threads>
<max_sessions>64</max_sessions>
<session_timeout>15m</session_timeout>
</rule_test>
<!-- Configuration for ossec-authd
To enable this service, run:
wazuh-control enable auth