Awesome Open Source
Awesome Open Source

Wazuh - Chef

Slack Email Documentation Documentation

Deploy the Wazuh platform using Chef cookbooks. Chef recipes are prepared for installing and configuring Agent, Manager (cluster) and RESTful API.

Compatibility Matrix

Wazuh version Elastic ODFE
v4.4.0 v7.10.2 v1.13.2
v4.3.0 v7.10.2 v1.13.2
v4.2.5 v7.10.2 v1.13.2
v4.2.4 v7.10.2 v1.13.2
v4.0.4 v7.9.3 v1.11.0


All the dependencies necessary to install cookbooks are listed inside the following files:

  • Berksfile: has defined the cookbooks path for Kitchen tests
  • metadata.rb: minimum distributions verions
  • Gemfile.rb: Ruby gems for testing

There is software that must be installed to ensure the correct installation.


Chef gives plenty of software packages solution depending on how you want to distribute the software. Please refer to the platform overview documentation for further information. We recommend using Chef Workstation for testing.



You can find predefined roles for a default installation of:

  1. wazuh_server: Wazuh Manager and Filebeat
  2. wazhu_server_oss: Wazuh Manager and Filebeat OSS
  3. wazuh_agent: Wazuh Agent
  4. elastic_stack: Elasticsearch and Kibana
  5. opendistro: Elasticsearch OSS and Kiban OSS

Check roles README for more information about default attributes and how to customize your installation.


Cloning whole repository

You can clone the repository by running: git clone and you will get the whole repository.

Use through Berkshelf

The easiest way to making use of these cookbooks is by including in your Berksfile the desired cookbooks as stated below:

cookbook "wazuh_agent", git: "", rel: 'cookbooks/wazuh_agent'
cookbook "wazuh_server", git: "", rel: 'cookbooks/wazuh_manager'
cookbook 'opendistro', git: '', rel: 'cookbooks/opendistro'
cookbook 'elastic-stack', git: '', rel: 'cookbooks/elastic-stack'
cookbook 'filebeat', git: '', rel: 'cookbooks/filebeat'
cookbook 'filebeat-oss', git: '', rel: 'cookbooks/filebeat-oss'

You can specify tags, branches, and revisions. More info on


The following describes how to define the needed JSON files to generate an encrypted data bag.

Important: If API user secret is declared will be installed. Otherwise, the default user will be foo:bar.


It contains the username and password that will be installed for Wazuh API authentication. Is required by the manager.

Example of a configuration file api_configuration.json before encryption:

 "id": "api",
 "htpasswd_user": "<YOUR USER>",
 "htpasswd_passcode": "<YOUR PASSWORD>"

Using Data Bags

To transfer our credentials securely, Chef provides data_bags that allows encrypting some sensitive data before communication.

The following process describes an example of how to create secrets and data bags to encrypt data.

  • Install a key or generate one (with OpenSSL for example) on your Workstation openssl rand -base64 512 | tr -d '\r\n' > /tmp/encrypted_data_bag_secret

  • Create the required secret by using : knife data bag from file wazuh_secrets ./api_configuration.json --secret-file /tmp/encrypted_data_bag_secret -z

  • Upload your new secrets with knife upload /

  • Before installing Wazuh-Manager, Wazuh-Filebeat or Wazuh-Elastic you will need to copy the key in /etc/chef/encrypted_data_bag_secret (default path) or in the desired path (remember to specify the key path in knife.rb and config.rb) of your workstation.

After encryption, the previous JSON files will have new fields that describe the encryption method and other useful info. For example api.json after encryption will look like this:

  "id": "api",
  "htpasswd_user": {
    "encrypted_data": "whdiITsM/JFBwiAcCE5MaVE2MinRLdDIGbJ0\n",
    "iv": "NVK/ezXHBsSFuiMm\n",
    "auth_tag": "NFPZcxGrjqxRSF7v/+i6Kw==\n",
    "version": 3,
    "cipher": "aes-256-gcm"
  "htpasswd_passcode": {
    "encrypted_data": "rX952YaNifO1gtcFXHxjteKCk6Zi592FZGgyE1gs0A==\n",
    "iv": "LThJWRCIB4JaDP4E\n",
    "auth_tag": "2oS9JDBtNdcRhsOdgg/A9A==\n",
    "version": 3,
    "cipher": "aes-256-gcm"

Using Chef Vault

Chef Vault provides an easier way to manage Data bags and configure them. To configure it you can follow these steps:

  • Configure knife.rb or config.rb and add knife[:vault_mode] = 'client' to make the workstation transfer vault to the server.

  • Create the vault with:

knife vault create wazuh_secrets api '{"id": "api", "htpasswd_user": "user", "htpasswd_passcode": "password"}' -A "username" -C "manager-1"

Where -A defines the workstation users authorized to modify/edit the vault and -C defines the nodes that have access to the defined vault.

After that, the vault will be created and synced with the server. The defined nodes will store the required keys to decrypt the vault content and consume it.

You can check Chef Official Documentation about Chef Vault for detailed info.

Choose to register an agent into a manager or not

Now we give the possibility to choose to register an agent after being configured and installed in a manager.

To connect an agent with the manager simply modify the wazuh-chef/roles/wazuh_agent.json with the manager IP address:


Since Wazuh 4.0, by default, the agent registers automatically against the manager through enrollment. Configuration details can be found on Enrollment section.


If you want to contribute to our project please don't hesitate to send a pull request. You can also join our users mailing list, by sending an email to [email protected], to ask questions and participate in discussions.

License and copyright

Wazuh App Copyright (C) 2019 Wazuh Inc. (License GPLv2)


Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
Ruby (305,174
Security (9,009
Monitoring (4,213
Elasticsearch (3,848
Chef (674
Compliance (260
Incident Response (229
Security Hardening (200
Ids (195
Vulnerability Detection (186
Intrusion Detection (139
Log Analysis (115
Loganalyzer (68
Pci Dss (56
Wazuh (40
Ossec (38
Security Awareness (22
File Integrity Management (20
Policy Monitoring (20
Openscap (19
Related Projects