Overview
Wazuh provides a unified security information and event management (SIEM) platform for Xloud environments. Agents deployed on compute instances forward security events, system logs, and file integrity alerts to a central Wazuh manager. The manager correlates events across all monitored instances, applies detection rules, and generates alerts for security incidents, compliance violations, and vulnerability findings.Prerequisites
- Wazuh manager 4.7 or later deployed (standalone or cluster)
- Network access from all instances to the Wazuh manager on TCP port 1514 (agent enrollment) and TCP port 1515 (agent registration)
sudoor root access on instances for agent installation- Ansible for automated bulk deployment (recommended for more than 5 instances)
Architecture
Components
| Component | Role |
|---|---|
| Wazuh Agent | Installed on each monitored instance — collects logs, monitors files, and reports to the manager |
| Wazuh Manager | Receives agent data, evaluates detection rules, and generates security alerts |
| Wazuh Indexer | OpenSearch-based index for storing and querying security events |
| Wazuh Dashboard | Web UI for alert review, compliance reports, and agent management |
Agent Deployment
Manual Installation (Single Instance)
- Linux (Ubuntu/Debian)
- Linux (RHEL/Rocky)
Install the agent
Install Wazuh agent
<wazuh-manager-ip> with the IP address of your Wazuh manager.Bulk Deployment via Ansible
Deploy Wazuh agents to all Xloud instances using the Ansible dynamic inventory:playbooks/wazuh-deploy.yml
Deploy Wazuh agents to all instances
Log Collection Configuration
Configure the agent to forward specific log files to the Wazuh manager for centralized analysis:/var/ossec/etc/ossec.conf (log collection section)
File Integrity Monitoring
Wazuh monitors filesystem paths for unauthorized modifications — files added, deleted, or modified outside of expected change windows trigger alerts:/var/ossec/etc/ossec.conf (FIM section)
Compliance Reporting
Wazuh includes pre-built compliance rule mappings for common frameworks. Enable compliance scanning in the agent configuration:| Framework | Coverage | Wazuh Rule Group |
|---|---|---|
| CIS Ubuntu 22.04 | Level 1 and Level 2 | cis_ubuntu_linux_22-04 |
| PCI DSS 3.2.1 | Requirements 6, 10, 11 | pci_dss |
| HIPAA | Security rule subset | hipaa |
| NIST 800-53 | Control families | nist_800_53 |
Verification
- Wazuh Dashboard
- CLI
Navigate to the Wazuh Dashboard at
http://<wazuh-dashboard-host>:5601:- Open Agents — all deployed instances appear with status Active
- Open Security Events — incoming events from agents are visible in real time
- Open Integrity Monitoring — file change events appear per monitored path
- Open Regulatory Compliance — compliance scores per instance
All agents show Active status. Events are flowing from monitored instances.
Troubleshooting
Agent shows Disconnected in Wazuh Dashboard
Agent shows Disconnected in Wazuh Dashboard
Cause: The agent cannot reach the Wazuh manager on TCP port 1514, or the agent
service stopped.Resolution:Verify that the security group for the instance allows outbound TCP 1514 to the manager.
Check agent service status
Test connectivity to manager
Agent registered but no events in Dashboard
Agent registered but no events in Dashboard
Cause: Log collection paths do not exist, or the agent configuration has a syntax
error.Resolution:Check
Validate agent configuration
Restart agent after config change
/var/ossec/logs/ossec.log on the instance for parsing errors.Bulk deployment fails on some instances
Bulk deployment fails on some instances
Cause: Package manager repository not reachable from instance (outbound internet
blocked), or wrong OS family detected.Resolution: Ensure instances have outbound HTTP/HTTPS access to
packages.wazuh.com, or host the Wazuh packages internally and update the repository
URL in the playbook. Use --limit to re-run the playbook on failed hosts only.Next Steps
Ansible Integration
Automate Wazuh agent deployment and configuration updates using Ansible playbooks
Prometheus Integration
Complement Wazuh security events with infrastructure metrics from Prometheus
Grafana Dashboards
Build unified security and operations dashboards combining Wazuh and Prometheus data
Key Manager
Store Wazuh registration keys securely in Xloud Key Manager