Skip to content

Commit 807e25e

Browse files
committed
Remove deprecated references for plain text auth in AWS wodle
1 parent ec29bc0 commit 807e25e

File tree

3 files changed

+2
-84
lines changed

3 files changed

+2
-84
lines changed

source/cloud-security/amazon/services/prerequisites/considerations.rst

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Reparse
3636
-------
3737

3838
.. warning::
39-
39+
4040
Using the ``reparse`` option will fetch and process all the logs from the starting date until the present. This process may generate duplicate alerts.
4141

4242
To fetch and process older logs, you need to manually run the module using the ``--reparse`` option.
@@ -231,6 +231,7 @@ The `service_endpoint` and `sts_endpoint` tags can be used to specify the VPC en
231231
</bucket>
232232
233233
<bucket type="cloudtrail">
234+
<aws_profile>default</aws_profile>
234235
<name>wazuh-cloudtrail-2</name>
235236
<aws_profile>default</aws_profile>
236237
<iam_role_arn>arn:aws:iam::xxxxxxxxxxx:role/wazuh-role</iam_role_arn>

source/cloud-security/amazon/services/prerequisites/credentials.rst

Lines changed: 0 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,6 @@ There are multiple ways to configure the AWS credentials:
1616
- `IAM Roles`_
1717
- `IAM roles for EC2 instances`_
1818
- `Environment variables`_
19-
- `Insert the credentials into the configuration`_
2019

2120
Create an IAM User
2221
------------------
@@ -182,20 +181,3 @@ If you're using a single AWS account for all your buckets this could be the most
182181

183182
* ``AWS_ACCESS_KEY_ID``
184183
* ``AWS_SECRET_ACCESS_KEY``
185-
186-
Insert the credentials into the configuration
187-
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
188-
189-
.. deprecated:: 4.4.0
190-
191-
Another available option to set up credentials is writing them right into the Wazuh configuration file (``/var/ossec/etc/ossec.conf``), inside of the ``<bucket>`` block on the module configuration.
192-
193-
This is an example configuration:
194-
195-
.. code-block:: xml
196-
197-
<bucket type="cloudtrail">
198-
<name>my-bucket</name>
199-
<access_key>insert_access_key</access_key>
200-
<secret_key>insert_secret_key</secret_key>
201-
</bucket>

source/user-manual/reference/ossec-conf/wodle-s3.rst

Lines changed: 0 additions & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -157,10 +157,6 @@ The available types are: ``cloudtrail``, ``guardduty``, ``vpcflow``, ``config``
157157
+----------------------------------------+-------------------------------------------------------------+-----------------------------------------------+
158158
| :ref:`bucket_account_alias` | Any string | Optional |
159159
+----------------------------------------+-------------------------------------------------------------+-----------------------------------------------+
160-
| :ref:`bucket_access_key` | Alphanumerical key | Optional |
161-
+----------------------------------------+-------------------------------------------------------------+-----------------------------------------------+
162-
| :ref:`bucket_secret_key` | Alphanumerical key | Optional |
163-
+----------------------------------------+-------------------------------------------------------------+-----------------------------------------------+
164160
| :ref:`bucket_aws_profile` | Any string | Optional |
165161
+----------------------------------------+-------------------------------------------------------------+-----------------------------------------------+
166162
| :ref:`bucket_iam_role_arn` | IAM role ARN | Optional |
@@ -228,37 +224,6 @@ A user-friendly name for the AWS account.
228224
| **Allowed values** | Any string |
229225
+--------------------+-----------------------------+
230226

231-
.. _bucket_access_key:
232-
233-
access_key
234-
^^^^^^^^^^
235-
236-
.. deprecated:: 4.4.0
237-
238-
The access key ID for the IAM user with the permission to read logs from the bucket.
239-
240-
+--------------------+--------------------------+
241-
| **Default value** | N/A |
242-
+--------------------+--------------------------+
243-
| **Allowed values** | Any alphanumerical key |
244-
+--------------------+--------------------------+
245-
246-
.. _bucket_secret_key:
247-
248-
249-
secret_key
250-
^^^^^^^^^^
251-
252-
.. deprecated:: 4.4.0
253-
254-
The secret key created for the IAM user with the permission to read logs from the bucket.
255-
256-
+--------------------+--------------------------+
257-
| **Default value** | N/A |
258-
+--------------------+--------------------------+
259-
| **Allowed values** | Any alphanumerical key |
260-
+--------------------+--------------------------+
261-
262227
.. _bucket_aws_profile:
263228

264229
aws_profile
@@ -505,10 +470,6 @@ The available types are: ``cloudwatchlogs``, and ``inspector``.
505470
+----------------------------------------+-------------------------------------------------------------+-----------------------------------------------+
506471
| :ref:`service_aws_log_groups` | Comma-separated list of valid log group names | Mandatory for CloudWatch Logs |
507472
+----------------------------------------+-------------------------------------------------------------+-----------------------------------------------+
508-
| :ref:`service_access_key` | Any alphanumerical key | Optional |
509-
+----------------------------------------+-------------------------------------------------------------+-----------------------------------------------+
510-
| :ref:`service_secret_key` | Any alphanumerical key | Optional |
511-
+----------------------------------------+-------------------------------------------------------------+-----------------------------------------------+
512473
| :ref:`service_aws_profile` | Valid profile name | Optional |
513474
+----------------------------------------+-------------------------------------------------------------+-----------------------------------------------+
514475
| :ref:`service_discard_regex` | A regex to determine if an event must be discarded | Optional |
@@ -555,19 +516,6 @@ A user-friendly name for the AWS account.
555516
| **Allowed values** | Any string |
556517
+--------------------+-----------------------------+
557518

558-
.. _service_access_key:
559-
560-
access_key
561-
^^^^^^^^^^
562-
563-
The access key ID for the IAM user with the permission to access the service.
564-
565-
+--------------------+--------------------------+
566-
| **Default value** | N/A |
567-
+--------------------+--------------------------+
568-
| **Allowed values** | Any alphanumerical key |
569-
+--------------------+--------------------------+
570-
571519
.. _service_aws_log_groups:
572520

573521
aws_log_groups
@@ -581,19 +529,6 @@ A comma-separated list of log group names from where the logs should be extracte
581529
| **Allowed values** | Comma-separated list of valid log group names |
582530
+--------------------+------------------------------------------------+
583531

584-
.. _service_secret_key:
585-
586-
secret_key
587-
^^^^^^^^^^
588-
589-
The secret key created for the IAM user with the permission to access the service.
590-
591-
+--------------------+--------------------------+
592-
| **Default value** | N/A |
593-
+--------------------+--------------------------+
594-
| **Allowed values** | Any alphanumerical key |
595-
+--------------------+--------------------------+
596-
597532
.. _service_aws_profile:
598533

599534
aws_profile

0 commit comments

Comments
 (0)