Hello there,
Thank you for asking Wazuh. I hope you are very well.
If you are trying to use the Search input in the Security events, you can use for example "data.privateIpAddress:10.0.0.1" to reach the json formatted data. You should be able to create any filter for those Fields to include or exclude them from the list.
Could you please confirm you are getting the logs in Kibana in the Security events? If you are unable to filter or search for them, please let me know and I'm glad to help you with this issue if you share with me some more information about the Elasticsearch indexes.
As you can see in the following example, the logs can be reached depending on the json level you are getting the field:
In this case, you should search for data.aws.sourceIPAddress:10.0.0.1 or you can create a Filter for the Field data.aws.sourceIPAddress - Operator: is - Value: 10.0.0.1 (In the Filter you'll get a list of the allowed fields for all the listed events).
Hope this helps! Anything you need, please let me know.
Kind regards,
Cesar Moreno.