
.png?part=0.1&view=1)
.png?part=0.1&view=1)
Jul 28 15:46:44 ip-x-x-x-x kibana[24344]: {"type":"log","@timestamp":"2021-07-28T15:46:44Z","tags":["info","plugins-system"],"pid":24344,"message":"Setting up [49] plugins: [opendistroAlertingKibana,uJul 28 15:46:44 ip-x-x-x-x kibana[24344]: {"type":"log","@timestamp":"2021-07-28T15:46:44Z","tags":["info","savedobjects-service"],"pid":24344,"message":"Waiting until all Elasticsearch nodes are compJul 28 15:46:44 ip-x-x-x-x kibana[24344]: {"type":"log","@timestamp":"2021-07-28T15:46:44Z","tags":["info","savedobjects-service"],"pid":24344,"message":"Starting saved objects migrations"}Jul 28 15:46:45 ip-x-x-x-x kibana[24344]: {"type":"log","@timestamp":"2021-07-28T15:46:45Z","tags":["info","plugins-system"],"pid":24344,"message":"Starting [49] plugins: [opendistroAlertingKibana,usaJul 28 15:46:45 ip-x-x-x-x kibana[24344]: {"type":"log","@timestamp":"2021-07-28T15:46:45Z","tags":["error","elasticsearch","data"],"pid":24344,"message":"[ResponseError]: Response Error"}Jul 28 15:46:45 ip-x-x-x-x kibana[24344]: {"type":"log","@timestamp":"2021-07-28T15:46:45Z","tags":["error","elasticsearch","data"],"pid":24344,"message":"[ResponseError]: Response Error"}Jul 28 15:46:45 ip-x-x-x-x kibana[24344]: {"type":"log","@timestamp":"2021-07-28T15:46:45Z","tags":["error","plugins","wazuh","initialize"],"pid":24344,"message":"Response Error"}Jul 28 15:46:45 i ip-x-x-x-x kibana[24344]: {"type":"log","@timestamp":"2021-07-28T15:46:45Z","tags":["error","plugins","wazuh","initialize"],"pid":24344,"message":"Response Error"}Jul 28 15:46:45 ip-x-x-x-x kibana[24344]: {"type":"log","@timestamp":"2021-07-28T15:46:45Z","tags":["listening","info"],"pid":24344,"message":"Server running at https://0.0.0.0:443"}Jul 28 15:46:46 ip-x-x-x-x kibana[24344]: {"type":"log","@timestamp":"2021-07-28T15:46:46Z","tags":["info","http","server","Kibana"],"pid":24344,"message":"http server running at https://0.0.0.0:443"}On Wednesday, July 28, 2021 at 7:14:47 AM UTC-4 Marc Bonoan wrote:Anythin else I could check? I have also done a complete restart of the server. Disk usage and Resources on the server are fine as wellOn Tuesday, July 27, 2021 at 9:23:32 AM UTC-4 Marc Bonoan wrote:Other logs in alerts.log are showing up in kibana like this oneRule: 80202 (level 3) -> 'AWS Cloudtrail: wafv2.amazonaws.com - UpdateIPSet.'
{"integration": "aws", "aws": {"log_info": {"aws_account_alias": "", "log_file": "AWSLogs/217785959066/CloudTrail/ca-central-1/2021/07/27/217785959066_CloudTrail_ca-central-1_20210727T1305Z_WR0drDlZPOBctxag.json.gz", "s3bucket": "aws-cloudtrail-logs-217785959066-39b5d175"}, "eventVersion": "1.08", "userIdentity": {"type": "AssumedRole", "principalId": "AROATFNIOAKNMNE4TZYJY:AWSWAFSecurityAutomations-ALB-LogParser-JXYNGQDYI153", "arn": "arn:aws:sts::217785959066:assumed-role/AWSWAFSecurityAutomations-ALB-LambdaRoleLogParser-197YMCD6OZ6XR/AWSWAFSecurityAutomations-ALB-LogParser-JXYNGQDYI153", "accountId": "217785959066", "accessKeyId": "ASIATFNIOAKND6UQK7R2", "sessionContext": {"sessionIssuer": {"type": "Role", "principalId": "AROATFNIOAKNMNE4TZYJY", "arn": "arn:aws:iam::217785959066:role/AWSWAFSecurityAutomations-ALB-LambdaRoleLogParser-197YMCD6OZ6XR", "accountId": "217785959066", "userName": "AWSWAFSecurityAutomations-ALB-LambdaRoleLogParser-197YMCD6OZ6XR"}, "webIdFederationData": {}, "attributes": {"creationDate": "2021-07-27T11:52:17Z", "mfaAuthenticated": "false"}}}, "eventTime": "2021-07-27T13:02:22Z", "eventSource": "wafv2.amazonaws.com", "eventName": "UpdateIPSet", "awsRegion": "ca-central-1", "sourceIPAddress": "99.79.127.250", "userAgent": "Boto3/1.17.42 Python/3.8.10 Linux/4.14.231-180.360.amzn2.x86_64 exec-env/AWS_Lambda_python3.8 Botocore/1.20.42", "requestParameters": {"name": "AWSWAFSecurityAutomations-ALBScannersProbesSetIPV6", "scope": "REGIONAL", "id": "68c42720-6b70-4661-b517-bd59ce7a145b", "description": "Block Scanners/Probes IPV6 addresses", "addresses": [], "lockToken": "b783e843-c303-41da-a71d-168c4291d89b"}, "responseElements": {"nextLockToken": "af1c23bb-e966-496d-849e-1cb0b1f47a85"}, "requestID": "162cd5ef-571a-4fba-b7a2-7b649fe50679", "eventID": "d411de6a-c008-4db9-b279-3de67365cb11", "readOnly": false, "eventType": "AwsApiCall", "apiVersion": "2019-04-23", "managementEvent": true, "recipientAccountId": "217785959066", "eventCategory": "Management", "source": "cloudtrail", "aws_account_id": "217785959066", "source_ip_address": "99.79.127.250"}}
integration: aws
aws.log_info.log_file: AWSLogs/217785959066/CloudTrail/ca-central-1/2021/07/27/217785959066_CloudTrail_ca-central-1_20210727T1305Z_WR0drDlZPOBctxag.json.gz
aws.log_info.s3bucket: aws-cloudtrail-logs-217785959066-39b5d175
aws.eventVersion: 1.08
aws.userIdentity.type: AssumedRole
aws.userIdentity.principalId: AROATFNIOAKNMNE4TZYJY:AWSWAFSecurityAutomations-ALB-LogParser-JXYNGQDYI153
aws.userIdentity.arn: arn:aws:sts::217785959066:assumed-role/AWSWAFSecurityAutomations-ALB-LambdaRoleLogParser-197YMCD6OZ6XR/AWSWAFSecurityAutomations-ALB-LogParser-JXYNGQDYI153
aws.userIdentity.accountId: 217785959066
aws.userIdentity.accessKeyId: ASIATFNIOAKND6UQK7R2
aws.userIdentity.sessionContext.sessionIssuer.type: Role
aws.userIdentity.sessionContext.sessionIssuer.principalId: AROATFNIOAKNMNE4TZYJY
aws.userIdentity.sessionContext.sessionIssuer.arn: arn:aws:iam::217785959066:role/AWSWAFSecurityAutomations-ALB-LambdaRoleLogParser-197YMCD6OZ6XR
aws.userIdentity.sessionContext.sessionIssuer.accountId: 217785959066
aws.userIdentity.sessionContext.sessionIssuer.userName: AWSWAFSecurityAutomations-ALB-LambdaRoleLogParser-197YMCD6OZ6XR
aws.userIdentity.sessionContext.attributes.creationDate: 2021-07-27T11:52:17Z
aws.userIdentity.sessionContext.attributes.mfaAuthenticated: false
aws.eventTime: 2021-07-27T13:02:22Z
aws.eventSource: wafv2.amazonaws.com
aws.eventName: UpdateIPSet
aws.awsRegion: ca-central-1
aws.sourceIPAddress: 99.79.127.250
aws.userAgent: Boto3/1.17.42 Python/3.8.10 Linux/4.14.231-180.360.amzn2.x86_64 exec-env/AWS_Lambda_python3.8 Botocore/1.20.42
aws.requestParameters.name: AWSWAFSecurityAutomations-ALBScannersProbesSetIPV6
aws.requestParameters.scope: REGIONAL
aws.requestParameters.id: 68c42720-6b70-4661-b517-bd59ce7a145b
aws.requestParameters.description: Block Scanners/Probes IPV6 addresses
aws.requestParameters.addresses: []
aws.requestParameters.lockToken: b783e843-c303-41da-a71d-168c4291d89b
aws.responseElements.nextLockToken: af1c23bb-e966-496d-849e-1cb0b1f47a85
aws.requestID: 162cd5ef-571a-4fba-b7a2-7b649fe50679
aws.eventID: d411de6a-c008-4db9-b279-3de67365cb11
aws.readOnly: false
aws.eventType: AwsApiCall
aws.apiVersion: 2019-04-23
aws.managementEvent: true
aws.recipientAccountId: 217785959066
aws.eventCategory: Management
aws.source: cloudtrail
aws.aws_account_id: 217785959066
aws.source_ip_address: 99.79.127.250
On Tue, Jul 27, 2021 at 9:00 AM Marc Bonoan <marc....@performanceadvantage.ca> wrote:
- An example of the alert from alerts.json file
** Alert 1627348565.3521493: - test_dev_app_logs
2021 Jul 27 01:16:05 ip-180-1-15-145->Wazuh-AWS
Rule: 100201 (level 3) -> 'Dev EXPRESS Logs'
Src IP: 46.165.195.139
2021 Jul 27 00:48:43 EXPRESS: {"level":"debug","label":"EXPRESS","timestamp":"2021 Jul 27 00:48:43","message":"46.165.195.139 - - [27/Jul/2021:00:48:43 +0000] \"GET /api/ping HTTP/1.1\" 200 4 \"-\" \"Pingdom.com_bot_version_1.4_(http://www.pingdom.com/)\"","environment":"development","meta":{"environment":"development"}}
level: debug
label: EXPRESS
timestamp: 2021 Jul 27 00:48:43
message: 46.165.195.139 - - [27/Jul/2021:00:48:43 +0000] "GET /api/ping HTTP/1.1" 200 4 "-" "Pingdom.com_bot_version_1.4_(http://www.pingdom.com/)"
environment: development
meta.environment: development
meta.request_date: 27/Jul/2021:00:48:43
meta.request_method: GET
meta.request_url: /api/ping
meta.request_protocol: HTTP/1.1
meta.response_code: 200
meta.response_size: 4
- Check if Filebeat is reading the alerts: lsof /var/ossec/logs/alerts/alerts.json
filebeat 18037 root 8r REG 202,1 323237113 663351 /var/ossec/logs/alerts/alerts.json
ossec-ana 18343 ossec 15w REG 202,1 323237113 663351 /var/ossec/logs/alerts/alerts.json
- Filebeat can reach and connect to Elasticsearc: filebeat test output
elasticsearch: https://127.0.0.1:9200...
parse url... OK
connection...
parse host... OK
dns lookup... OK
addresses: 127.0.0.1
dial up... OK
TLS...
security: server's certificate chain verification is enabled
handshake... OK
TLS version: TLSv1.3
dial up... OK
talk to server... OK
version: 7.10.0
- Run the shown commands in dev tools of kibana:
- GET _cluster/allocation/explain
{
"index" : "security-auditlog-2021.06.24",
"shard" : 0,
"primary" : false,
"current_state" : "unassigned",
"unassigned_info" : {
"reason" : "CLUSTER_RECOVERED",
"at" : "2021-07-26T19:20:51.243Z",
"last_allocation_status" : "no_attempt"
},
"can_allocate" : "no",
"allocate_explanation" : "cannot allocate because allocation is not permitted to any of the nodes",
"node_allocation_decisions" : [
{
"node_id" : "fJaAPxI-R_WzVSclZ-s-aw",
"node_name" : "node-1",
"transport_address" : "127.0.0.1:9300",
"node_decision" : "no",
"deciders" : [
{
"decider" : "same_shard",
"decision" : "NO",
"explanation" : "a copy of this shard is already allocated to this node [[security-auditlog-2021.06.24][0], node[fJaAPxI-R_WzVSclZ-s-aw], [P], s[STARTED], a[id=8jkFot0-Q4GJVGR3R9_XCQ]]"
}
]
}
]
}
- GET _cluster/health
#! Deprecation: this request accesses system indices: [.kibana_1, .opendistro-anomaly-detector-jobs, .opendistro-anomaly-detectors], but in a future major version, direct access to system indices will be prevented by default
{
"cluster_name" : "elasticsearch",
"status" : "yellow",
"timed_out" : false,
"number_of_nodes" : 1,
"number_of_data_nodes" : 1,
"active_primary_shards" : 753,
"active_shards" : 753,
"relocating_shards" : 0,
"initializing_shards" : 0,
"unassigned_shards" : 124,
"delayed_unassigned_shards" : 0,
"number_of_pending_tasks" : 0,
"number_of_in_flight_fetch" : 0,
"task_max_waiting_in_queue_millis" : 0,
"active_shards_percent_as_number" : 85.86088939566704
}
--
You received this message because you are subscribed to the Google Groups "Wazuh mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/e22c1d2a-3e66-48f0-9927-5372608a8f7an%40googlegroups.com.
--Marc BonoanIT Manager
--Marc BonoanIT Manager